Intelligence and National Security Summit opens in DC. Great power competition in cyberspace. Gugi Trojan evolves. Social media threats. Industry and litigation news.
news from the Intelligence & National Security Summit
Today and tomorrow we'll be in Washington, DC, covering the 2016 Intelligence & National Security Summit hosted by AFCEA International and the Intelligence and National Security Alliance (INSA). Follow @thecyberwire for live tweets. We'll also have special coverage in the CyberWire later this week.
Policymakers and others attending the G20 summit are, predictably, warned to expect a variety of hacks and other intelligence prospecting. Warnings focus on Chinese intelligence and security services, especially given the current atmosphere of great and regional power competition over territorial rights in the South China Sea. That competition has had a cyber dimension that's widely expected to increase.
If concerns with respect to China have mostly to do with industrial espionage, the principal concern in the US with respect to Russia currently involves fears of election hacking. Circumstantial evidence of Russian involvement in recent compromises of US political sites induces US officials at the meetings to seek a firmer line with Russia over cyber conflict and cyber norms.
Meanwhile, back stateside, House Minority Leader Pelosi calls upon Republicans to stop exploiting Russian cyber capers involving Democratic campaigns.
Cisco ASA devices were among the more prominent targets threatened by the EXTRABACON exploit leaked by the Shadow Brokers. Too many of those devices are said to remain unpatched for comfort.
SEC Consult warned last year that too many embedded devices were sharing cryptographic keys. The situation apparently hasn't improved, and concerns about those devices' vulnerability to man-in-the-middle attacks continues to rise.
Kaspersky warns that an evolved version of the Gugi Trojan is now able to bypass Android 6 defenses against phishing and ransomware.
One new social media risk: complaining about PayPal on Twitter.
Google patches Quadrooter vulnerabilities.
Palantir is reported to be suing one of its early investors, alleging IP theft.
Today's issue includes events affecting Australia, Bulgaria, China, Russia, United Kingdom, and United States.
The CyberWire's regular daily Podcast will be out later this afternoon, with interviews, educational tips, and more on the stories of the day. Today John Leiseboer, representing our partners at Quintessence Labs ,will discuss cryptographic and key management standards. Out guest, Gabby Nizry from Ayehu, will talk to us about the benefits of automation. As always, if you enjoy the podcast, please consider giving it an iTunes review.
Washington, DC: the latest from the Intelligence & National Security Summit
The Intelligence and National Security Summit (INSA and AFCEA) The third annual Intelligence & National Security Summit will be held September 7 - 8, 2016, at the Walter E. Washington Convention Center in Washington, D.C. Hosted by the two leading professional associations – AFCEA International (AFCEA) and the Intelligence and National Security Alliance (INSA) – this is the premier gathering of senior decision makers from government, military, industry and academia. In its first two years the summit drew more than 3,000 attendees, exhibitors and journalists
Cyber Attacks, Threats, and Vulnerabilities
Australia warned of China’s G20 spies who used gifts, ‘honeypots’ and cyber hacking tactics (Brisbane Courier-Mail) Gifts, “honeypots” and cyber hacking are among the weapons used by the Chinese to hunt top-secret information at the G20 summit
Opinion: How the South China Sea fight could go digital (Christian Science Monitor Passcode) China's growing technological prowess gives it many opportunities to use cybercapabilities to press territorial claims. That's why the US needs sharper policies to counter digital provocations
More Signs Point To Russian Cyberspy Connection In State Election Board Hacks (Dark Reading) Researchers discover possible nation-sate link between attacks on Arizona and Illinois and recent attacks on Turkey and Ukraine governments
US Election Officials Worried About Russian Cyber Attacks (Voice of America) Election officials in the United States are working to stop threats to the election system from cyber attackers
Can cybersecurity save the November elections? (CSO) The Federal Bureau of Investigation’s disclosure earlier this month that foreign hackers had infiltrated voter registration systems in Illinois and Arizona came as no surprise to some cybersecurity experts
Pelosi to GOP: Stop using DNC material hacked by Russians (Colorado Springs Gazette) House Minority Leader Nancy Pelosi asked House Speaker Paul Ryan on Tuesday to get the House GOP campaign arm to stop using any material hacked by Russia, which has been accused of cyberattacks on both the DNC and the Democratic Congressional Campaign Committee
Too many Cisco ASA boxes still open to an EXTRABACON attack (Help Net Security) Among the Equation Group exploits leaked by the Shadow Brokers, the one named EXTRABACON that targets Cisco ASA devices got the most attention from security researchers and attackers
Cryptographic Key Reuse Remains Widespread In Embedded Products (Dark Reading) Nine months after SEC Consult warned about the reuse of private keys and certificates in routers, modems, other products, problem has grown worse
Number of Devices Sharing Private Crypto Keys Up Sharply (Threatpost) Researchers at SEC Consult say the number of internet gateways, routers, modems and other embedded devices sharing cryptographic keys and certificates is up 40 percent since the Austrian consulting firm first looked at the problem in November
Cry Ransomware Uses UDP, Imgur, Google Maps (Threatpost) Ransomware purporting to come from a phony government agency, something called the Central Security Treatment Organization, has been making the rounds, researchers say
New Malware Targets Android Banking Apps, Cybersecurity Group Says (Wall Street Journal) Kaspersky Lab said the malicious software sidesteps security features on version 6 of the Android mobile-phone operating system
Gugi banking Trojan outsmarts Android 6 security (Help Net Security) A modification of the Gugi banking Trojan that can bypass Android 6 security features designed to block phishing and ransomware attacks. The modified Trojan forces users into giving it the right to overlay genuine apps, send and view SMS, make calls and more
Sony’s PlayStation Network (PSN) Goes Down (HackRead) Sony’s Playstation Network (PSN) goes down and users are angry again — it is unclear if this was a DDoS attack or a technical error
Complaining about PayPal might get you hacked as clever new phishing scam is unearthed 0 (Thai Visa) PayPal users are being warned to think twice about complaining on Twitter following reports that cyber criminals are using social media to trick unsuspecting customers into handing over their bank account details
Porn site users urged to protect themselves by using 'safe words' (SC Magazine) Nearly 800,000 users' details have been stolen from porn chat site Brazzers, leading some pundits to advise users to be more creative with their passwords
Security Patches, Mitigations, and Software Updates
Google Patches Quadrooter Vulnerabilities in Android (Threatpost) The Quadrooter vulnerabilities made a lot of people take notice because the scale of affected Android devices (more than 900,000) put it on a level with Stagefright and other bugs that impact a large majority of the Android ecosystem
New Android Security Patch Level System Is a Convoluted Mess (Softpedia) Google uses 3 security patch levels in September's bulletin
Why Social Media Sites Are The New Cyber Weapons Of Choice (Dark Reading) Facebook, LinkedIn, and Twitter can't secure their own environments, let alone yours. It's time to sharpen your security acumen
All aboard the breach bandwagon: Are the hackers gaining momentum? (ITPro Portal) So today I've been at CloudSec 2016 in London, listening to various security professionals from the likes of Trend Micro and Microsoft talk about the challenges businesses face in securing their data in the cloud
Quantum Computing: A New Threat to Cybersecurity (Montreal Gazette) Report estimates a 50% risk that existing cryptography tools will be broken within 15 years
ISPs treat cyber security as a top priority (Help Net Security) Better law enforcement training and coordination of cyber security and support for a government-backed awareness campaign are two key findings of an ISP survey by the Internet Services Providers’ Association (ISPA)
8 Security Categories Healthcare Providers Need to Improve On (Dark Reading) A new survey by HIMSS finds that many providers don't even cover the basics of IT security
The age of ransomware (Star) Malaysia has the dubious distinction of being number 25 on the list of countries that is the source of the most web infections, according to global security firm Kaspersky Lab
Iovation acquires LaunchKey, shows the future of authentication (Help Net Security) Iovation, a provider of device-based solutions for authentication and fraud prevention, announced the acquisition of multifactor authentication company LaunchKey
UK software co Ideagen acquires Bulgaria's Logen (Daily Brief) UK supplier of information management software Ideagen said on Tuesday it has acquired Sofia-based audit software company Logen for 200,000 British pounds ($266,700/239,000 euro))
Logikcull Closes Series A Funding Round (KMWorld) Logikcull, a San Francisco-based provider of legal intelligence software, has raised $10 million in venture capital from OpenView Ventures and Storm Ventures. It is the only pure cloud-based solution for collaborative searching and sharing of information in litigation, investigations, due diligence, and M&A
HPE stock: Here’s why Hewlett Packard Enterprises could soar in 2016 (Profit Confidential) Hewlett Packard Enterprise Co (NYSE:HPE) is selling its software division. This news carries limited weight, as far as Hewlett Packard Enterprise stock, or its business, is concerned. Still, the company, which was spun off from HP Inc (NYSE:HPQ) last year, could keep reaping benefits. The software segment currently accounts for about six percent of HPE’s sales
Better Buy: FireEye Inc vs. Fortinet (Motley Fool) Both cybersecurity stocks have gotten cheaper lately, but which is the better buy now?
Palo Alto: Best Of Breed (Seeking Alpha) Palo Alto's fourth quarter earnings were solid and cemented the company as the best of breed cybersecurity company. Compared to its peers, Palo Alto appears to be pulling away in terms of growth and valuation. Top line expansion remains strong and will fuel further stock gains
Thycotic: A Growing Force In Privileged Account Management (Seeking Alpha) Security is constantly changing as it catches up with the advancements in IT and application technology. The rise of privileged account management comes in tandem with the decline of traditional perimeter security. Thycotic is poised to grow quickly within this greenfield market opportunity
Bugcrowd, the Match.com for developers and researchers? (CSO) Whether you're looking for a single engagement or a long-lasting relationship, developers and researchers connect to test the waters and sometimes make a connection
Is There Life After Dell? SonicWALL Thinks So! (Gigaom) When SonicWALL was acquired by Dell back in 2012, many wondered how SonicWALL would fare under the auspices of industry giant Dell. That said, SonicWALL managed to maintain market share in its core SMB business sector, and start making inroads in to the large, distributed enterprise sector. Nonetheless, when Dell decided to sell off its software assets, along with SonicWALL to private equity firms, many began to wonder once again what that meant for SonicWALL
DHS Selects Imperva For $6B CDM Program (Homeland Security Today) The Department of Homeland Security (DHS) has selected cybersecurity firm Imperva’s SecureSphere Web Application Firewall and SecureSphere Database Firewall for inclusion in its Continuous Diagnostics and Mitigation (CDM) Tools/Continuous Monitoring as a Service Blanket Purchase Agreement (BPA)
Yelp Offers Up To $15K Per Bug Via New Bounty Program (Dark Reading) Reviews site building off previous success with private bug bounty program to launch new public program
Cryptzone CSO Appointed to Citizens Crime Commission of New York City (American Security Today) Leo Taddeo, Cryptzone’s Chief Security Officer, has been appointed to the Corporate Council for the Citizens Crime Commission for New York City
Products, Services, and Solutions
Measuring IT security health with GreySpark (Help Net Security) GreySparkIn this podcast recorded at Black Hat USA 2016, Brit Wanick, Vice President of Sales, FourV Sytems, talks about measuring IT security health with GreySpark
Gemalto expands SafeNet portfolio (Secure Document World) Gemalto has announced a major expansion of its SafeNet data protection portfolio, which the company says makes it easier for enterprises to protect big data deployments in the cloud, data centre, and virtualised environments
“The Russians are Coming,” Warns Cyber Security Expert Regarding the Threat Russian Hackers Pose to the Presidential Election and Computer Systems Throughout the U.S. (Press Release Rocket) In response to a recent alert from the FBI that cybercriminals have breached U.S. election systems in two states and may be planning more, cyber security expert and OPSWAT founder Benny Czarny says OPSWAT's Certified Security Application Program will help take American cyber security to the next level
G DATA veröffentlicht neuen Bot-Schutz für Android (Go Windows) Immer mehr mobile Android-Geräte sind durch die wachsende Anzahl von Bedrohungen durch Trojaner oder andere Schadsoftware gefährdet. Der eco Verband hat in einer Zusammenarbeit mit seinem Mitgliedsunternehmen G DATA Software AG den so genannten EU-Cleaner für Android-Smartphones und -Tablets entwickelt
HEAT Software First to be Awarded CESG CPA Accreditation for Software Execution Control (BusinessWire) Endpoint security solution approved for UK government and public sector organizations
IPM Partners With Avecto to Bolster Data Security (MarketWired) Enables companies to more effectively implement a comprehensive and flexible endpoint security solution
Technologies, Techniques, and Standards
Encrypting the Internet of Things (BankInfo Security) NIST: Specially designed cryptography needed for small computing devices
How to Set Up Your Own Malware Trap (SANS Internet Storm Center) I am sure what you really want is more malware ;-). But a few people asked for tricks to collect malware. Malware can be useful for a number of reasons: First of all, you could extract indicators of compromise from malware using various more or less automated methods. In addition, it is a good idea to keep an eye on what your users may be seeing, in particular, if they receive e-mail from sources other than your corporate e-mail system
The Four Cybersecurity Terms Businesses Need to Know (Infosecurity Magazine) Technological evolution yields a constantly changing threat landscape. Those who learn survive, and those who don’t evolve and grow their knowledge, are left behind. Just a few weeks ago at Black Hat, we heard a number of different conversations on the four key areas below, cementing their role as the cybersecurity hot topics of the near future
Use ransomware to get security buy-in, says Trend Micro CTO (ComputerWeekly) Ransomware is one of the top cyber threats to business, but organisations should use that to engage stakeholders and review processes and defences, says Trend Micro CTO Raimund Genes
How to control your privacy in Chromebooks vs. Windows 10 (CSO) Both Chrome OS and Windows 10 help themselves to similar usage data by default, but in different ways
Design and Innovation
Introducing Deep Learning: Boosting Cybersecurity With An Artificial Brain (Dark Reading) With nearly the same speed and precision that the human eye can identify a water bottle, the technology of deep learning is enabling the detection of malicious activity at the point of entry in real-time
National Security Agency names Triad college a cybersecurity resource center (Triad Business Journal) The National Security Agency has named Forsyth Technical Community College a cybersecurity regional resource center designed to develop and administer workshops and professional development programs to faculty at other community colleges across the Southeast
Legislation, Policy, and Regulation
China’s G-20: The Most Censored Day of the Year (Foreign Policy) The massive summit saw empty streets in Hangzhou and a spate of social media deletions
Obama and Clinton weigh in on cyber warfare tactics (TechCrunch) Russia’s recent intrusions into American political organizations’ networks are driving discussions about the rules of engagement for cyber warfare, and forcing America’s own hacking of foreign governments into the light
Litigation, Investigation, and Law Enforcement
FBI report: Clinton had limited knowledge of classified data procedures (Ars Technica) Former secretary of state left details of e-mail to her husband's staff
Congressional Report Slams OPM on Data Breach (KrebsOnSecurity) The massive data breach at the U.S. Office of Personnel Management (OPM) that exposed background investigations and fingerprint data on millions of Americans was the result of a cascading series of cybersecurity blunders from the agency’s senior leadership on down to the outdated technology used to secure the sensitive data, according to a lengthy report released today by a key government oversight panel
Lauri Love Might Get 99 Years for Hacking US Government Computers (HackRead) Let’s talk about hack and love; let’s talk about LAURI LOVE — Lauri Love is a British hacker might get 99 years for allegedly hacking US Government computers
Palantir Has Filed a Dramatic Lawsuit Against a Major Early Investor (Palantir) These are some serious allegations
For a complete running list of events, please visit the Event Tracker.
Newly Noted Events
Cambridge Cyber Summit (Cambridge, Massachusetts, USA, Oct 5, 2016) This unique one-day summit will bring together c-suite executives and business owners with public and private-sector leaders in security, technology and defense to discuss ways to combat urgent cyber threats and secure America's future. The event, comprised of interviews and live demonstrations, will focus on critical issues such as the next wave of cyberattacks and their perpetrators, countermeasures, privacy and security, public-private cooperation and information sharing, and the latest trends in technology, among others.
2016 Intelligence & National Security Summit (Washington, DC, USA, Sep 7 - 8, 2016) Third annual unclassified summit hosted by AFCEA International and the Intelligence and National Security Alliance (INSA). There are five plenary sessions and nine breakout sessions related to cybersecurity, policy, and enduring strategic issues
Annual Privacy Forum 2016 (Frankfurt, Hesse, Germany, Sep 7 - 8, 2016) In the light of the upcoming data protection regulation and the European digital agenda, DG CONNECT, ENISA and, Goethe University Frankfurt is organizing APF 2016. In the light of the upcoming data protection regulation and the European digital agenda, DG CONNECT, ENISA and, Goethe University Frankfurt is organizing APF 2016.
Innoexcell Annual Symposium 2016 (Singapore, Sep 8, 2016) The Innoxcell Annual Symposium (IAS) is largest and most comprehensive international legal and regulatory compliance conference in Hong Kong, Beijing, Shanghai, Singapore, Australia and United States.This is the only event of its kind that will run multiple paths covering great diversity of Legal and Regulatory Compliance topics with over 20 sessions to select from and 10+ exhibitions. We aim to provide a ‘one-of-a-kind’ conference for legal and compliance executives and professionals from different industries to explore the latest best legal and business practices, catch-up with latest regulatory updates, establish networking with prominent legal professionals around the Globe, as well as visit the legal technology and solutions exhibition.
SecureWorld Cincinnati (Sharonville, Ohio, USA, Sep 8, 2016) Join your fellow security professionals for affordable, high-quality cybersecurity training and education. Earn 6-12 CPE credits through 30+ educational elements learning from nationally recognized industry leaders. Attend featured keynotes, panel discussions & breakout sessions all while networking with local peers
Borderless Cyber Europe (Brussels, Belgium, Sep 8 - 9, 2016) Join CIOs, CISOs and cyber threat intelligence experts from industry, government and CSIRTs worldwide to share experiences, strategies, tactics and practices that will improve your state of preparedness and more effectively protect your business against cyber threats. You will learn how to build communities of practice between C-level professionals and IT security practitioners, access the latest cyber threat information sharing and get actionable experiences from real-world use cases.
SANS Network Security 2016 (Las Vegas, Nevada, USA , Sep 10 - 16, 2016) We are pleased to invite you and your colleagues to attend SANS Network Security 2016 at the magnificent Caesars Palace, Las Vegas, on September 10-19. SANS Network Security is your annual networking opportunity! SANS will bring you the best in network security training, certification, and up-to-the-minute research on the most important topics in the industry today.
Business Insurance Cyber Risk Summit 2016 (San Francisco, California, USA, Sep 11 - 12, 2016) The Business Insurance Cyber Risk Summit provides risk management professionals and chief information security officers with the practical information and tools needed to combat the latest cyber risks that threaten their organizations. The day-long conference will explore cyber exposures, regulations, governance and insurance coverage. Risk managers and CISOs will learn how to adapt proven risk management strategies to their current cybersecurity environments, how to better communicate with their information security teams, and how to effectively convey risks, exposures and coverage options to their corporate boards and the C suite.
Hacker Halted 2016 (Atlanta, Georgia, USA, Sep 11 - 16, 2016) This year, Hacker Halted’s theme is the Cyber Butterfly Effect: When Small Mistakes Lead to Big Disasters. The goal of the conference is to bring the IT security community together to discuss how organizations are often compromised through the smallest of mistakes and how implementing effective changes can have ripple effects throughout all departments of an organization.
(ISC)² Security Congress (Orlando, Florida, USA, Sep 12 - 15, 2016) (ISC)² Security Congress offers attendees over 90 education sessions, designed to transcend all industry sectors, focus on current and emerging issues, best practices, and challenges facing cybersecurity leaders. As cyber threats and attacks continue to rise, the goal of (ISC)² Security Congress is to advance security leaders by arming them with the knowledge, tools, and expertise to protect their organizations.
7th Annual Billington Cybersecurity Summit (Washington, DC, USA, Sep 13, 2016) Join over 600 senior-level attendees, more than 50 distinguished speakers, and over 40 prestigious sponsors and exhibitors at the 7th Annual Billington CyberSecurity Summit, the leading Fall forum on cybersecurity in the Nation’s Capital, on September 13 in Washington, D.C. at the Ronald Reagan Building and International Trade Center. Keynotes Include NSA Director Admiral Michael Rogers and top U.K. and Israeli Cyber Leaders.
Privacy. Security. Risk. 2016 (San Jose, California, USA, Sep 13 - 16, 2016) Innovative since Day 1, P.S.R. brings together two related fields—privacy and security—helping you see beyond your role in order to excel in your role. Because perspective is everything. Delivering the most thought-provoking speakers, sessions led by foremost experts and invaluable opportunities to connect and share ideas, P.S.R. gives you a world of new perspective.
CISO GAS (Frankfurt, Hessen, Germany, Sep 13, 2016) A data breach is not only a PR nightmare, but cause for customers to turn to competitors, exposing sensitive company information and racking up fines from industry regulators. CISOs and IT security executives must always have this in mind, as well as a host of other evolving concerns, from curbing Bring-Your-Own-Device (BYOD) risk to controlling vulnerable social media data. In order for today's leading enterprises to operate smoothly, information security must be ahead of the hackers and kept abreast of the latest IT security topics and trends. The CISO Summit will bring together C-level IT security executives, industry analysts and solution providers to discuss challenges and best practices in a relaxed, yet focused business setting. Agenda sessions include engaging Keynote Presentations, Thought Leadership sessions, CISO Think Tanks, Analyst Q&As and much more
ISS World Americas (Washington, DC, USA, Sep 13 - 15, 2016) ISS World America is the world's largest gathering of North American Law Enforcement, Intelligence and Homeland Security Analysts as well as Telecom Operators responsible for Lawful Interception, Hi-Tech Electronic Investigations and Network Intelligence Gathering and Sharing. ISS World Programs present the methodologies and tools for Law Enforcement, Public Safety and Government Intelligence Communities in the fight against drug trafficking, cyber money laundering, human trafficking, terrorism and other criminal activities conducted over today's Telecommunications networks, the Internet and Social Networks.
Tarleton State University Cyber Security Summit 2016 (Dallas, Texas, USA, Sep 13, 2016) Cyber Security for the Board and the C-Suite: "What You Need to Know." Cyber Security experts will discuss corporate cyber-attacks and legal practitioners will discuss strategies to help companies comply with the increasingly complex data security laws. Data privacy and security experts will discuss practical solutions to current problems.
Insider Threat Program Development Training For NISPOM CC 2 with Legal Guidance (Germantown, Maryland, USA, Sep 14 - 15, 2016) Insider Threat Program Development Training for NISPOM CC 2 (Germantown, Maryland, September 14 - 15, 2016) Insider Threat Defense will hold a two-day training class on Insider Threat Program Development (NISPOM Conforming Change 2). For a limited time the training is being offered at a discounted rate of $795 (normally $1395). The training is comprehensive and provides students with the knowledge and resources to develop and implement a robust Insider Threat Program. The training will include "Legal Considerations & Guidance For Insider Threat Programs" (Privacy Concerns, User Activity Monitoring, Investigations, Etc.) - Provided By Co-Instructor Insider Threat Law - Licensed Attorney. Insider Threat Defense has trained over 400 organizations and has become the "leader-go to company" for insider threat program development training.
SecureWorld Detroit (Dearborn, Michigan, USA , Sep 14 - 15, 2016) Join your fellow security professionals for affordable, high-quality cybersecurity training and education. Earn 12-16 CPE credits through 60+ educational elements learning from nationally recognized industry leaders. Attend featured keynotes, panel discussions & breakout sessions all while networking with local peers
Insider Threat Program Development Training for NISPOM CC 2 (Milwaukee, Wisconsin, USA, Sep 19 - 20, 2016) Insider Threat Defense will hold a two-day training class on Insider Threat Program Development (NISPOM Conforming Change 2). For a limited time the training is being offered at a discounted rate of $795 (normally $1395). The training is comprehensive and provides students with the knowledge and resources to develop and implement a robust insider threat program. Insider Threat Defense has trained over 350+ organizations and has become the "leader-go to company " for insider threat program development training.
4th ETSI/IQC Workshop on Quantum-Safe Cryptography (Toronto, Ontario, Canada, Sep 19 - 21, 2016) This three-day workshop brings together diverse players in the quantum-safe cybersecurity community to facilitate the knowledge exchange and collaboration required to transition cyber infrastructures and business practices to make them safe in an era with quantum computers. Attendees and presenters will include leaders from the fields of post-quantum (quantum resistant) cryptography, quantum key distribution (QKD), theoretical and commercial integration of cryptography and security tools, first-adopters of quantum-safe tools from industry and government, and members of standards bodies. Anyone interested in joining the growing community that is working to mitigate the quantum risk and creating quantum safe cryptosystems for the future should attend this workshop.
Cyber Physical Systems Summit (Newport News, Virginia, USA, Sep 20 - 22, 2016) On September 20-22, 2016 the Commonwealth will be hosting a Cyber and Physical Systems Summit. The three day event will consist of roundtable discussions, plenary and panel presentations across the intersection of cyber and three vectors – Autonomy, Physical Systems (Mfg), and Critical Infrastructure. Participants in the Summit will engage in conversations surrounding challenges, opportunities, threats, and the associated policy and budgetary implications.
hardwear.io Security Conference (The Hague, the Netherlands, Sep 20 - 23, 2016) hardwear.io Security Conference is a platform for hardware and security community where researchers showcase and discuss their innovative research on attacking and defending hardware. The objective of the conference revolves around four key concerns in hardware, firmware and related protocols i.e. backdoors, exploits, trust and attacks (BETA). hardwear.io is seeking innovative research on hardware security. If you have done interesting research on attacks or mitigation on any Hardware and want to showcase it to the security community, just submit your research paper.
3rd Annual Senior Executive Cyber Security Conference: Navigating Today's Cyber Security Terrain (Baltimore, Maryland, USA, Sep 21, 2016) The Johns Hopkins University Information Security Institute and COMPASS Cyber Security are hosting the 3rd Annual Senior Executive Cyber Security Conference on Wednesday, September 21, from 8:30 a.m. – 4:00 p.m., on the Homewood campus of Johns Hopkins University. Hear from industry leaders on cyber security best practices and trends that will help you better secure your organization's data. This year's agenda examines the current cyber security landscape, threats, and challenges ahead for organizations and how senior leaders can work towards "shifting their data to being safe and secure."
New York Cyber Security Summit (New York, New York, USA, Sep 21, 2016) The Cyber Security Summit is an exclusive conference series connects C-Suite & Senior Executives who are responsible for protecting their companies’ critical infrastructures with innovative solution providers and renowned information security experts. This educational and informational forum will focus on educating attendees on how to best protect highly vulnerable business applications and critical infrastructure. Attendees will have the opportunity to meet the nation’s leading solution providers and discover the latest products and services for enterprise cyber defense.
Gigaom Change 2016 Leader's Summit (Austin, Texas, USA, Sep 21 - 23, 2016) Over an immersive 2.5 days, we will explore the current state-of-the-art technologies, how these are transforming industry, and why this all matters. You’ll emerge with a greater understanding of the exponential technological changes occurring around us, and the confidence to accelerate tangible next steps. Gigaom Change is designed to empower businesses of today to thrive in a world of tomorrow. Gigaom Change will focus on the seven most disruptive enterprise technologies that are widely known but little understood: Artificial Intelligence, Virtual Reality, Robotics, Nanotechnology, Cybersecurity, 3-D Printing, and Human-Machine Interface.
NYIT Annual Cybersecurity Conference (New York, New York, USA, Sep 22, 2016) Presented by NYIT School of Engineering and Computing Sciences, this conference brings together cyber experts from academia, business, and government to address: Cyber Defense Against Attacks–How Industry Is Addressing Evolving Threats; Information Currency and Blockchain Vulnerability; Cyber Physical Systems, Cyber Infrastructure, and the Internet of Things; Government Agencies' Strategies for Securing Cyberspace; Cyber Risks of Smart Transportation; and Accelerating Cyber Education and Career Paths.
GDPR Comprehensive 2016 (London, England, UK, Sep 22 - 23, 2016) The GDPR is now a reality. Are you prepared? We had an incredible response to the IAPP GDPR Comprehensive in Brussels and New York, where we prepared hundreds of privacy and data protection professionals for the implementation of the GPDR. Now we’re bringing the programme to London. Don’t miss this intensive, two-day guided tour of the GDPR with the industry’s most knowledgeable experts.
Cyber Security: How to Identify Risk and Act (Frankenmuth, Michigan, USA, Sep 26, 2016) Join us on 9/26/2016 for the PMI-MTC's annual project management PDD focusing on "Cyber Security: How to Identify Risk and Act." Earn 7 PDUs during the interactive sessions with well-known information security and project management experts. Featuring a keynote speaker from the FBI Detroit Cyber Task Force. Also featuring speakers from the Dow Chemical Company, UHY LLP, Ally Financial, CBI, and more.
CYBERSEC (Kraków, Poland, Sep 26 - 27, 2016) The CYBERSEC forum is the first of its kind in Poland and one of just a few regular public policy conferences in Europe devoted to the strategic issues of cyberspace and cybersecurity.The goal of the CYBERSEC conference is the formulation of practical recommendations that aim to increase resilience to cyber threats within specific economic sectors, states, and the EU as a whole.
Third Annual Women in Cyber Security Reception (Baltimore, Maryland, USA, Sep 27, 2016) The CyberWire is pleased to present the 3rd Annual Women in Cyber Security Reception in cooperation with our partner the Cybersecurity Association of Maryland (CAMI) on Tuesday, September 27, 2016, in Baltimore, MD - See more at: https://thecyberwire.com/events/s/3rd-annual-women-in-cyber-security-reception.html#sthash.Kgzd4dXp.dpuf
IP EXPO Nordic 2016 (Stockholm, Sweden, Sep 27 - 28, 2016) IP EXPO Nordic is part of Europe’s number ONE enterprise IT event series, designed for those looking to find out how the latest IT innovations can drive business growth and competitiveness. The event showcases brand new exclusive content and senior-level insights from across the industry, as well as unveiling the latest developments in IT. It covers everything you need to run a successful enterprise or organisation. Arrive with challenges, leave with solutions. IP EXPO Nordic 2016 incorporates six IT events under one roof – Cloud, Cyber Security, Networks and Infrastructure, Data Analytics, DevOps and Open Source. This year’s event will be the most comprehensive business-enhancing experience for those across the IT industry, including IT managers, CTOs, CDOs, network and storage engineers, CISOs, data analysts, developers and communications specialists.
SecureWorld Dallas (Plano, Texas, USA , Sep 27 - 28, 2016) Join your fellow security professionals for affordable, high-quality cybersecurity training and education. Earn 12-16 CPE credits through 60+ educational elements learning from nationally recognized industry leaders. Attend featured keynotes, panel discussions & breakout sessions all while networking with local peers