Juniper confirms zero-days in Shadow Brokers' leaks. Observers speculate about attribution. Spy-Agent Trojan active in the wild against US targets. Hancitor downloader shifts gears.
Juniper Networks joins Cisco and Fortinet in confirming that the Shadow Brokers' leaks include zero-days for its products. NetScreen devices running ScreenOS are vulnerable.
Most observers who've expressed an opinion have concluded the leaks are genuine. There's more divergence on attribution of responsibility, although consensus continues to point to Russian intelligence. A minority argues that this couldn't be the case, because the Russian organs would have held the material quietly and exploited it for their own purposes, and that hence the leaks were the work of a rogue NSA insider. But more observers (Edward Snowden, of all people, among them) argue that disclosure is a deliberate move on the part of the Russian government to discredit NSA and place American intelligence collection in bad odor. And of course the (alleged) complicity of a compromised insider is consistent with Russian intelligence operations.
That the Shadow Brokers are private actors with a mix of hacktivist and mercenary motives seems unlikely. Their online auction of the material makes little sense: it's seen no serious bidders. And, as CIO points out, the loss leaders with which they've teased the market would have brought a great deal of money from zero-day brokers, whether white, grey, or black hat.
Speaking of Russian intelligence, Fancy Bear (of DNC hack fame) is back, and apparently behind the hack of the World Anti-Doping Agency.
Dr. Web warns that the Spy-Agent backdoor Trojan is now in active use against US targets.
Palo Alto sees a shift in Hancitor downloader tactics.
Today's issue includes events affecting Australia, Canada, Germany, India, Ireland, Israel, Japan, Netherlands, Philippines, Russia, Switzerland, Turkey, United Kingdom, and United States.
A note to our readers, especially those of you interested in art and design--"STEM to STEAM," as they call it: the CyberWire is partnering with Maryland Art Place to sponsor a competition for an original work of art on the theme "creating connections." You can read about the competition in NY Arts Magazine. A full prospectus may be found here.
The CyberWire's regular daily Podcast will be out later this afternoon, with interviews, educational tips, and more on the stories of the day. In today's podcast we'll be hearing about the Shadow Brokers affair, in extended discussions with Columbia University's Jason Healey and RedSeal's Ray Rothrock (CEO) and Mike Lloyd (CTO). (As always, if you enjoy the podcast, by all means consider giving it an iTunes review.)
Cyber Attacks, Threats, and Vulnerabilities
Juniper Acknowledges Equation Group Targeted ScreenOS (Threatpost) Juniper Networks on Friday acknowledged that exploits implants contained in the ShadowBrokers data dump do indeed target its products
Snowden: Leak Of NSA Hacking Tools Are Russia’s ‘Warning’ To The US Government (Mint Press News) In a recent string of tweets, the whistleblower warned that recently leaked NSA hacking tools 'could have significant foreign policy consequences. Particularly if any of those operations targeted US allies'
Expert: NSA 'hack' most likely an agency insider (Washington Examiner) The online leak of data pilfered from the National Security Agency more likely came from an agency insider than from hackers linked to Russia, according to an expert on the intelligence community
Alleged NSA hackers probably gave away a small fortune by leaking exploits (CIO) Each of the zero-day exploits could have sold for over $100,000 or more in the black market
Why Twitter Was the Platform of Choice for Ripping Apart the NSA Dump (Motherboard) Last week, “The Shadow Brokers” dumped a slew of hacking tools they claimed belonged to a group associated with the NSA
Shadow Brokers, digital attacks, and the escalation of geopolitical conflict (Help Desk Security) Last week’s data dump by the Shadow Brokers has left many wondering how the US will respond. This is just the latest in a series of politically motivated data breaches often attributed to Russia, including last year’s State Department and White House attacks, as well as this summer’s intrusions on the DNC and DCCC. However, these must not be viewed in isolation, but as part of the larger, on-going escalation of tensions between the US and Russia
Can hackers sway public opinion with DNC and NSA leaks? (Christian Science Monitor Passcode) Many cybersecurity experts say the Kremlin is attempting to manipulate debate in the US by leaking secret information on politicians and secret government operations
Russian hackers 'Fancy Bear' likely breached Olympic drug-testing agency and DNC, experts say (International Business Times) Researchers believe the World Anti-Doping Agency breach was a form of retaliation against whistleblower Yuliya Stepanova
Same Russian hackers likely breached Olympic drug-testing agency and DNC (Guardian) Experts believe hacker ‘Fancy Bear’ hacked Democratic National Committee and World Anti-Doping Agency, the second in retaliation against whistleblower
Turns Out You Can’t Trust Russian Hackers Anymore (Foreign Policy) Moscow-linked cyberthieves aren’t just stealing and releasing emails anymore -- they’re altering them to smear one of Putin's most vocal opponents
Backdoor uses TeamViewer to spy on victims (Help Net Security) A backdoor Trojan with spying capabilities that has been previously directed against European and Russian users is now being lobbed at US users, Dr. Web researchers have warned
Epic Games forums hacked again, over 800,000 users affected (Help Net Security) Some of the online forums maintained by Epic Games, the video game development company behing the Unreal Engine technology and games based on it, have been hacked and their user databases compromised
Hancitor Downloader Shifts Attack Strategy (Threatpost) Researchers said a new variant of the Hancitor downloader has shifted tactics and adopted new dropper strategies and obfuscation techniques on infected PCs. Researchers at Palo Alto Networks are currently tracking the biggest push of the Hancitor family of malware since June that it says has shifted away from H1N1 downloader and now distributes the Pony and Vawtrak executables
DetoxCrypto ransomware-as-a-service rears its ugly head (Graham Cluley) Different variants. Different themes. Different emails. But similar code. Hmm
Voice Message Notifications Deliver Ransomware (SANS Internet Storm Center) Bad guys need to constantly find new ways to lure their victims. If billing notifications were very common for a while, not all people in a company are working with such kind of documents. Which types of notification do they have in common?
Hospitals More at Risk Than Ever With the New Locky Ransomware Wave (Virus Guides) A huge increase in the number of ransomware attacks against US-based hospitals was detected by the security team at FireEye
Many hospitals transmit your health records unencrypted (CSO) Healthcare IT organizations often lack budget and personnel to address security needs
Fake attacks by insiders to fool companies (CSO) Famous cybercrime groups and hacktivists “brands” may be a smokescreen to cover sophisticated insider attacks
Anatomy Of A Social Media Attack (Dark Reading) Finding and addressing Twitter and Facebook threats requires a thorough understanding of how they're accomplished
Cybercriminals recruiting insiders to attack telecommunication providers: Kaspersky (Canadian Underwriter) Cybercriminals are using insiders to gain access to telecommunications networks and subscriber data, according to an intelligence report from global cybersecurity company Kaspersky Lab
Attackers don't need vulnerabilities when the basics work just as well (CSO) Weak passwords and network access controls do more harm than malware
Malicious QuadRooter Apps Discovered in Google Play Store (Infosecurity Magazine) The recent disclosure of a set of vulnerabilities in the Android operating system that could potentially put over 900 million devices at risk may have been patched, but its threat remains
Hacktivists Take Aim At Olympics Broadcast Service (Dark Reading) Broadcasts and images of Games left intact, but employee contact information apparently breached
Imperva: Application layer DDoS attacks are on the rise (CSO) Aided by botnets and DDoS-for-hire more actors can generate longer attacks
DDoS Attacks Increase 200%; UK Now Second Most Targeted Nation (Infosecurity Magazine) DDoS attacks have increased by over 200% in the last year, according to new research from Imperva. The uptick in attacks has been attributed to DDoS-for-hire services, the company said
Workers using Pokémon Go expose corporate networks (Enterprise Innovation) An estimated 26 million users have installed the Pokémon Go app in less than a month since launch in the US, breaking all mobile gaming records with more than 75 million installs across Apple and Google platforms globally
Security Patches, Mitigations, and Software Updates
Obihai Patches Memory Corruption, DoS, CSRF Vulnerabilities in IP Phones (Threatpost) Obihai Technology recently patched vulnerabilities in its ObiPhone IP phones that could have led to memory corruption, buffer overflow, and denial of service conditions, among other outcomes
First Galaxy Note 7 update already rolling out with August security patch (Updato) While the Android fans are still soaking in the goodness of Galaxy Note 7, Samsung and supported carriers aren’t resting. Within less than a week since the launch of its latest phablet, Samsung is rolling out the very first Galaxy Note 7 update
Has Microsoft “broken” millions of webcams? (And how to fix yours.) (Naked Security) It’s not a good /day, week, month, quarter, year/ to be working in Microsoft Support
Despite billions spent on cybersecurity, companies aren’t truly safe from hacks (CSO) Companies on a treadmill to stay ahead of data thieves
IoT Security Predictions Are Coming True, Fortinet Finds (SDX Central) Fortinet didn’t exactly go out on a limb last year when it predicted security problems for the Internet of Things (IoT). But it’s worth noting that those predictions seem to be coming true this year
Walls: Not the Be-All and End-All of Cybersecurity (Bloomberg BNA) Walls. For years, humans have relied on walls as the first line from defense from nature and foreign threats. However, these trusted walls aren’t always sufficient to protect people from extreme natural disasters or explosive weapons. According to a recent survey of 1,100 information technology decision makers by international digital security company Gemalto, the same goes for digital defenses
Most Asia Pacific companies lack cyber-security mind-set (Manilla Bulletin) Most companies in the Asia Pacific (APAC), almost 60 per cent, the Philippines included, consider “employees’ lack of knowledge” as the main insider threat to cyber-security and less than one in ten companies in the region fully understand how cyber-attacks happen
Family Offices at Risk of Cyber Attack (Campden FB) Almost half of multi-million dollar international family offices do not have dedicated cyber security, exposing ultra-high net worth individuals to hackers, an accountancy firm warns
UBS Breaks Down The Clouding Cyber Fundamentals (Benzinga) For about three years, cybersecurity spending has been in a “super cycle,” UBS’s Brent Thill said in a report. The analyst added, however, that the 1H16 earnings and “our ongoing field work” indicate that the phase of “indiscriminate budget allocations” may be over
3 Hot Cybersecurity Stocks (Forbes) The World Economic Forum recently cited cybersecurity attacks as one of the top five global risks we face today. Think content security, network security and data protection for consumers, businesses, and governments
Microsoft: The Latest Tech Company Rushing To Acquire Machine Intelligence Startups (Stockhouse) Technology companies have been scrambling to prepare for the next generation of technology by acquiring machine intelligence startups. The most recent notable transaction occurred on Monday when Microsoft Corporation (NASDAQ: MSFT) announced it has acquired Genee
Lockheed Shrinks, and a New Cyberwar Star Is Born at Leidos (Motley Fool) The new government IT giant boasts some (classified) big-name clients
Jonathan Aberman: The one void that could slow our cybersecurity dreams (Washington Post) More and more people agree: cybersecurity is in our region’s DNA and can continue to be a boom for greater Washington
This Silicon Valley venture fund keeps betting millions on D.C.’s cyber community (Washington Post) Bessemer Venture Partners is one of California’s more successful technology investors, an early backer in the likes of Yelp, LinkedIn and Skype. Lately, the venture firm has taken a particular interest in the Washington area’s cybersecurity scene. Its fund owns stakes in at least 40 cybersecurity companies, and recently added three local companies to its portfolio
ThreatQuotient Raises $12M in Series B Funding and Appoints NEA’s Peter Barris to Board of Directors (BusinessWire) Investment supports major growth initiatives and validates company’s innovative approach to the threat intelligence platform market
Tempered Networks raises $10M for networking and security tech that helps companies prevent cyberattacks (GeekWire) Tempered Networks has raised another $10 million to help protect companies from cyberattacks while also providing networking infrastructure
How not to describe yourself if you want to get funded (TechCrunch) We are the Uber of our industry, applying curated, user-generated gamification to the sharing economy
Forget FireEye Inc: These 2 Stocks Are Better Buys (Fox Business) Threat detection firm FireEye (NASDAQ: FEYE) has lost almost 60% of its market value over the past 12 months due to concerns about its slowing sales growth, rapid cash burn rate, rising competition, and executive departures. Its dismal second quarter earnings report on Aug. 4 basically confirmed all those fears
Trust exercise: Symantec's new website security expert is reaching out to hacker community (SC Magazine) Tarah Wheeler Van Vlack, whom Symantec recently hired as principal security advocate and senior director of engineering for its Website Security team, is already making her presence felt, reportedly pledging to foster ties with the independent hacker community for inspiration and ideas
BAE Systems to host live simulated cyber-attack competition in London (Army Technology) British defence company BAE Systems and Her Majesty’s Government’s Communications Centre (HMGCC) are set to host a live simulated cyber-attack at the Blue Fin building in London, UK, on 3 September
U.S. Bank and Akana Prepare for a Small Business Banking Hackathon in Silicon Valley (Yahoo! Finance) Akana, a leading provider of API Management, API security and Microservices solutions for Digital Businesses, announced today that its Akana Platform will power the app development efforts at the upcoming external U.S. Bank Hackathon being held in San Jose, California. By joining forces with U.S. Bank to sponsor the Aug. 27 and 28 Hackathon, Akana and U.S. Bank will externalize APIs that the developer teams will leverage alongside MasterCard’s APIs to create innovative solutions that improve productivity, financial stability and customer experiences for all small businesses
Generali Global Assistance Bolsters Identity and Digital Protection Services Global Unit With New Appointment (MarketWired) Generali Global Assistance ("GGA" or "the Company"), a leader in the assistance industry since its founding in 1963 and part of the multinational Generali Group, today announced the appointment of Julie Jamsa as Vice President, Service Delivery for the Company's Identity and Digital Protection Services Global Unit, effective immediately
Palo Alto Networks Announces Executive Appointments (PRNewswire) Dave Peranich joins as Executive Vice President, Worldwide Sales; Mark Anderson promoted to President
Cylance Appoints Felix Marquardt President of Cylance International (BusinessWire) Marquardt will report to Cylance President and CEO Stuart McClure and work closely with Chief Security and Trust Officer Malcolm Harkins, SVP Worldwide Sales Nicholas Warner, and the rest of the Cylance executive team
Products, Services, and Solutions
Siemplify Launches Security Channel Partner Program (Digital Journal) Siemplify™ today announced the launch of its Nucleus Channel Partner Program, which extends the reach of the company’s ThreatNexus™ security operations platform by making it available to partners and their customers on a national basis. As part of the launch, Siemplify also announced multiple partnerships with leading security channel partners including INNO4, SeeGee Technologies, RKON, and Gotham
Anti-phishing firm KnowBe4 looks to gear up channel (Channel Buzz) About five per cent of the company’s partner business is in Canada today, but they have a push panned in the Canadian market in 2017
Raytheon debuts Cyber and Electromagnetic Battle Management system (UPI) System unveiled at U.S. Army's Cyber Quest event
Dell SonicWall’s multi-engine sandbox approach to capturing evasive malware (Security Asia) As businesses in Asia Pacific become more digitized, enterprises and governments in this region have to ensure that their security programs are updated and future-proof to prevent imminent breaches from constantly evolving threats
Cyber security stretches across the spectrum (Automotive World) Thales e-Security speaks to Megan Lampinen about its pioneering data protection and cyber security efforts
10 best anti-hacking software to protect your Windows 10 run PC from hackers 0 (TechWorm) Protect your PC/laptops with these 10 best anti-hacking software for Windows 10
Threat intelligence has a shelf life says security exec (Security Brief) The security division of EMC, the RSA, has new integrated threat intelligence partners for the RSA NetWitness Suite
Technologies, Techniques, and Standards
Threat Intelligence Starter Resources (Recorded Future) Creating a threat intelligence capability can be a challenging undertaking, and not all companies are ready for it. Businesses that run successful threat intelligence teams generally
Can endpoint security stop ransomware attacks? (GCN) In the realm of malware, ransomware is reaching plague-like proportions. And just like any infectious disease, the No. 1 cause of transmission is the one thing no one can avoid: human beings
How to Digitally Erase All Your Stuff When You Quit Your Job (Wired) It's your last day at your job. There will be tears! Between the cheesy sendoff at the morning meeting and the after-work happy hour, you have to do something very important: back up all your stuff and securely clear your computer. Be smart about it with these steps
5 back-to-school tips to help kids stay safe online (Naked Security) As children around the world (in the northern hemisphere, anyway) end their summer breaks and start to head back to school, they’ll be using the internet and their phones for schoolwork and socializing. Of course, we want to make sure kids are safe and smart online, so we’re sharing these 5 back-to-school tips to help
Research and Development
NIST scientists 'nervous' about lightweight crypto for IoT (FedScoop) The Internet of Things presents a unique challenge for cryptographers: How long should a key be?
World's most efficient AES crypto processing technology for IoT devices developed (Science Daily) Our research group has discovered a new technique for compressing the computations of encryption and decryption operations known as Galois field arithmetic operations, and has succeeded in developing the world's most efficient Advanced Encryption Standard (AES) cryptographic processing circuit, whose energy consumption is reduced by more than 50% of the current level
Air Force wants a cyber disconnect (C4ISRNET) BAE Systems Information and Electronic Systems Integration has been awarded an $8.7 million Air Force contract for software that will disconnect and reconnect users to a network
American Military University Becomes Newest CyberPatriot Sponsor (PRNewswire) The Air Force Association today announced American Military University (AMU) as the newest Cyber Silver sponsor of its flagship STEM program, CyberPatriot
All Hail the College Cyberdefense Champions (New America) Heather Lawrence is the president of Hack@UCF, the team of college students from the University of Central Florida that won this summer's National Collegiate Cyber Defense Competition. She and her teammate, Alex Davis, are part of a 180-student club that has taken three consecutive championships in the country’s largest cyberdefense competition of its kind. On this episode of the Cybersecurity Podcast, these student champions discuss what it's like to be part of such a high-stakes competition, what young people can do to make sure they remain ethical hackers, and how they plan to adapt to the quick-changing nature of technology
Legislation, Policy, and Regulation
Israel’s New Counter-Terrorism Law and Terrorism in Cyberspace (Council on Foreign Relations) The Israeli parliament adopted a new counter-terrorism law on June 15, 2016. According to the Ministry of Justice’s summary, the legislation will provide “law enforcement authorities with more effective tools to combat modern terrorist threats while incorporating additional checks and balances necessary to safeguard against unreasonable violations of individual human rights.” The legislation revises and expands Israeli law in many areas, as Elena Chacko discusses at Lawfare. The changes include provisions addressing use of the internet and social media for terrorist purposes. With terrorist activities online under scrutiny, the new Israeli law is important to efforts underway to reduce the threat of terrorism in cyberspace
CCS sets up framework for cyber security pros (UK Authority) Contingent LabourONE framework provides new route for contracting CESG certified specialists
Groups oppose US plan to collect social media info from visitors (CSO) The groups say a Department of Homeland Security proposal will be ineffective and impinge on privacy
Elections Shouldn’t Be Deemed Critical Infrastructure (Security Debrief) The recent cyberattack on the Democratic National Committee and the Democratic Congressional Campaign Committee has led to confusion on how to protect against potential future hacks. In the wake of these attacks, Homeland Security Secretary Jeh Johnson said the Department was looking at designating elections as critical infrastructure. This move would put elections on par with the electricity grid and the banking system. It’s a subject the Obama administration is exploring
NASA’s ‘act of desperation’ demonstrates continued cyber deficiencies (Federal News Radio) One of NASA’s main networks used by almost every employee and contractor and managed by Hewlett Packard Enterprise is in such bad shape, the agency’s chief information officer could no longer accept the risk and let the cybersecurity authorization expire
New cyberspace operations group & intelligence squadron activated at National Guard Base (WBFF Fox 45 News) A new cyberspace operations group and intelligence squadron have been formally activated at Warfield Air National Guard Base in Middle River
Marines with I MEF strengthen cyber defensive capabilities (DVIDS) The Corps’ ability to win on the battlefield remains strong; however, its post-9/11 enemies in operational environments like in Iraq and Afghanistan have been, by and large, a technologically inferior force. And while the Corps may need to only refine its maneuver warfare skills, there is a new battle space that is sure to dominate the next major armed conflict: cyberspace
Litigation, Investigation, and Law Enforcement
FBI uncovers 14,900 more documents in Clinton email probe (Washington Post) The FBI’s year-long investigation of Hillary Clinton’s private email server uncovered 14,900 emails and documents from her time as secretary of state that had not been disclosed by her attorneys, and a federal judge on Monday pressed the State Department to begin releasing emails sooner than mid-October as it planned
Bahraini Prince Sought Access to Clinton Through Foundation After Trying ‘Normal Channels’ (Foreign Policy) Newly-released emails from Hillary Clinton’s tenure as secretary of state raise fresh questions about whether the Clinton Foundation helped its donors gain access and special treatment from the State Department during her time in office
Republicans subpoena three tech companies over Clinton emails (CSO) The subpoenas were sent to Datto, SECNAP Network Security and Platte River Networks
Indians could face jail time for torrenting and file sharing (HackRead) India is waging a war of torrents and file sharing sites
Turkish Journalist Jailed for Terrorism Was Framed, Forensics Report Shows (Motherboard) Turkish investigative journalist Barış Pehlivan spent 19 months in jail, accused of terrorism based on documents found on his work computer. But when digital forensics experts examined his PC, they discovered that those files were put there by someone who removed the hard drive from the case, copied the documents, and then reinstalled the hard drive
Irish man said to be Silk Road’s “Libertas” fights to stay out of US prison (Ars Technica) Gary Davis is free, for now, on €15,000 bail
Snooped-on man free to sue spyware maker (Naked Security) A US court has said that a man can sue a spyware company whose software was used unlawfully by a jealous spouse to intercept his messages
Lawyer: Dark Web Child Porn Site Ran Better When It Was Taken Over by the FBI (Motherboard) In February 2015, the FBI took control of Playpen, the largest dark web child pornography site at the time. But instead of shutting the site down, the agency kept it going for just under two weeks, in order to deliver malware to its visitors in the hope of identifying suspects in its investigation
Release of FISC Question of Law & FISCR Opinion (IC on the Record) Today the Office of the Director of National Intelligence, in consultation with the Department of Justice, is releasing in redacted form a Certification of Question of Law to the Foreign Intelligence Surveillance Court of Review submitted by the Foreign Intelligence Surveillance Court on February 12, 2016, and the FISCR’s April 14, 2016 Opinion in response to the FISC’s Certification of Question of Law
For a complete running list of events, please visit the Event Tracker.
Newly Noted Events
AppSecUSA 2016 (Washington, DC, USA, Oct 11 - 14, 2016) OWASP’s 13th Annual AppSecUSA Security Conference is the premier application security conference for developers and security experts. Come hear an amazing group of inspirational speakers—including YouTube’s Favorite Hacker, Former DHS NCSD Director of Software Assurance, and Assistant Professor & Cryptographer—who are challenging traditions. You’ll be inspired by fresh ideas, start rethinking the status quo, and leave ready to tackle your challenges in innovative ways.
SANS Alaska 2016 (Anchorage, Alaska, USA, Aug 22 - 27, 2016) SANS is bringing our renowned security training to Alaska! Join us in August for a week of hands-on training and compelling bonus sessions while taking in breathtaking views and experiencing the great Alaskan wilderness. SANS Alaska will feature two hands-on, immersion-style security training courses taught by real-world practitioners August 22-27, 2016 in Anchorage.
CISO New Jersey (Hoboken, New Jersey, USA, Aug 23, 2016) With newspaper headlines covering the latest data breaches, cloud computing security questions going unanswered and hackers developing more sophisticated attacks, the IT department has a growing responsibility to protect customer and company data. The CISO Summit brings together C-level IT security executives, industry analysts and solution providers to discuss challenges and best practices in a relaxed, yet focused business setting. Agenda sessions include panel discussions, think tanks, analyst Q&A sessions and much more.
Cyber Jobs Fair (San Antonio, Texas, USA, Aug 23, 2016) Held in conjunction with the Second Annual CyberTexas Conference, the Cyber Jobs Fair is open to anyone with cyber security education or experience. A security clearance is not required. Booz Allen Hamilton, Digital Hands, IPSecure, Inc., ISHPI, L-3 - West, Lockheed Martin, the Los Alamos National Laboratory, MacAulay-Brown, Inc., STG, Inc., and Tensley Consulting, Inc. will be among the employers attending.
CyberTexas (San Antonio, Texas, USA, Aug 23 - 24, 2016) CyberTexas was established to provide expanded access to security developments and resources located in Texas; provide an ongoing platform for the education and skill development of cyber professionals & job creation; build strong relationships with other U.S. and International geographies focused on cyber ecosystem development; bring national and international resources to the region to showcase Texas-based cyber assets; identify and encourage business opportunities within and outside of Texas; and create long-term value for the cyber security ecosystem of San Antonio and the State of Texas.
Chicago Cyber Security Summit (Chicago, Illinois, USA, Aug 25, 2016) The Cyber Security Summit is an exclusive conference series connects C-Suite & Senior Executives who are responsible for protecting their companies’ critical infrastructures with innovative solution providers and renowned information security experts. This educational and informational forum will focus on educating attendees on how to best protect highly vulnerable business applications and critical infrastructure. Attendees will have the opportunity to meet the nation’s leading solution providers and discover the latest products and services for enterprise cyber defense.
Air Force Information Technology and Cyberpower Conference 2016 (Montgomery, Alabama, USA, Aug 29 - 31, 2016) America is faced with a national emergency in cyberspace. US national security, economic vitality, financial stability and foreign policy are being eroded. Increasingly prevalent and severe malicious cyber activities are being directed against the DOD, USG, Private-Sector, Critical Infrastructure and Key Resource operators, Academia and Civil Society. USG industrial-aged thought, processes, and organizational relationship are not fostering “success” against decentralized, digital-age threat actors. An information-age solution is needed. Private-public dialogue is integral to building a new paradigm in which digital platforms are secure, and the nation is defended in a domain. Building bridges between government and the private sector is essential for victory. This conference will promote a national dialogue between the US Air Force, commercial businesses, academia and civil society to generate “whole of nation” strategies and processes aimed at overcoming challenges and ambiguities of an increasingly digital world.
CISO Toronto (Toronto, Ontario, Canada, Aug 30, 2016) A data breach is not only a PR nightmare, but cause for customers to turn to competitors, exposing sensitive company information and racking up fines from industry regulators. In order for organizations to operate smoothly, CISOs and IT security executives need to be ahead of the hackers, and kept abreast of the latest IT security topics and trends.
ISAO SO Public Forum (Tysons, Virginia, USA, Aug 31 - Sep 1, 2016) This public forum is the last opportunity to meet face-to-face and participate in conversations that will shape the first set of standards and guidelines to be published in September! Speakers will include leaders from multiple industry sectors, government and academia. The meeting will feature topics including: an in-depth public discussion of ISAO 100-1: Guidelines for Establishing an ISAO and ISAO 600-1: Government Relations, Programs, and Services; the State of the Ecosystem from the ISAO SO: “Where We Are and Where We’re Going” and “How We’ll Get There”; a special meeting of emerging ISAOs, and panel discussions from industry experts and thought leaders on ISAO Services and Capabilities, and Building an ISAO.
cybergamut Technical Tuesday: Quantifying Cyber Attacks: To Optimize and Assess your Defense by Jason Syversen of Siege Technologies (Elkridge, Maryland, USA, Sep 6, 2016) cybergamut Technical Tuesday is for cyber professionals to exchange innovative ideas and discuss technical issues of mutual interest. We’ll have a Technical Tuesday event on 6 September 2016 (1600 – 1730 East Coast Time). This talk describes the challenges of quantifying offensive and defensive capabilities and posture. This is not an IT-oriented metrics-talk about measuring the firewall rules or number of incidents last year. Instead, you’ll hear about new military-backed research on how to quantify the effectiveness of attacks, predict outcomes and measure defensive strength, as well as the future of data-driven security technologies.
2016 Intelligence & National Security Summit (Washington, DC, USA, Sep 7 - 8, 2016) Third annual unclassified summit hosted by AFCEA International and the Intelligence and National Security Alliance (INSA). There are five plenary sessions and nine breakout sessions related to cybersecurity, policy, and enduring strategic issues
Annual Privacy Forum 2016 (Frankfurt, Hesse, Germany, Sep 7 - 8, 2016) In the light of the upcoming data protection regulation and the European digital agenda, DG CONNECT, ENISA and, Goethe University Frankfurt is organizing APF 2016. In the light of the upcoming data protection regulation and the European digital agenda, DG CONNECT, ENISA and, Goethe University Frankfurt is organizing APF 2016.
SecureWorld Cincinnati (Sharonville, Ohio, USA, Sep 8, 2016) Join your fellow security professionals for affordable, high-quality cybersecurity training and education. Earn 6-12 CPE credits through 30+ educational elements learning from nationally recognized industry leaders. Attend featured keynotes, panel discussions & breakout sessions all while networking with local peers
Borderless Cyber Europe (Brussels, Belgium, Sep 8 - 9, 2016) Join CIOs, CISOs and cyber threat intelligence experts from industry, government and CSIRTs worldwide to share experiences, strategies, tactics and practices that will improve your state of preparedness and more effectively protect your business against cyber threats. You will learn how to build communities of practice between C-level professionals and IT security practitioners, access the latest cyber threat information sharing and get actionable experiences from real-world use cases.
SANS Network Security 2016 (Las Vegas, Nevada, USA , Sep 10 - 16, 2016) We are pleased to invite you and your colleagues to attend SANS Network Security 2016 at the magnificent Caesars Palace, Las Vegas, on September 10-19. SANS Network Security is your annual networking opportunity! SANS will bring you the best in network security training, certification, and up-to-the-minute research on the most important topics in the industry today.
Business Insurance Cyber Risk Summit 2016 (San Francisco, California, USA, Sep 11 - 12, 2016) The Business Insurance Cyber Risk Summit provides risk management professionals and chief information security officers with the practical information and tools needed to combat the latest cyber risks that threaten their organizations. The day-long conference will explore cyber exposures, regulations, governance and insurance coverage. Risk managers and CISOs will learn how to adapt proven risk management strategies to their current cybersecurity environments, how to better communicate with their information security teams, and how to effectively convey risks, exposures and coverage options to their corporate boards and the C suite.
Hacker Halted 2016 (Atlanta, Georgia, USA, Sep 11 - 16, 2016) This year, Hacker Halted’s theme is the Cyber Butterfly Effect: When Small Mistakes Lead to Big Disasters. The goal of the conference is to bring the IT security community together to discuss how organizations are often compromised through the smallest of mistakes and how implementing effective changes can have ripple effects throughout all departments of an organization.
(ISC)² Security Congress (Orlando, Florida, USA, Sep 12 - 15, 2016) (ISC)² Security Congress offers attendees over 90 education sessions, designed to transcend all industry sectors, focus on current and emerging issues, best practices, and challenges facing cybersecurity leaders. As cyber threats and attacks continue to rise, the goal of (ISC)² Security Congress is to advance security leaders by arming them with the knowledge, tools, and expertise to protect their organizations.
7th Annual Billington Cybersecurity Summit (Washington, DC, USA, Sep 13, 2016) Join over 600 senior-level attendees, more than 50 distinguished speakers, and over 40 prestigious sponsors and exhibitors at the 7th Annual Billington CyberSecurity Summit, the leading Fall forum on cybersecurity in the Nation’s Capital, on September 13 in Washington, D.C. at the Ronald Reagan Building and International Trade Center. Keynotes Include NSA Director Admiral Michael Rogers and top U.K. and Israeli Cyber Leaders.
CISO GAS (Frankfurt, Hessen, Germany, Sep 13, 2016) A data breach is not only a PR nightmare, but cause for customers to turn to competitors, exposing sensitive company information and racking up fines from industry regulators. CISOs and IT security executives must always have this in mind, as well as a host of other evolving concerns, from curbing Bring-Your-Own-Device (BYOD) risk to controlling vulnerable social media data. In order for today's leading enterprises to operate smoothly, information security must be ahead of the hackers and kept abreast of the latest IT security topics and trends. The CISO Summit will bring together C-level IT security executives, industry analysts and solution providers to discuss challenges and best practices in a relaxed, yet focused business setting. Agenda sessions include engaging Keynote Presentations, Thought Leadership sessions, CISO Think Tanks, Analyst Q&As and much more
ISS World Americas (Washington, DC, USA, Sep 13 - 15, 2016) ISS World America is the world's largest gathering of North American Law Enforcement, Intelligence and Homeland Security Analysts as well as Telecom Operators responsible for Lawful Interception, Hi-Tech Electronic Investigations and Network Intelligence Gathering and Sharing. ISS World Programs present the methodologies and tools for Law Enforcement, Public Safety and Government Intelligence Communities in the fight against drug trafficking, cyber money laundering, human trafficking, terrorism and other criminal activities conducted over today's Telecommunications networks, the Internet and Social Networks.
Tarleton State University Cyber Security Summit 2016 (Dallas, Texas, USA, Sep 13, 2016) Cyber Security for the Board and the C-Suite: "What You Need to Know." Cyber Security experts will discuss corporate cyber-attacks and legal practitioners will discuss strategies to help companies comply with the increasingly complex data security laws. Data privacy and security experts will discuss practical solutions to current problems.
Insider Threat Program Development Training For NISPOM CC 2 with Legal Guidance (Germantown, Maryland, USA, Sep 14 - 15, 2016) Insider Threat Program Development Training for NISPOM CC 2 (Germantown, Maryland, September 14 - 15, 2016) Insider Threat Defense will hold a two-day training class on Insider Threat Program Development (NISPOM Conforming Change 2). For a limited time the training is being offered at a discounted rate of $795 (normally $1395). The training is comprehensive and provides students with the knowledge and resources to develop and implement a robust Insider Threat Program. The training will include "Legal Considerations & Guidance For Insider Threat Programs" (Privacy Concerns, User Activity Monitoring, Investigations, Etc.) - Provided By Co-Instructor Insider Threat Law - Licensed Attorney. Insider Threat Defense has trained over 400 organizations and has become the "leader-go to company" for insider threat program development training.
SecureWorld Detroit (Dearborn, Michigan, USA , Sep 14 - 15, 2016) Join your fellow security professionals for affordable, high-quality cybersecurity training and education. Earn 12-16 CPE credits through 60+ educational elements learning from nationally recognized industry leaders. Attend featured keynotes, panel discussions & breakout sessions all while networking with local peers
Insider Threat Program Development Training for NISPOM CC 2 (Milwaukee, Wisconsin, USA, Sep 19 - 20, 2016) Insider Threat Defense will hold a two-day training class on Insider Threat Program Development (NISPOM Conforming Change 2). For a limited time the training is being offered at a discounted rate of $795 (normally $1395). The training is comprehensive and provides students with the knowledge and resources to develop and implement a robust insider threat program. Insider Threat Defense has trained over 350+ organizations and has become the "leader-go to company " for insider threat program development training.
4th ETSI/IQC Workshop on Quantum-Safe Cryptography (Toronto, Ontario, Canada, Sep 19 - 21, 2016) This three-day workshop brings together diverse players in the quantum-safe cybersecurity community to facilitate the knowledge exchange and collaboration required to transition cyber infrastructures and business practices to make them safe in an era with quantum computers. Attendees and presenters will include leaders from the fields of post-quantum (quantum resistant) cryptography, quantum key distribution (QKD), theoretical and commercial integration of cryptography and security tools, first-adopters of quantum-safe tools from industry and government, and members of standards bodies. Anyone interested in joining the growing community that is working to mitigate the quantum risk and creating quantum safe cryptosystems for the future should attend this workshop.
Cyber Physical Systems Summit (Newport News, Virginia, USA, Sep 20 - 22, 2016) On September 20-22, 2016 the Commonwealth will be hosting a Cyber and Physical Systems Summit. The three day event will consist of roundtable discussions, plenary and panel presentations across the intersection of cyber and three vectors – Autonomy, Physical Systems (Mfg), and Critical Infrastructure. Participants in the Summit will engage in conversations surrounding challenges, opportunities, threats, and the associated policy and budgetary implications.
hardwear.io Security Conference (The Hague, the Netherlands, Sep 20 - 23, 2016) hardwear.io Security Conference is a platform for hardware and security community where researchers showcase and discuss their innovative research on attacking and defending hardware. The objective of the conference revolves around four key concerns in hardware, firmware and related protocols i.e. backdoors, exploits, trust and attacks (BETA). hardwear.io is seeking innovative research on hardware security. If you have done interesting research on attacks or mitigation on any Hardware and want to showcase it to the security community, just submit your research paper.
3rd Annual Senior Executive Cyber Security Conference: Navigating Today's Cyber Security Terrain (Baltimore, Maryland, USA, Sep 21, 2016) The Johns Hopkins University Information Security Institute and COMPASS Cyber Security are hosting the 3rd Annual Senior Executive Cyber Security Conference on Wednesday, September 21, from 8:30 a.m. – 4:00 p.m., on the Homewood campus of Johns Hopkins University. Hear from industry leaders on cyber security best practices and trends that will help you better secure your organization's data. This year's agenda examines the current cyber security landscape, threats, and challenges ahead for organizations and how senior leaders can work towards "shifting their data to being safe and secure."
New York Cyber Security Summit (New York, New York, USA, Sep 21, 2016) The Cyber Security Summit is an exclusive conference series connects C-Suite & Senior Executives who are responsible for protecting their companies’ critical infrastructures with innovative solution providers and renowned information security experts. This educational and informational forum will focus on educating attendees on how to best protect highly vulnerable business applications and critical infrastructure. Attendees will have the opportunity to meet the nation’s leading solution providers and discover the latest products and services for enterprise cyber defense.
Gigaom Change 2016 Leader's Summit (Austin, Texas, USA, Sep 21 - 23, 2016) Over an immersive 2.5 days, we will explore the current state-of-the-art technologies, how these are transforming industry, and why this all matters. You’ll emerge with a greater understanding of the exponential technological changes occurring around us, and the confidence to accelerate tangible next steps. Gigaom Change is designed to empower businesses of today to thrive in a world of tomorrow. Gigaom Change will focus on the seven most disruptive enterprise technologies that are widely known but little understood: Artificial Intelligence, Virtual Reality, Robotics, Nanotechnology, Cybersecurity, 3-D Printing, and Human-Machine Interface.
NYIT Annual Cybersecurity Conference (New York, New York, USA, Sep 22, 2016) Presented by NYIT School of Engineering and Computing Sciences, this conference brings together cyber experts from academia, business, and government to address: Cyber Defense Against Attacks–How Industry Is Addressing Evolving Threats; Information Currency and Blockchain Vulnerability; Cyber Physical Systems, Cyber Infrastructure, and the Internet of Things; Government Agencies' Strategies for Securing Cyberspace; Cyber Risks of Smart Transportation; and Accelerating Cyber Education and Career Paths.
Cyber Security: How to Identify Risk and Act (Frankenmuth, Michigan, USA, Sep 26, 2016) Join us on 9/26/2016 for the PMI-MTC's annual project management PDD focusing on "Cyber Security: How to Identify Risk and Act." Earn 7 PDUs during the interactive sessions with well-known information security and project management experts. Featuring a keynote speaker from the FBI Detroit Cyber Task Force. Also featuring speakers from the Dow Chemical Company, UHY LLP, Ally Financial, CBI, and more.
CYBERSEC (Kraków, Poland, Sep 26 - 27, 2016) The CYBERSEC forum is the first of its kind in Poland and one of just a few regular public policy conferences in Europe devoted to the strategic issues of cyberspace and cybersecurity.The goal of the CYBERSEC conference is the formulation of practical recommendations that aim to increase resilience to cyber threats within specific economic sectors, states, and the EU as a whole.
Third Annual Women in Cyber Security Reception (Baltimore, Maryland, USA, Sep 27, 2016) The CyberWire is pleased to present the 3rd Annual Women in Cyber Security Reception in cooperation with our partner the Cybersecurity Association of Maryland (CAMI) on Tuesday, September 27, 2016, in Baltimore, MD - See more at: https://thecyberwire.com/events/s/3rd-annual-women-in-cyber-security-reception.html#sthash.Kgzd4dXp.dpuf
IP EXPO Nordic 2016 (Stockholm, Sweden, Sep 27 - 28, 2016) IP EXPO Nordic is part of Europe’s number ONE enterprise IT event series, designed for those looking to find out how the latest IT innovations can drive business growth and competitiveness. The event showcases brand new exclusive content and senior-level insights from across the industry, as well as unveiling the latest developments in IT. It covers everything you need to run a successful enterprise or organisation. Arrive with challenges, leave with solutions. IP EXPO Nordic 2016 incorporates six IT events under one roof – Cloud, Cyber Security, Networks and Infrastructure, Data Analytics, DevOps and Open Source. This year’s event will be the most comprehensive business-enhancing experience for those across the IT industry, including IT managers, CTOs, CDOs, network and storage engineers, CISOs, data analysts, developers and communications specialists.
SecureWorld Dallas (Plano, Texas, USA , Sep 27 - 28, 2016) Join your fellow security professionals for affordable, high-quality cybersecurity training and education. Earn 12-16 CPE credits through 60+ educational elements learning from nationally recognized industry leaders. Attend featured keynotes, panel discussions & breakout sessions all while networking with local peers