Are you investing wisely in threat intelligence?

Download this free guide from Recorded Future to learn the 11 questions you must answer before buying threat intelligence.

The daily briefing.

Special Section: SINET ITSEF (our regular summary appears below)

We wrap up our coverage of SINET's annual ITSEF conference with today's issue. Among the many interesting takeaways from the conference were the importance of resilience, clarity about one's own enterprise, the relative likelihood of falling victim to a mundane threat, and the shifting regulatory landscape.

Incident response planning, exercises that teach and test those plans, and a sound understanding of an organization's mission seen as essential to achieving resilience, defined as the ability to fight through an attack and continue to do business. If that sounds military, it is: a number of industry experts thought resilience was an area where the private sector could learn much to its profit from soldiers.

Speakers emphasized that most of the damage done by attackers was accomplished not through rare, exotic, and sophisticated attacks using never-before seen zero-days, but through social engineering, credential stuffing, and attacks on unpatched systems using known exploits. Cyber hygiene was therefore much recommended.

With respect to regulation, businesses should expect to be held liable for much of what goes on in their customers' endpoints; indeed, data themselves may well be on their way to becoming "the new endpoint." The EU's GDPR and the US Federal Trade Commission are two engines driving this shift.

You'll find some detailed accounts of the conference in our event coverage.

Today's regular daily summary starts here.

UK Prime Minister May has demanded an explanation from Russia, by midnight tonight, of the March 4th attempted assassination by nerve agent of former GRU officer Sergei Skripal and his daughter Yulia. Russia will not comply: Foreign Minister Lavrov dismissed any notion of Russian complicity as "nonsense." Essentially no one believes this. The poison used was an unusual nerve agent developed by the Soviet Union during the Cold War's endgame.

The UK has darkly promised some form of retaliation. Home Secretary Rudd said the retaliation may be covert or clandestine, which, taken with last week's Cabinet statement on cyber defense, is being read as hinting at retaliation with some form of cyber attack.

Palo Alto Networks' Unit 42 this morning published a report on HenBox, a family of Android malware that represents itself as legitimate apps available in third-party app stores. HenBox is spyware, an information-stealer that seems designed to target China's Muslim Uyghur minority. Unit 42 doesn't offer attribution, but the target set strongly suggests a Chinese government domestic intelligence operation.

NCC Group reports that a Chinese threat actor, APT15 (also known as Ke3chang, Mirage, Vixen Panda, or Playful Dragon) has been actively prospecting British Government agencies and defense contractors through a series of backdoors.

The US Government has for reasons of national security stopped Broadcom's attempted hostile takeover of Qualcomm.

The AP reports this morning that US President Trump has dismissed Secretary of State Rex Tillerson. Director of Central Intelligence Mike Pompeo is said to be his replacement.


Cylance is proud to be the CyberWire sustaining sponsor for 2018. Learn more about how Cylance prevents cyberattacks at

Today's edition of the CyberWire reports events affecting Australia, China, the European Union, the Holy See, Myanmar, Pakistan, Russia, Syria, Turkey, Ukraine, the United Kingdom, and the United States.

Intelligent response to doing more with less

Phishing, ransomware, and data breaches plague organizations of all sizes and industries, but the financial services market has always had the largest target on its back. How do you fend off these attacks when you don’t have the budget or resources for everything you need to protect your organization: data feeds, tools, analysis and mitigation? Learn more in our webinar on Wednesday, March 21 @ 2pm ET. Sign up now!

On the Podcast

In today's podcast we speak with our partners at the University of Bristol, as Awais Rashid discusses cyber physical systems. Our guest is Tom Badders from Telos who reviews obfuscation as applied to threat intelligence.

Sponsored Events

How to Sell Your Cyber Startup's Software to Large Fortune 500 Companies (Fulton, Maryland, USA, March 15, 2018) Joe Silva, VP Cyber Threat & Intelligence at TransUnion, will share his perspective on how large Fortune 500 companies approach buying software from cyber start-ups. Early stage founders and technology innovators come to learn, network & enjoy free food & beverages.

Billington International Cybersecurity Summit (Washington, DC, USA, March 21, 2018) Billington International Cybersecurity Summit, March 21, Washington, D.C. Cybersecurity leaders from Asia, Europe, the Middle and U.S. on global threats and best practices, including Acting DoD CIO and Singapore Cyber Commissioner-designate. Sponsor Opportunities: Sandy Nuwar at 443-994-9832

Cyber Security Summits: Denver on March 22 & May 15 in Dallas (Denver, Colorado, USA, March 22, 2018) Sr. Level Executives are invited to learn about the latest threats & solutions in Cyber Security from experts from The FBI, Darktrace, IBM and more. Register with promo code cyberwire50 for half off your admission (Regular price $350)

Third Annual Cyber Investing Summit 5/15/18 (New York, New York, USA, May 15, 2018) Renowned cyber security executive David DeWalt will deliver the keynote address at the Third Annual Cyber Investing Summit. The Cyber Investing Summit is a unique all-day conference focused on the financial opportunities available in the rapidly growing cyber security industry. Panels will explore sector investment strategies, market growth forecasts, equity valuations, merger and acquisition activity, cryptocurrency protection, funding for startups, and more. Speakers include leading Chief Information Security Officers, VC founders, financial analysts, cyber security innovators from publicly traded and privately held companies, and government experts.

Selected Reading

Dateline Mountain View: the latest from SINET ITSEF 2018

What makes for resilience? Planning and drill. (The CyberWire) From the military school of life: what are soldiers made of? Planning and drill, all kinds of drill. Industry, take note.

Implications of the Internet-of-things. (The CyberWire) The IoT's vast expansion of enterprise attack surfaces is deeply troubling even when you confine your concerns to consumer-level IoT devices. When you consider the industrial IoT, it can be terrifying.

Emerging threats (and, again, especially those emerging from the IoT) (The CyberWire) Those interested in discerning where the next wave of threats will gather need look no farther than the Internet-of-things.

"Internet Insurrection," and the changing economics of cybercrime (The CyberWire) Cybercrime and government regulation in response to that crime are changing the online economy. Both legitimate and criminal markets are being shaped in new and unfamiliar ways.

Data as endpoint. (The CyberWire) Many things are being called the "new endpoint." Would data be among them?

100 coins: an exercise in trade-offs (The CyberWire) A panel discussion applied the national security strategic planning process "100 Coins," essentially a thought-experiment that facilitates identification of strategic priorities.

SINET Security Conference Summary and Observations March 7-8, 2018 (Control Global) I participated in the 2018 SINET Security Conference in Mt. View, CA. The agenda can be found at There was a dearth of control system cyber discussions and a lack of control system cyber security understanding by many.

Cyber Attacks, Threats, and Vulnerabilities

HenBox: The Chickens Come Home to Roost (Palo Alto Networks Blog) Unit 42 discovers HenBox, an Android Malware family masquerading as legitimate apps on third-party app stores.

CCleaner Attackers Intended To Deploy Keylogger In Third Stage (Threatpost) As investigations continue about the backdoor that was planted in CCleaner, Avast said it has found that the actors behind the attack were planning to install a third round of malware on compromised computers.

APT15 hacking group linked to Chinese intelligence accused of hacking UK government contractor and stealing military secrets (Computing) Google Cloud used by Chinese hackers as part of command and control infrastructure for nation-state attack, claims NCC Group

China-Linked Spies Used New Malware in U.K. Government Attack (SecurityWeek) A China-linked cyber espionage group used new backdoors in an attack aimed at a company that provides services to the UK government

Report highlights how deep packet inspection could be subverted by cybercriminals (Fierce Wireless) DPI middleboxes developed by Sandvine PacketLogic are apparently being misused by state-sponsored cybercriminals.

Olympic Destroyer: A False Flag Confusion Bomb (Threatpost) Researchers say the case of Olympic Destroyer malware show how threat actors can manipulate “geopolitical agenda” with false flags.

Winter Olympics Gold Medal for False Flag Goes to ... ? (BankInfo Security) Whoever unleashed malware designed to disrupt last month's Winter Olympics in Pyeongchang, South Korea, designed it to look like it had been executed by a group of

Russia Didn’t Abuse Facebook—It Simply Used It As Intended (WIRED) Opinion: When ISIS uses Twitter to recruit or a landlord uses Airbnb to discriminate, that’s not exploiting the platforms' glitches—that’s using their features.

UN says Facebook is accelerating ethnic violence in Myanmar (TechCrunch) The United Nations has warned that Facebook's platform is contributing to the spread of hate speech and ethnic violence in crisis hit Myanmar.

Vehicle Ramming, from the Middle East to Charlottesville: How do Tactics Spread? (Modern War Institute) Abdelrahman al-Shaludi was from Silwan in East Jerusalem. James Fields was from Ohio. One was associated with Hamas and the other with white supremacists.  The two have very little in common, except one thing: both chose to turn a car into a weapon. Despite their differences, their decisions to weaponize their vehicles bookended the spread …

Peter Cochrane: Escaping the comfortable rabbit hole of social-media agreement (Computing) Has social media killed reasoned debate? And, if so, how do we re-inject civility back into public discourse, asks Peter Cochrane

Fake Fortnite Mobile iOS Invites Being Pushed On Social Sites (BleepingComputer) Whenever something newsworthy comes out there will always be people who try to take advantage of it. A perfect example of this is the Fortnite iOS mobile invite that launched today, where people are impatiently waiting for the invite codes to be released, while others try to trick them into purchasing fake ones.

Cortana vulnerability allows hackers to bypass Windows passwords (CRN Australia) Security risk allows hackers to install malware.

How did it all start? Early Memcached DDoS Attack Precursors and Ransom Notes (SANS Internet Storm Center) The past weeks we’ve seen several large DDoS attacks taking advantage of public accessible memcached instances.

Payload delivery via SMB (SANS Internet Storm Center) This weekend, while reviewing the collected data for the last days, I found an interesting way to drop a payload to the victim.

Exclusive: Cyber-criminals are selling victim's selfies on the dark web (The Next Web) You can buy almost anything on the dark web. The shrouded underbelly of the Internet is most known for its clandestine markets that make a brisk trade in the sale of drugs, weapons, and the details and identities of millions of people. It’s the latter category that’s taken an interesting turn, with some cyber-criminals now …

Life is cheap! Well it is on Dark Web where your entire identity is for sale (HackRead) Your Entire Identity Is Up for Sale at the Dark Web - Startling Revelations by UK’s top VPN Comparison Service.

Culture issues creating open season for phishing (Channelnomics) Customer gaps in instilling security in daily culture is leaving the channel continuously tangled in phishing lines

Two-Fifths of NHS Staff Break Policy Via WhatsApp Use: Report (Infosecurity Magazine) Two-Fifths of NHS Staff Break Policy Via WhatsApp Use: Report. Shadow IT challenge exposes patient data to risk, says CommonTime

Security Patches, Mitigations, and Software Updates

Microsoft forced upgrades on Windows 10 machines set to block updates (Computerworld) For the third time in the past four months, Microsoft 'accidentally' upgraded Windows 10 1703 machines to version 1709 in spite of explicit, correctly applied, deferral settings.

Cyber Trends

20 Percent Say IoT Is Chief Mobile Security Concern, According to Verizon Report (Sourcing Journal) It’s funny how companies that aren’t acting on mobile security just so happen to be more likely to suffer a cyber incident or significant downtime as a result.


US blocks Broadcom acquisition of Qualcomm citing national security (Computing) President Trump follows CFIUS recommendation and blocks Broadcom's mega-bid for Qualcomm

Legislators react: 'The national security aspect of this cannot be overstated.' (San Diego Union Tribune) President Trump quashed Broadcom's hostile takeover bid of San Diego-based tech giant Qualcomm.

EclecticIQ grows customer base by 100 percent, establishes North American Headquarters and continues expanding to strategic regions (EclecticIQ) Series-B investment unlocks additional growth of customer base. Optimized product portfolio for jumpstarting and advancing threat intelligence practice

Zscaler IPO: A (Good) Sign of Things to Come? (SharesPost) Zscaler will be the first unicorn to hit Wall Street this year so investors are naturally playing close attention to the San Jose-based cybersecurity firm’s IPO, tentatively planned for March 16. The company plans to sell up 11.5 million shares at $10 to $12 per share. Zscaler, which will operate under the ticker ZS, could raise up to $112 million.

Sedulo Group Strengthens Position in Cybertechnology Space with Addition of Industry Vets (PR Newswire) Sedulo Group today announced that Alysse Nockels, former Director of...

Products, Services, and Solutions

The Next Gen Infection Monkey is Here (GuardiCore Labs) GuardiCore labs are pleased to announce a new version of our Infection Monkey open source attack simulation tool with several significant enhancements.

Equinix Enhances Its Global Platform with New Cloud Security Service to Manage Encryption Keys (PR Newswire) Equinix, Inc. (Nasdaq: EQIX), the global interconnection and...

Ann Arbor's Duo Security launches cybersecurity website called Decipher ( "We're trying to help educate and inspire people around security and privacy and get people who might not be as well versed or think they don't need to know as much about it to make better choices."

Maryland cybersecurity company SecuLore Solutions is helping to assess the state's 911 system ( Baltimore) The Anne Arundel County company is joining with Mission Critical Partners to document assets and potential vulnerabilities.

Aryaka Unveils Security Platform with Radware, Zscaler, Palo Alto (Channel Partners) Aryaka, the software-defined wide area networking (SD-WAN provider), introduced a security platform and ecosystem The vendor has partnered with Radware, Palo Alto Networks and Zscaler to provide industrial-grade security measures.

Technologies, Techniques, and Standards

IIC Publishes Best Practices for Securing Industrial Endpoints (SecurityWeek) The Industrial Internet Consortium (IIC) has published a new paper designed to provide a concise overview of the countermeasures necessary to secure industrial endpoints; that is, the industrial internet of things (IIoT).

Energy Joins in Collaborative Cybersecurity EffortEnergy Joins in Collaborative Cybersecurity Effort (Automation World) With energy discussions at CERAWeek as the backdrop, three additional companies signed on to the Charter of Trust, a cooperation initiated by...

If War Comes, Russia Could Disconnect from the Internet. Yes, the Entire Country ( Robust internal networks will keep the military and government operating, says Putin’s top IT advisor.

The Army’s new tool in firing back? Cyber (Fifth Domain) The Army is continuing to experiment with cyber capabilities on the battlefield.

Are Spectre and Meltdown just hype? (CSO) Often, it’s the dramatic things that get our attention and what we see as a risk. We’re more scared of flying than of driving, and terrified of snakes and spiders when we’re more at risk from the common cold. So, do our fears lie in the right place?

GDPR Questions Answered: Where do I Learn to be a DPO? (Infosecurity Magazine) How to learn and train to be a data protection officer, and how your organization matters.

Internal Audit's Growing Engagement in Cyber Management (PR Newswire) Internal auditors are increasingly adapting to the new cybersecurity...

Are We Aware Yet? (Infosecurity Magazine) We’re just not human centric. If you want better results, let people be people, and design accordingly.

Expert Roundup: The Impact of Software Monocultures on Security Across Organizations (Heimdal Security Blog) We asked cybersecurity experts about the impact of software monocultures on security and their answers provided great insights. They talked about the risks of using it in the organizations and why a multi-vendor approach is a better option.

Inside the Vatican's First-Ever Hackathon (WIRED) This is the Holy See of the 21st century.

Legislation, Policy, and Regulation

Theresa May gives Putin deadline to explain Sergei Skripal poisoning (TImes) Theresa May has cleared the way for a cyberattack on Russia as she challenged President Putin to explain how a powerful Russian nerve agent came to be used in an assassination attempt on British soil.

Cyber-attacks against Russia may follow attempted nerve agent killing in UK (SC Media UK) Offensive cyber-attacks against Russia among options under consideration by the UK if it is dissatisfied with Russia’s explanation of the UK use of Novichok .

Putin to stoke patriotic fervour with Crimea rally ahead of Russian election (Times) President Putin will hold a defiant rally in Crimea tomorrow, shrugging off EU sanctions against Russia that were extended yesterday over its continued occupation of the peninsula. The Russian...

The Banality of Putin’s Potemkin Elections (Foreign Policy) The tremendous effort that goes into producing a fake vote.

Is the U.S. Hypocritical to Criticize Russian Election Meddling? (Foreign Affairs) The United States is simply not engaging in electoral meddling in a manner comparable to Russia’s approach.

To defend against hostile nations, America needs fierce cyberpower (TheHill) The government needs a clear strategy cyberstrategy to defend against threats like Russia.

Trump: Rex Tillerson out as secretary of state, to be replaced by CIA Director Mike Pompeo ( Trump: Rex Tillerson out as secretary of state, to be replaced by CIA Director Mike Pompeo

Govt to monitor extremists, criminals in cyberspace (Pakistan Today) Interior minister says terrorism screening system to be established to protect CPEC route

10 Takeaways From the Fight Against the Islamic State (War on the Rocks) Nearly three years on from the Islamic State’s high water mark in the summer of 2015, there are several lessons that the United States and its allies can discern from the terrorist group’s meteoric rise to control large parts of Iraq and Syria to the loss of its physical caliphate late last year. The steady decline

Canadian Intelligence Reform Proposal: An ‘Intelligence Commissioner’ for the Communications Security Establishment (Lawfare) In this second post in our series about Canada’s national security law reform, we begin a discussion of changes proposed for the Communications Security Establishment (CSE), Canada’s primary signals intelligence and cybersecurity agency.

How to Improve Federal Cybersecurity Efforts ( The public sector can, and should, play a larger role in helping ensure massive breaches don’t happen again.

There Are No Guardrails on Our Privacy Dystopia (Motherboard) If tech is going to infiltrate, influence, and shape all of society, it is unacceptable for tech and pure market forces to decide the limits of the surveillance state.

Time limits for children hooked on social media (Times) Teenagers face being cut off from social media sites after a few hours’ browsing under proposals being drawn up to tame the “wild west” of the internet. Ministers are looking at imposing a limit on...

Could tech giants be controlled through anti-monopoly and merger regulations? (Public Finance) Last week members of the House of Lords International Relations Committee concluded tech firms were negatively affecting our society and questioned whether a ‘different regulatory approach’ was needed to control them. Could incoming monopoly and merger regulation provide the solution? asks Respublica's Joe Cowen.

Dutch Finance Minister Advises Government on Cryptocurrency (Bitcoin Magazine) In a six-page letter to the Dutch senate and house, Finance Minister Wopke Hoekstra has outlined his concerns over the rapid and dramatic growth in cryptocurrencies.Hoekstra emphasized that there has been little time to understand and react to the changing landscape and that the current supervision and regulatory ...

"No Right Without a Remedy": Why NSA Whistleblower Protections Are Lacking | Whistleblower Protection Blog (Whistleblower Protection Blog) Earlier this month Stephen M. Kohn, executive director of the National Whistleblower Center, attended a roundtable discussion with the National Security Ag

Litigation, Investigation, and Law Enforcement

Sergei Skripal attack: Salisbury poison novichok is so secret, it has never been detected before (Times) The nerve agent that contaminated the victims of the Salisbury attack is a lethal chemical weapon developed in Russia in the 1970s and 1980s and never known to have been used until now. Novichok...

Homeland Security Sees No ‘Nefarious Activity’ Threatening Cybersecurity Ahead of Midterms (The Daily Beast) In the months since the 2016 election, DHS officials have had ‘a little bit of a crash course on what it means to run an election.’

Republicans on House panel, excluding Democrats’ input, say there’s no evidence of Russia collusion (Washington Post) A draft report from the GOP is expected to face backlash from Democrats, who believe there is evidence the Trump team coordinated with the Kremlin.

Democrats demand Trump force 13 indicted Russians to stand trial (Washington Examiner) Top Democrats on Monday demanded that President Trump force the 13 Russian nationals who have been indicted as part of special counsel Robert Mueller's probe to stand trial in the U.S. for their alleged interference in the 2016 presidential election.

Google Is Back In Canadian Court to Fight Global Search Censorship (Motherboard) A California court said the 2014 Canadian order “threatens free speech on the global internet.”

Data breach victims can sue Yahoo in the United States: judge (Reuters) Yahoo has been ordered by a federal judge to face much of a lawsuit in the United States claiming that the personal information of all 3 billion users was compromised in a series of data breaches.

How the Government’s Cyber Agency Rates on Cybersecurity ( The annual FISMA report shows where the Homeland Security Department—the government’s point agency on cyber issues—can improve its own information security.

$250k bounty for anyone exposing hackers behind Binance attempted attack (HackRead) Binance cryptocurrency exchange is offering $250,000 to anyone who can provide conclusive evidence against hackers and lead to prosecution and jail for attempting to hack the exchange.

Lawyers can contribute to the rise of blockchain by understanding it (ABA Journal) Blockchain technology can make legal services more efficient and less costly by establishing automated smart contracts that don’t have to rely on human intermediaries to be enacted. According to David Fisher, founder and CEO at Integra Ledger, lawyers need to first understand how blockchain functions before it can be effectively used in the legal industry.

Feds Bust CEO Allegedly Selling Custom BlackBerry Phones to Sinaloa Drug Cartel (Motherboard) Phantom Secure is one of the most infamous companies in the secure phone industry. Sources and court documents detail that its owner has been arrested for allegedly helping criminal organizations.

TSA accused of searching domestic travelers’ devices with no warrant (Ars Technica) TSA has failed to fully respond to FOIA requests from the ACLU.

Matthew Keys, now freed from prison, is ready to get back to journalism (Ars Technica) "I work hard, and I’m smart, but I do have an uphill battle going forward."

Surveillance reseller Streamax beats NSW Police in court (CRN Australia) Tribunal reinstates security licence.

Cyber Events

For a complete running list of events, please visit the event tracker on the CyberWire website.

Register for DataTribe's Meetup on 3.15.18
Billington International Cybersecurity Summit, March 21, Washington, D.C.
Cyber Security Summit - CYBERWIRE50
Third Annual Cyber Investing Summit 5/15/18

Newly Noted Events

North American Financial Information Summit (New York, New York, USA, May 23, 2018) Data is the most vital asset of any financial services firm. With volumes increasing exponentially, and the complexity and structure continuously changing, it is more vital than ever to keep on top of EDM strategy and analytical capabilities, while of course remaining compliant. Join us for the only conference around to challenge your current data strategy and evaluate your technology investments. Have your voice heard at interactive workshop tables, learn from peers facing the same challenges at their respective firms, listen to the experts, hear their success stories, and meet 350+ senior decision makers over 5 networking breaks - all this for only one day out of the office!

Upcoming Events

PCI Security Standards Council Middle East and Africa Forum (Cape Town, South Africa, March 14 - 15, 2018) Don’t miss the data security event of the year for the payment card industry. Join us for: networking opportunities, updates on industry trends, insights and strategies on best practices, engaging keynotes and industry expert speakers. The PCI Security Standards Council’s 2018 Middle East and Africa Forum (MEAF) provides you the information and tools to help secure payment data. They lead a global, cross industry effort to increase payment security by providing industry-driven, flexible and effective data security standards and programs that help businesses detect, mitigate and prevent criminal attacks and breaches.

SecureWorld Boston (Boston, Massachussetts, USA, March 14 - 15, 2018) Connecting, informing, and developing leaders in cybersecurity. SecureWorld conferences provide more content and facilitate more professional connections than any other event in the Information Security industry. Join your fellow InfoSec professionals for high-quality, affordable cybersecurity training and education. Earn 12-16 CPE credits through 60+ educational elements learning from nationally recognized industry leaders. Attend featured keynotes, panel discussions, breakout sessions, and solution vendor displays-all while networking with local peers.

Cyber 9-12 (Washington, DC, USA, March 16 - 17, 2018) Now entering its fifth year, the Cyber 9/12 Student Challenge is a one-of-a-kind competition designed to provide students across academic disciplines with a deeper understanding of the policy challenges associated with cyber crisis and conflict. Part interactive learning experience and part competitive scenario exercise, it challenges teams to respond to a realistic, evolving cyberattack and analyze the threat it poses to national, international, and private sector interests.

Infosecurity Magazine Spring Virtual Conference (Online, March 21, 2018) Tune in on Wednesday March 21 for day two of our two-day online event to learn what’s going on at the heart of the industry. Our easy to digest format offers a mix of short sessions, panel debates and live profile interviews, all fully produced and moderated by the Infosecurity Magazine editorial team. Each day event looks into the biggest industry issues and trends creating an immersive education program featuring a large selection of high calibre speakers and specialists in their field.

3rd Annual Billington International Cybersecurity Summit (Washington, DC, USA, March 21, 2018) With confirmed speakers from Estonia, Romania, Singapore, Sweden, the United States, and Kuwait, and with attendees from many more countries, this summit brings together world-class cybersecurity thought leaders to engage in high-level information sharing, unparalleled networking and public-private partnerships from a cross-section of civilian, military and intelligence agencies, industry and academia.

Infosecurity Magazine North America Virtual Conference (Online, March 21 - 22, 2018) Tune in on Wednesday March 21 for day two of our two-day online event to learn what’s going on at the heart of the industry. Our easy to digest format offers a mix of short sessions, panel debates and live profile interviews, all fully produced and moderated by the Infosecurity Magazine editorial team. Each day event looks into the biggest industry issues and trends creating an immersive education program featuring a large selection of high calibre speakers and specialists in their field.

The Cyber Security Summit: Denver (Denver, Colorado, USA, March 22, 2018) This event is an exclusive conference connecting Senior Level Executives responsible for protecting their company’s critical data with innovative solution providers & renowned information security experts. Learn from cyber security thought leaders and Engage in panel discussions focusing on trending cyber topics such as Sr. Leadership’s Best Approach to Cyber Defense, What’s Your Strategic Incident Response Plan?, Protecting your Enterprise from the Human Element and more. Your registration includes a catered breakfast, lunch, and cocktail reception. Receive half off your admission with promo code cyberwire50 at and view details including the full agenda, participating solution providers & confirmed speakers. Tickets are normally $350, but only $175 with promo code.

Women in CyberSecurity 2018 (Chicago, Illinois, USA, March 23 - 24, 2018) Through the WiCyS community and activities we expect to raise awareness about the importance and nature of cybersecurity career. We hope to generate interest among students to consider cybersecurity as a viable and promising career option.

Northeast Regional Security Education Symposium (Jersey City, New Jersey, USA, March 23, 2018) The Professional Security Studies Department at New Jersey City University (NJCU) will hold its Northeast Regional Security Education Symposium on Friday, March 23, 2018, from 8 am to 2 pm. The symposium will feature discussions about national, corporate and cybersecurity implications related to the public and private sectors. This year’s symposium will take place at the NJCU School of Business’ Skyline Room, 147 Harborside Financial Center in Jersey City, NJ, with stunning views of Manhattan across the Hudson River. The event will feature a dark web overview, national security and media coverage, careers in security, and risk assessment and security.

KNOW Identity Conference 2018 (Washington, DC, USA, March 26 - 28, 2018) The premier global event for the identity industry, the KNOW Identity Conference is the nexus for identity innovation, offering a uniquely differentiated, powerful, and immersive event that convenes the world’s most influential organizations and smartest minds across industries to shape the future of identity.

SecureWorld Philadelphia (Philadelphia, Pennsylvania, USA, March 28 - 29, 2018) Connecting, informing, and developing leaders in cybersecurity. SecureWorld conferences provide more content and facilitate more professional connections than any other event in the Information Security industry. Join your fellow InfoSec professionals for high-quality, affordable cybersecurity training and education. Earn 12-16 CPE credits through 60+ educational elements learning from nationally recognized industry leaders. Attend featured keynotes, panel discussions, breakout sessions, and solution vendor displays-all while networking with local peers.

National Cyber League Spring Season (Chevy Chase, Maryland, USA, March 30 - May 25, 2018) The NCL is a defensive and offensive puzzle-based, capture-the-flag style cybersecurity competition. Its virtual training ground helps high school and college students prepare and test themselves against cybersecurity challenges that they will likely face in the workforce. All participants play the games simultaneously during Preseason, Regular Season and Postseason. NCL allows players of all levels to enter. Between Easy, Medium and Hard challenges, students have multiple opportunities to really shine in areas as they excel. Registration for the Spring Season is 2/26/18-3/25/18.

4th Middle East Cyber Security Summit (Riyadh, Saudi Arabia, April 4 - 5, 2018) The summit will feature state of the art presentations, hackathons and technology showcasing from regional and international experts and leading technology providers. One of the focus areas of the summit will be block-chains & artificial intelligence in existing technical infrastructure in order to protect organizations from external attacks. The need of the hour is to create an ecosystem of trust aided with cybersecurity capabilities.

Cybersecurity: A Shared Responsibility (Auburn, Alabama, USA, April 8 - November 10, 2018) During the 2018 SEC Academic Conference, we will explore three themes within cyber security: the underlying computer and communication technology; the economic and physical systems that are controlled by technology; and the policies and laws that govern and protect the use of information that is stored in, transmitted by, and processed with technology.

Sea-Air-Space: The Navy League’s Global Maritime Exposition (National Harbor, Maryland, USA, April 9 - 11, 2018) Join us this April for Sea-Air-Space, the largest maritime exposition in the U.S., with 275+ exhibitors displaying the latest in maritime, defense and energy technology. This year’s theme, “Learn. Compete. Win.” reminds us that every day our men and women in uniform are learning new strategies, tactics and energy technology to compete against the world's best, where winning is the only option. The challenge is always on, and Sea-Air-Space is your place to participate in interactive exhibits, professional development sessions, and open forums disclosing timely information. Hear from active duty military, government and industry leaders on key issues and future strategies for the U.S. Navy, Marine Corps, Coast Guard U.S.-flag Merchant Marine.

2018 Mississippi College Cybersecurity Summit (Clinton, Mississippi, USA, April 10 - 11, 2018) The 2018 Mississippi College Cybersecurity Summit is a conference designed to engage, educate, and raise awareness about cybersecurity across the nation. The 2018 Cybersecurity Summit will provide valuable cybersecurity tools and resources for a variety of industries and topics, including: critical infrastructure, healthcare, government, education, large and small business issues, and cryptocurrencies.

ISC West 2018 (Las Vegas, Nevada, USA, April 11 - 13, 2018) ISC West is THE largest security industry trade show in the U.S. At ISC West, you will have the chance to network with over 30,000 security professionals through New Products & Technologies encompassing everything from access control to unmanned vehicles from over 1,000 Exhibitors & Brands.

CYBERTACOS San Francisco (San Francisco, California, USA, April 16, 2018) CYBERTACOS is back and becoming one of the biggest cybersecurity networking events! Register today and join us for networking, food and drinks. This event includes a 45-minute meet the press panel made up of influential security reporters who will discuss what they are covering and how to best work with them.

RSA Conference 2018 (San Francisco, California, USA, April 16 - 20, 2018) Take this opportunity to learn about new approaches to info security, discover the latest technology and interact with top security leaders and pioneers. Hands-on sessions, keynotes and informal gatherings allow you to tap into a smart, forward-thinking global community that will inspire and empower you.

Our Security Advocates (San Francisco, California, USA, April 17, 2018) OUR Security Advocates highlights a diverse set of experts from across information security, safety, trust, and other related fields. OURSA is a single-track, one-day conference with four topic sessions. In each session, you'll hear short talks from multiple experts followed by a moderated discussion.

Industrial Control Systems (ICS) Cyber Security Conference Asia (Singapore, April 25 - 27, 2018) The Central ICS/SCADA Cyber Security Event of the Year for the APAC Region. Three days of multi-track training & workshops for days for operations, control systems and IT security professionals to connect on SCADA, DCS PLC and field controller cyber security.

INFILTRATE (Miami Beach, Florida, USA, April 26 - 27, 2018) INFILTRATE is a "pure offense" security conference aimed at the experienced to advanced practitioner. With the late-90s hacker con as its inspiration, the event has limited attendance in order to foster a close-knit, casual and open environment for speakers and attendees. There are no sponsored talks, panels or other gimmicks, just two days of carefully vetted, highly technical talks which present new research in advanced exploitation techniques, vulnerability discovery, malware/implant design, anti-forensics and persistent access. Speakers include hackers from all across the offensive spectrum. The conference also hosts advanced training classes in web hacking, exploit development, cryptanalysis, kernel exploitation, Java attacks and other techniques (April 22-25). Now in its eighth year, the two-day, single track conference is organized by Dave Aitel and Immunity Inc., and is held in warm, sunny Miami Beach.

Compiled and published by the CyberWire editorial staff. Views and assertions in source articles are those of the authors, not the CyberWire, Inc.