AUSA update. Mirai botnet shows risks of default IoT passwords. US-Russian tensions rise over imposition of costs.
news from AUSA 2016
To state the obvious, cyber conflict doesn't occur in a political, military, or strategic vacuum. It's stakes and conditions are set by broader concerns: even (especially?) the 400-pound hackers out there live in meatspace, and retain some connection to the non-virtual world. Obvious as this may be, it's worth a periodic reminder that it's so.
The CyberWire attended the 2016 Association of the United States Army Annual Meeting and Exposition in Washington, where we spoke with people about the connections between cyber warfare and other forms of conflict. You'll find our accounts posted below, and on our website here.
The Shadow Brokers still haven't found any takers for those Equation Group zero-days they say they have for sale, so hop to it, shoppers (we guess).
The Mirai botnet's code is out on the dark web in a bad-news/good-news-good-news story. The bad news is that the code is out, and thus available for more IoT-driven distributed denial-of-service. The good news is that the author may be sensing the law's approach, and the other good news is that inspection of the botnet and its code is yielding some useful lessons. The biggest lesson is the danger default passwords pose when they're left unchanged: Mirai used 61 default passwords to herd its bots into the biggest DDoS attack yet seen. Krebs has an account of the manufacturers whose devices were exploited.
Kaspersky has cracked the MarsJoke crypto ransomware and they have a tool available to help the afflicted.
Interactive, "real-time" phishing has emerged in Brazilian cybercrime campaigns.
US concerns about election hacking and voter influence continue, with Russia the source of concern. US-Russian relations grew colder this week as Russia formally withdrew from a bilateral plutonium-control accord in response to US sanctions against Russia. The Russian point is that US imposition of costs (a centerpiece of American cyber policy) will itself have costs.
In industry news, Carbon Black prepares for an IPO as it partners with IBM to offer competition with Tanium in the endpoint security market.
Russia has tightened up cyber legislation: cybercrimes will henceforth be categorized as theft, not fraud.
Notes.
Today's issue includes events affecting Brazil, Democratic Peoples Republic of Korea, Russia, United Kingdom, and United States.
A note to our readers: This week we're attending the 2016 annual meeting of the Association of the United States Army. We'll be providing tweets and full coverage from the cyber-relevant portions of the three-day event. We're also spending some time with our colleagues from the Military Cyber Professionals Association.
It's also National Cyber Security Awareness Month in the United States. The theme for the first week is "STOP. THINK. CONNECT.™: The Basic Steps to Online Safety and Security."
The CyberWire's regular daily Podcast will be out later this afternoon, with interviews, educational tips, and more on the stories of the day. Today we hear from our partners at the University of Maryland's Center for Health and Homeland Security as Ben Yelin explains changes to Rule 41 of the Federal Rules of Criminal Procedure and how those changes could affect online privacy. Our guest today is Igor Volovich, CEO of ROMAD, who'll talk about signature-less solutions for fighting malware. If you enjoy the podcast, we invite you to consider giving it an iTunes review.
Washington, DC: the latest from AUSA 2016
AUSA Annual Meeting Preview (Defense News) Lt. Gen. Patricia McQuistion, senior director for AUSA membership, discusses what to expect from this year’s show
The World Changed in 2014 (The CyberWire) Everyone recognizes that the world changed on 9/11. It also changed, and just as drastically, in 2014. That year saw the Russian invasion of Ukraine (with its attendant suppression of civil society and hybrid warfare); it also saw the rise of ISIS and the beginning of the ongoing refugee crisis as people fled the failed states of North Africa and the Middle East. With that crisis, terrorism came back to Europe. A major feature of the new world of conflict has been intense operations in cyberspace
SECARM Sets Goals, Timeline for Rapid Capabilities Office: AUSA Exclusive (Defense News) The Army is aggressively pursuing overhauls this year to its troubled procurement system – concurrent with Congress’ own efforts to reform the Defense Department’s acquisition process at-large
Where Are All the Startups? (Defense One) Pentagon leaders regularly tout Silicon Valley innovation, but entrepreneurs seem largely absent from the largest defense industry events
Army Looks For Ways To Make Contracting More Agile (Defense News) The Army is soliciting ideas on how it might make its contracting processes more agile, the service’s acquisition chief Katrina McFarland said during a panel at the Association of the US Army’s annual conference Monday
Cyber Attacks, Threats, and Vulnerabilities
South Korean military cyber command hacked by injecting malicious codes into routing server (International Business Times) It is not known where the attack originated from, but North Korea is on the radar of suspicion
Hacker group finds almost no takers for stolen NSA cyber tools (McClatchy DC) Foreign hackers responsible for the theft of top secret cyber weapons from the National Security Agency are ranting that no one is interested in buying the stolen cyber tools
Can you hack the vote? Yes, but not how you might think (CSO) It’s public confidence, not the actual vote count, that’s in danger, Symantec says
How Bots Can Influence the 2016 Presidential Election (ShieldSquare) Voting for elections happen around the world, and people choose their favorite candidate based on a lot of factors
IoT Devices at Risk After Mirai Code Leaked that Exploits Default Credentials (HackRead) The IoT Botnet Mirai’s source code has been published online by its author along with configuration and set-up details
IoT botnet highlights the dangers of default passwords (CSO) The Mirai botnet used IoT devices to launch a massive DDOS attack
Here are the 61 passwords that powered the Mirai IoT botnet (CSO) Mirai was one of two botnets behind the largest DDoS attack on record
Who Makes the IoT Things Under Attack? (KrebsOnSecurity) As KrebsOnSecurity observed over the weekend, the source code that powers the “Internet of Things” (IoT) botnet responsible for launching the historically large distributed denial-of-service (DDoS) attack against KrebsOnSecurity last month has been publicly released. Here’s a look at which devices are being targeted by this malware
OpenJPEG zero-day flaw leads to remote code execution (ZDNet) The newly-discovered bug gives attackers the chance to execute code through the open-source JPEG 2000 codec
Security company finds five “zero-day” flaws in EMC management console (Ars Technica) Unisphere for VMAX used insecured Flash-to-Java interfaces, leaving door open to attacks
Hack Crashes Linux Distros with 48 Characters of Code (Threatpost) With just a mere 48 characters of code, Linux admin and SSLMate founder Andrew Ayer has figured out how to crash major Linux distributions by locally exploiting a flaw in systemd
The Oracle of Delphi Will Steal Your Credentials (Guardicore) It was one of those warm summer nights, no clouds, just a bright full moon lighting the way. Someone had unknowingly stumbled upon our honeypot, completely unaware of the fact that her every move was recorded and fully analyzed. Thanks to our deception technology, we could easily reroute the attacker, making her believe she reached her real target. Something about this attack was different, though. All originating from the same source, the attacks repeatedly used brute force passwords for RDP credentials to connect to the victim machine, download and execute a previously undetected malware, which we named Trojan.sysscan. This is a new malware capable of running on every Windows version from XP through Server 2012 R2
Researchers Crack MarsJoke Crypto to Defang Ransomware (Infosecurity Magazine) Researchers have cracked the MarsJoke crypto-ransomware, defanging it and giving victims a way to decrypt their files
Real-Time Phishing Emerges in Brazil (Infosecurity Magazine) A real-time phishing campaign is targeting Brazil. This tactic is designed to emulate a banking Trojan by extracting critical data from its victims in real time via a live, interactive phishing attack
Buhmat banking malware infiltrates popular Russian boxing webiste (IBS Intelligence) Banking malware can be found in the strangest places, and a contender has been found in popular boxing website allboxing.ru. The site, which has more than three million visitors per month, was infected with code that redirected users to a third-party site containing an exploit and a Russian banking Trojan
Mount Holly Springs police fall victim to cyber attack (ABC 27 News) The Mount Holly Springs Police Department says no private information was jeopardized when hackers took over one its computers
Hutton Hotel removes unwanted malware guest (CSO) The long sorted list of companies that have had their payment systems has added a new victim to it’s ranks
Security Patches, Mitigations, and Software Updates
Big Blue Patches 14 More OpenSSL Flaws In IBM i (IT Jungle) IBM i shops that use the OpenSSL encryption protocol will want to know that IBM last week issued program temporary fixes (PTFs) for 14 security vulnerabilities impacting IBM i versions 7.1, 7.2, and 7.3. If you're running an older version of the IBM i OS, you are out of luck
BlackBerry Priv Starts Receiving October 2016 Security Update (Tech Times) BlackBerry is rolling out an October security update for the Android-powered BlackBerry Priv, ahead of Google's official release of the patch
Mozilla Reduces Threat of Export-Grade Crypto to Firefox (Threatpost) Logjam was one of several downgrade attacks discovered in the last 18 months that could theoretically allow a resourced attacker to take advantage of lingering export-grade cryptography to read and modify data over a supposedly secure connection
Apple To Block WoSign Intermediate Certificates (Threatpost) Apple weighed in on the ongoing WoSign fiasco over the weekend, saying it would soon distrust certificates issued by the Chinese Certificate Authority’s Free SSL Certificate G2 intermediate CA on macOS
Cyber Trends
Tech budgets 2017: A CXO's Guide (ZDNet) See our original research on where organizations are spending their tech budgets in 2017 and what their top priorities are. We also provide practical advice on how to put your IT dollars to good use
Cloud providers not expanding security as fast as customers adopt cloud (Help Net Security) Information security professionals trust the cloud even less now than they did last year, despite efforts by cloud-service providers to tighten security, according to the SANS Institute
National Cyber Security Awareness Month: Our Shared Responsibility (Federal Bureau of Investigation) Data breaches resulting in the compromise of personally identifiable information of thousands of Americans. Intrusions into financial, corporate, and government networks. Complex financial schemes committed by sophisticated cyber criminals against businesses and the public in general
Q&A: Interview with a Virus Slayer (Medium) Mikko Hyppönen on the Museum of Malware, the golden age of virus hunting, and the weaponization of viruses
BAE Systems: A cyber attack could cost your business £1 million (IT Pro Portal) Following on from Kaspersky Lab's report finding that DDoS attacks can cost large businesses up to £1.2 million, BAE Systems has also released new research highlighting the financial impact of cyber attacks
Women Underrepresented in Information Security Workforce (Credit Union Times) Women represent only 11% of the global information security workforce, including in financial services, despite a shortage of cybersecurity skilled personnel overall
Snowden: Privacy is dignity (This Week) Exiled ex-NSA contractor speaks via video feed at Ohio Wesleyan
Marketplace
Compliance pushing boards' cyber security more than breaches - survey (Channelnomics) Research shows increase in compliance mandates is the top driver for cyber security prioritization for boards of directors
Verizon Merger Likely to Force More Robust Yahoo Response (Bloomberg BNA) Yahoo! Inc. will likely undertake a more robust data breach response to reassure Verizon Communications Inc. that it isn't acquiring an unreasonable privacy and data security burden, cybersecurity professionals told Bloomberg BNA
Japanese group acquires Australian cyber firm (IHS Jane's 360) The Nomura Research Institute (NRI), a Japanese consulting and IT group, has entered an agreement to acquire Australian cyber-defence company ASG, it was announced 30 September
RTN Eyes Cybersecurity Market Growth (RTN) (Investopedia) Raytheon Co. (RTN) is making headway in the commercial cybersecurity market, which could help the business bolster its overall earnings for years to come
Corero recovering after September stumble (Proactive Investors) Contracts are taking longer to get over the line than anticpated, but the orders are still rolling in and the cyber-threat is not going to disappear
Report: Carbon Black Files For IPO As Endpoint Security Market Continues To Heat Up (CRN) In the latest sign of a booming market for endpoint security, Carbon Black has reportedly confidentially filed for its initial public offering
Carbon Black, IBM Take Aim At Competitor Tanium With New Partnership (CRN) Carbon Black and IBM are deepening their relationship, unveiling Tuesday a new endpoint management partnership that takes direct aim at competitor Tanium
Sophos to drop Quadsys after Five Avoid Jail (Register) Enid Blyton plot twist: Former Platinum Partner kicked to the curb
South GA cyber security firm partners with government (WALB 10 News) A South Georgia cyber security firm is working with the government to promote cyber security
Hexadite’s Aaron Cote Named to CRN “100 People You Don’t Know But Should” List (BusinessWIre) VP of Sales playing a critical role as security and orchestration platform expands in the channel with key resellers
ZTE offers OTN-based quantum encryption (Lightwave) ZTE Corp. (0763.HK/000063.SZ) has unveiled what it asserts is the first quantum encryption transport capability based on Optical Transport Network (OTN). The technology supports transmission of quantum paths and traditional paths on the same fiber
Products, Services, and Solutions
Kaspersky Lab Releases Decryption Tool for Polyglot Ransomware That Disguises Itself as CTB-Locker (BusinessWire) Kaspersky Lab announced today that users who have suffered from Polyglot ransomware, also known as MarsJoke, can now restore their files with the decryption tool developed by Kaspersky Lab experts
Cloudwick Announces Technology Partnership Program With Security and Analytics Leaders (MarketWired) Cloudwick, the leading open source services and solutions provider, launched its Technology Partnership Program (TPP). On the heels of the Cloudwick Data Analytics Platform (CDAP) launch, this announcement demonstrates the company's commitment to working with industry-leading advanced analytics and machine learning software providers to advance the cybersecurity market
Egnyte Goes All-In on Enterprise, Announcing End-to-End Collaboration with Microsoft (PRWeb) Offers Microsoft Azure as premiere storage provider for new customers
AristotleInsight's® Directional Matrix Proven Invaluable for Real-World Cyber Security Situation (IT Briefing) Sergeant Laboratories is excited to reveal that its flagship product, AristotleInsight, proved key in helping a customer identify an advanced persistent threat (APT) cyber attack. The client recently notified Sergeant Laboratories of the security incident
AT&T rebrands Network Functions on Demand into FlexWare, expands product offerings (Fierce Telecom) AT&T said it will rebrand its Network Functions on Demand service into the FlexWare brand. The company also said it added several new options to the service, including a smaller device and security services from Palo Alto Networks
Automation Enables Cyber Threat Mitigation at Machine Speed, Propels Organizations Toward Cyber Resiliency (BusinessWire) Booz Allen and Phantom deliver intelligent automation to help Federal and commercial clients combat threats, empowering security pros to focus on the most critical issues
Technologies, Techniques, and Standards
How do you work out a country’s level of cybersecurity? (We Live Security) When we talk about the cybersecurity of a nation state, we have to refer to many different aspects, such as the nation’s capacity to respond to large-scale security incidents, its legislation in this area, the protection of critical infrastructure, its capacity to work with other countries, and even the security culture that might exist among the population
DHS sets Oct. 31 comment deadline for draft cyber-response plan (Inside Cybersecurity) The Department of Homeland Security has posted a draft National Cyber-Incident Response Plan for public comment until Oct. 31. The revised plan was developed under Presidential Policy Directive 41 issued in July, and is expected to be issued as final early next year
Swift mandates banks to tighten security (Global Trade Review) Swift has unveiled the next phase of its customer security programme (CSP), established to support customers in the struggle against cyber-attacks. The controls will be mandatory by the start of 2018
Hackers for good: How Anand Prakash rescued Facebook (Christian Science Monitor Passcode) In the first installment in an occasional series about ethical hackers, Passcode profiles one of India's most successful freelance cybersecurity researchers known for finding – and helping fix – serious flaws in Facebook
Palo Alto Networks' three top tips for cybersecurity success (Security Brief) Some professionals are becoming jaded about their ability to protect themselves against cyber attacks, particularly as successful attacks are on the rise, Palo Alto Networks has found
Password Buddies: A Better Way To Reset Passwords (SANS Internet Storm Center) Implementing password resets is hard. The problem comes down to how we authenticate a user who forgot the common secret(s) we shared. We all know, that "password reset questions" are often just weak "password bypass questions," and can not be used to authenticate a user reliably
Sharing is caring: Public-private (SC Magazine) Threat intelligence information sharing efforts have become increasingly important as breaches become more pervasive. Karen Epper Hoffman reports
Design and Innovation
Dual-Data Defense in Depth Improves SCADA Security (SIGNAL) A new technique could help prevent a cascade of catastrophic cyber attacks across systems
Academia
Gulf Power summit: Cybersecurity jobs to flood market (Pensacola News Journal) A forthcoming, inaugural group of University of West Florida graduates should help supply a job market booming with growth in Northwest Florida and across the nation
Legislation, Policy, and Regulation
EU wants to curb export of cyber-surveillance tech (Help Net Security) The European Commission has proposed a new amendment to the regulation that forms the basis of EU’s export control regime of dual-use technology, i.e. technology that can be used for both peaceful and military aims
Privacy Shield's Drama Is Far From Over (Dark Reading) Businesses are working with trading partners to take responsibility for protecting private data in case the US-EU framework fails
The Truth About Thailand's Social Media Surveillance (Diplomat) The targeting of government critics is yet another concern in post-coup Thailand
Putin suspends nuclear pact, raising stakes in row with Washington (Reuters) Russian President Vladimir Putin on Monday suspended a treaty with Washington on cleaning up weapons-grade plutonium, signaling he is willing to use nuclear disarmament as a new bargaining chip in disputes with the United States over Ukraine and Syria
U.S Halts Cooperation with Russia on Syrian War (Foreign Policy) The United States has suspended plans to coordinate with Russia on counter-terrorism strikes in Syria, and talks with Moscow are over a cease-fire are definitely dead after Russia’s continued attacks on the besieged city of Aleppo, the State Department announced Monday
Is DHS Going To Take Over The Cybersecurity Of The Election System? (Inside Counsel) The Department of Homeland Security (DHS) has offered to provide more cybersecurity protections to help states secure their voting systems
Previous Next For the Corps, It Is Game On (SIGNAL) The U.S. Marine Corps looks to a gaming-inspired course to train the next generation of cyber warriors
U.S. Army Creates Cybersecurity Strategy For a New Normal (SIGNAL) Thriving in the digital age means embracing disruptive technologies and work force reforms
Cyber Mission Force approaches initial operating capacity (C4ISRNET) In a major milestone, U.S. Cyber Command announced that the Cyber Mission Force is nearly initially operationally capable. A CYBERCOM spokesman said, as of Oct. 3, 99 percent of the CMF achieved initial operating capability with 132 of the total 133 teams reaching IOC by the end of fiscal 2016, Sept. 30
New cyber directorate encompasses critical missions (C4ISRNET) In a world where cyber is part of virtually every operation, the military is working to determine how it fits in and works best with a close, but very different, capability: electronic warfare (EW). To that end, Pentagon leadership recently established a new cyber directorate within the Army’s Office of the Deputy Chief of Staff, G-3/5/7, headed up by Brig. Gen. Patricia Frost
Trump calls for ‘crippling cyberattacks’ on US enemies (Federal Times) Republican presidential nominee Donald Trump has a plan for the nation’s cybersecurity and, following last week’s debate performance, he’s rolling it out on the stump
Trump announces plans for Cyber Review Team (FCW) After calling the security aspect of cyber "hardly doable" during the first presidential debate, the Republican presidential nominee took another whack at addressing cybersecurity during an Oct. 3 campaign event
Microsoft Unveils Security Policy Doc for Lawmakers (Infosecurity Magazine) Microsoft has launched a major new policy document designed to lobby governments into legislating and regulating towards “a trusted, responsible, and inclusive cloud”
Litigation, Investigation, and Law Enforcement
Russian government equates cyber-crimes to theft (SC Magazine) Russia is making it easier to prosecute cyber-crimes by characterising them as theft, not fraud, which will also allow the imposition of tougher penalties as it was previously difficult to establish that they were serious crimes
The company linked to the OPM hack just got hired by the government again (ZDNet) Keypoint is suspected of being the source of the leaked credentials that allowed hackers to swipe millions of records from the OPM database
Lawmakers: 'Mileygate' commander doesn't deserve brigadier general's star (Air Force Times) Two lawmakers are urging the Senate to reject the Air Force's decision to award a brigadier general's star to the commander who reprimanded and grounded three pilots over text messages containing Miley Cyrus' lyrics referencing drug use
For a complete running list of events, please visit the Event Tracker.
Newly Noted Events
GTEC (Ottawa, Ontario, Canada, Nov 1 - 3, 2016) For the public sector and business, count on GTEC to help you keep up with the changing landscape of technology and service delivery in Canada. With our nationally recognized awards program and annual conference, plus our new learning products, GTEC is your destination of choice for innovation and excellence in public sector IT. The conference program will feature a close focus on the cyber threat, particularly the threat of cybercrime, and the Canadian response to that threat.
Upcoming Events
Cyber National Security – The Law of Cyberspace Confrontation (Hanover, Maryland, and Fort Meade, Oct 3 - 6, 2016) US Cyber Command will host the fourth annual COCOM-Interagency Cyber Law Conference from 3 through 6 October 2016, Cyber National Security – The Law of Cyberspace Confrontation. This year the conference will build on last year's success with a particular focus on the domestic and international legal frameworks and challenges to confronting the growing cyber threats in the gray zone short of armed conflict and employing cyber capabilities as part of broader deterrence strategies. The first two days of the conference will be held at the Acquisition Research Center, Hannover, MD, and will be conducted at the Unclassified level. The third and fourth days of the conference will be held at the classified level on Fort Meade, Maryland. The conference will be closed to the media and conducted under Chatham House rules.
Crossroads Regional Cybersecurity Summit (Victoria, Texas, USA, Oct 4, 2016) Bringing together top experts from both the public and private sectors, the Crossroads Regional Cybersecurity Summit (CRCS) will be an exciting and educational day for local businesses. Through a variety of speakers and interactive panels, CRCS will educate and raise awareness on a wide range of cybersecurity issues - from local to global - facing businesses of all sizes. Summit attendees will be exposed to the latest findings and best practices regarding: small organizations/SMB cybersecurity preventative measures, network security (whether large or small), financial and payment card industry (PCI) compliance, and law enforcement and national security concerns. Plan to attend and ensure that your business is prepared to face the 21st Century cybersecurity challenges ahead.
Cambridge Cyber Summit (Cambridge, Massachusetts, USA, Oct 5, 2016) This unique one-day summit will bring together c-suite executives and business owners with public and private-sector leaders in security, technology and defense to discuss ways to combat urgent cyber threats and secure America's future. The event, comprised of interviews and live demonstrations, will focus on critical issues such as the next wave of cyberattacks and their perpetrators, countermeasures, privacy and security, public-private cooperation and information sharing, and the latest trends in technology, among others.
IP EXPO Europe (London, England, UK, Oct 5 - 6, 2016) IP EXPO Europe is Europe's number ONE IT event for those looking to find out how the latest IT innovations can drive their business forwardIP EXPO Europe now includes six co-located events with their own speakers, exhibitors and seminar programmes. These events bring together 300+ exhibitors and 300+ free to attend seminars across 23 theatres, all under ONE roof. The six IP EXPO Europe events for 2016 are: Cloud Europe, Cyber Security Europe, Networks & Infrastructure Europe, Data Analytics Europe, DevOps Europe, Open Source Europe
RFUN 2016: 5th Annual Threat Intelligence Conference (Washington, DC, USA, Oct 5 - 6, 2016) The fifth annual RFUN Conference is a two-day event that brings together the diverse and talented community of analysts and operational defenders who apply real-time threat intelligence to out-innovate their adversaries. We invite Recorded Future customers, partners, and threat intelligence enthusiasts to join us at RFUN 2016.
SecureWorld Denver (Denver, Colorado, USA, Oct 5 - 6, 2016) Join your fellow security professionals for affordable, high-quality cybersecurity training and education. Earn 12-16 CPE credits through 60+ educational elements learning from nationally recognized industry leaders. Attend featured keynotes, panel discussions & breakout sessions all while networking with local peers
VB 2016 (Denver, Colorado, USA, Oct 5 - 7, 2016) The 26th annual international Virus Bulletin conference meets this October in Denver
Insider Threat Program Development Training For NISPOM CC 2 (Aberdeen, Maryland, USA, Aug 10 - 11, 2016) Insider Threat Defense will hold a two-day training class on Insider Threat Program Development (National Insider Threat Policy-NISPOM Conforming Change 2). For a limited time the training is being offered at a discounted rate of $795 (normally $1395). The training is comprehensive and provides students with the knowledge and resources to develop and implement a robust Insider Threat Program. Insider Threat Defense has trained over one hundred fifty organizations and has become the "go-to company" for Insider Threat Program Development Training.
TU-Automotive Cyber Security Europe (Munich, Bayern, Germany, Oct 6 - 7, 2016) The most focussed forum on the ‘here and now’ of automotive cybersecurity. As we are inundated by headlines on cyber-attacks, we go beyond the hype to focus on the current challenges and solutions that unite players from research labs, automakers, tier 1’s and the complete supply chain to plan for a secure future.
AFCEA CyberSecurity Summit (Washington, DC, USA, Oct 11 - 12, 2016) AFCEA Washington, DC invites you to attend the 7th Annual Cybersecurity Summit on October 11–12, 2016. This two-day summit will feature keynotes from government leaders, thought-provoking discussion panels, and a number of deep-dive breakout sessions. The opening day of the conference, October 11, will tackle strategies for addressing cyber intelligence, next-generation cyber operations, and insider threats. Hosted at the Grand Hyatt Washington, attendees will be able to explore the avenues of cyber workforce development and training issues impacting tomorrow’s evolving threat environment. The half-day conference on October 12 is strictly for Sensitive Compartmented Information (SCI) clearance holders and will be hosted at the General Dynamics Information Technology facility in Alexandria, Virginia
AppSecUSA 2016 (Washington, DC, USA, Oct 11 - 14, 2016) OWASP’s 13th Annual AppSecUSA Security Conference is the premier application security conference for developers and security experts. Come hear an amazing group of inspirational speakers—including YouTube’s Favorite Hacker, Former DHS NCSD Director of Software Assurance, and Assistant Professor & Cryptographer—who are challenging traditions. You’ll be inspired by fresh ideas, start rethinking the status quo, and leave ready to tackle your challenges in innovative ways.
Cyber Security Summit 2016 (Aukland, New Zealand, May 5, 2016) New Zealand’s first Cyber Security Summit will be held in Auckland on 5 May 2016. The theme is “Keeping New Zealand’s Economy Cyber Secure”. Hosted by the Minister for Communications Hon Amy Adams, the Summit is an opportunity for board chairs and chief executives to discuss how New Zealand should tackle the threat of cybercrime, and improve our resilience and security. Chief executives, board chairs and leaders from across the public and private sectors have been invited to join the Minister for Communications at this high level event.
Insider Threat Program Development Training for NISPOM CC 2 (Warrington, Pennsylvania, USA, Oct 17 - 18, 2016) Insider Threat Defense will hold a two-day training class on Insider Threat Program Development (NISPOM Conforming Change 2). PA. For a limited time the training is being offered at a discounted rate of $795 (normally $1395). The training is comprehensive and provides students with the knowledge and resources to develop and implement a robust insider threat program. Insider Threat Defense has trained over 350+ organizations and has become the "leader-go to company" for insider threat program development training.
Cyber Ready 2016 (McDill Air Force Base, Florida, USA, Oct 18, 2016) We invite you to join us for our first annual Cyber ReadyTM 2016 conference observing National Cyber Security Awareness Month: The Impact of Cyber Crime. The National Cyber Partnership, joined by the MITRE Corporation, Tampa Bay Innovation Center, Florida Chamber Foundation and the Florida Suncoast AFIO Chapter is proud to present this important event. In addition to attending the Cybersecurity Conference, you're also invited to register for the Golf Outing and Barbecue Dinner at the MacDill AFB Bay Palms Golf Complex on Monday afternoon. The event will include the sixth annual MITRE National Capture the Flag (CTF) Competition Cyber Challenge Awards Ceremony.
EDGE2016 Security Conference (Knoxville, Tennessee, USA, Oct 18 - 19, 2016) The EDGE2016 conference is where true collaboration between business and technology professionals happens. Combining engaging keynotes from world-renowned visionaries, recognized technology industry leaders, topical roundtables, training sessions, and industry-specific tracks, EDGE2016 is where complex business security problems meet real-world solutions.
SecureWorld St. Louis (St. Louis, Missouri, USA, Oct 18 - 19, 2016) Join your fellow security professionals for affordable, high-quality cybersecurity training and education. Earn 12-16 CPE credits through 60+ educational elements learning from nationally recognized industry leaders. Attend featured keynotes, panel discussions & breakout sessions all while networking with local peers
CyberTini at CyberMaryland (Baltimore, Maryland, USA, Oct 19, 2016) The bwtech@UMBC Cyber Incubator will be hosting a CyberTini as the official opening event of the CyberMaryland Conference on the evening of October 19, 2016 at the Columbus Center in Baltimore’s Inner Harbor. The Columbus Center is just a few blocks from the Baltimore Hilton Hotel where the CyberMaryland Conference is taking place, and attendance at the CyberTini is estimated to be 250 or more. The event will begin at 5pm the night before the CyberMaryland Conference and will run until approximately 7:30pm.
Los Angeles Cyber Security Summit (Los Angeles, California, USA, Oct 28, 2016) The Cyber Security Summit is an exclusive conference series connects C-Suite & Senior Executives who are responsible for protecting their companies’ critical infrastructures with innovative solution providers and renowned information security experts. This educational and informational forum will focus on educating attendees on how to best protect highly vulnerable business applications and critical infrastructure. Attendees will have the opportunity to meet the nation’s leading solution providers and discover the latest products and services for enterprise cyber defense.
Insider Threat Program Development Training For NISPOM CC 2 (Aberdeen, Maryland, USA, Aug 10 - 11, 2016) Insider Threat Defense will hold a two-day training class on Insider Threat Program Development (National Insider Threat Policy-NISPOM Conforming Change 2). For a limited time the training is being offered at a discounted rate of $795 (normally $1395). The training is comprehensive and provides students with the knowledge and resources to develop and implement a robust Insider Threat Program. Insider Threat Defense has trained over one hundred fifty organizations and has become the "go-to company" for Insider Threat Program Development Training.
CyberMaryland 2016 (Baltimore, Maryland, USA, Oct 20 - 21, 2016) The CyberMaryland Conference is an annual two-day event presented jointly by The National Cyber Security Hall of Fame and Federal Business Council (FBC) in conjunction with academia, government and private industry organizations. The theme, “Leading the Cyber Generation,” captures the event’s intent to provide unparalleled information sharing and networking opportunities for development of cyber assets on both the human and technological side. Additionally, the conference provides an opportunity for Maryland to demonstrate its natural leadership in Cyber Security.
CyCon US: International Conference on Cyber Conflict (Washington, DC, USA, Oct 21 - 23, 2016) The inaugural U.S. based International Conference on Cyber Conflict will take place 21-23 October 2016 in Washington D.C. Focusing on a theme of Protecting the Future. CyCon U.S. seeks to create greater information exchange among industry, academia, and government entities at both the national and international levels. The issues to be covered include the future of international cooperation, imminent technical challenges and requirements, forthcoming conflicts in cyberspace, and the potential for new legal frameworks, standards, and regulations.
SANS San Diego 2016 (San Diego, California, USA , Oct 23 - 28, 2016) Cyber security training in San Diego, CA from SANS Institute, the global leader in information security training. Choose from nine hands-on, immersion-style training courses for security professionals at all levels. Many of these security courses have certifications that are aligned with DoD Directive 8570/8140 and all courses at this event are associated with GIAC Certifications. This event was planned to give you the weapons you need to defend against attackers and advance your career. You will learn from leading experts in courses that have been carefully selected to arm you with the latest tactics and strategies that will sharpen your skills
Insider Threat Program Development Training For NISPOM CC 2 (Aberdeen, Maryland, USA, Aug 10 - 11, 2016) Insider Threat Defense will hold a two-day training class on Insider Threat Program Development (National Insider Threat Policy-NISPOM Conforming Change 2). For a limited time the training is being offered at a discounted rate of $795 (normally $1395). The training is comprehensive and provides students with the knowledge and resources to develop and implement a robust Insider Threat Program. Insider Threat Defense has trained over one hundred fifty organizations and has become the "go-to company" for Insider Threat Program Development Training.
2016 ICS Cyber Security Conference (Atlanta, Georgia, USA, Oct 24 - 27, 2016) As the largest and longest-running cyber security-focused conference for the industrial control systems sector, the event caters to the energy, utility, chemical, transportation, manufacturing, and other industrial and critical infrastructure organizations, including the military. The conference will address topics covering ICSs, including protection for SCADA systems, plant control systems, engineering workstations, substation equipment, programmable logic controllers (PLCs), and other field control system devices.
SecureWorld Bay Area (San Jose, California, USA, Oct 27, 2016) Join your fellow security professionals for affordable, high-quality cybersecurity training and education. Earn 6-12 CPE credits through 30+ educational elements learning from nationally recognized industry leaders. Attend featured keynotes, panel discussions & breakout sessions all while networking with local peers
Regional Cyber Security Summit (Sharm El-Sheikh, Egypt, Oct 30 - Nov 1, 2016) The Regional Cyber Security Summit comes this year with the theme of “Boundless Collaboration, Boundless Protection”. It focuses on the cooperation in cybersecurity as one of key pillars to tackle the complexity and the scalability of the main challenges of today’s cyber threats. The regional cybersecurity summit has been conducted for the last 4 years under the umbrella of ITU-ARCC in Oman to share experience and knowledge, learn from each other, get in tight to recent updates and collaborate to enhance organizations’ cybersecurity became a must.