Leaked exploits from the Shadow Brokers actively exploited in the wild. Cyberattacks serving information operations' goals. Ransomware hits India, Vietnam. France, Germany, rethink commitment to privacy. UK MPs hit social media for enabling extremism.
Researchers at Silent Signal report a relatively easy upgrade of the Shadow Brokers' leaked Extrabacon exploit that renders it effective against newer versions of Cisco ASA. Others have found the exploits relatively easy to use—a honeypot set up by a researcher at New York University noticed the same sorts of probes Cisco honeypots have seen. US DNI Clapper says investigation continues, but that the Intelligence Community still lacks a good understanding of the incident. Bruce Schneier cites the incident as further evidence of poor US Government disclosure policy. (He also thinks it's "not Snowden stuff," but the work of an outsider.)
That outsider is widely believed, of course, to be the Russian intelligence services, and observers think the leaking reflects a "new normal" in which cyberattacks directly serve the goals of information operations. In recent cases those goals apparently center on discrediting the US political system as irredeemably corrupt. Analysts predict direct election hacking in November. Wikileaks' Assange promises to release, soon, more discreditable information about Democratic Presidential candidate Clinton.
Terrorist attacks have led German policymakers to rethink the national commitment to privacy. French policymakers are on board with this as well, both countries looking for laws that would enable security services to break encryption at need. In the UK, Members of Parliament take social media companies to task for enabling extremism.
A backdoor banking Trojan is found to receive its command-and-control via Twitter.
Ransomware hits an Indian pharmaceutical company, and Bkav warns of ransomware-bearing emails circulating in Vietnam.
Notes.
Today's issue includes events affecting Australia, Belgium, Brazil, Canada, Chad, Germany, Hungary, India, Japan, Netherlands, New Zealand, Nigeria, Russia, Singapore, Thailand, United Kingdom, United States, and and Vietnam.
A note to our readers, especially those of you interested in art and design--"STEM to STEAM," as they call it: the CyberWire is partnering with Maryland Art Place to sponsor a competition for an original work of art on the theme "creating connections." You can read about the competition in NY Arts Magazine. A full prospectus may be found here.
The CyberWire's regular daily Podcast will be out later this afternoon, with interviews, educational tips, and more on the stories of the day. Today we talk about building a security operations center with Dale Drew of our partners at Level 3. Our guest is Ralph Sita, CEO of Cybrary, who'll discuss his organization, the job market, and other matters. (If you enjoy the podcast, please consider giving it an iTunes review.)
Cyber Attacks, Threats, and Vulnerabilities
Leaked ShadowBrokers Attack Upgraded to Target Current Versions of Cisco ASA (Threatpost) Exploits against enterprise-grade Cisco firewalls dumped by the ShadowBrokers have quickly—and apparently without a lot of strenuous effort—been upgraded to attack more current versions of ASA
Of Course Everyone’s Already Using the Leaked NSA Exploits (Wired) Last week, an anonymous group calling itself the Shadow Brokers leaked a bunch of National Security Agency hacking tools. Whoever they are, the Shadow Brokers say they still have more data to dump. But the preview has already unleashed some notable vulnerabilities, complete with tips for how to use them
US intelligence still sorting out purported NSA hack (AP via Fox News) The U.S. is still probing the extent of a recent cyber leak of what purports to be hacking tools used by the National Security Agency
Russian Cyberspies' Leaked Hacks Could Herald New Normal (Dark Reading) Time to set cyber espionage 'norms' before more volatile nation-states follow suit, experts say
New leaks prove it: the NSA is putting us all at risk to be hacked (Vox) The National Security Agency is lying to us. We know that because of data stolen from an NSA server was dumped on the internet. The agency is hoarding information about security vulnerabilities in the products you use, because it wants to use it to hack others' computers. Those vulnerabilities aren't being reported, and aren't getting fixed, making your computers and networks unsafe
For journalists in Russia, fighting off hackers is part of the job (Christian Science Monitor Passcode) Reports that unknown hackers targeted the Moscow bureau of The New York Times is part of a worrying trend of alleged Kremlin spying against journalists in Russia
Assange promises to leak more on Clinton, Dems (Politico) WikiLeaks editor-in-chief Julian Assange on Wednesday night promised to leak “thousands” of document pages pertaining to Hillary Clinton, the Democratic National Committee and the presidential election
How the DNC hack is boosting anti-US sentiment in Russia (Christian Science Monitor Passcode) Russian state-supported media is using the Democratic National Committee leaked emails to portray the American presidential elections as a corrupt spectacle akin to 'House of Cards'
French Submarine Firm Claims Economic Warfare After Massive Data Leak (Dark Reading) The Australian publishes over 22,000 documents on six DCNS Scorpene subs that are being built in India
Boko Haram’s internal rift probably isn’t good news. Here’s why. (Washington Post) What’s the latest with the Islamic State’s West Africa Province (ISWAP), the terrorist group better known as Boko Haram? In early August, the Islamic State named Abu Musab al-Barnawi as the new “Wali” of the group, replacing Abubakar Shekau. Shekau then released a video highlighting masses of soldiers and lambasted Barnawi as unqualified to be a leader
Twitter-controlled Android backdoor delivers banking malware (Help Net Security) A backdoor Trojan named Twitoor is the first instance of Android malware that receives its commands from a Twitter account
New collision attacks against triple-DES, Blowfish break HTTPS sessions (CSO) Legacy ciphers such as triple-DES and Blowfish are vulnerable to Sweet32 attacks, which let attackers decrypt HTTPS sessions even without the encryption key
First case of 'digital kidnapping' in Punjab, cyber criminals seek ransom from pharma company (India Today) July 19 was just another regular day for employees of Shri Dhanvantari Herbals, an Amritsar-based company making Ayurvedic pharmaceutical products. They reached the office in morning, ready to resume their work. But when they switched on their computers, they were in for a shock. The computers were taken over by cyber criminals and all the employees were logged out, with their login details rendered null and void
Malware detected in emails: Bkav (VietNamNet Bridge) Viet Nam’s cybersecurity company Bkav has warned people about ransomware, a type of malicious software designed to block access to a computer system till a sum of money is paid
The New Scourge of Ransomware 4: CryptoLocker Study in Contradictions (Privacy PC) As part of their story on CryptoLocker analysis, John Bambenek and Lance James dwell on the methodology of tracking the ransomware via payments and DGA
Wildfire Ransomware Campaign Disrupted (Threatpost) The No More Ransom initiative released decryption keys for yet another strain of ransomware this week; now victims of the mostly Dutch-leaning ransomware called WildFire can get their files back without paying attackers
Half of NHS Trusts Hit by Ransomware (Infosecurity Magazine) Nearly half of all NHS Trusts suffered a ransomware attack during the past year, according to a Freedom of Information (FoI) request from NCC Group
The evolution of BEC scams and ransomware (Help Net Security) Trend Micro analyzed the trends in attacks and vulnerabilities seen throughout the first half of this year, and found a rise and impact of attacks, such as a 172 percent increase in ransomware and $3 billion in losses due to business email compromise (BEC) scams so far in 2016
Mail.ru, Funcom gaming forums hacked, user databases stolen (Help Net Security) Vulnerabilities in older versions of the popular vBulletin Internet forum software are being exploited left and right, and data of millions of forum users is being pilfered every day
Blizzard DDoS Blows World of Warcraft Dev Away (Infosecurity Magazine) World of Warcraft developer Blizzard appears to have been hit by multiple DDoS attacks over the past couple of days, affecting its gaming customers
GTAGaming Hack Blamed on Old vBulletin Software (Trheatpost) Outdated vBulletin forum software is being blamed for the breach of a Grand Theft Auto fan forum called GTAGaming. It marks the second time in two days a gaming forum has been targeted by hackers and that a SQL injection vulnerability is believed to have been exploited
Example of Targeted Attack Through a Proxy PAC File (SANS Internet Storm Center) Yesterday, I discovered a nice example of targeted attack against a Brazilian bank. It started with an email sample like this
German Man Behind IRC-Controlled WordPress Botnet (Softpedia) Botnet is still active because of complex legal procedures
Hacked Email - Why Cyber Criminals Want to Get Into Your Inbox (Heimdal) “I don’t care about getting hacked, there’s nothing valuable in my email”
The biggest threat facing connected autonomous vehicles is cybersecurity (TechCrunch) Connected, autonomous vehicles are around the corner. Many of the most innovative and deep-pocketed companies in the world are racing to bring them to market — and for good reason: the economic and social gains they will generate will be tremendous
Ghostbusters star Leslie Jones is targeted in racist cyber-attack on her website (CITI FM Online) Hackers have targeted Ghostbusters star Leslie Jones after intimate photos of the actress were posted online
Security Patches, Mitigations, and Software Updates
Cisco Begins Patching Equation Group ASA Zero Day (Threatpost) Cisco today began the process of patching a zero-day vulnerability in its Adaptive Security Appliance (ASA) software exposed in the ShadowBrokers data dump
Tor Update Fixes ReachableAddresses Problem (Threatpost) The Tor Project on Wednesday updated its software package to version 0.2.8.7 and fixed a number of issues, including a bug it calls “important” in the ReachableAddresses option
Samsung Galaxy S7, Galaxy S7 edge receiving August security patch in the US (Phone Arena) Samsung promised to provide some of its Galaxy Note and Galaxy S series smartphones with regular security updates. As Google releases these security updates at the beginning of each month, handset manufacturers take their time to customize and push them to their smartphones
Android 7 boasts new encryption features as the Crypto War soldiers on (Daily Dot) Not too long ago, the idea of smartphone encryption set off a global debate
United Airlines Sets Minimum Bar on Security (KrebsOnSecurity) United Airlines has rolled out a series of updates to its Web site that the company claims will help beef up the security of customer accounts. But at first glance, the core changes — moving from a 4-digit PINs to password and requiring customers to pick five different security questions and answers — may seem like a security playbook copied from Yahoo.com, circa 2009. Here’s a closer look at what’s changed in how United authenticates customers, and hopefully a bit of insight into what the nation’s fourth-largest airline is trying to accomplish with its new system
Cyber Trends
A Temperature-Check On The State Of Application Security (Dark Reading) AppSec is more dangerous than network security but receives less than half the funding, according to new Ponemon study
A deeper look at business impact of a cyberattack (CSO) Deloitte finds “hidden” costs can amount to 90 percent of the total business impact on an organization, and will most likely be experienced two years or more after the event
The paradox of encryption (Security Info Watch) In his recent paper, "The Moral Character of Cryptographic Work," cryptographer and UC Davis professor Dr. Phillip Rogaway wrote that, “Cryptography rearranges power: it configures who can do what, from what. This makes cryptography an inherently political tool, and it confers on the field an intrinsically moral dimension.” Put simply, encryption is more than a matter for technologists and politicians – it is an emotionally charged topic, subject to the fluctuations of current events and as divisive as any other debate that is rooted in our moral foundations
Consumers ready to walk away from their favorite retailers if a breach occurs (Help Net Security) Consumers are wary of the increased frequency of cyber attacks against retailers, and many are ready to walk away from their favorite retailers if a breach occurs. In fact, in surveying 448 consumers, KPMG found that 19 percent said they would stop shopping at a retailer that had been a victim of a cybersecurity incident, even if the company took the necessary steps to remediate the issue
The network security skills shortage: Lack of trained professionals is a welcome mat for cybercriminals (Security Brief NZ) Is your organisation looking for skilled professionals to help you secure your network? Someone who understands the threat landscape, the various options for preventing intrusions and data loss, mitigating zero day threats and how to install, configure and monitor the various components in near -real time?
Hacking the Skills Shortage: A study of the international shortage in cybersecurity skills (Intel Security) The cybersecurity workforce shortfall remains a critical vulnerability for companies and nations
The State of Bug Bounty (Bugcrowd) Bug Bounty: A cooperative relationship between security researchers and organizations that allow the researchers to receive rewards for identifying application vulnerabilities without the risk of prosecution, thereby aiding companies to identify and resolve security problems that would otherwise go undetected
Marketplace
IDVector Emerges from Stealth with Privacy Focused Secure Public Internet Access Offering (BusinessWire) Former cybersecurity defense contractors launch on-the-go safe and secure access to the Internet
Verizon Has A Message For BlackBerry (Seeking Alpha) BlackBerry is preparing to enter the fleet management space while Verizon has already bought the market leader Fleetmatics. Verizon-Fleetmatics synergy could be too hard for BlackBerry to handle. Is BlackBerry paying attention to Verizon's message?
Recent Buy: Cisco Systems (Seeking Alpha) Earlier this month, I opted to sell $31 puts on CSCO instead of paying an asking price of over $31 per share. Last Friday, expiration day, CSCO closed below $31 and I got put the shares. Taking into account the option premium I received, my cost basis is lower than Friday's closing price and nearly 10% discounted to my fair value estimate. This article includes a stock analysis and I discuss my reasons for adding CSCO to my dividend growth portfolio
CrowdStrike, other cybersecurity firms integrating industry cooperative (Reuters) Some information security companies that were shut out of the leading system for sharing data on malicious software are revealing more about how their own systems work in hopes of rejoining the cooperative effort, a shift that should improve protections for customers throughout the industry
Ondrej Krehel (LIFARS): Tackling Cybersecurity Issues Needs Deeper Collaboration (Slovak Startup) With many years of experience and his deep knowledge of the field, Ondrej Krehel is one of the top experts on cybersecurity and the founder and CEO of LIFARS. LIFARS is a digital forensics and cybersecurity intelligence company based in New York with an office in Bratislava as well
ManpowerGroup buys Ciber Norway (Recruiter) Recruitment giant ManpowerGroup has reached to acquire global IT consulting services and outsourcing company Ciber’s business in Norway
Level 3 Named 2016 Cyber Security Awareness Month Champion (PRNewswire) DHS and NCSA recognize commitment to online awareness and safety
Armorway Is Now 'Avata Intelligence' (PRNewswire) AI innovator refocuses on artificial intelligence beyond security domain
Lear Appoints Dr. André Weimerskirch, a Renowned Industry Expert, to Lead Cyber Security for E-Systems (Yahoo! Finance) Lear Corporation [NYSE: LEA], a leading global supplier of automotive seating and electrical systems, today announced that Dr. André Weimerskirch has been appointed Vice President, Cyber Security for E-Systems, effective immediately
Products, Services, and Solutions
Partnership aims for end-to-end security for Surface devices (GCN) Booz Allen Hamilton will be working with Microsoft to develop security software for the computer giant’s portable Surface products for government users
Wombat Security Technologies and GTRI Join Forces to Combat Insider Threats Through Continuous and Reinforced Employee Education (BusinessWire) Companies collaborate on User Proficiency and Behavior Threat Protection solution
Real-Time Speech Analytics from Verint Optimizes Customer Engagement with Actionable Intelligence (BusinessWire) Advanced analytics solution helps customer engagement centers guide interactions toward positive outcomes, while supporting regulatory compliance and other key organizational initiatives
SecureAuth Unveils Cloud-based Identity Service Using Adaptive Access Control (MarketWired) SecureAuth Cloud Access addresses enterprise needs for security and adaptability unmet by other identity-as-a-service offerings
MobileIron locks down mobile app to cloud security with new offering (Channel Life) MobileIron has debuted its newest security offering, MobileIron Access, locally, with the vendor saying the offering provides ‘the first unified solution for mobile and cloud security’
Dstillery and White Ops Turn Up the Heat on Mobile Ad Fraud (MarketWired) Expanded partnership combines market leading audience engagement platform with industry's first SIVT accredited anti-fraud solution
98 things Facebook knows about you (Naked Security) The Washington Post recently published a list of 98 specific user details that it says Facebook keeps tabs on
98 personal data points that Facebook uses to target ads to you (Washington Post) Say you’re scrolling through your Facebook Newsfeed and you encounter an ad so eerily well-suited, it seems someone has possibly read your brain
Technologies, Techniques, and Standards
How Intel and Others Are Fighting the Ransomware Epidemic (Fortune) Firms release decryption tools to battle Wildfire
When Securing Your Applications, Seeing Is Believing (Dark Reading) While the cloud is amazing, a worrying lack of visibility goes along with it. Keep that in mind as you develop your security approach
7 Database Security Best Practices (eSecurity Planet) Database security has never been more important, given the high value hackers place on data. These database security best practices will help protect your data
Stay on Track During IR (SANS Internet Storm Center) When responding to incidents, it’s easy to go down a rabbit hole that likely won’t produce results to the questions we are always after: How did the attacker get in? What information is contained on the system? And What information was accessed?
Three Top Ways Marketers Can Fight Phishing Attacks (Martech Advisor) Marketers depend on data to track their contributed ROI to the business. And key performance metrics (KPIs) from the email channel are a big indicator of success
Army explores using cyber teams to aid maneuver commanders (US Army) A pilot program known as Cyber Support to Corps and Below, or CSCB, is now providing some maneuver commanders with an improved situational awareness of the information environment and tools to shape that environment
Security Leadership & The Art Of Decision Making (Dark Reading) What a classically-trained guitarist with a Master's Degree in counseling brings to the table as head of cybersecurity and privacy at one of the world's major healthcare organizations
The Teenager’s Definitive Guide to Social Media Don’ts (Wired) You're only as relevant as you are clued in. Don’t be a social pariah—avoid the hellscape of awkward behavior and secondhand embarrassment by never, ever breaking these ironclad rules
Research and Development
Experts challenge Skyhigh's patent for cloud-based encryption gateway (CSO) Skyhigh Networks, Inc., announced today that it has received a patent for using a hosted gateway to encrypt and decrypt data moving between users and cloud services such as Office 365, but some experts say that the technology is neither new nor unique
Legislation, Policy, and Regulation
Facebook, Google, Twitter lax on terrorists’ misuse of their sites, say UK MPs (CSO) UK lawmakers said the companies could for one have more staff to weed out extremist content
Silicon Valley Giants Hit Back at MPs in Extremism Row (Infosecurity Magazine) The technology industry has hit back at claims made by an influential parliamentary committee that it's failing to combat extremism propagated via online services
As terror hits closer to home, Germany reconsiders privacy (Christian Science Monitor Passcode) Following European terror attacks, German officials have suggested legislation that would force tech companies to decrypt private messages and other measures to increase digital surveillance
France, Germany Want Encrypted App Makers To Help Stop IS (TopTechNews) France and Germany pushed Tuesday for Europe-wide rules requiring the makers of encrypted messaging apps such as Telegram to help governments monitor communications among suspected extremists
Telegram's encryption stymies French police but pleases their bosses (CSO) Senior French legislators and lawmakers are attracted to Telegram for exactly the same reason as terrorists - or anyone else
Taking stock of the new French-German encryption proposal (Politico) Here we go again — France’s and Germany’s interior ministers teamed up on Tuesday to propose an EU law requiring tech companies to decrypt data for investigators. The proposal, which the European Commission will consider at a meeting next month, reflects deepening frustration with fragmented European counterterrorism operations and the investigative challenges posed by widespread encryption
NATO to spend €70 million on 'cyber-refresh' (SC Magazine) More than a thousand industry representatives and NATO officials are expected to attend the NATO Information Assurance and Cyber Defence Symposium (NIAS) in Mons, Belgium, on 7, 8 September 2016, to learn about the Alliance's future cyber-requirements. After hearing about NATO's vision for its future cyber-defences, invitations for bids are expected to be released in 2017, and the first round of investments completed in 2018
Japanese government plans cyber attack institute (The Stack) The government of Japan will create an institute to train employees to counter cyber attacks. The institute, which will be operational early next year, will focus on preventing cyber attacks on electrical systems and other infrastructure
Confronting Cybersecurity Challenges Through US-Singapore Partnership – Analysis (Eurasia Review) Cyber cooperation remains a prominent area of mutual interest between Singapore and Washington. Singapore’s Cyber Security Agency (CSA) and the US Department of Homeland Security (DHS) recently established a formal cybersecurity partnership. This agreement will improve bilateral cybersecurity and potentially create mechanisms for ASEAN nations to better address cybersecurity challenges
This Election Could Be Hacked, And We Need To Plan For It (Forbes) With the Democratic National Committee cyberattack far more widespread than originally thought, fears of foreign power using cyber-espionage to influence this November’s election are growing, and real. It’s also prompted concern that hackers may shift focus to an even more vulnerable target: your vote
What Teddy Roosevelt can teach us about cybersecurity (Christian Science Monitor Passcode) Why wait years to grow new cybersecurity talent when you can take advantage of the talented federal workforce today?
“Highly invasive” plan to collect traveler social media details criticized by group (Naked Security) On 2 December, the day of the shootings in San Bernardino, a post went up on a Facebook page associated with Tashfeen Malik, one of the shooters
Litigation, Investigation, and Law Enforcement
Ashley Madison Failed on Authentication and Data Security (Infosecurity Magazine) Ashley Madison failed to deliver security measures on user details and featured a phoney security certification on its homepage
Shock horror! Ashley Madison security was woeful, finds investigation (Naked Security) Ashley “100% discreet” Madison’s security, before its breach, was as flimsy as tissue paper, according to a new report
Joint investigation of Ashley Madison by the Privacy Commissioner of Canada and the Australian Privacy Commissioner and Acting Australian Information Commissioner (Office of the Australian Information Commissioner) Avid Life Media Inc. (ALM)[1] is a company that operates a number of adult dating websites. The largest website operated by ALM is Ashley Madison, which is targeted at people seeking a discreet affair. ALM is headquartered in Canada, but its websites have a global reach, with users in over 50 countries, including Australia
Five things to know about the Clinton Foundation and its donors (The Hill) The private foundation run by the Clinton family has become the latest firestorm in the 2016 presidential race
ATM Malware: Hackers Steal 12.29 million Baht ($350,000) from Thai Banks (HackRead) Hackers who stole $350,000 from Bangkok’s Government Savings Bank ATMs have fled the country
Using PGP Phones Doesn’t Make You a Criminal, Ontario Judge Says (Motherboard) Messaging your gun-toting, drug-trafficking friends by way of encrypted message isn’t proof that you’re a gun-toting drug-trafficker, an Ontario court has ruled
Virgin Trains faces data protection inquiry over Corbyn CCTV footage (Guardian) Information Commissioner’s Office looks into claims train operator broke data protection rules by releasing images of Labour leader
Biden Vows Support For Turkey, Demurs On Cleric's Extradition (Radio Free Europe | Radio Liberty) .S. Vice President Joe Biden has said Washington had "unwavering support" for democracy in Turkey following last month's failed coup, but demurred on Ankara's demands to extradite the self-exiled cleric Turkey says was behind it
For a complete running list of events, please visit the Event Tracker.
Upcoming Events
SANS Alaska 2016 (Anchorage, Alaska, USA, Aug 22 - 27, 2016) SANS is bringing our renowned security training to Alaska! Join us in August for a week of hands-on training and compelling bonus sessions while taking in breathtaking views and experiencing the great Alaskan wilderness. SANS Alaska will feature two hands-on, immersion-style security training courses taught by real-world practitioners August 22-27, 2016 in Anchorage.
Chicago Cyber Security Summit (Chicago, Illinois, USA, Aug 25, 2016) The Cyber Security Summit is an exclusive conference series connects C-Suite & Senior Executives who are responsible for protecting their companies’ critical infrastructures with innovative solution providers and renowned information security experts. This educational and informational forum will focus on educating attendees on how to best protect highly vulnerable business applications and critical infrastructure. Attendees will have the opportunity to meet the nation’s leading solution providers and discover the latest products and services for enterprise cyber defense.
Air Force Information Technology and Cyberpower Conference 2016 (Montgomery, Alabama, USA, Aug 29 - 31, 2016) America is faced with a national emergency in cyberspace. US national security, economic vitality, financial stability and foreign policy are being eroded. Increasingly prevalent and severe malicious cyber activities are being directed against the DOD, USG, Private-Sector, Critical Infrastructure and Key Resource operators, Academia and Civil Society. USG industrial-aged thought, processes, and organizational relationship are not fostering “success” against decentralized, digital-age threat actors. An information-age solution is needed. Private-public dialogue is integral to building a new paradigm in which digital platforms are secure, and the nation is defended in a domain. Building bridges between government and the private sector is essential for victory. This conference will promote a national dialogue between the US Air Force, commercial businesses, academia and civil society to generate “whole of nation” strategies and processes aimed at overcoming challenges and ambiguities of an increasingly digital world.
CISO Toronto (Toronto, Ontario, Canada, Aug 30, 2016) A data breach is not only a PR nightmare, but cause for customers to turn to competitors, exposing sensitive company information and racking up fines from industry regulators. In order for organizations to operate smoothly, CISOs and IT security executives need to be ahead of the hackers, and kept abreast of the latest IT security topics and trends.
ISAO SO Public Forum (Tysons, Virginia, USA, Aug 31 - Sep 1, 2016) This public forum is the last opportunity to meet face-to-face and participate in conversations that will shape the first set of standards and guidelines to be published in September! Speakers will include leaders from multiple industry sectors, government and academia. The meeting will feature topics including: an in-depth public discussion of ISAO 100-1: Guidelines for Establishing an ISAO and ISAO 600-1: Government Relations, Programs, and Services; the State of the Ecosystem from the ISAO SO: “Where We Are and Where We’re Going” and “How We’ll Get There”; a special meeting of emerging ISAOs, and panel discussions from industry experts and thought leaders on ISAO Services and Capabilities, and Building an ISAO.
cybergamut Technical Tuesday: Quantifying Cyber Attacks: To Optimize and Assess your Defense by Jason Syversen of Siege Technologies (Elkridge, Maryland, USA, Sep 6, 2016) cybergamut Technical Tuesday is for cyber professionals to exchange innovative ideas and discuss technical issues of mutual interest. We’ll have a Technical Tuesday event on 6 September 2016 (1600 – 1730 East Coast Time). This talk describes the challenges of quantifying offensive and defensive capabilities and posture. This is not an IT-oriented metrics-talk about measuring the firewall rules or number of incidents last year. Instead, you’ll hear about new military-backed research on how to quantify the effectiveness of attacks, predict outcomes and measure defensive strength, as well as the future of data-driven security technologies.
2016 Intelligence & National Security Summit (Washington, DC, USA, Sep 7 - 8, 2016) Third annual unclassified summit hosted by AFCEA International and the Intelligence and National Security Alliance (INSA). There are five plenary sessions and nine breakout sessions related to cybersecurity, policy, and enduring strategic issues
Annual Privacy Forum 2016 (Frankfurt, Hesse, Germany, Sep 7 - 8, 2016) In the light of the upcoming data protection regulation and the European digital agenda, DG CONNECT, ENISA and, Goethe University Frankfurt is organizing APF 2016. In the light of the upcoming data protection regulation and the European digital agenda, DG CONNECT, ENISA and, Goethe University Frankfurt is organizing APF 2016.
SecureWorld Cincinnati (Sharonville, Ohio, USA, Sep 8, 2016) Join your fellow security professionals for affordable, high-quality cybersecurity training and education. Earn 6-12 CPE credits through 30+ educational elements learning from nationally recognized industry leaders. Attend featured keynotes, panel discussions & breakout sessions all while networking with local peers
Borderless Cyber Europe (Brussels, Belgium, Sep 8 - 9, 2016) Join CIOs, CISOs and cyber threat intelligence experts from industry, government and CSIRTs worldwide to share experiences, strategies, tactics and practices that will improve your state of preparedness and more effectively protect your business against cyber threats. You will learn how to build communities of practice between C-level professionals and IT security practitioners, access the latest cyber threat information sharing and get actionable experiences from real-world use cases.
SANS Network Security 2016 (Las Vegas, Nevada, USA , Sep 10 - 16, 2016) We are pleased to invite you and your colleagues to attend SANS Network Security 2016 at the magnificent Caesars Palace, Las Vegas, on September 10-19. SANS Network Security is your annual networking opportunity! SANS will bring you the best in network security training, certification, and up-to-the-minute research on the most important topics in the industry today.
Business Insurance Cyber Risk Summit 2016 (San Francisco, California, USA, Sep 11 - 12, 2016) The Business Insurance Cyber Risk Summit provides risk management professionals and chief information security officers with the practical information and tools needed to combat the latest cyber risks that threaten their organizations. The day-long conference will explore cyber exposures, regulations, governance and insurance coverage. Risk managers and CISOs will learn how to adapt proven risk management strategies to their current cybersecurity environments, how to better communicate with their information security teams, and how to effectively convey risks, exposures and coverage options to their corporate boards and the C suite.
Hacker Halted 2016 (Atlanta, Georgia, USA, Sep 11 - 16, 2016) This year, Hacker Halted’s theme is the Cyber Butterfly Effect: When Small Mistakes Lead to Big Disasters. The goal of the conference is to bring the IT security community together to discuss how organizations are often compromised through the smallest of mistakes and how implementing effective changes can have ripple effects throughout all departments of an organization.
(ISC)² Security Congress (Orlando, Florida, USA, Sep 12 - 15, 2016) (ISC)² Security Congress offers attendees over 90 education sessions, designed to transcend all industry sectors, focus on current and emerging issues, best practices, and challenges facing cybersecurity leaders. As cyber threats and attacks continue to rise, the goal of (ISC)² Security Congress is to advance security leaders by arming them with the knowledge, tools, and expertise to protect their organizations.
7th Annual Billington Cybersecurity Summit (Washington, DC, USA, Sep 13, 2016) Join over 600 senior-level attendees, more than 50 distinguished speakers, and over 40 prestigious sponsors and exhibitors at the 7th Annual Billington CyberSecurity Summit, the leading Fall forum on cybersecurity in the Nation’s Capital, on September 13 in Washington, D.C. at the Ronald Reagan Building and International Trade Center. Keynotes Include NSA Director Admiral Michael Rogers and top U.K. and Israeli Cyber Leaders.
CISO GAS (Frankfurt, Hessen, Germany, Sep 13, 2016) A data breach is not only a PR nightmare, but cause for customers to turn to competitors, exposing sensitive company information and racking up fines from industry regulators. CISOs and IT security executives must always have this in mind, as well as a host of other evolving concerns, from curbing Bring-Your-Own-Device (BYOD) risk to controlling vulnerable social media data. In order for today's leading enterprises to operate smoothly, information security must be ahead of the hackers and kept abreast of the latest IT security topics and trends. The CISO Summit will bring together C-level IT security executives, industry analysts and solution providers to discuss challenges and best practices in a relaxed, yet focused business setting. Agenda sessions include engaging Keynote Presentations, Thought Leadership sessions, CISO Think Tanks, Analyst Q&As and much more
ISS World Americas (Washington, DC, USA, Sep 13 - 15, 2016) ISS World America is the world's largest gathering of North American Law Enforcement, Intelligence and Homeland Security Analysts as well as Telecom Operators responsible for Lawful Interception, Hi-Tech Electronic Investigations and Network Intelligence Gathering and Sharing. ISS World Programs present the methodologies and tools for Law Enforcement, Public Safety and Government Intelligence Communities in the fight against drug trafficking, cyber money laundering, human trafficking, terrorism and other criminal activities conducted over today's Telecommunications networks, the Internet and Social Networks.
Tarleton State University Cyber Security Summit 2016 (Dallas, Texas, USA, Sep 13, 2016) Cyber Security for the Board and the C-Suite: "What You Need to Know." Cyber Security experts will discuss corporate cyber-attacks and legal practitioners will discuss strategies to help companies comply with the increasingly complex data security laws. Data privacy and security experts will discuss practical solutions to current problems.
Insider Threat Program Development Training For NISPOM CC 2 with Legal Guidance (Germantown, Maryland, USA, Sep 14 - 15, 2016) Insider Threat Program Development Training for NISPOM CC 2 (Germantown, Maryland, September 14 - 15, 2016) Insider Threat Defense will hold a two-day training class on Insider Threat Program Development (NISPOM Conforming Change 2). For a limited time the training is being offered at a discounted rate of $795 (normally $1395). The training is comprehensive and provides students with the knowledge and resources to develop and implement a robust Insider Threat Program. The training will include "Legal Considerations & Guidance For Insider Threat Programs" (Privacy Concerns, User Activity Monitoring, Investigations, Etc.) - Provided By Co-Instructor Insider Threat Law - Licensed Attorney. Insider Threat Defense has trained over 400 organizations and has become the "leader-go to company" for insider threat program development training.
SecureWorld Detroit (Dearborn, Michigan, USA , Sep 14 - 15, 2016) Join your fellow security professionals for affordable, high-quality cybersecurity training and education. Earn 12-16 CPE credits through 60+ educational elements learning from nationally recognized industry leaders. Attend featured keynotes, panel discussions & breakout sessions all while networking with local peers
Insider Threat Program Development Training for NISPOM CC 2 (Milwaukee, Wisconsin, USA, Sep 19 - 20, 2016) Insider Threat Defense will hold a two-day training class on Insider Threat Program Development (NISPOM Conforming Change 2). For a limited time the training is being offered at a discounted rate of $795 (normally $1395). The training is comprehensive and provides students with the knowledge and resources to develop and implement a robust insider threat program. Insider Threat Defense has trained over 350+ organizations and has become the "leader-go to company " for insider threat program development training.
4th ETSI/IQC Workshop on Quantum-Safe Cryptography (Toronto, Ontario, Canada, Sep 19 - 21, 2016) This three-day workshop brings together diverse players in the quantum-safe cybersecurity community to facilitate the knowledge exchange and collaboration required to transition cyber infrastructures and business practices to make them safe in an era with quantum computers. Attendees and presenters will include leaders from the fields of post-quantum (quantum resistant) cryptography, quantum key distribution (QKD), theoretical and commercial integration of cryptography and security tools, first-adopters of quantum-safe tools from industry and government, and members of standards bodies. Anyone interested in joining the growing community that is working to mitigate the quantum risk and creating quantum safe cryptosystems for the future should attend this workshop.
Cyber Physical Systems Summit (Newport News, Virginia, USA, Sep 20 - 22, 2016) On September 20-22, 2016 the Commonwealth will be hosting a Cyber and Physical Systems Summit. The three day event will consist of roundtable discussions, plenary and panel presentations across the intersection of cyber and three vectors – Autonomy, Physical Systems (Mfg), and Critical Infrastructure. Participants in the Summit will engage in conversations surrounding challenges, opportunities, threats, and the associated policy and budgetary implications.
hardwear.io Security Conference (The Hague, the Netherlands, Sep 20 - 23, 2016) hardwear.io Security Conference is a platform for hardware and security community where researchers showcase and discuss their innovative research on attacking and defending hardware. The objective of the conference revolves around four key concerns in hardware, firmware and related protocols i.e. backdoors, exploits, trust and attacks (BETA). hardwear.io is seeking innovative research on hardware security. If you have done interesting research on attacks or mitigation on any Hardware and want to showcase it to the security community, just submit your research paper.
3rd Annual Senior Executive Cyber Security Conference: Navigating Today's Cyber Security Terrain (Baltimore, Maryland, USA, Sep 21, 2016) The Johns Hopkins University Information Security Institute and COMPASS Cyber Security are hosting the 3rd Annual Senior Executive Cyber Security Conference on Wednesday, September 21, from 8:30 a.m. – 4:00 p.m., on the Homewood campus of Johns Hopkins University. Hear from industry leaders on cyber security best practices and trends that will help you better secure your organization's data. This year's agenda examines the current cyber security landscape, threats, and challenges ahead for organizations and how senior leaders can work towards "shifting their data to being safe and secure."
New York Cyber Security Summit (New York, New York, USA, Sep 21, 2016) The Cyber Security Summit is an exclusive conference series connects C-Suite & Senior Executives who are responsible for protecting their companies’ critical infrastructures with innovative solution providers and renowned information security experts. This educational and informational forum will focus on educating attendees on how to best protect highly vulnerable business applications and critical infrastructure. Attendees will have the opportunity to meet the nation’s leading solution providers and discover the latest products and services for enterprise cyber defense.
Gigaom Change 2016 Leader's Summit (Austin, Texas, USA, Sep 21 - 23, 2016) Over an immersive 2.5 days, we will explore the current state-of-the-art technologies, how these are transforming industry, and why this all matters. You’ll emerge with a greater understanding of the exponential technological changes occurring around us, and the confidence to accelerate tangible next steps. Gigaom Change is designed to empower businesses of today to thrive in a world of tomorrow. Gigaom Change will focus on the seven most disruptive enterprise technologies that are widely known but little understood: Artificial Intelligence, Virtual Reality, Robotics, Nanotechnology, Cybersecurity, 3-D Printing, and Human-Machine Interface.
NYIT Annual Cybersecurity Conference (New York, New York, USA, Sep 22, 2016) Presented by NYIT School of Engineering and Computing Sciences, this conference brings together cyber experts from academia, business, and government to address: Cyber Defense Against Attacks–How Industry Is Addressing Evolving Threats; Information Currency and Blockchain Vulnerability; Cyber Physical Systems, Cyber Infrastructure, and the Internet of Things; Government Agencies' Strategies for Securing Cyberspace; Cyber Risks of Smart Transportation; and Accelerating Cyber Education and Career Paths.
Cyber Security: How to Identify Risk and Act (Frankenmuth, Michigan, USA, Sep 26, 2016) Join us on 9/26/2016 for the PMI-MTC's annual project management PDD focusing on "Cyber Security: How to Identify Risk and Act." Earn 7 PDUs during the interactive sessions with well-known information security and project management experts. Featuring a keynote speaker from the FBI Detroit Cyber Task Force. Also featuring speakers from the Dow Chemical Company, UHY LLP, Ally Financial, CBI, and more.
CYBERSEC (Kraków, Poland, Sep 26 - 27, 2016) The CYBERSEC forum is the first of its kind in Poland and one of just a few regular public policy conferences in Europe devoted to the strategic issues of cyberspace and cybersecurity.The goal of the CYBERSEC conference is the formulation of practical recommendations that aim to increase resilience to cyber threats within specific economic sectors, states, and the EU as a whole.
Third Annual Women in Cyber Security Reception (Baltimore, Maryland, USA, Sep 27, 2016) The CyberWire is pleased to present the 3rd Annual Women in Cyber Security Reception in cooperation with our partner the Cybersecurity Association of Maryland (CAMI) on Tuesday, September 27, 2016, in Baltimore, MD - See more at: https://thecyberwire.com/events/s/3rd-annual-women-in-cyber-security-reception.html#sthash.Kgzd4dXp.dpuf
IP EXPO Nordic 2016 (Stockholm, Sweden, Sep 27 - 28, 2016) IP EXPO Nordic is part of Europe’s number ONE enterprise IT event series, designed for those looking to find out how the latest IT innovations can drive business growth and competitiveness. The event showcases brand new exclusive content and senior-level insights from across the industry, as well as unveiling the latest developments in IT. It covers everything you need to run a successful enterprise or organisation. Arrive with challenges, leave with solutions. IP EXPO Nordic 2016 incorporates six IT events under one roof – Cloud, Cyber Security, Networks and Infrastructure, Data Analytics, DevOps and Open Source. This year’s event will be the most comprehensive business-enhancing experience for those across the IT industry, including IT managers, CTOs, CDOs, network and storage engineers, CISOs, data analysts, developers and communications specialists.
SecureWorld Dallas (Plano, Texas, USA , Sep 27 - 28, 2016) Join your fellow security professionals for affordable, high-quality cybersecurity training and education. Earn 12-16 CPE credits through 60+ educational elements learning from nationally recognized industry leaders. Attend featured keynotes, panel discussions & breakout sessions all while networking with local peers