The CyberWire Daily Briefing 03.20.15
Chinese anti-censorship organization GreatFire sustains a denial-of-service attack.
The Seattle Times reports that Federal auditors — from the Office of Personnel Management — warned Premera of the insurer's cyber vulnerabilities some three weeks before attackers got into its networks last spring.
Ransomware continues its evolution as a costly irritant. TrendLabs reports seeing Cryptowall combined with FAREIT spyware. KnowBe4 outlines new variants of other strains. Sophos answers the should-you-pay question: it's o.k. to pay, better not to, and best of all not to face the question.
Some 700,000 ADSL routers are reported to contain dangerous vulnerabilities.
The OpenSSL patch fixes a serious bug, but not a devastating one, so early fears that this would be another Heartbleed turn out to be overhyped.
Bloomberg warns that Kaspersky has ties to "the KGB" (side note — it's tough to keep track, but Russian organs have new names nowadays: FSB, SVR, FSO). Kaspersky denies it, and complains it's a victim of sloppy reporting and loose assumptions about Russians conducting meetings in Russian. (For what it's worth, a quick look at Nota Bene's meta tags would impress linguistic analysts with fluency in demotic American argot, leading them to conclude it was the work of some guys from South Hackensack. Attribution's tough.)
US NSA Director Rogers tells Congress deterrence is failing in cyberspace for want of credible offensive capabilities.
Debate continues over pending US cyber bills.
Target prepares to settle breach claims for $10M, a bellwether, observers say, for other sectors, including law and real estate.
Notes.
Today's issue includes events affecting China, Estonia, Israel, Nigeria, Norway, Russia, Slovenia, United Kingdom, and United States.
Cyber Attacks, Threats, and Vulnerabilities
Hackers Attack GreatFire.org, a Workaround for Websites Censored in China (New York Times) For years, a group of anonymous activists known as GreatFire.org has monitored online censorship in China, provided access to blocked websites and collected messages deleted by censors
Feds warned Premera about security flaws before breach (Seattle Times) In what the health insurer called a routine audit, federal officials found a handful of issues with Premera's network security — three weeks before a major breach first occurred
The Next Cybersecurity Target: Medical Data (Atlantic) The health industry is not immune to cyberattacks
CryptoWall 3.0 Ransomware Partners With FAREIT Spyware (TrendLabs Security Intelligence Blog) Crypto-ransomware is once again upping the ante with its routines. We came across one crypto-ransomware variant that's combined with spyware — a first for crypto-ransomware. This development just comes at the heels of the discovery that ransomware has included file infection to its routines
KnowBe4 Warns Of Onslaught Of New Ransomware Strains (Business Solutions) In an unsettling trend, cybercriminals have launched a new wave of ransomware attacks that include several new malicious strains targeting both businesses and consumers, according to KnowBe4, a provider of web-based security awareness training to small and medium sized enterprises. The new strains expand capabilities into unmapped network drives, malicious help files, and games
Ransomware — should you pay? (Naked Security) Unfortunately, we've had cause to write rather regularly in recent times about ransomware, and what it can do to you
At least 700,000 routers given to customers by ISPs are vulnerable to hacking (IDG via CSO) More than 700,000 ADSL routers provided to customers by ISPs around the world contain serious flaws that allow remote hackers to take control of them
What we can learn from $1 billion bank-robbing malware (SC Magazine) Cybercriminals used a mix of social engineering and the Carbanak family of malware to infiltrate banks around the world and steal as much a $1 billion since 2013, according to a recent Kaspersky Labs report. Spear phishing emails reportedly duped employees into opening back doors for criminals to infiltrate banking systems, alter account balances, transfer funds and hide their tracks. But how did these criminals go back to the well so many times at so many banks without getting caught?
Dylib Hijacking on OS X (Virus Bulletin) DLL hijacking is a well known class of attack which was always believed only to affect the Windows OS. However, this paper will show that OS X is similarly vulnerable to dynamic library hijacks
Facebook photo leak flaw raises security concerns (ComputerWeekly) A Facebook mobile code vulnerability, which exposed private photos to hackers, has raised questions about the safety of the social network's coding in general
Mandrill warns attack may have exposed some data about email (IDG via CSO) Mandrill warned customers on Wednesday that some email-related data may have been exposed after attackers tried to lasso some of its servers into a botnet
Corporate espionage — the Internet's new growth industry (IT Pro Portal) Espionage as a Service (EaaS) is the latest threat to big business worldwide. While corporate espionage has been part of the business landscape for hundreds of years, EaaS is largely a product of the Internet
VA official 'perplexed' by lawmaker's claims of nation-state breach (The Hill) Lawmakers and the Veterans Affairs Department are fighting over whether the department suffered a nation-state hack in September 2014, according to a Thursday report
Number of veterans whose personal information was put at risk nearly triples in a month (FierceGovernmentIT) Between January and February, the number of veterans who had personal information affected by data breaches nearly tripled, according to a new report
Police Admit Leak Due to Fault in Crypto System (STA) Police commissioner Marjan Fank has admitted that the police force sustained a leak of sensitive information communicated through its secure communication network, Tetra, because of a cryptography fault. The leak is said to be small in size
Security Patches, Mitigations, and Software Updates
OpenSSL 1.0.2 ClientHello sigalgs DoS (CVE-2015-0291) (OpenSSL Security Advisory) Severity: High. If a client connects to an OpenSSL 1.0.2 server and renegotiates with an invalid signature algorithms extension a NULL pointer dereference will occur. This can be exploited in a DoS attack against the server
OpenSSL patched against high severity denial-of-service bug, and other flaws (Graham Cluley) Phew! Well, there's a relief
OpenSSL security update less critical than expected, still recommended (Help Net Security) As announced on Monday, the OpenSSL project team has released new versions of the cryptographic library that fix a number of security issues
Apple fixes 17 security holes in Safari's WebKit engine (FierceITSecurity) Apple also fills security gaps in iOS 8 with latest update
Drupal Core — Moderately Critical — Multiple Vulnerabilities - SA-CORE-2015-001 (Drupal Security Team) Password reset URLs can be forged under certain circumstances, allowing an attacker to gain access to another user's account without knowing the account's password
Drupal flaw allows reset password by crafting specific URLs (Security Affairs) The Drupal team issued an update to fix a flaw that allows attackers reset password by crafting URLs under certain circumstances
Cyber Trends
The days of mass attacks are over; now it's all about big data (FierceITSecurity) Security execs at CeBit spoke about how the threat landscape has changed and warned against the temptation to hack back
Should you worry about government spying? IT security pros differ (FierceITSecurity) Before you hire an IT security vendor to help lock up your critical business data, it's probably a good idea to understand how the vendor prioritizes threats. Judging from executives who spoke at CeBit in Hannover, Germany, this week, they may have widely different opinions
IWCE keynote Roger Cressey: If you're reacting to a cyber attack, you're too late (IWCE's Urgent Communications) Cyber threats will never be eliminated, but cyber risks can be mitigated, according to Roger Cressey, NBC News' counter-terrorism analyst and former presidential advisor to both the Clinton and Bush administrations
The latest trend worry for CIOs: The Analytics of Things (FierceCIO) When it comes to big data and data analytics, IT Leaders continue to struggle with how to wrap their hands around it all. First up are continued concerns about security. Adding to the challenges is the quest for data accuracy
Smart cities to use 1.1 billion connected things (Help Net Security) Increasing urbanization is putting unprecedented pressure on city mayors to constantly balance the challenge of resource constraints against environmental sustainability concerns. Gartner estimates that 1.1 billion connected things will be used by smart cities in 2015, rising to 9.7 billion by 2020
Power companies unprepared for hacking attacks (Phys.org) Researchers are recommending that Norwegian power distribution companies should carry out more regular contingency exercises to prepare themselves for hacking attacks. If they don't, they won't be equipped to identify and deal with crisis situations
Cyber Risk Management for the Automotive Sector (Dark Matters) Recently, Senator Markey of Massachusetts sent letters to 20 major automobile manufacturers requesting information about how they protect against cyber-attacks. This effort by the Senator was subsequently followed up with talking points at an auto show in Detroit
Many admit that passwords are their only IT security measure (Help Net Security) New research from SecureAuth shows that despite much debate, the password isn't dead yet as two in five IT decision makers (ITDMs) admit that passwords are their only IT security measure. It is a worrying revelation, considering the prevalence of security breaches due to compromised credentials. Furthermore, a third (33%) of companies with more than 1,000 employees are still using password only access. Even more concerning, one in five (20%) respondents said they 'don't know' how many IT security policies their company currently has
Study: Mobile app security risk well-known, but enterprises lack proper usage policy (SC Magazine) Although most IT professionals believe mobile apps in the workplace have increased security risks, less than half of organizations have a policy in place to define acceptable mobile app use
Companies Left in the Dark as Two-Thirds Admit Cloud Apps being Implemented Without their Knowledge Pose a Security Threat (Information Security Buzz) More than two-thirds (67 per cent) of organisations admit that unauthorised cloud applications are being implemented without IT's knowledge or involvement, and correspondingly pose a security risk to the business. This is according to a snapshot poll by Centrify, the leader in unified identity management across cloud, mobile and data centre, at Cloud Expo Europe last week in London
Data Breach Detection Takes Days or Longer For Many Businesses: Survey (SecurityWeek) Seconds count when dealing with a security incident. A new survey from Osterman Research however has found that many companies believe it would take hours or more for them to detect a breach — with nearly 30 percent stating it would take days, weeks or longer
Deloitte's Exposé on Cyber Security Concerns for Nigeria in 2015 (Techcabal) The advantages the internet accords us with, are numerous. From the report we published couple of weeks back, it will be seen that Nigeria ranked well on the internet affordability index among the developing economies in the world. Ardent observers of this tech space in the country will notice that there has been a surge in the number of activities performed online
Marketplace
The Company Securing Your Internet Has Close Ties to Russian Spies (Bloomberg) Kaspersky Lab has published reports on alleged electronic espionage by the U.S., Israel, and the U.K. — but it's yet to look at Russia
A Practical Guide to Making up a Sensation (Nota Bene) There are many ways to make up something sensationalist in the media. One of the practical ways is to speculate and create conspiracy theories. Unfortunately, there is a demand on such stories and they have a very good chance of making a splash
Check Point in talks to buy Israeli cyber-security firm (Reuters) Internet and network security provider Check Point Software Technologies is in talks to buy cyber-security firm Lacoon Mobile Security for $80 million, Israeli newspaper Calcalist reported on its website on Thursday
Opera buys VPN service to help protect user privacy (IDG via CSO) Norwegian browser developer Opera Software has bought virtual private network service SurfEasy to help its users protect their privacy when accessing the Web from smartphones, tablets and computers
Fortinet: Well Positioned In An Increasingly Vital Industry (Seeking Alpha) Fortinet is on the forefront of cyber-security, replacing the businesses of more legacy firms with its highly sophisticated/multilayered security products. In addition to developing some of the industry's most advanced cyber-security applications, Fortinet is also extremely well diversified across the globe. While all cyber-security firms risk obsolescence in the rapidly changing cyberspace, Fortinet is more adapted to this changing environment than its competitors
Raytheon Boosts Shareholder Value, Ups Dividend by 11% (Zacks via Nasdaq) The board of directors of Raytheon Co. (RTN) approved of a 10.7% annual dividend hike, marking the 11th consecutive rise. The company has increased the quarterly dividend to 67 cents per share from 60.5 cents, bringing the annualized payout to $2.68 with a yield of 2.42%. The dividend will be paid on Apr 30 to shareholders of record as of Apr 1
KEYW Announces Award of $38 Million Prime Contract to Provide Cyber Training and Infrastructure Upgrades (GlobeNewswire) The KEYW Corporation, a wholly owned subsidiary of The KEYW Holding Corporation (Nasdaq:KEYW), announced today it has received a prime contract to provide advanced cyber training content development, delivery, and training infrastructure upgrades to a U.S.-based customer
Young Hackers Win Big Bucks Crushing Your Web Browsers (Tom's Guide) Every major Web browser was quickly hacked during the latest Pwn2Own contest here at the CanSecWest 2015 security conference, with the contestants walking away with more than half-a-million dollars in prize money
ThreatStream Announces New Advisory Board with Leading Experts from Cisco, Cloudera and OSG Consulting (PRNewswire) ThreatStream®, the leading provider of an enterprise-class threat intelligence platform, today announced its advisory board, which will provide input and guidance on the company's direction. The board includes John N. Stewart, senior vice president, chief security and trust officer at Cisco; Mercedes Westcott, vice president, public sector, at Cloudera; and Greg Oslan, founder and managing partner at OSG Consulting. Stewart, Westcott and Oslan will serve as strategic resources as ThreatStream continues to develop solutions that enable enterprises to increase the accuracy and speed with which security threats are discovered
Former FBI Executive Assistant Director Louis E. Grever Joins Wynyard Group Board (Virtual Strategy Magazine) Wynyard Group, a market leader in crime-fighting software and services, today announced that former FBI Executive Assistant Director Science and Technology Branch, Louis Grever, will join its Board of Directors
Products, Services, and Solutions
Internet Explorer: Microsoft's Troubled Browser Retires (InformationWeek) Microsoft this week announced the demise of Internet Explorer. Let's reflect on how it evolved over the years
Dome9 Releases New Android App for Secure Enterprise Access to Cloud Servers (Virtual Strategy Magazine) App provides on-demand access to reduce the attack surface of cloud servers
Technologies, Techniques, and Standards
Signature antivirus' dirty little secret (Help Net Security) If you rely only on traditional, signature-based antivirus, you are going to get infected — and probably a lot! Antivirus was, and still is, a valuable addition to your layered security strategy, but only if you understand its limitations, which have become more and more prominent over time
Cracking a Wi-Fi WPA2 Password, Thanks to Amazon (Infosec Institute) In a pen tester's life, sooner or later you are cracking a password. This activity depends on the type of password and available hardware
Well-Designed RFP Crucial for Enterprise Key and Certificate Management (Venafi) So, you've decided to select a vendor solution for your enterprise key and certificate management. You've made a wise decision — manual tracking methods or limited internal scripts cannot effectively manage and secure the number of keys and certificates in an average enterprise. But to get the most of your investment dollars and ensure that the vendor solution you choose will meet your needs now and in the future, you need to create a clear and comprehensive request for proposal
Prepare for The Cyber Threat: What Executives Need to Know to Manage Risk (CTO Vision) Cybersecurity is one of the most high-profile topics for organizations today and one of their biggest sources of risk. Numerous recent incidents have heightened awareness of and sensitivity to this risk, and have made it even more critical that they assess their cyber readiness
OpenPGP email security for Mozilla applications (Enigmail) Enigmail is an extension for Thunderbird and other Mozilla based mail clients. It allows you to encrypt and digital sign emails using the OpenPGP standard
Is it time to adopt a military-style approach to cyber security? (Network World) It seems like every week we hear about another serious breach affecting this merchant or that healthcare provider or some other major business. Successful cyber attacks of the private sector have become all too common
Design and Innovation
'War game' will determine if DoD can share well with others in the cloud (FierceGovernmentIT) DoD will test if cloud providers can use military property for commercial clients
Polymorphic security warnings more effective than same, static ones (Help Net Security) In the last year or so, we have witnessed Google becoming increasingly interested in providing effective warnings that would spur users into making good decisions regarding the security of their computers and their information
Research and Development
IARPA preps insider threat monitoring projects (GCN) The intelligence community will host a meeting next month to brief IT firms on research into insider threat monitoring systems
Academia
Training Cyber Warriors: What Can Be Learned from Defense Language Training? (RAND) Over the past decade, cyber operations have become an increasingly important part of U.S. and international military capabilities. Research and the popular press note the rising threat from cyber warfare, including threats to military and federal government networks, as well as potential attacks on the U.S. economy, infrastructure, and business. To respond to this threat, cyber defense spending is projected to grow substantially — even while overall Pentagon spending is reduced. As the importance of cyber operations in national security grows, the US military's ability to train individuals in cyber skills and ensure a robust cyber workforce becomes increasingly important in protecting the nation. There has been a particular focus on the need for cyber warriors — highly trained and specialized individuals who engage in offensive and defensive cyber warfare
Civil Air Patrol Cadets compete in cyber effort (Belvoir Eagle) Cyber intrusions and attacks and the evolving array of cyber-based threats against the government and business occur every day. Recent media reports of cyber breach and attack against big businesses, small businesses and government entities pose threats to national security, commerce, intellectual property and people
Legislation, Policy, and Regulation
2014—2017 Cyber Security Strategy (Ministry of Economic Affairs and Communication) The Cyber Security Strategy 2014-2017 is the basic document for planning Estonia's cyber security and a part of Estonia's broader security strategy. The strategy highlights important recent developments, assesses threats to Estonia's cyber security and presents measures to manage threats. This strategy continues the implementation of many of the goals found in the Cyber Security Strategy 2008-2013; however, new threats and needs which were not covered by the previous strategy have also been added
Cyber chief: Efforts to deter attacks against the U.S. are not working (Washington Post) The government's efforts to deter computer attacks against the United States are not working and it is time to consider boosting the military's cyber-offensive capability, the head of U.S. Cyber Command told Congress on Thursday
NSA Chief: US Needs Offensive Strategy to Deter Cyber Attacks (Reuters via the Voice of America) The United States needs to step up its offensive cyber capabilities, a top security official said on Thursday, warning that looming defense budget cuts could hurt efforts to bolster the nation's cyber military facilities and make the country more vulnerable
North Korea Internet outage was payback for Sony hack, U.S. official says (UPI) A U.S. official said the December Internet blackout in North Korea was a retaliatory strike after a data breach at Sony Pictures disrupted employee computers and disclosed confidential Sony information to the public
Dueling Bills Complicate U.S. Cyberdefense Efforts (Wall Street Journal) Dueling committees in the House of Representatives are drafting their own cybersecurity bills, reflecting a legislative turf war that has complicated political efforts to address the growing number of computer attacks, including some believed to originate in foreign countries
Senate Intelligence Committee Advances Terrible "̶C̶y̶b̶e̶r̶s̶e̶c̶u̶r̶i̶t̶y̶"̶ ̶B̶i̶l̶l̶ Surveillance Bill in Secret Session (Electronic Frontier Foundation) The Senate Intelligence Committee advanced a terrible cybersecurity bill called the Cybersecurity Information Sharing Act of 2015 (CISA) to the Senate floor last week. The new chair (and huge fan of transparency) Senator Richard Burr may have set a record as he kept the bill secret until Tuesday night. Unfortunately, the newest Senate Intelligence bill is one of the worst yet
Here's Why the NSA Won't Need Congress' Permission To Continue Spying (National Journal via Defense One) A passage buried in a recently declassified FISA court document paves the way for the NSA's bulk collection of U.S. phone data to continue beyond its June 1 expiration
Funding Cuts Pose Significant Risk to DoD Cyber Security (Seapower) The world is a complex, dynamic and uncertain place, and continued budget cuts from sequestration may pose drastic risks to the Department of Defense (DoD) cyber security abilities, service leaders told a Senate Armed Services Committee hearing March 19
FREAK: How government security worries got us into this mess (Inquirer) FREAK, the elderly OpenSSL problem that has set insecurity firms alight over the past couple of weeks, continues to make headlines, but why? What on earth caused this terrible mess?
Vickers to step down from DoD intell post (C4ISR & Networks) Under Secretary of Defense for Intelligence Dr. Michael Vickers will retire from federal service as of April 30, according to a Defense Department press release
Litigation, Investigation, and Law Enforcement
Target agrees to pay $10 million to settle data breach lawsuit (Naked Security) US retailing giant Target has proposed a settlement worth $10 million (about £6.7 million) in respect of a class-action lawsuit related to the massive data breach it experienced in 2013
Target settlement could make other hacked retailers liable (Christian Science Monitor) Target has agreed to pay $10 million to settle a class-action lawsuit stemming from a massive data breach that compromised the information of up to 40 million shoppers during the 2013 holiday season. Target will pay affected shoppers up to $10,000 each in damages
Cyber Attacks Upend Attorney-Client Privilege (Bloomberg) Security experts say law firms are perfect targets for hackers
To hackers, real estate agents are walking around with bull's-eye on their backs (Inman) Protect yourself and your business from the bad guys
US turns to rewards in hunt for overseas cyber criminals (AP via Yahoo! News) The FBI considers Evgeniy Bogachev one of the world's most prolific and brilliant cyber criminals, slapping his photos — bald, beefy-faced and smiling faintly — on "Wanted" fliers posted online. The Russian would be an ideal target for prosecution — if only the Justice Department could find him
Police need wider capability to tackle online crime, says London watchdog (ComputerWeekly) The Metropolitan Police should appoint a senior officer to ensure the whole force is prepared to tackle online crime, according to a London watchdog
Microsoft Using Big Data to Disrupt Big Cybercrime (Accounting Today) Cybersecurity is a CEO-level issue, stated David Finn, executive director of Microsoft Digital Crimes Unit, during his closing day keynote of the 2015 Microsoft Convergence Conference
iovation Helps Bust Cyberfraud Ring; Saves Insurer $3.5 Million (Consumer Electronics Net) Identifying Devices and IP Addresses Ultimately Leads to Stopping "Crash for Cash" Scheme
Bomber's Computer Contained Extremist Materials (AP via Forensic Magazine) Boston Marathon bomber Dzhokhar Tsarnaev had a variety of extremist materials on his computer, including an issue of the al-Qaida magazine Inspire with an article entitled "Make a Bomb in the Kitchen of Your Mom," an FBI agent testified Thursday
Individual Charged with Hacking NYPD Computers and FBI Database (Softpedia) Defendant logged into police computers remotely
For a complete running list of events, please visit the Event Tracker.
Newly Noted Events
Proposer's Day Conference for the Scientific advances to Continuous Insider Threat Evaluation (SCITE) program (Washington, DC, area, Apr 16, 2015) The Intelligence Advanced Research Projects Activity (IARPA) will host a Proposers' Day conference for the Scientific advances to Continuous Insider Threat Evaluation (SCITE) program, in anticipation of the release of a new solicitation in support of the program. The purpose of the conference will be to provide introductory information on SCITE and the research problems that the program aims to address, to respond to questions from potential proposers, and to provide a forum for potential proposers to present their capabilities and identify potential team partners
DaytonDefense Ohio Cyber Dialogue with Industry Conference (Dayton, Ohio, USA, May 6 - 7, 2015) Our Cyber Security conference presents how Cyber Security affects you as an individual, your company, and your nation, along with business opportunities in this growing area. You will walk away with an understanding of not only what training is needed to counter such a threat, but also where you will find business opportunities in countering that threat
BSides Las Vegas (Las Vegas, Nevada, USA, Aug 4 - 5, 2015) BSides Las Vegas is an Information/Security conference that's different. We're a 100% volunteer organized event, put on by and for the community, and we truly strive to keep information free. There is no charge to the public to attend BSidesLV. Our costs are covered by our generous donors and sponsors, who share our vision of free dissemination of information. The conversations are getting more potent and the "TALK AT YOU" conferences are starting to realize they have to change. BSidesLV is making this happen by shaking-up the format
Upcoming Events
B-Sides Salt Lake City (Salt Lake City, Utah, USA, Mar 20 - 21, 2015) B-Sides is a community-driven framework for building events for and by information security community members. The goal is to expand the spectrum of conversation
CarolinaCon-11 (Raleigh, North Carolina, USA, Mar 20 - 22, 2015) CarolinaCon-11 (also hereby referred to as "The Last CarolinaCon As We Know It") will occur on March 20th-22nd 2015 in Raleigh NC (USA). We are now officially accepting speaker/paper/demo submissions for the event. If you are somewhat knowledgeable in any interesting field of hacking, technology, robotics, science, global thermonuclear war, etc. (but mostly hacking), and are interested in presenting at CarolinaCon-11, we cordially invite you to submit your proposal
Cyber Security Conference 2015 (Bolton, UK, Mar 23 - 24, 2015) Cyber Security Conference 2015 is a coming together of the North of England's two most successful Cyber Security Conferences; BEC Information & Data Security Conference and Lancaster University's North West Cyber Security Conference. From large corporations to micro businesses the importance of protecting personal and commercial information has become much more important with the introduction of the smart phone and other portable device's. When it comes to Information Security Systems small businesses and large corporations believe they are doing all they need to secure themselves and their clients
Fraud Summit Altanta (Atlanta, Georgia, USA, Mar 24, 2015) ISMG's Fraud Summit is a one-day event focused exclusively on the top fraud trends impacting organizations and the mitigation strategies to overcome those challenges. Highlights of the Atlanta event include presentations on the insider cyber threat, threat intelligence, fraud-as-a-service, POS security, fraud detection through big data, and mobile banking fraud
CyberTech Israel 2015 (Tel Aviv, Israel, Mar 24 - 25, 2015) In the face of these enemies and threats, individuals, organizations and states are required to produce innovative, unique solutions that would improve the resistance and resilience of the sensitive systems they rely on every day. For this purpose, it is essential to maintain a direct, on-going contact with the latest developments and changes in the cyber defense market. To this end, we are pleased to invite you to Cybertech 2015, the International Conference & Exhibition for Cyber Solutions, taking place on March 24th-25th, 2015 in Tel Aviv, Israel. Cybertech Conference and Exhibition, an initiative of Israel Defense, is the largest exhibition and conference of cyber technologies outside of the US
Global APT Defense Summit (Atlanta, Georgia, USA, Mar 25, 2015) This event will lay out a defense framework, which describes the appropriate phases, from establishing a resilient security baseline, through gathering threat intelligence, zero-day malware detection, security analytics to how an appropriate, measured response capability can be established. Each of these defense phases are described in lock step with those of the attack. We will also provide detailed examples of the "Fail Chain," where we dissect a number of high-profile breaches and show where the opportunities to defeat them were missed. The market is currently awash with fragmented and contradictory messaging. This unique, intense day of sequential attack- and defend-based sessions will clarify both the problem and describe the end-to-end solution, delivering an actionable framework for attendees to integrate into their existing security strategies
2nd Annual ISSA COS Cyber Focus Day (Colorado Springs, Colorado, USA, Mar 25, 2015) Join us for the Information Systems Security Association (ISSA) — Colorado Springs Chapter — Cyber Focus Day set to take on Wednesday, March 25, 2015 at the University of Colorado Colorado Springs (UCCS). The theme for CFD 2015 will "Cybercrime". Industry experts will be on hand to brief attendees on the latest trends, and best practices, in cybersecurity. This one-day forum will offer IT, business, law enforcement, government, military, academic, training, and other professionals a unique, local opportunity to get up-to-date information on rapidly evolving cybersecurity challenges
28th Annual FISSEA Expo (Gaithersburg, Maryland, USA, Mar 25, 2015) This year's theme is "Changes, Challenges, and Collaborations: Effective Cybersecurity Training." Through numerous high quality sessions, over 100 attendees will learn new ways to improve their IT security program and practical solutions to training problems while earning Continuing Professional Education (CPE) credits. The vendor fair gives attendees a tactical look at the products and services available to meet their professional goals
Conference on Cyber Defence in Europe (Berlin, Germany, Mar 25 - 26, 2015) The conference aims to address these and other issues of cyber defense in a broad audience of policy-makers, senior officials and experts from EU institutions and Member States, representatives of industry and academia. Thus the conference aims at discussing EU cyber defence matters among an audience of approximately one hundred policy-makers, senior officials from EU entities and from EU Member States as well as other interested officials in four panels: Implications of the EU's Cyber Defence Policy Framework; the EU's Mutual Defence and Solidarity Clause in the Cyber Context; Cyber Defence in EU Military Operations; and Civil-Military Cooperation in Cyber Defence
CYBERWEST (Phoenix, Arizona, USA, Mar 25 - 26, 2015) The purpose of CYBERWEST is to bring together Government and businesses to: Exchange information and learn in areas of policy and strategy; technology and R&D; workforce training and education; and economic, legal, regulatory and insurance impacts. Discuss cybersecurity issues and to focus on applied cybersecurity (i.e. implementing the NIST framework, R&D, legal and regulatory perspectives, state and local approaches). Present content that attendees can take back and use in their organizations
Fraud Summit Dubai (Dubai, United Arab Emirates, Mar 26, 2015) ISMG's Fraud Summit is a one-day event focused exclusively on the top fraud trends impacting organizations and the mitigation strategies to overcome those challenges. Highlights of the Dubai event include the threat of insider fraud, ATM security, mobile banking risks and their mitigation, the role of law enforcement agencies, digital forensics, and threat information exchange for actionable intelligence
Women in Cyber Security (Atlanta, Georgia, USA, Mar 27 - 28, 2015) Despite the growing demand and tremendous opportunities in the job market, cybersecurity remains an area where there is significant shortage of skilled professionals regionally, nationally and internationally. Even worse, women's representation in this male-dominated field of security is alarmingly low. Through the WiCyS community and activities we expect to raise awareness about the importance and nature of cybersecurity career. We hope to generate interest among students to consider cybersecurity as a viable and promising career option
Automotive Cyber Security Summit (Detroit, Michigan, USA, Mar 30 - Apr 1, 2015) The debut Automotive Cyber Security Summit will bring together CTOs, CSOs, Engineers and IT professionals from GM, KIA, Nissan, Bosch, Qualcomm and more for three days of case studies, workshops, panel discussions and networking sessions
Insider Threat Symposium & Expo (Laurel, Maryland, USA, Mar 31, 2015) The National Insider Threat Special Interest Group (NITSIG) announced that it will hold FREE 1 day Insider Threat Symposium & Expo (ITS&E) on March 31, 2015 in Laurel, Maryland. The symposium is exclusively focused on insider threat awareness, insider threat program development and implementation and insider threat risk mitigation.The ITS&E will provide attendees with access to a broad network of security professionals to collaborate with on insider threat risks, insider threat detection, insider threat risk mitigation strategies and insider threat program development, implementation and management. The expo will include vendors that have proven technologies and services for insider threat risk mitigation
Kansas City Secure World (Kansas City, Missouri, USA, Apr 1, 2015) Join your fellow security professional for affordable, high-quality cybersecurity training and education at a regional conference near you. Earn CPE credits while learning from nationally recognized industry experts on many diverse topics such as: Risk Mitigation, Malware Detection, Digital Forensics, Cloud Security, Privacy, Big Data, PCI Compliance, Security Metrics, Encryption, Mobile Device Management, Incident Response, and much more. James Beeson (CISO, GE Capital Americas) will deliver the keynote
Coast Guard Intelligence Industry Day (Chantilly, Virginia, USA, Apr 2, 2015) With a blended focus of defense, homeland security, law enforcement, criminal investigations, intelligence and cyber issues, Coast Guard Intelligence is aggressively looking to collaborate with partners and stakeholders in support of mission of execution. This event will be Coast Guard Intelligence's most significant and inclusive outreach event of the year.
Centers for Medicare and Medicaid Services (CMS) CISO Security & Privacy Forum (Woodlawn, Maryland, USA, Apr 7, 2015) The CISO Security & Privacy Forum is hosted by the Information Security Privacy Group (ISPG) at CMS. The Vision for ISPG is to provide leadership to CMS in managing information security and privacy risks appropriate for evolving cyber threats. The Mission is to enable the safe use of sensitive and privacy data while servicing the healthcare needs of the nation. The format for this event will include briefings from government and industry. Our featured speaker is from the Interagency OPSEC Support Staff and will present on "TRASHINT: Dumpster Diving", a very popular topic which teaches attendees how one person's trash can be another person's treasure
10th Annual Cyber and Information Security Research Conference (Oak Ridge, Tennessee, USA, Apr 7 - 9, 2015) Cyberspace is fundamental to our national prosperity, as it has become critical to commerce, research, education, and government. Realizing the benefits of this shared environment requires that we are able to properly balance the risks and rewards, understand and communicate threats to security and privacy, and rapidly adapt any resulting approach to a changing adversarial environment. The 10th Annual Cyber and Information Security Research Conference at Oak Ridge National Laboratory in Oak Ridge, Tennessee will bring together cyber security researchers, program managers, decision makers, security vendors, and practitioners to discuss many challenging tasks and novel solutions pertaining to cyber security
Cyber Threats Masterclass (Turin, Italy, Apr 9 - 11, 2015) The United Nations Interregional Crime and Justice Research Institute (UNICRI) is organizing two new courses on emerging threats towards states and citizens with the aim of promoting an in-depth knowledge of specific issues such as cyber crimes and crimes against the environment. The courses are tailored to journalists and chief information officers, as well as those who want to specialize in this area, offering a unique opportunity to network with renowned international experts
InfoSec Southwest 2015 (Austin, Texas, USA, Apr 10 - 12, 2015) InfoSec Southwest is an annual information security and hacking conference held in Austin, Texas, one of the most interesting and beautiful cities in the United States. By addressing a broad scope of subject-matter, InfoSec Southwest is intended to both provide a comprehensive and valuable forum to all participants as well as fill a gap for our local attendees left by the other few conferences held here in Texas which are all focused on a narrower scope of subject matter or a narrower slice of audience demographic
Cybergamut Tech Tuesday: Tor and the Deep Dark Web (Elkridge, Maryland, USA, Apr 14, 2015) This talk will explore the use of Tor and how it relates to garnering useful intelligence. Distinguishing attribution or valuable intelligence from limited event data is difficult. Leveraging external threat data can be helpful in evaluating intelligence but how do you identify relevance? Created as a means of protecting the privacy and anonymity of its users, Tor — the managed network of private computers leveraged by criminal elements to minimize the risk of surveillance and capture — is being exploited by the most technically proficient, aggressive, and organized of criminal syndicates
NIST IT Security Day (Gaithersburg, Maryland, USA, Apr 8, 2014) The Office of the Chief Information Officer, OCIO, is hosting NIST IT Security Day as a means to heighten awareness for all NIST users on the many aspects of operational information technology security and networking at home and in the office. This event's objective is to educate users on IT security and related topics. The event will feature guest speakers on general and technical IT security topics and tutorials on internal services and products.
Cyber Security Summit: Industrial Sector & Governments (Prague, Czech Republic, Apr 14 - 15, 2015) Cyber Security Summit Europe — Industrial Sector & Governments brings together cyber security experts who will share their skills and know-how needed to address highly topical issues such as state-sponsored cyber-attacks and SCADA Security Assessment
Cyber Security Summit: Financial Services (Prague, Czech Republic, Apr 14 - 15, 2015) Cyber Security Summit Europe — Financial Services brings together cyber security experts across the financial sector to discuss topical security vulnerabilities as well as bring forward effective strategies and solutions to effectively mitigate them
INTERPOL World 2015 (Singapore, Apr 14 - 16, 2015) INTERPOL World is a new biennial international security trade event which will bring police and other law enforcement agencies together with security solution providers and security professionals from around the world to identify future challenges and propose and build innovative solutions
Mid-Atlantic ISSA Security Conference 2015 (Gaithersburg, Maryland, USA, Apr 15, 2015) Meeting at the NIST campus, this all-day event, jointly hosted by the ISSA Baltimore, DC, and Northern Virginia chapters, will have 3 concurrent tracks of security professionals discussing the current state of various information security topics. The cost is $150 per person, including breakfast and lunch; pre-registration is required in order to get onto the NIST campus
Symantec Government Symposium: Secure Government: Manage, Mitigate, Mobilize (Washington, DC, USA, Apr 15, 2015) The annual Symantec Government Symposium is a one-day event attracting 1,500 government IT security and management professionals. The event is designed to facilitate peer-to-peer dialogue on the challenges facing today's government leaders. This year, former FBI Director Robert Mueller will deliver the keynote address, and the program will also feature sessions on CDM, risk management, security intelligence, secure app management, cyber legislative priorities, and much more. The theme of the 2015 Symposium is "Secure Government: Manage, Mitigate, Mobilize"
IIT Cyber Forensics and Security Conference and Expo (Wheaton, Illinois, USA, Apr 17, 2015) All are invited to participate in this multi-track, technical conference that attracts more than 200 professionals, 50 speakers, 20 sponsors, for an intensive one and a half day schedule that includes discussion and debate over forensics, security, data/information governance, cyber crime and security, ethical hacking, eDiscovery, cloud forensics, steganography, policy and compliance, privacy, wireless security, cloud computing, identity theft, and more
RSA Conference 2015 (San Francisco, California, USA, Apr 20 - 24, 2015) Don't miss this opportunity to join thousands of industry professionals at the premier information security event of 2015
Australian Cyber Security Centre Conference (Canberra, Australia, Apr 22 - 23, 2015) The Australian Cyber Security Centre (ACSC) will be hosting its first cyber security conference in 2015. We are bringing leading cyber security experts from Australia and abroad to share their expertise. This will be your first chance to experience the unique collaboration of the ACSC. Over 700 attendees from the national and international ICT community are expected to attend
Security Forum 2015 (Hagenberg im Mühlkreis, Austria, Apr 22 - 23, 2015) The Security Forum is the annual IT security conference in Hagenberg that addresses current issues in this domain. Visitors are offered technical as well as management-oriented talks by representatives of business, research and public service
CyberTexas / CyberIOT (San Antonio, Texas, USA, Apr 23 - 24, 2015) CyberIOT — Securing the Internet of Things. As more everyday devices become connected to the internet, the need for securing those items becomes critical. CyberTexas will explore the intersection of cyber security and the internet of things'
Defensive Cyberspace Operations & Intelligence Conference & Exhibition (Washington, DC, USA, Apr 27 - 28, 2015) The 5th Annual Defensive Cyberspace Operations & Intelligence (DCOI) conference & exhibition is an Israeli-American partnership promoting the extraordinary developments in the technological, intelligence and policy-making domains of cyberspace. It will be held on April 27-28; the first day will consist of panels and exhibition at the Ronald Reagan Building and International Trade Center, and the second will hold workshops, exhibition and seminars at the George Washington University
INTEROP Las Vegas (Las Vegas, Nevada, USA, Apr 27 - May 1, 2015) Attend Interop Las Vegas, the leading independent technology conference and expo designed to inspire, inform, and connect the world's IT community. In 2015, look for all new programs, networking opportunities, and classes that will help you set your organization's IT action plan