ISIS messaging shifts as territory shrinks. Android encryption issues. Cryptobit, CryptXXX, and DedCryptor are ransomware leaders. Aftermath of US Congressional hearings into State Department email issues.
ISIS-controlled territory shrinks. Its messaging continues, but (suggests VICE) the messaging increasingly looks like what a sinking business would use to reassure investors.
Orange Labs claims that Android’s KeyStore default implementation could be susceptible to forgery attacks. This report joins concerns expressed earlier this week about Android’s KeyMaster module, whose Qualcomm environment was found vulnerable to reverse engineering. (Qualcomm says that it fixed the vulnerabilities in 2014, and so informed Google.)
Cryptobit, a new strain of ransomware, has been found joining distribution channels used by a revised CryptXXX. “Realstatistics,” as the criminal campaign is known, pushes ransomware through the Neutrino exploit kit. Sucuri says the vectors are usually infected sites based on Joomla or WordPress content management systems.
CryptXXX itself has grown harder to track. It’s being distributed in more effectively obfuscated forms (as, for example, in pseudo-DarkLeech). It now directs victims to a new [.]onion site for payment and removes the opportunity to contact customer (that is, victim) service.
DedCryptor ransomware is still around, with more infections of Anglophone users reported as it spreads outward from Russia.
In other campaigns, Kovter click-fraud malware poses as a Firefox update, Japanese banks are hit by the BEBLOH Trojan, and NetTraveler returns to Eastern Europe. Mac backdoors make a comeback—ESET has found another, “Keydnap,” which goes after passwords in the keychain.
FBI Director Comey’s testimony yesterday mollified few critics of former Secretary of State Clinton’s email practices—not-enough-to-indict seemed tepid vindication. Defendants in similar cases are already invoking a sauce-for-the-goose defense.
Notes.
Today's issue includes events affecting Albania, Belgium, Benin, Brazil, Bulgaria, Canada, Chad, China, Republic of Congo, Croatia, Czech Republic, Denmark, Estonia, European Union, France, Guinea Bissau, Germany, Greece, Hungary, Iceland, Iraq, Italy, Japan, Kenya, Latvia, Lithuania, Luxembourg, NATO, Netherlands, Nigeria, Norway, Mauritania, Poland, Portugal, Romania, Russia, São Tomé and Príncipe, Saudi Arabia, Sierra Leone, Slovakia, Slovenia, South Africa, Spain, Syria, Ukraine, United Kingdom, United States, and and Zambia.
Catch the CyberWire's Podcast later this afternoon, with interviews, educational tips, and more on the stories of the day. Today we'll hear from our Malek Ben Salem, from our partners at Accenture Labs, on how big data helps analytics. We'll also be speaking with Bob Stratton of the Mach 37 cyber accelerator, who'll describe the early stages of business life for a security start-up. (If you enjoy the Podcast, by the way, please share an iTunes review.)
Cyber Attacks, Threats, and Vulnerabilities
The Islamic State's new propaganda film is like an HR meeting, but with beheadings (VICE News) People don't commonly associate the Islamic State, the brutal extremist outfit that has established a rudimentary state that transcends the borders of Iraq and Syria, with organization
Islamic stateless? (Economist) The jihadists are losing their caliphate, but they remain deadly
Android KeyStore Encryption Scheme Broken, Researchers Say (Threatpost) The default implementation for KeyStore, the system in Android designed to store user credentials and cryptographic keys, is broken, researchers say
CryptXXX, Cryptobit Ransomware Spreading Through Campaign (Threatpost) Researchers have spotted several types of ransomware, including CryptXXX and a fairly new strain, Cryptobit, being pushed through the same shady series of domains
CryptXXX Ransomware Updates Ransom Note, Payment Site (Threatpost) For the second time since June 1, the handlers of CryptXXX ransomware have changed their ransom note and Tor payment site. More importantly to those developing detection signatures and administrators, this update no longer makes changes to the file extensions of encrypted files
CryptXXX Developers Remove Support For Victims With Bitcoin Payment Problems (The Merkle) The cat and mouse game between Bitcoin ransomware developers and security researchers continues. The CryptXXX developers have come up with another improvement to their malware. A change in ransom note may not be significant, but the change in Tor payment site is rather interesting. It is the second time in a few weeks the developers have upped the ante again
Ded Cryptor: Greedy ransomware with open-source roots (Kaspersky Labs) Recently, English and Russian-speaking people were attacked with a new ransomware Trojan called Ded Cryptor. It’s voracious, demanding a whopping 2 bitcoins (about $1,300) as ransom. Unfortunately, no decryption solution is available to restore files held hostage by Ded Cryptor
Kovter malware masquerades as Firefox update (Help Net Security) Click-ad-fraud Kovter malware, packaged as a legitimate Firefox browser update, is being delivered to unsuspecting victims via drive-by-download attacks
Japanese Banking Industry Hit by BEBLOH Trojan (IBM Security Intelligence) BEBLOH is a banking Trojan that first appeared in 2009, according to Softpedia, but it has maintained its cybercrime status and ranked sixth on the list of most active Trojans in 2015
Decade-old NetTraveler Malware Used in Multi-National Attacks (SecurityWeek) NetTraveler, a Trojan that is over a decade old, was recently observed in a series of cyber-espionage attacks launched against victims in Russia and neighboring European countries, Proofpoint researchers warn. Proofpoint believes the group is operating out of China
Keydnap malware opens backdoor, goes after passwords in OS X keychain (Help Net Security) ESET researchers have revealed the existence of another new piece of malware aimed at Mac machines and users: Keydnap
After hiatus, in-the-wild Mac backdoors are suddenly back (Ars Technica) Three new pieces of Mac-targeting malware access webcams, passwords, and more
Code reuse exposes over 120 D-Link devices models to hacking (CSO) A vulnerability in a service shared by many D-Link products allows attackers to take over cameras, routers and other devices
D-Link Wi-Fi Camera Flaw Extends to 120 Products (Threatpost) A software component that exposed D-Link Wi-Fi cameras to remote attacks is also used in more than 120 other products sold by the company
Pentesters (and Attackers) Love Internet Connected Security Cameras! (SANS Internet Storm Center) A recent story making the rounds in both the infosec and public press is the recent use of internet-connected security cameras as a base for DDOS attacks. They don't have a lot of CPU, but they're linux platforms that are easily hackable, never get updated and usually have good bandwidth available to them
Remote Code Execution in Xiaomi MIUI Analytics (IBM Security Intelligence) The IBM X-Force Application Security Research Team has discovered a remote code execution (RCE) vulnerability in MIUI, which we privately disclosed to Xiaomi in January
Samba up to 4.2.13/4.3.10/4.4.4 Client-Signing Protection Smbxcli_Base.C Smb2cli_Session_Set_Session_Key Weak Authentication (vulbd) Temp Score: 7.0. Current Exploit Price (≈) $2k-$5k. A vulnerability was found in Samba up to 4.2.13/4.3.10/4.4.4. It has been rated as critical. Affected by this issue is the function smb2cli_session_set_session_key of the file libcli/smb/smbXcli_base.c of the component Client-Signing Protection. The manipulation of the argument SMB2_SESSION_FLAG_IS_GUEST/SMB2_SESSION_FLAG_IS_GUEST with an unknown input leads to a weak authentication vulnerability (spoofing). Impacted is confidentiality, integrity, and availability
Ripping Away The Mobile Security Blanket (Dark Reading) Upcoming Black Hat USA talk will highlight vulns in Good Technology platform and discuss the dangers of overreliance on enterprise mobility security suites
Wendy's hack was bigger than thought and exposed credit card data (CSO) The company has published a list of the affected restaurants
What I learned playing prey to Windows scammers (CSO) Three months of phone calls prove Windows scammers are more skilled at social engineering than you think
New Dark Web Hitman Site Scams You Even Before Signing Up (Motherboard) Sites offering hitman services have periodically sprung up on the dark web, that part of the internet that’s only reachable using the anonymizing tool Tor
Cyber-attack allows pirates to target cargo to steal (SeatradeMaritime News) There have been a lot of warnings about shipping and cyber security but one shipowner found out the hard way how pirates were able hack the company’s systems and target to steal specific high value cargoes on its vessels
Security Patches, Mitigations, and Software Updates
Qualcomm says it issued patch for Android encryption flaw over a year ago (Tech Crunch) CCracking encryption is a topic of perpetual fascination
Symantec admits it won't patch 'catastrophic' security flaws until mid-July (Inquirer) Google's Project Zero described vulnerabilities as 'as bad as it gets'
How Android Nougat will help protect your password from ransomware (Graham Cluley) New condition will partially prevent unwanted Android lockscreen password resets
Cyber Trends
DDoS extortion campaigns increasingly target businesses (Help Net Security) 80 percent of European IT security professionals expect their business to be threatened with a DDoS ransom attack during the next 12 months, according to Corero Network Security
Growth prospects of the cloud-based information governance market (Help Net Security) The global cloud-based information governance market will grow at a CAGR of more than 27% through 2020, according to Technavio
Unsung cybersecurity vulnerabilities in US infrastructure and utilities (Help Net Security) This past May, the Internet was abuzz about a report by the Government Accountability Office (GAO) highlighting a number of outdated “legacy systems” still in use across the U.S. government. According to the report, “The Strategic Automated Command and Control System coordinates the operational functions of the United States’ nuclear forces, such as intercontinental ballistic missiles, nuclear bombers, and tanker support aircrafts. This system runs on an IBM Series/1 Computer—a 1970s computing system—and uses 8-inch floppy disks.” Many reading this article may have worked on similar systems when they were much younger
IBM says company insiders are responsible for more cyber attacks than hackers (Property Casualty 360) The constant threat of cyber attacks on businesses globally has led to vast sums of money being spent to protect against them
Small business cybersecurity lagging as attacks increase — security experts (FedScoop) Sixty percent of hacked small to medium businesses are forced out of business within six months of being breached
G DATA Sommerumfrage: 80 Prozent der Deutschen sind im Urlaub online Mobile Devices sind beliebteste Reise-Begleiter - Sicherheit bleibt auf der Strecke (Presseportal) Sommer, Sonne, Sicherheit - egal ob am Strand oder in den Bergen, auch unterwegs wollen Urlauber online sein
Need for cultural shift to improve cyber security awareness: Wombat Security (Canadian Underwriter) It is disheartening to see how the end-user is being managed when it comes to combating cyber security threats, suggests Amy Baker, vice president of marketing for Wombat Security Technologies, Inc
Twenty Years Ago, Trolling Was Repeatedly Posting ‘Meow’ in Usenet Groups (Motherboard) In a YouTube clip from an episode of American kids’ show Mr Rogers’ Neighbourhood, dating from 1971, a puppet named Henrietta Pussycat has flown into a rage. “Meow meow meow meow meow…” Everything Henrietta says is punctuated with meows
Marketplace
Can Cybersecurity Insurance Improve Threat Management? (Techwire) Just hours after the terrorist bombs went off in Brussels on March 22, the U.S. House Homeland Security Cybersecurity Subcommittee held a hearing to explore the market-based incentives that cyberinsurance can potentially bring to managing online risks and promoting wider adoption of cybersecurity industry best practices
Local hardware chain takes on global security threat (Chain Store Age) Operating seven stores, McLendon Hardware Inc. may not seem like a top target for a customer data breach
Jhonsa: Intel, FireEye and Others Should Be Pleased With Avast/AVG Deal (The Street) Avast Software announced Thursday it's buying rival security software provider AVG Technologies for a healthy premium, and that's a good news for a number of potential sellers
Avast Takeover Bid for AVG Bounces Cybersecurity ETFs (ETF Trends) Cybersecurity-related exchange traded funds led gains Thursday after Avast Software made a $1.3 billion bid to acquire rival AVG Technologies N.V.
Cyber security firm NCC raises concerns about Brexit as FY revenues rise (DigitalLook) Cyber security and risk mitigation consultant NCC’s full year revenues grew as they joined the FTSE 250 index but it also raised concerns about cyber security in light of Brexit
FireMon Accelerates Year-Over-Year Bookings in Second Quarter 2016 (Yahoo! Finance) Market leader in security management and risk assessment software continues global growth streak, adds more Fortune 500 companies and continues to drive high renewal rates
'We have no channel conflict' - Sophos CEO lauds new-found focus (Channelnomics) Security vendor's leader discusses acting 'more like a start-up company'
Bitdefender turns to CNN for smart home cybersecurity branded content campaign (CNN) Bitdefender, a leading internet security technology company protecting 500 million users worldwide, is raising awareness about cybersecurity threats in the Internet of Things space (IoT) through a unique, highly targeted advertising campaign on CNNMoney with a goal to grow sales of its Bitdefender BOX product
Commerce rebrands Turkey trip as ‘Cyber Security Mission’ (Federal Times) Few would argue against the notion that cybersecurity has become a hot topic in government and industry circles. But now and again there are clear, unassailable signs that this is the case
Arctic Slope Mission Services awarded FMS cyber contract (C4ISRNET) Arctic Slope Mission Services has been awarded a contract to develop and certify IT systems delivered under Foreign Military Sales contracts
Amida Technology Solutions Welcomes Governor Martin J. O’Malley as Advisor (Amida Technology Solutions) Former Governor of Maryland and Mayor of Baltimore brings experience using data for social good to Maryland-based start-up dedicated to open data, data security, and data interoperability
Cyphort Strengthens Management Team with Two New Executive Hires (BusinessWire) Cybersecurity veterans bring sales and marketing leadership to further accelerate company growth
PhishMe Expands Senior Leadership Team (BusinessWire) Global leader in phishing defense hires experienced engineering and professional services leaders to support company’s hyper-growth
Products, Services, and Solutions
Savvius Vigil Integrates With Cisco FirePOWER for Additional Risk Mitigation Through Direct Access to Critical Network Forensics Information (MarketWired) Joint solution makes network data easily available to security professionals, reducing both the likelihood and the impact of breaches by speeding up investigations into security alerts
Ixia Integrates ControlTower with Cisco Nexus Switches to Deliver a Scalable, Reliable Visibility Architecture (Yahoo! Finance) Ixia to showcase integration at Cisco Live 2016
Locking down Internet of Things data and devices (Inside SAP) With growing attention on security, data sent by Internet of Things-enabled devices has not escaped scrutiny, and it is this link in the chain that is the focus of a new collaboration between Swiss cybersecurity company WISeKey and SAP
Technologies, Techniques, and Standards
GDS puts security top of the agenda for G-Cloud 9 (CRN) Suppliers and buyers admit they struggle to understand each other on security
Predicting Cyber Attacks: A Study of the Successes and Failures of the Intelligence Community (Small Wars Journal) Technology capability and dependency has increased at a tremendous rate in the last three decades and has changed the way we live our lives on a daily basis. Technology developments that claim origin with the original mechanical computation device of the early 1900s can now operate anything from your AC in your house to the Satellite providing direct support to an operation overseas
3 Data Protection Tips, in Light of Proposed Cybersecurity Laws (eSecurity Planet) Proposed cybersecurity legislation is making business owners nervous – with good reason. These tips will help you be prepared no matter what Congress does
What is Ransomware and 15 Easy Steps To Keep Your System Protected [Updated] (Heimdal Security) A few weeks ago, a delivery guy walked into our office. While we signed for the package, he realized that we work in cyber security and asked: My entire music collection from the past 11 years got encrypted by ransomware. Is there anything I can do about it? They’re asking for $500 for the decryption key
Hacking A Penetration Tester (Dark Reading) How even a pen test conducted by a security pro can be hacked by a determined attacker looking for a way to its target
Insider Threat: How Being 'Noisy' Can Reduce Fraud (BankInfoSecurity) Bank of the West's Pollino on why covert monitoring Is the wrong approach
Design and Innovation
Google is experimenting with post-quantum cryptography (ZDNet) The internet company is adding a post-quantum key-exchange algorithm to a small fraction of connections between desktop Chrome and Google's servers
Researchers add software bugs to reduce the number of… software bugs (CSO) A new strategy for training bug-finding tools could help catch more vulnerabilities
Can gaming integrate cyber, traditional military forces? (C4ISRNET) The U.S. and its allies face a regional dispute over territory claims with another major nation state. An increasing number of cyberattacks probe both the Department of Defense Information Networks (DoDIN) and U.S. critical infrastructure, successfully leaving millions without power and shutting down West Coast ports. The still-nascent forces of Cyber Command must prepare to support joint forces to de-escalate the situation or, if necessary, prevail if full-scale conflict breaks out
Legislation, Policy, and Regulation
EU prepares to raise Privacy Shield over data transfers to U.S. (CSO) The European Commission is set to issue an adequacy decision early next week, bringing Privacy Shield into effect
NATO Ambassador: How The Ukraine Crisis Fits Cyber War Narrative (Dark Reading) Kenneth Geers previews his Black Hat talk and discusses the strategic military maneuvers governments can make within cyberspace
Cyber Diplomacy with Africa: Lessons From the African Cybersecurity Convention (Council on Foreign Relations) Two years ago, the African Union (AU) adopted its Convention on Cybersecurity and Personal Data Protection. The Convention seeks to improve how African states address cybercrime, data protection, e-commerce, and cybersecurity. However, only eight of the AU’s fifty-four members have signed the Convention, with none ratifying it. Despite this currently limited uptake, the Convention, and how the AU produced it, signals that African states value political autonomy and independence when developing cyber policy. The U.S. government should keep this in mind as it reaches out to AU member states in promoting cyber norms and capacity building efforts
Litigation, Investigation, and Law Enforcement
Marine's attorney: If Hillary Clinton wasn't prosecuted, this officer shouldn't be discharged (Marine Corps Times) The attorney representing a Marine officer accused of mishandling classified information by warning troops in Afghanistan about the threat of an insider attack said he plans to argue that his client deserves the same leniency that Hillary Clinton received
Clinton Case Raises Questions About Discipline For Government Employees (NPR) Susan Hennessey, a fellow at the Brookings Institution and managing editor of the Lawfare blog, talks about disciplinary actions for employees implicated in "sloppy" handling of classified materials
State Department reopens probe into Clinton emails (CNN) The State Department is reopening its investigation into Hillary Clinton's use of a private email server during her tenure as secretary of state
Paul Ryan Asks Director of National Intelligence to Deny Clinton Classified Information (Epoch Times) Paul Ryan, the Speaker of the House, formally asked the head of National Intelligence to deny Hillary Clinton access to any classified information
Texas Senator Files Bill To Revoke Hillary Clinton’s Security Clearance (CBS DFW) Texas Senator John Cornyn is taking the next step in the scandal surrounding Hillary Clinton’s use of a private email server
F.B.I. Director James Comey Testifies Before Congress (New York Times) Mr. Comey was questioned by the House Oversight Committee about the investigation into Hillary Clinton’s use of a personal email network as secretary of state. Republicans have questioned Mrs. Clinton’s truthfulness, and Representative Mark Meadows raised the specter of more hearings on whether Mrs. Clinton lied to a Congressional committee. Democrats have defended Mr. Comey amid personal attacks regarding his decision not to prosecute
Clinton's email claims challenged by FBI director during hearing (Engadget) Director Comey testified in front of Congress today on the decision not to recommend charges
Comey testifies Clinton email claims ‘not true’ at heated Hill hearing (Fox News) FBI Director James Comey testified Thursday that Hillary Clinton’s claims -- some made under oath -- about her use of a private email server were “not true,” fueling Republican questions about whether in doing so she committed a felony
Hillary Clinton Email Investigation (C-SPAN) FBI Director James Comey testified at a hearing on the FBI’s investigation into Hillary Clinton’s use of private email servers while serving as secretary of state, as well as the decision to not recommend criminal charges against her
FBI chief says Guccifer lied about hacking into Clinton's email server (CSO) Guccifer had boasted to media outlets that the hack was easy
Petraeus' security breaches much worse than Clinton's, FBI chief says (Military Times) FBI Director James Comey on Thursday refuted assertions that email abuses by former Secretary of State Hillary Clinton outweighed security lapses by former CIA and U.S. Central Command head David Petraeus, calling the retired general’s crimes “intentional misconduct”
11 takeaways from FBI Director James Comey's testimony (Washington Examiner) 1. A new investigation of Hillary Clinton is imminent
Senate GOP leader: Release Clinton's FBI interview (The Hill) Senate Majority Leader Mitch McConnell (R-Ky.) wants Hillary Clinton's interview with the FBI made public as GOP lawmakers demand more information on the investigation into her private email server
State defends classified marking practice in Clinton email case (Washington Examiner) State Department spokesman John Kirby on Thursday defended a State Department practice of marking sections of emails for then-Secretary of State Hillary Clinton with a "(C)" for classified though he couldn't say whether it followed federal rules regarding designations for classified material
No free passes on mishandling top secret info (York Daily Record) If what has come to light is true, then the American public should demand answers
Clinton’s Email Scandal Reveals an Unlikely National Security Threat (Time) We classify way too much information, to our own detriment
Prosecutors reveal efforts by ISIS recruiter in Syria to encourage attacks in U.S. (Washington Post) Federal prosecutors on Thursday said a top Islamic State recruiter in Syria was involved in directing an American college student to kill a member of the U.S. military and then attack a police station in southern Ohio
Mohamed Mohamud case appeal challenges NSA surveillance (KGW) Civil rights attorneys say surveillance evidence used to convict a Somali-American man who plotted to bomb a 2010 Christmas tree-lighting ceremony was gathered unconstitutionally through the U.S. government's warrantless foreign surveillance program
CIS Security Controls Added to Law Enforcement Cyber-Guide (Infosecurity Magazine) The Cybersecurity Guide for State Local Law Enforcement has added the Center for Internet Security’s (CIS) the Multi-State Information Sharing and Analysis Center (MS-ISAC) and the CIS Critical Security Controls as key resources
A UK Government Department Uses Hacking Powers to Catch Price-Fixing Cartels (Motherboard) Over the past few months, traditionally tight-lipped UK law enforcement agencies have released snippets of how they use “equipment interference,” or hacking powers. In response to enquiries from Motherboard, one government department has been unusually forthcoming about what it actually uses hacking for: catching price fixers and others involved in criminally anti-competitive behaviour
Polish Authorities Want to Question UK Tor Operator Over 'Offensive' Forum Post (Motherboard) Volunteers who maintain the Tor network are sometimes hassled by the authorities. Perhaps child pornography travelled across their exit node—the part of the network where a user's traffic joins the normal web—or maybe it was implicated in the hacking of a website. The FBI has even raided the houses of Tor operators in response to instances like these
3 years after taking off Guy Fawkes mask, Kentucky Anon indicted (Ars Technica) Deric Lostutter accused of aiding hack of local Steubenville, Ohio sports website
Ex-employee pleads guilty to cyber attack on Northborough company (MetroWest Daily News) A disgruntled IT worker will pay more than $130,000 in restitution after admitting he damaged a Northborough company’s computer systems and waged a cyber attack against three of its clients, according to the U.S. Attorney’s Office
For a complete running list of events, please visit the Event Tracker.
Upcoming Events
ISS World South Africa (Johannesburg, South Africa, Jul 10 - 12, 2016) ISS World South Africa is the world's largest gathering of Southern Africa Law Enforcement, Intelligence and Homeland Security Analysts as well as Telecom Operators responsible for Lawful Interception, Hi-Tech Electronic Investigations and Network Intelligence Gathering. ISS World Programs present the methodologies and tools for Law Enforcement, Public Safety and Government Intelligence Communities in the fight against drug trafficking, cyber money laundering, human trafficking, terrorism and other criminal activities conducted over today's telecommunications network and the Internet.
Insider Threat Program Development Training (Washington, DC, USA, Mar 29 - 30, 2016) Insider Threat Defense announced it will hold a training class on Insider Threat Program Development (National Insider Threat Policy-NISPOM Conforming Change 2) on March 29-30, 2016, in Washington, DC. For a limited time the training is being offered at a discounted rate of $795. The training is comprehensive and provides students with the knowledge and resources to develop and implement a robust Insider Threat Program. Insider Threat Defense has trained a substantial number of organizations and has become the "Go To Company" for Insider Threat Program Development Training
SINET Innovation Summit 2016 (New York, New York, USA, Jul 14, 2016) “Connecting Wall Street, Silicon Valley and the Beltway.“ SINET Innovation Summit connects America’s three most powerful epicenters and evangelizes the importance of industry, government and academic collaboration on joint research initiatives. The opportunity to bring practitioners and theory together to discuss fundamental Cybersecurity challenges is critical to the advancement of innovation in the Cybersecurity domain. This summit is designed to reinvigorate public-private partnership efforts and increase relationships that foster the sharing of information and joint collaboration on Cybersecurity research projects
Insider Threat Program Development Training (Washington, DC, USA, Mar 29 - 30, 2016) Insider Threat Defense announced it will hold a training class on Insider Threat Program Development (National Insider Threat Policy-NISPOM Conforming Change 2) on March 29-30, 2016, in Washington, DC. For a limited time the training is being offered at a discounted rate of $795. The training is comprehensive and provides students with the knowledge and resources to develop and implement a robust Insider Threat Program. Insider Threat Defense has trained a substantial number of organizations and has become the "Go To Company" for Insider Threat Program Development Training
cybergamut Technical Tuesday: The Importance of Managing Attribution Online by Dani Charles of Ntrepid Corporation (Elkridge and Calverton, Maryland, USA, Jul 19, 2016) cybergamut Technical Tuesday is for cyber professionals to exchange innovative ideas and discuss technical issues of mutual interest. We’ll have a Technical Tuesday event on 19 July 2016 (1600 – 1730 East Coast Time). The importance of open-source intelligence (OSINT) has increased exponentially as more and more information has come available online. At the same time, the increased sophistication of websites and platforms means the content one sees can be easily blocked or manipulated based on one’s attribution to an organization, region, or country. This presentation focuses on the importance of Managed Attribution, detailing the technical methods employed by websites and platforms to determine attribution, and presenting solutions that allow users to manage their attribution in order to get access to the most authentic and accurate information.
CyberSec 2016 (New York, New York, USA, Jul 19, 2016) Ask any bank CEO in the U.S. what keeps them up at night and cybersecurity is bound to be in the top five. Maybe even no. 1. And while the threat matrix is evolving rapidly, along with the regulatory demands, so are the technology tools available to help meet them. This one-day conference will take a big-picture look at the threats facing banks today and tomorrow, and offer insights on how to combat them.
Nominations are now open: National Cyber Security Hall of Fame (Baltimore, Maryland, USA (nominations submitted online), Jul 20, 2016) The Cyber Security Hall of Fame "Respect the Past - Protect the Future" accepts nominations from companies and organizations that are engaged in, and committed to, the growth of the cyber security industry. Each of the nominators can submit nominations in the following categories or combination of categories: Technology, Policy, Public Awareness, Education, and Business.
Insider Threat Program Development Training (Washington, DC, USA, Mar 29 - 30, 2016) Insider Threat Defense announced it will hold a training class on Insider Threat Program Development (National Insider Threat Policy-NISPOM Conforming Change 2) on March 29-30, 2016, in Washington, DC. For a limited time the training is being offered at a discounted rate of $795. The training is comprehensive and provides students with the knowledge and resources to develop and implement a robust Insider Threat Program. Insider Threat Defense has trained a substantial number of organizations and has become the "Go To Company" for Insider Threat Program Development Training
Billington Global Automotive Cybersecurity Summit (Detroit, Michigan, USA, Jul 22, 2016) Billington Cybersecurity, an independent conference company focused exclusively on cybersecurity seminars, announces the first global summit that brings together the most senior government and industry experts to examine cyber security in the automotive industry. The Chairman and CEO of General Motors, Mary Barra, U.S. Transportation Secretary Anthony Foxx, U.S. Senator Gary C. Peters and Lyft CEO and Co-Founder Logan Green will discuss industry and government insights on automotive cybersecurity.
Community College Cyber Summit (3CS) (Pittsburgh, Pennsylvania, USA, Jul 22 - 24, 2016) The third annual Community College Cyber Summit (3CS) is organized and produced by six Advanced Technological Education (ATE) centers funded by the National Science Foundation (NSF) and involved in cybersecurity. 3CS meets the perceived need for a national academic conference that focuses exclusively on cybersecurity education at the community college level. Faculty, administrators, and other stakeholders in community college cybersecurity education are invited and encouraged to attend
SANS ICS Security Summit & Training — Houston 2016 (Houston, Texas, USA, Jul 25 - 30, 2016) SANS has joined forces with industry leaders and experts to strengthen the cybersecurity of Industrial Control Systems (ICS). The initiative is turning ICS cybersecurity around by equipping both security professionals and control system engineers with the security awareness, work-specific knowledge, and hands-on technical skills they need to secure automation and control system technology. Register now for these ICS skills based courses.
SANS San Jose 2016 (San Jose, California, USA , Jul 25 - 30, 2016) Information security training is coming to Silicon Valley from SANS Institute, the global leader in information security training. At SANS San Jose 2016, July 25-30, 2016, choose from 7 hands-on, immersion-style cybersecurity training courses taught by real-world practitioners. We will see you at The Westin San Jose, located in the heart of downtown San Jose. Now is the time to improve your information security skills. SANS San Jose 2016 features comprehensive hands-on technical training from some of the best instructors in the industry and includes several courses that will prepare you or your technical staff for DoD 8570 and GIAC approved certification exams. Start making your plans to attend now!
AfricaHackOn (Nairobi, Kenya, Jul 28 - 29, 2016) What began as a casual meet up for information security professionals has become one of the formidable forces in the profession. That group is the AfricaHackOn. Housed under its parent umbrella, Euclid Consultancy Ltd, AH as fondly known, has traversed all odds to becoming a leading venture in raising awareness on matters affecting cyber security and also grooming upcoming talent into the job market. We have been poised to becoming a one stop shop for talent and resources in a field greatly short staffed.