Jihadist recruiting refreshed online. NATO websites sustain suspicious outages. Anonymous hits African governments. Pokémon Go is out, with troubles in its popular trail.
ISIS increases Southeast Asia recruiting efforts as it struggles to hold core territory in the Levant. Rival al Qaeda resurfaces online as one of Bin Laden’s sons threatens vengeance for his father’s death in a 2011 US raid on his Pakistan hideout.
NATO websites suffered outages during last week’s meetings of the Atlantic Alliance. Whether they were hacked is under investigation; a priori speculation says “Russia” (but that’s speculation).
Two Anonymous operations are underway in Africa. One, #ShutDownZimbabwe, has downed government websites in Zimbabwe to protest Robert Mugabe’s regime. In the other, as part of #OpAfrica, the hacktivist collective breached Armscor, a procurement agency of South Africa’s Department of Defense. Someone claiming to represent Anonymous has said the breach was accomplished by SQL injection. Details of various arms deals have been posted online.
More is out on Eleanor, the Mac malware whose existence researchers disclosed last week. In a scare headline, Naked Security reports that Eleanor “tries to hook your webcam up to the Dark Web.”
And researchers at Kaspersky and Cymmetria continue to track the ongoing campaigns in South Asia (“Patchwork” or “Dropping Elephant”) that have repurposed old exploits to successfully attack their targets.
Some 80,000 Amazon Kindle credentials are reported to have leaked.
Pokémon Go is out and popular. It’s also being spoofed by a RAT, and the extensive permissions the game requires (geolocation, mostly) have been exploited by muggers.
Car thieves are now using laptops as well as jimmies.
Inquiries into US State Department email scandals continue.
Notes.
Today's issue includes events affecting Albania, Belgium, Bulgaria, Canada, China, Croatia, Czech Republic, Denmark, Estonia, European Union, France, Germany, Greece, Hungary, Iceland, India, Iraq, Israel, Italy, Kosovo, Latvia, Lithuania, Luxembourg, Malaysia, Malta, NATO, Netherlands, Norway, Philippines, Poland, Portugal, Romania, Russia, Saudi Arabia, Slovakia, Slovenia, South Africa, Spain, Syria, Ukraine, United Kingdom, United States, and and Zimbabwe.
Catch the CyberWire's Podcast later this afternoon, with interviews, educational tips, and more on the stories of the day. Today we hear from our partners at Virginia Tech's Hume Center, as Charles Clancy discusses the privacy of data. Our guest will be Chris Gerritz, Infocyte CEO, who'll discuss the timely topic of threat hunting. (And if you'd care to review the Podcast, it's easy to do so on iTunes.)
Cyber Attacks, Threats, and Vulnerabilities
ISIS Has Launched a Newspaper to Recruit Southeast Asian Fighters (Time) The launch underscores growing fears of ISIS encroachment in the region
Q&A: Islamic State Has 'Metastasized,' Says Pulitzer Prize-Winner Joby Warrick (Radio Free Europe | Radio Liberty) Territorial gains made by the Islamic State (IS) militant group in Iraq and Syria have come as a surprise for many observers, as has its ability to attract Muslim youths to its brand of radical Islam or drive them to perpetrate terrorist acts in its name. But some argue that, far from appearing out of nowhere, the radical group in its current form is the result of a transformation rooted in the Sunni insurgency that followed the U.S. invasion of Iraq in 2003
Bin Laden's son threatens revenge for father's assassination: monitor (Reuters) The son of slain al Qaeda leader Osama bin Laden has threatened revenge against the United States for assassinating his father, according to an audio message posted online
NATO-Linked Websites Go Down, Cyberattack Suspected (Wall Street Journal) North Atlantic Treaty Organization meeting in Warsaw to address cyberspace dangers and Russian aggression
OpAfrica: Anonymous hacks South African arms procurement agency (Hack Read) Anonymous has hacked into the servers of Armscor, a South African arms procurement agency and leaked financial data belonging to agency’s officials, clients and trade details
Anonymous DDoS Zimbabwe Government Sites for #ShutDownZimbabwe (Hack Read) Anonymous Africa is now targeting government of Zimbabwe in support of ongoing protests against President Robert Mugabe
New Mac malware tries to hook your webcam up to the Dark Web (Naked Security) Mac malware is sufficiently rare, at least compared to Windows and Android, that new OS X malware strains often get a lot of attention
Pokemon Go wants to catch (almost) all your app permissions (TechCrunch) Let’s be honest, players of Pokemon Go aren’t going to care a Joltik or a Flabébé about the app permissions required to roam their neighbourhoods garnering the disproving glances of seniors as they fling invisible poke balls at the rose bushes
Android Mew-ware, I choose you: Code nasty poses as Pokemon GO (Register) DroidJack wants to peek-at-you
Fake Pokémon Go app contains RAT; takes full control of infected device (Hack Read) Alert for Pokémon Go app users on Android — cyber criminals have uploaded a fake copy of Pokémon Go gaming app which is actually infected with RAT that has a unique capability of taking over the smartphone
Gamer finds dead body while testing Pokémon Go’s GPS features (Ars Technica) App requiring users to walk to physical locations leads to disturbing discovery
Pokémon Go players robbed at gunpoint, suspects arrested (CSO) Police 'catch 'em all' shortly after receiving initial robbery reports
Amazon Suffers Security Breach; 80,000 Login Credentials Leaked (Hack Read) Hacker leaked 80,000 Amazon Kindle login credentials because the company wouldn’t respond to his security report
Cyber espionage group uses low profile tools to hunt high profile targets (Help Net Security) Kaspersky Lab researchers investigated a threat actor that was undertaking aggressive cyber espionage activity in the Asian region, targeting multiple diplomatic and government entities with a particular focus on China and its international affairs. This group, named Dropping Elephant (also known as “Chinastrats”), used their unsophisticated tools to attack some high profile Western targets as well
Cyber spies are still using these old Windows flaws to target their victims (ZDNet) 'Dropping Elephant' cyber-epionage group is using old and long-patched flaws as part of its campaign, but appears to be still finding some success
New APT Targets Thousands of Organizations in Southeast Asia (eWeek) Cymmetria discovered a new advanced persistent threat that it calls Patchwork. The initial infection uses the Sandworm vulnerability on unpatched systems
Thieves using laptops to hack into and steal cars (Naked Security) Say you’re planning to hot-wire a car
Hacker Finds Bug to Edit or Delete Any Medium Post (Motherboard) Medium has become the go-to home for extended blog posts from researchers, CEOs, and even the President of the United States. Now, one hacker has found a way to edit or delete any post on the publishing platform
Baton Rouge database of police details exposed over killing of Alton Sterling (Naked Security) @0x2Taylor, somebody who describes himself as a “Security Researcher,” is claiming responsibility for having published a database listing names and contact information for 50,000 police in Baton Rouge, just days after the fatal shooting of a black man in that city sparked more #BlackLivesMatter rage and a civil rights investigation from the Justice Department
Hijacked NASA Kepler Twitter feed tweets entirely new type of moon shot (Naked Security) Was that a photo of a new red ring around the planet Uranus, tweeted out by NASA’s Kepler account?
Omni Hotels was hit by point-of-sale malware (CSO) The hotel chain was hit by malware designed to collect payment card information
Poland's No.2 telecom Netia says suffered cyber attack (Reuters) Poland's No. 2 telecoms operator Netia came under attack from hackers who may have stolen the data of some of its clients, a company spokeswoman said on Friday
Guccifer Hacker aka Marcel Lazăr Lehel is NOT dead (Hack Read) Don’t fall for fake news about the death of Marcel Lazăr Lehel aka the Guccifer hacker — he is alive and awaiting sentencing in a Virginia jail cell
8 Ways Ethically Compromised Employees Compromise Security (Dark Reading) From audit cheats to bringing data to a new job, unscrupulous employees put organizations at risk
Security Patches, Mitigations, and Software Updates
Symantec says that Android Nougat prevents ransomware from resetting lockscreen passwords (Android Police) Ransomware is one of the nastier types of malicious software to emerge in the last few years. It's not exclusive to mobile, but the basic gist is that it locks down either specific files or an entire machine until the user sends money to a shady, untraceable online account to get their digital life back in order. The combination of easily-exploited security vulnerabilities, relatively small payments spread out over thousands of devices, and users reliance on their phones or computers has proven incredibly lucrative for malware developers
Facebook Messenger End-to-End Encryption Not On By Default (Threatpost) Facebook today began a test program rolling out opt-in end-to-end encryption for its Messenger service called Secret Conversations
Whispering Over the Internet: Facebook’s Encrypted Secret Conversations (Markets Morning) Since the founding of Facebook it has been innovative and revolutionary in the way we communicate with each other. The reigning king of social media has provided services for billions of people around the world. Where once communication was prohibited or impossible, Facebook provides the opportunity to interact and share ideas with likeminded or completely different individuals
Cyber Trends
Malware Drops Dramatically in First Half of 2016, But the Dangers of Malware are Still Very Real (Enigma Software) Tampa, St. Louis, and Orlando are on of top the list of the "most infected" cities for the first half of 2016
Insurance is ready for an upgrade (TechCrunch) Insurance may be widely perceived as a sleepy backwater when it comes to innovation in technology, but that’s about to change
What happens to consumer trust when a business is breached? (Help Net Security) In this podcast recorded at Infosecurity Europe 2016, Bill Mann, Chief Product Officer at Centrify, talks about what happens to consumer trust when a business is breached
You Have A Website? You Have Cybersecurity Risk (PC World) In the United States, small business is big business. Keeping the websites for those small businesses — all 28.4 million of them — safe and secure from attack, is a huge job. A job made easier with the help of a trusted partner
Cyber security will soon be the work of machines (Financial Times) Technology thinks like us — only better and faster, and it never tires, writes Anjana Ahuja
Is artificial intelligence the next frontier in security technology? (Security Info Watch) It sounds like the stuff of science-fiction; computer-based systems that can learn behavior pattern and make predictions about future incidents in both the physical and virtual world
A cyber-chasm prevents better security (ITWire) Australia is one of the faster adopters of virtualised servers, desktops, networks, and applications yet its thinking has not advanced as fast
Marketplace
Confusion over Cyber Insurance Leads to Coverage Gaps (CIO) Cyber insurance may be a booming business thanks to the high-profile breaches, but the market for such policies is a complicated, say experts from SANS Institute, Advisen and PivotPoint
Startup of the Week: Zuroovi takes the pain out of cyber insurance hunting (Washington Business Journal) It shouldn’t be so hard to get cyber insurance for a small business. At least that was Peter Madara’s thought when he tried to get cyber insurance for himself last year
Avast/AVG Deal: Why Should It Interest Intel? (Value Walk) Intel Corporation (NASDAQ:INTC) will be very interested in the details of a recent Avast/AVG deal as recently there were reports about it exploring options for selling its security unit. Following a slow start to the year, the tech M&A scene, much like the IPO market, is heating up, and security tech companies are the biggest beneficiaries of this trend
Microsoft rebrands EMS to become Enterprise Mobility + Security (Enterprise Apps Tech) It’s EMS, Jim, but not as we know it: Microsoft is rebranding its Enterprise Mobility Suite (EMS) to become Enterprise Mobility + Security, in order to “more accurately communicate its value”
Barracuda Networks Inc (CUDA) Stock Skyrockets on Blockbuster Q1 Earnings Call (Country Caller) Barracuda posted $86.7 million in total revenues, edging the Street's estimates of $83.84 million
Better Buy: FireEye Inc. or CyberArk Software Ltd? (Motley Fool) Which beaten-down cybersecurity player is a better long-term buy?
Why FireEye Is A Toxic Investment (Seeking Alpha) FireEye investors who have bought the stock in the hopes of an acquisition should consider selling their holdings as none will buy out the company at its asking valuation. FireEye has removed its CEO who used to specialize in selling several emerging companies and was spearheading companies like McAfee and Documentum when they were acquired. No buyer will pay a premium for FireEye as its expenses have been rising at a faster pace than the revenue, while the debt is also substantial. Due to a rapid growth in expenses, FireEye's operating cash flow has slipped deep into the red, which is why no buyer might pay its $30/share asking price. FireEye has made a mistake by not accepting two buyout offers this year, while the management shake-up indicates that the board does not intend to sell the company
US cyber security firm Imperva to explore strategic options (Domain-b) US cyber security firm Imperva Inc is planning to hire an investment bank in order to help it explore strategic options after coming under pressure from activist hedge fund Elliott Management, Reuters yesterday reported, citing people familiar with the matter
Billionaire Mike Lynch explains why he's putting his money into a Cambridge cybersecurity startup that's full of spies (Business Insider) This week, a relatively young cybersecurity company called Darktrace announced that it has raised an additional $65 million (£50 million) at a suspected valuation of over $400 million (£308 million)
HackerOne Continues to Grow Bug Bounty Business (eSecurity Planet) Alex Rice, co-founder and CTO of HackerOne, discusses how his firm is growing the bug bounty model
An Israeli startup is using the ancient art of military deception to trap hackers everywhere (Tech Insider) Israeli cybersecurity firm Cymmetria specializes in what it calls "cyber deception," and it should scare hackers everywhere
The Evolution of Deception Tech (InfoRisk Today) Smokescreen's Hidayatullah on controlling the narrative in an attack
CyberArk Named a Leader in Privileged Identity Management by Independent Research Firm (Yahoo! Finance) Report recognizes CyberArk for largest privileged identity management market presence
Citadel Security hires Microsoft’s Kevin Turner as the CEO of the company (Big News Network) Citadel Securities has announced that it has hired Microsoft COO Kevin Turner to be the new CEO of the financial company
Products, Services, and Solutions
Airbus to enhance RAF crypto (IHS Jane's 360) Airbus Defence and Space is set to provide cryptographic key management technology for the UK's F-35B Lightning II, C-130J, and MRTT Voyager aircraft, IHS Jane's has learned
The reward for mining Bitcoin was just cut in half (TechCrunch) It’s Halvening!!!
Ashley Madison admits using fembots to lure men into spending money (Ars Technica) The hookup site for cheaters admits its mistakes and tries to rebrand
Technologies, Techniques, and Standards
PCI-DSS: The Asian Journey to Compliance (InfoRisk Today) SISA founder Shanthamurthy says PCI Standards are embraced in Asia, Middle East markets
PCI: Why Indian Banks Say Compliance Remains Priority (InfoRisk Today) But will push for cardless payments make PCI-DSS obsolete 10 years from now?
Lessons Learned from Industrial Control Systems (SANS Internet Storm Center) While at SANSFire a few weeks ago, I had the good fortune to sit in on Robert M. Lee as he taught ICS515: ICS Active Defense and Incident Response. I'm not responsible for defending a power-plant's network nor do I have a manufacturing floor in my enterprise. I've also not worked with Modbus outside of CyberCity. However, like many of you, I have certain business-critical systems running on legacy hardware or requiring now-unsupported Operating Systems. These are the systems that you can't patch, or that even if they experience a compromise, you can't immediately shut them down. How to you secure networks with such constraints?
Why you shouldn't pay the ransomware fee (CSO) What enterprises need to consider in deciding whether to pay a ransomware fee
Cyber Resilience - Going Beyond Security to a New Level of Readiness (Crowe Horwath) Security, disaster recovery, and business continuity are all elements of “cyber resilience.” As attacks against data and information systems become more prevalent and malicious, it’s no longer a question of whether an attack will succeed, but when. Many leading organizations are turning to the concept to help limit the damage and speed up recovery. This article explains how cyber resilience goes beyond preventing attacks to focus on mitigating attacks’ consequences. It outlines the critical components an organization needs for a mature and effective program
Manage cybersecurity risk by restoring defense-in-depth’s promise (Help Net Security) Cybersecurity spending continues to soar, as the current, $75.4 billion worldwide market will increase to $101 billion by 2018, according to projections from Gartner. But how effectively are organizations investing in these tools? Not very, as 28 percent of the spending pays for security products which are either underutilized or not used at all, according to survey findings from Osterman Research
Cybersecurity firms step up intel sharing despite issues of trust (PCWorld) The collaboration has been protecting companies from the latest cyber attacks
Cyber risk management for financial institutions (Manilla Times) A study the Ponemon Institute and Hewlett Packard Enterprise conducted in 2015 found that for the average cost of cyber crime companies have suffered in any particular industry, financial services topped globally. Last year, the annualized average cost of cyber crime in the financial sector was $13.5 million, followed by the utilities and energy sector ($12.8 million)
How to set up two-step verification on Twitter (Naked Security) We’ve been reviewing why two-factor authentication (2FA) is so important, and how to set it up on various websites and services you might commonly use. When 2FA is available, it’s a great feature to enable to help secure your account, and thankfully it’s becoming more and more common on a number of popular sites
Design and Innovation
How artificial intelligence could help warn us of another Dallas (Washington Post) As the country reels from the spasm of gun violence that killed two black men and five police officers this week, a prominent digital vigilante is using an online tool he hacked together to keep an eye on hot spots that seem at risk of boiling over into bloodshed
Eyefluence shows us how we’ll be able to navigate screens with our eyes (TechCrunch) What if you could control a computer screen with just your eyes? Well that’s the vision of Eyefluence, a Silicon Valley-based startup that is working on technology for hands-free navigation
Academia
NSF awards Norwich grant for free teen summer cyber camp for second year (VermontBiz) Norwich University has received a grant for more than $72,000 from the National Science Foundation, with support from the National Security Agency, to lead a weeklong summer camp on cybersecurity for rising high school juniors and seniors. Dubbed GenCyber@NU (link sends e-mail), the comprehensive program is free to all participants and will be taught by standout Norwich faculty and alumni
Paladion Networks partners with M. S. Ramaiah University of Applied Sciences (Indian Education Diary) Paladion Networks, a globally acclaimed cyber security provider, is partnering with Karnataka's leading engineering college MS Ramaiah University of Applied Sciences to launch an M Tech program in Cyber security and Information Assurance. The course is a first-of-its-kind in India and aims to fill the talent crunch in the information security space
Legislation, Policy, and Regulation
The Nato summit might just make Vladimir Putin think again (Telegraph) hese days international summits come and go, a wearying merry-go-round of oppressive security, unreadable declarations and mutual self-congratulation. But this 2016 Nato summit in Warsaw is fraught with both human and strategic interest
Putin Haunts NATO Summit as Leaders See Threat on All Fronts (Bloomberg) NATO leaders pledged to bolster Europe’s defenses in the face of what they called an “arc of insecurity and instability” from Moscow to North Africa
India may amend law to step up cyber security: RK Sudhanshu (Economic Times) The Department of Electronics and Information Technology (DeitY) is gearing up to bring in new encryption and privacy policies to cater to evolving cyberspace, RK Sudhanshu, joint secretary cyber laws and e-security said on Friday
White House and Congress clash over Cyber Command (Washington Examiner) Lawmakers have largely expressed what they see as a need to restructure national cyberdefense by more clearly delineating lines of authority and elevating the status of Cyber Command in the Pentagon. However, pushback from the White House is casting doubt on whether such a move would be viable this year, much to the frustration of Congress
Obama says U.S. government must improve cyber security (Reuters) U.S. President Barack Obama said on Sunday that the U.S. government has to improve its cyber security practices for the modern age of smart phones and other technology, saying that hackers had targeted the White House
N.J. lawmakers urge DHS to send more money for cyberattack prevention efforts (StateScoop) Members of the state's congressional delegation think some key grant changes could help New Jersey better fend off cyberthreats
Going Dark Going Forward: A Primer on the Encryption Debate (House Homeland Security Committee Majority Staff Report) Public engagement on encryption issues surged following the 2015 terrorist attacks in Paris and San Bernardino, particularly when it became clear that the attackers used encrypted communications to evade detection—a phenomenon known as “going dark.” While encryption provides important benefits to society and the individual, it also makes it more difficult for law enforcement and intelligence professionals to keep us safe
Homeland Security's big encryption report wasn't fact-checked (Engadget) In attempting to shine a light on 'going dark,' the Homeland Security Committee reveals just how in the dark lawmakers are on encryption
Litigation, Investigation, and Law Enforcement
Does Hacktivism Really Equal Terrorism? (Hack Read) An act involving hacking of a computer or a website to deliver a religious, political or social message is known as hacktivism but is it an act of terrorism as well?
Cybercrime Now Surpasses Traditional Crime In UK (Dark Reading) The US could be on an even worse trajectory, according to one security expert
Global Cybergangs Take The ‘Cyber Arms Race’ Lead (PYMNTS) It looks like the use of profitable malware fraud attacks is helping cybercriminals to remain one step ahead of authorities
Security industry largely welcomes NCA cyber crime report (ComputerWeekly) Most information security professionals support the National Crime Agency's call for help from businesses in pursuing cyber criminals
Inside the Global Banking E-Heist (Epoch Times) Cybercriminals infiltrate financial networks, putting U.S. banks at risk
Email controversy not over for Clinton, Republicans warn (Washington Post) Hillary Clinton and her allies think that the political and legal cloud that hovered over her presidential prospects for more than a year blew away last week with news that the Justice Department would not pursue criminal charges in her handling of sensitive emails
Congressman wants answers on State's security culture (FCW) FBI Director Jim Comey may have closed his case on presidential candidate Hillary Clinton and her private email server, but many in Congress still have questions
FBI Pros Question Decision Not to Charge Hillary Clinton (Sharyl Attkisson) If some in the general public were outraged, so were some in the FBI
J. Edgar Hoover’s FBI Wouldn’t Have Punted EmailGate (Observer) Obama and Clinton don’t fear Comey—and that’s a problem
Police Cybercrime Unit using old and obsolete equipment, EU assessment finds (Independent) Despite the fact that the amount of cases being handled by the Police Force’s Cybercrimes Unit has surged by over 1,000 per cent in just over a decade, an EU evaluation report has indicated that the Maltese cybercrime unit is using old as well as obsolete equipment
When Will Cyber Appellate Tribunal Chair be Named? (InfoRisk Today) Post remains vacant; fraud cases pending
For a complete running list of events, please visit the Event Tracker.
Newly Noted Events
SANS San Diego 2016 (San Diego, California, USA , Oct 23 - 28, 2016) Cyber security training in San Diego, CA from SANS Institute, the global leader in information security training. Choose from nine hands-on, immersion-style training courses for security professionals at all levels. Many of these security courses have certifications that are aligned with DoD Directive 8570/8140 and all courses at this event are associated with GIAC Certifications. This event was planned to give you the weapons you need to defend against attackers and advance your career. You will learn from leading experts in courses that have been carefully selected to arm you with the latest tactics and strategies that will sharpen your skills
SANS Miami 2016 (Coconut Grove, Florida, USA, Nov 7 - 12, 2016) Attend our new SANS Miami 2016 event, November 7-12 and choose from five hands-on, immersion-style cybersecurity training courses taught by real-world practitioners. Attackers are targeting you with increasing viciousness and stealth, and it's essential you understand the tools and techniques and learn the skills needed to protect your organizations. Get the training you need from SANS - the most trusted and by far the largest source for information security training in the world
SANS Healthcare CyberSecurity Summit & Training 2016 (Houston, Texas, USA, Nov 14 - 21, 2016) SANS will be hosting its 4th Annual Healthcare Cybersecurity Summit. Join us and hear top security experts from leading healthcare companies discuss proven approaches for securing and succeeding in the new healthcare environment. You'll have the opportunity to meet with leaders from top organizations and see what really works in securing healthcare. As we know, healthcare has been undergoing major changes. Patients are demanding more convenient and personalized care. Digital health is changing the way that doctors and patients interact. New technologies allow patients to track their own health and generate data that was previously not available to care providers. Additionally, health information exchanges are being created to enable access to electronic medical records across disparate organizations. The Healthcare CyberSecurity Summit will take aim at the major challenges organizations face as they balance the security, compliance, and innovation required to thrive in this quickly changing market
SANS Cyber Defense Initiative 2016 (Washington, DC, USA , Dec 10 - 17, 2016) Make plans to attend SANS Cyber Defense Initiative 2016 (CDI). SANS is the one educational organization known for developing the cybersecurity skills most in need right now. SANS Cyber Defense Initiative 2016 will feature courses in IT security, security management, IT audit, penetration testing, and computer forensics, including short courses that can be taken with a long course to enhance your training. Every course, evening talk, and special event is designed to equip you with cutting-edge knowledge and skills required to combat today's cyber criminals. SANS events offer you a unique opportunity to learn from the best cybersecurity teachers in the country. At SANS events you get the kind of hands-on, immersion training that you can put to work immediately
SANS Cyber Threat Intelligence Summit & Training 2017 (Arlington, Virginia, USA, Jan 25 - Feb 1, 2017) Join SANS at this innovative Summit as we focus on enabling organizations to build effective cyber threat intelligence analysis capabilities. Most organizations are familiar with threat intelligence, but have no real concept of how to create and produce proper intelligence. The 2017 Summit will focus on specific analysis techniques and capabilities that can be used to properly create and maintain Cyber Threat Intelligence in your organization. Attend this summit to learn and discuss directly with the experts who are doing the CTI analysis in their organizations. What you learn will help you detect and respond to all ranges of adversaries including some of the most sophisticated threats targeting your networks
Upcoming Events
ISS World South Africa (Johannesburg, South Africa, Jul 10 - 12, 2016) ISS World South Africa is the world's largest gathering of Southern Africa Law Enforcement, Intelligence and Homeland Security Analysts as well as Telecom Operators responsible for Lawful Interception, Hi-Tech Electronic Investigations and Network Intelligence Gathering. ISS World Programs present the methodologies and tools for Law Enforcement, Public Safety and Government Intelligence Communities in the fight against drug trafficking, cyber money laundering, human trafficking, terrorism and other criminal activities conducted over today's telecommunications network and the Internet.
Insider Threat Program Development Training (Washington, DC, USA, Mar 29 - 30, 2016) Insider Threat Defense announced it will hold a training class on Insider Threat Program Development (National Insider Threat Policy-NISPOM Conforming Change 2) on March 29-30, 2016, in Washington, DC. For a limited time the training is being offered at a discounted rate of $795. The training is comprehensive and provides students with the knowledge and resources to develop and implement a robust Insider Threat Program. Insider Threat Defense has trained a substantial number of organizations and has become the "Go To Company" for Insider Threat Program Development Training
SINET Innovation Summit 2016 (New York, New York, USA, Jul 14, 2016) “Connecting Wall Street, Silicon Valley and the Beltway.“ SINET Innovation Summit connects America’s three most powerful epicenters and evangelizes the importance of industry, government and academic collaboration on joint research initiatives. The opportunity to bring practitioners and theory together to discuss fundamental Cybersecurity challenges is critical to the advancement of innovation in the Cybersecurity domain. This summit is designed to reinvigorate public-private partnership efforts and increase relationships that foster the sharing of information and joint collaboration on Cybersecurity research projects
Insider Threat Program Development Training (Washington, DC, USA, Mar 29 - 30, 2016) Insider Threat Defense announced it will hold a training class on Insider Threat Program Development (National Insider Threat Policy-NISPOM Conforming Change 2) on March 29-30, 2016, in Washington, DC. For a limited time the training is being offered at a discounted rate of $795. The training is comprehensive and provides students with the knowledge and resources to develop and implement a robust Insider Threat Program. Insider Threat Defense has trained a substantial number of organizations and has become the "Go To Company" for Insider Threat Program Development Training
cybergamut Technical Tuesday: The Importance of Managing Attribution Online by Dani Charles of Ntrepid Corporation (Elkridge and Calverton, Maryland, USA, Jul 19, 2016) cybergamut Technical Tuesday is for cyber professionals to exchange innovative ideas and discuss technical issues of mutual interest. We’ll have a Technical Tuesday event on 19 July 2016 (1600 – 1730 East Coast Time). The importance of open-source intelligence (OSINT) has increased exponentially as more and more information has come available online. At the same time, the increased sophistication of websites and platforms means the content one sees can be easily blocked or manipulated based on one’s attribution to an organization, region, or country. This presentation focuses on the importance of Managed Attribution, detailing the technical methods employed by websites and platforms to determine attribution, and presenting solutions that allow users to manage their attribution in order to get access to the most authentic and accurate information.
CyberSec 2016 (New York, New York, USA, Jul 19, 2016) Ask any bank CEO in the U.S. what keeps them up at night and cybersecurity is bound to be in the top five. Maybe even no. 1. And while the threat matrix is evolving rapidly, along with the regulatory demands, so are the technology tools available to help meet them. This one-day conference will take a big-picture look at the threats facing banks today and tomorrow, and offer insights on how to combat them.
Nominations are now open: National Cyber Security Hall of Fame (Baltimore, Maryland, USA (nominations submitted online), Jul 20, 2016) The Cyber Security Hall of Fame "Respect the Past - Protect the Future" accepts nominations from companies and organizations that are engaged in, and committed to, the growth of the cyber security industry. Each of the nominators can submit nominations in the following categories or combination of categories: Technology, Policy, Public Awareness, Education, and Business.
Insider Threat Program Development Training (Washington, DC, USA, Mar 29 - 30, 2016) Insider Threat Defense announced it will hold a training class on Insider Threat Program Development (National Insider Threat Policy-NISPOM Conforming Change 2) on March 29-30, 2016, in Washington, DC. For a limited time the training is being offered at a discounted rate of $795. The training is comprehensive and provides students with the knowledge and resources to develop and implement a robust Insider Threat Program. Insider Threat Defense has trained a substantial number of organizations and has become the "Go To Company" for Insider Threat Program Development Training
Billington Global Automotive Cybersecurity Summit (Detroit, Michigan, USA, Jul 22, 2016) Billington Cybersecurity, an independent conference company focused exclusively on cybersecurity seminars, announces the first global summit that brings together the most senior government and industry experts to examine cyber security in the automotive industry. The Chairman and CEO of General Motors, Mary Barra, U.S. Transportation Secretary Anthony Foxx, U.S. Senator Gary C. Peters and Lyft CEO and Co-Founder Logan Green will discuss industry and government insights on automotive cybersecurity.
Community College Cyber Summit (3CS) (Pittsburgh, Pennsylvania, USA, Jul 22 - 24, 2016) The third annual Community College Cyber Summit (3CS) is organized and produced by six Advanced Technological Education (ATE) centers funded by the National Science Foundation (NSF) and involved in cybersecurity. 3CS meets the perceived need for a national academic conference that focuses exclusively on cybersecurity education at the community college level. Faculty, administrators, and other stakeholders in community college cybersecurity education are invited and encouraged to attend
SANS ICS Security Summit & Training — Houston 2016 (Houston, Texas, USA, Jul 25 - 30, 2016) SANS has joined forces with industry leaders and experts to strengthen the cybersecurity of Industrial Control Systems (ICS). The initiative is turning ICS cybersecurity around by equipping both security professionals and control system engineers with the security awareness, work-specific knowledge, and hands-on technical skills they need to secure automation and control system technology. Register now for these ICS skills based courses.
SANS San Jose 2016 (San Jose, California, USA , Jul 25 - 30, 2016) Information security training is coming to Silicon Valley from SANS Institute, the global leader in information security training. At SANS San Jose 2016, July 25-30, 2016, choose from 7 hands-on, immersion-style cybersecurity training courses taught by real-world practitioners. We will see you at The Westin San Jose, located in the heart of downtown San Jose. Now is the time to improve your information security skills. SANS San Jose 2016 features comprehensive hands-on technical training from some of the best instructors in the industry and includes several courses that will prepare you or your technical staff for DoD 8570 and GIAC approved certification exams. Start making your plans to attend now!
AfricaHackOn (Nairobi, Kenya, Jul 28 - 29, 2016) What began as a casual meet up for information security professionals has become one of the formidable forces in the profession. That group is the AfricaHackOn. Housed under its parent umbrella, Euclid Consultancy Ltd, AH as fondly known, has traversed all odds to becoming a leading venture in raising awareness on matters affecting cyber security and also grooming upcoming talent into the job market. We have been poised to becoming a one stop shop for talent and resources in a field greatly short staffed.