Shift in ISIS info ops themes. Script kiddies, not security services, may have taken down Dyn. Criminal capabilities, systemic vulnerabilities, spook utilities. Millennials and cyber security.
ISIS deals with loss of territory by looking for scriptural evidence that such setbacks are foreordained, and in no way compromise its legitimacy. Expect this to become a leitmotif in the Caliphate's ongoing information campaign.
The Syrian Electronic Army ("with Russian backing," says the victim) has attacked Belgian newspaper Nieuwsblad to protest Belgian participation in airstrikes against Syrian targets.
Pace the Jester and lots of other people who thought they'd glimpsed the hidden hand of Russia, it now appears that Friday's DDoS attacks were not directly the work of a state security service. The Mirai botnet remains under investigation, but according to US Director of National Intelligence Clapper, it looks more like a criminal operation than an attack by the state. Flashpoint has published a study that suggests the attackers were, as CSO calls them, "a bunch of amateurs," "script kiddies" and dark web lurkers without specific political or criminal motivation. If correct, this assessment is not reassuring, since it implies such attacks are well within the reach of many.
Utilities, especially electrical utilities, are worried. The not-forgotten Ukraine grid hack began with low-grade criminals and was coopted by a capable nation-state, and the same could happen with IoT vulnerabilities. Trend Micro points out one problem with the electrical power sector: too many of its personnel still use pagers.
Indegy has found a remote code vulnerability in Schneider Electric software used in programmable logic controllers.
Netskope describes the CloudFanta credential harvesting malware.
Forcepoint's study of millennials and cyber is out.
Today's issue includes events affecting Australia, Belgium, Brazil, Canada, European Union, Iran, Iraq, Malaysia, Mauritania, Mexico, Netherlands, New Zealand, Russia, Switzerland, Syria, Turkey, and United States.
A note to our readers: National Cyber Security Awareness Month is now in its' final full week. The theme is "our continuously connected lives: what's your 'apptitude'?"
The CyberWire's regular daily Podcast will be out later this afternoon, with interviews, educational tips, and more on the stories of the day. Today we'll hear from Terbium Lab's Emily Wilson, who'll share our partners' insights into credit card fraud. Our guest is Ed Hammersla of Forcepoint Federal, who talks to us about their just-completed study of millennials in the workforce. As always, if you enjoy the podcast, please consider giving it an iTunes review.
Cyber Attacks, Threats, and Vulnerabilities
Allah Wants ISIS to Retreat (Foreign Policy) The Caliphate’s propagandists are digging through the Quran to prove that getting beaten back in Mosul doesn’t stray from the preordained plan
From French Soldier to ISIS Spymaster (Daily Beast) It’s been almost six months since The Daily Beast exposed Abu Suleyman al-Firansi. Now new details are emerging that can tell us a lot about ISIS’s organization
Amateurs were behind the Dyn Inc. DDoS attack, report says (CSO) Flashpoint says that despite speculation, nothing they’ve seen points to political motivation or extortion
Clapper: Non-state actor likely to blame for massive cyberattack (Federal Times) National Intelligence Director James Clapper has said it appears a "non-state actor" was behind a massive cyberattack last week that briefly blocked access to websites including Twitter and Netflix
Russia's power in cyberattacks (Israel Hayom) Last Friday, a long list of well-known websites -- including Amazon, PayPal and others -- were shut down for several hours. U.S. security authorities believe that the people behind the attack, one of the largest of its kind in recent years, are private Russian and Chinese hackers who worked together
Your DVR Didn’t Take Down the Internet—Yet (Wired) Last week ended with a mid-level internet catastrophe. You may have noticed that for most of Friday popular sites like Netflix, Twitter, Spotify (and yes, WIRED) were inaccessible across the East Coast and beyond
'Root' & The New Age Of IoT-Based DDoS Attacks (Dark Reading) Last Friday's massive DDoS that exploited online cameras and DVRs was simple to pull off -- and a new chapter in online attacks
Terabit-scale DDoS events are on the horizon (Help Net Security) Corero Network Security has disclosed a new DDoS attack vector observed for the first time against its customers last week
Hackers Sell $7,500 IoT Cannon To Bring Down The Web Again (Forbes) Think Friday’s massive outage was bad? Worse is expected, as hackers are selling access to a huge army of hacked Internet of Things (IoT) devices designed to launch attacks capable of severely disrupting web connections
'This attack was different' — cyberthreat draws utility warnings (EE News) Swarms of hacked, internet-connected devices have menaced core parts of the web and put utilities on edge
What Businesses Can Learn From the Mirai Botnet DDoS Attack (Fox Business) Sitting in a cybersecurity conference days after a massive cyberattack is a surreal feeling
Can we secure the internet of things in time to prevent another cyber-attack? (Guardian) Easy-to-hijack ‘smart’ devices just crashed some of the world’s biggest online platforms. Experts say it’s a wake-up call to improve security – and quickly
History repeating: How the IoT is failing to learn the security lessons of the past (ZDNet) The massive cyberattacks which took down some of the most popular websites on the internet show that device manufacturers are not learning from the mistakes of the past
No, the Jester didn't hack the Russian Foreign Ministry website (Graham Cluley) Ho ho ho
Chinese Firm Defends Webcam Security After DDoS Attacks (Dark Reading) Hangzhou Xiongmai Technology says devices sold in the US before April 2015 will be recalled after attack on Dyn servers
ForeScout Reveals New Findings that Show Common Enterprise IoT Devices are Hackable in Under Three Minutes (ForeScout) In-depth analysis highlights the dangers posed by enterprise IoT devices, discovering that most can act as simple points of entry into critical enterprise networks
Nuclear plants leak critical alerts in unencrypted pager messages (Ars Technica) A surprising number of critical infrastructure participants do, too, study finds
Power Plants Are Hackable Because Employees Are Still Using Pagers (Motherboard) After hackers attacked several Ukrainian power companies in December of last year, the cybersecurity of critical infrastructure has faced increased scrutiny
Syrian Cyber Army valt website Nieuwsblad aan (Nieuwsblad) Syrische hackers, gesteund door Rusland, hebben maandagnamiddag een grootscheepse aanval ingezet op de website van Het Nieuwsblad. Ze deden dat uit protest tegen de Belgische bombardementen op Syrië
How hackers broke into John Podesta, DNC Gmail accounts (Naked Security) Who hacked the Democratic National Committee (DNC)? The finger of blame has been pointed at, among others, Russia, with allegations being made with a varying degree of heat and conviction but – so far – without much evidence. However, evidence now is emerging – in the form of URLs shortened by the Bit.ly service
US Officials: Russian Hackers Could Spread Online Rumors Of Voter Fraud (Dark Reading) US authorities ask election officials to be alert to false documents posted online to influence public perception
WikiLeaks is exposing Clinton’s duplicity, but it’s no hero (Jackson Hole News and Guide) Winston Churchill once said that “if Hitler invaded hell, I would make at least a favorable reference to the devil in the House of Commons.” So it’s not surprising that many conservatives are thrilled to see WikiLeaks and the Clinton campaign at war, as Julian Assange releases emails exposing the duplicity and potential self-dealing of the Clinton machine and the blurred line between the Clinton Foundation and the State Department
Mauritania: Recent E-mail Scam Exposes Weaknesses (Wapack Labs) Mauritania, specifically their capital Nouakchott, face numerous cyber challenges to their banking/corporate, government and personal communications due to outside dependence on network infrastructure
The Phone Hackers at Cellebrite Have Had Their Firmware Leaked Online (Motherboard) Cellebrite, an Israeli company that specialises in digital forensics, has dominated the market in helping law enforcement access mobile phones. But one apparent reseller of the company's products is publicly distributing copies of Cellebrite firmware and software for anyone to download
Millions of Android Devices Vulnerable to DRAMMER Attack (HackRead) DRAMMER, a dangerous threat to Android devices — Google has awarded the researchers $4000 for identifying the bug but it will take a while for to get rid of it
CloudFanta Malware Targets Victims Via Cloud Storage App (Dark Reading) The malware campaign uses the Sugarsync cloud storage app to distribute malware that steals user credentials and monitors online banking activity
CloudFanta Pops with the Cloud using SugarSync (Netskope) Netskope Threat Research Labs has discovered a new malware campaign, which we suspect stole more than 26,000 email credentials and also monitors online banking activities. The malware, which we have named “CloudFanta,” has been in operation since July 2016 and primarily targets Brazilian users
CloudFanta Malware Campaign Technical Analysis (Netskope) We recently published an overview blog about the CloudFanta malware campaign that uses the Sugarsync cloud storage app to deliver malware capable of stealing user credentials and monitoring online banking activities. This blog will detail the technical aspects of CloudFanta
Russian criminals' bank attacks go global (CSO) Russian cybercriminals have field tested their attack techniques on local banks, and have now begun taking them global, according to a new report -- and a new breed of mobile attack apps is coming up next
Lifting the lid on Sednit: A closer look at the software it uses (We Live Security) Security experts at ESET have released the final two parts of their new research into the operations of the notorious Sednit hacking group which – as previously discussed – has targeted over 1000 high-profile individuals with phishing attacks and zero-day exploits
Analysing the NULL SecurityDescriptor kernel exploitation mitigation in the latest Windows 10 v1607 Build 14393 (Nettitude) We recently discovered a new and quietly released Windows kernel exploitation defence. Exploiting a kernel bug by setting the pointer to the SecurityDescriptor to NULL in the header of a process object running as SYSTEM won’t work from Windows 10 v1607 (Build 14393)
Workstation software flaw exposes industrial control systems to hacking (CSO) Attackers can send malicious code to industrial engineering software to take over workstations used to program and control PLCs
Lyft customers face potential hack from recycled phone numbers (CSO) The problem involves Lyft's use of cell phone numbers to verify customers' identities
Stolen medical data on the cheap after waves of healthcare hacks (Christian Science Monitor Passcode) Buyers and sellers on the digital underground are trading healthcare records databases for as much as $200,000, according to a report from Intel Security. And that's at a discount
Following Lull, New Campaigns Pushing Retooled ‘Pumpkin’ Locky (Threatpost) New and increasingly diverse variants of ransomware are released weekly, but developers behind the Locky strain have managed to keep the malware fresh in the face of changing trends
7 Scary Ransomware Families (Dark Reading) Here are seven ransomware variants that can creep up on you
Cyber attack to blame for Grade 10 literacy test chaos (Hamilton Spectator) The computer troubles that plagued the online literacy test for more than 200,000 Ontario teens last week were caused by an "intentional, malicious and sustained Distributed Denial of Service (DDoS) attack — a type of cyber attack," the testing agency says
Flash mobs the latest threat this holiday season (CSO) The holiday season rings in more than just higher sales for retailers. There's also more shoplifting and lower profit margins than the rest of the year, according to a report released today. Plus, this year, there's an extra surprise -- flash mobs
Security Patches, Mitigations, and Software Updates
Apple Patches iOS Flaw Exploitable by Malicious JPEG (Threatpost) Apple on Monday patched a code execution vulnerability in iOS that could be exploited via a JPEG file crafted to take advantage of the flaw
Critical account creation flaws patched in popular Joomla CMS (CSO) Developers urge users to update to Joomla 3.6.4 as soon as possible
Internet of Things: Have We Bitten Off More Than We Can Chew? (NBC News) Ready or not, the Internet of Things is about to explode. But whether we're equipped to handle security for it is another question
Millennials see future in cyber security (Enterprise Times) The future job prospects for millennials has been bleak for some time
Forcepoint™ Study Finds Millennials' Behavior Poses Significant Security Risk To Federal It Systems (PRNewswire) As security-conscious baby boomers retire, survey of growing millennial workforce reveals a new generation more likely to trade caution for digital productivity
The Rising Tide of Millennials (Forcepoint) A tsunami of risks for the Federal Government?
Over one-third of Americans have been hacked (Help Net Security) Two-thirds of Americans believe themselves to be tech savvy, although their actions with regard to online security indicate otherwise – with millennials being the worst offenders, according to Arbor Networks
Intellectual property cyber theft to rise 58% (Help Net Security) The number of intellectual property cyber theft incidents in the next 12 months is expected to increase, according to 58 percent of respondents to a recent Deloitte poll
61% of employers have no BYOD policy (Help Net Security) Trustlook has shared findings on the latest BYOD trends and best practices from a survey of 320 Android users
As IPO Looms, Tanium Sells Itself As More Than Cybersecurity (Forbes) On Tuesday morning in San Francisco, Orion Hindawi will kick off Tanium’s inaugural user conference as the CEO of one of the hottest cybersecurity startups in Silicon Valley. But the 36-year-old Hindawi wants the $3.5 billion-valued Tanium to be known as more than a tool to fight hackers
Is An American Company's Technology Helping Turkey Spy On Its Citizens? (Forbes) “I do not wish to spend the rest of my life with the regret of having been a part of Erdoğan’s insanity, so I’m out.” The company-wide email on April 4 from Kriss Andsten, a senior technical engineer for Fremont, California-based Procera Networks, landed with a thud and marked the beginning of an internal revolt that has rattled the telecom technology provider
Lessons to learn from Wynyard Group failure (NewsHub) There are lessons for both investors and entrepreneurs from the failure of Wynyard Group
Ballooning costs spell trouble for Wynyard (Otago Daily Times) Wynyard Group appeared to be paying the price for not controlling its costs as revenue failed to grow quickly enough, Craigs Investment Partners broker Peter McIntyre said yesterday
Former White House cybersecurity chief launches Uplevel Security (TechCrunch) Launching today with a new security technology Uplevel Security wants to be the go-to tool IT departments use to respond to breaches and hacks
National security brain drain (CSO) Former Defense, Intelligence and National Security senior officials who were charged with protecting our country’s secrets, classified networks and technical assets are in high demand by corporate America
Kudelski Security Unveils Research Unit to Drive Development of Industry's Most Advanced Enterprise Cybersecurity Programs (Yahoo! Finance) Kudelski Security, a trusted advisor and cybersecurity innovator for the world's most security-conscious organizations, today launched a research unit dedicated to driving the most effective cybersecurity programs possible for enterprises and public sector institutions
Gatekeeper of cyber security (Docklands News) Victoria is one step closer to becoming one of the world’s top five cyber security powerhouses and Docklands is the headquarters of the hub
Products, Services, and Solutions
Delta Risk LLC and AlienVault Team Up to Help Companies Fight Ransomware (CBS 8) Ransomware attacks are on the rise, with a 300 percent increase in daily attacks since the beginning of the year, according to a recent U.S. government interagency report
PacketRAID: All-in-One Portable Network Recorder Multi-Port—Multi-Format—Multi-Speed (The Packet Company) PacketRAID delivers remarkable performance and flexibility with an intuitive GUI in a portable platform. Designed for use in test labs and in network security applications, it can record and replay almost any type of traffic at a wide range of speeds
TV Rheinland and OpenSky Join the RSA SecurWorld Partner Program to Help Enterprises Take Command of Risk in an Increasingly Digital World (9 & 10 News) OpenSky announces channel partnership with RSA in the US, UK and Switzerland
Breaking the Android Puzzle With Oxygen Forensic Detective v. 9.0 (PRNewswire) Oxygen Forensics, the worldwide developer and provider of advanced forensic data examination tools for mobile devices and cloud services, announced today that it has added a Jet-Imager module to its Oxygen Forensic Detective product that allows users to acquire data from Android devices faster saving experts critical time while solving law enforcement cases
Appmobi Extends Protection Center Platform to Defend IoT Devices (PRNewswire) New IoT security solution uses machine learning to identify and resolve DDoS attacks and other cyber threats in real time
Breathe New Life into Your Old PC with Paragon Migrate OS 5.0 – One-Step Migration to New Storage Devices (Paragon Software Group) Paragon Software Group (PSG), the leader in data backup, disaster recovery and data migration solutions, announces Paragon Migrate OS 5.0, a one-step tool to help with Windows systems migration to new storage devices – solid-state drives (SSDs) and hard disk drives (HDDs). Paragon Migrate OS 5.0 instantly performs fast and safe Windows migrations and even downsizes to smaller capacity drives, thanks to advanced data exclusion capabilities. You can transfer a live system with no impact to your work, and have your partitions automatically aligned in the process, if needed. The new release fully supports Windows 10 and comes with an even more intuitive UI providing easy access to the software's step-by-step migration wizard
G2 Web Services Wins 2016 Florin Awards Asia (PRNewswire) G2 Transaction Laundering Detection recognized as the Best Fraud Prevention Innovation
Certus Software presents Certified Data Erasing according to the Common Criteria EAL3+ level (Global Security) Certus Software provides fully transparent certified data erasing, including management of all users, reports and licenses in a cloud-based tool and according to the CCRA
Free tool for Active Directory changes monitoring (Help Net Security) Netwrix Change Notifier for Active Directory tracks changes to Active Directory (AD) users, group memberships, OUs, permissions, and provides visibility into what’s happening inside your AD
Carahsoft Partners With Okta to Bring Secure and Simplified Approach to Identity and Security to the Public Sector (Marketwired) Okta Identity Cloud now available on Carahsoft's GSA Schedule and SEWP V Contracts
Visa opens tokenisation services to third party partners (Finextra) Today Visa (NYSE:V), announced it is accelerating the adoption of secure, digital payments by allowing third party partners to offer Visa Token Service (VTS)
Malaysian insurer partners IT supplier to tailor cyber security policies (ComputerWeekly) Partnership is in response to requests from AIG customers for a more comprehensive risk management approach to cyber insurance
Technologies, Techniques, and Standards
'Siri, catch market cheats': Wall Street watchdogs turn to A.I. (Reuters) Artificial intelligence programs have beaten chess masters and TV quiz show champions. Next up: stock market cheats
How to approach keeping your IoT devices safe (CSO) A DVR has now become a major weapon as seen with the latest round of DDoS
What is a Botnet & How to Prevent Your PC From Being Enslaved (Heimdal Security) Is your computer used to attack others? Everything you need to know about botnets and zombies
What awareness is supposed to be (CSO) Recent W-2 and accounts payable thefts show governance should be the cornerstone of awareness
FS-ISAC Announces The Formation Of The Financial Systemic Analysis & Resilience Center (FSARC) (PRNewswire) Established by financial institutions, FSARC deepens analytic capabilities to combat cyber risk and strengthen resiliency of U.S. financial system
Getting To The 'Just Right' Level Of Encryption (Dark Reading) The key to unlocking secure business messaging is controlling who has the key
Best practices for securing your data in-motion (Help Net Security) Security and compliance is at the top of every IT pro’s mind, yet much of that effort is focused on protecting data within the organization that’s “at rest.” While it’s important to protect all data, data in-motion is when it’s at its most vulnerable point and needs to be more of a focus of your efforts
Why don’t all businesses have a good continuity strategy? (Help Net Security) It has been said that an ounce of prevention is worth a pound of cure. In the case of disaster recovery, however, businesses tend focus on prevention without anticipating the need for a cure
What is malware & what threats does it pose to you? (Network Support Company) Malware is software designed with malicious purpose. It may be designed to disable your phone or computer, remotely control your device, or steal valuable information like credit card information or passwords
Design and Innovation
The Latest Battle in Software Is All About Artificial Intelligence (Fortune) What if AI could make our software simple again?
Research and Development
How MIT Is Teaching AI to Scare Us (Motherboard) Halloween's approaching, and MIT wants to use AI to scare the daylights out of you
Meet the winners of the Passcode Cup (Christian Science Monitor Passcode) After a four-hour hacking competition organized by Passcode on Friday, October 21, the team from the University of Virginia emerged as the winners
15 under 15: Rising stars in cybersecurity (Christian Science Monitor Passcode) Kids born after the year 2000 have never lived a day without the internet. Everything in their lives is captured in silicon chips and chronicled on Facebook. Algorithms track how quickly they complete their homework; their text message confessions and #selfies are whisked to the cloud
Legislation, Policy, and Regulation
Should companies be fined for not doing cyber security basics? (Computer Business Review) GDPR will punish slow breach reporting: but should it extend to doing cyber security basics?
US wants Mexico under grid security pact before year's end (Washington Examiner) The Obama administration is scrambling to make Mexico by the end of the year a full-fledged member of a North American industry pact that works to defend the electric grid from cyberattacks
Malaysia’s Cyber Defense: One of ASEAN’s Best? (Diplomat) Defense minister praises the country’s developing capabilities
NHTSA Issues Cybersecurity Best Practices For Automakers (Dark Reading) Focus is on limiting access to electronic components and what someone can do with that access
US transport agency guidance on vehicle cybersecurity irks lawmakers (CSO) The guidelines issued by the NHTSA are only voluntary
Senator Prods Federal Agencies on IoT Mess (KrebsOnSecurity) The co-founder of the newly launched Senate Cybersecurity Caucus is pushing federal agencies for possible solutions and responses to the security threat from insecure “Internet of Things” (IoT) devices, such as the network of hacked security cameras and digital video recorders that were reportedly used to help bring about last Friday’s major Internet outages
Federal regulators: Increasing cybersecurity stance on financial institutions (Help Net Security) Everyone is increasing the attention of cybersecurity given the continued parade of hacking incidents. Just last week, the three main prudential regulators for financial institutions—Office of the Comptroller of the Currency (OCC), Federal Reserve Board (FRB), and Federal Deposit Insurance Corporation (FDIC)—released new proposed cybersecurity risk mitigation standards called, Enhanced Cyber Risk Management Standards
FOIA committee mulls Section 508 responsibilities (Federal News Radio) Section 508 of the Rehabilitation Act is meant to serve as a curb ramp for access to federal information and communication technology, but for some Freedom of Information Act stakeholders, 508 is more like a pothole
Cyber mission force reaches key milestone (C4ISRNET) After narrowly missing its self-imposed deadline, U.S. Cyber Command’s cyber mission force has reached initial operating capability
Litigation, Investigation, and Law Enforcement
IoT Device Maker Vows Product Recall, Legal Action Against Western Accusers (KrebsOnSecurity) A Chinese electronics firm pegged by experts as responsible for making many of the components leveraged in last week’s massive attack that disrupted Twitter and dozens of popular Web sites has vowed to recall some of its vulnerable products, even as it threatened legal action against this publication and others for allegedly tarnishing the company’s brand
Iranian-American Citizen Sentenced To 18 Years In Prison For Espionage (RadioFreeEurope/RadioLiberty) A dual Iranian-American citizen sentenced to 18 years in prison for insulting the Islamic republic and engaging in espionage for the United States was convicted based on his social-media posts, according to a close acquaintance
For a complete running list of events, please visit the Event Tracker.
Newly Noted Events
Enfuse 2017 (Las Vegas, Nevada, USA, May 22 - 25, 2017) Enfuse™ is a three-day security and digital investigations conference where specialists, executives, and experts break new ground for the year ahead. Enfuse offers unsurpassed networking opportunities, hands-on training, and in-depth exploration of current topics.
SANS San Diego 2016 (San Diego, California, USA , Oct 23 - 28, 2016) Cyber security training in San Diego, CA from SANS Institute, the global leader in information security training. Choose from nine hands-on, immersion-style training courses for security professionals at all levels. Many of these security courses have certifications that are aligned with DoD Directive 8570/8140 and all courses at this event are associated with GIAC Certifications. This event was planned to give you the weapons you need to defend against attackers and advance your career. You will learn from leading experts in courses that have been carefully selected to arm you with the latest tactics and strategies that will sharpen your skills
2016 ICS Cyber Security Conference (Atlanta, Georgia, USA, Oct 24 - 27, 2016) As the largest and longest-running cyber security-focused conference for the industrial control systems sector, the event caters to the energy, utility, chemical, transportation, manufacturing, and other industrial and critical infrastructure organizations, including the military. The conference will address topics covering ICSs, including protection for SCADA systems, plant control systems, engineering workstations, substation equipment, programmable logic controllers (PLCs), and other field control system devices.
14th Annual EWF National Conference (Scottsdale, Arizona, USA, Oct 25 - 27, 2016) Balancing risk and opportunity: transforming cybersecuity; risk and privacy beyond the enterprise. The Executive Women's Forum (EWF) Annual Conference provides an exclusive opportunity to personally interact with more than 350 global thought leaders in the fields of Information Security, Risk Management and Privacy. During this three-day event, members collaborate on round-table exercises, incident simulations, panel discussions and working groups. Exposure to new ideas and approaches, best practice management of everyday issues and learning from observing the best and the brightest is an excellent and abundant return on investment.
SecureWorld Bay Area (San Jose, California, USA, Oct 27, 2016) Join your fellow security professionals for affordable, high-quality cybersecurity training and education. Earn 6-12 CPE credits through 30+ educational elements learning from nationally recognized industry leaders. Attend featured keynotes, panel discussions & breakout sessions all while networking with local peers
Security By Design (McLean, Virginia, USA, Oct 28, 2016) The essential security conference for all who desire to build trustworthy software. Developers, DevOps Engineers, Software Architects, Security Software Engineers, Designers and more.
Regional Cyber Security Summit (Sharm El-Sheikh, Egypt, Oct 30 - Nov 1, 2016) The Regional Cyber Security Summit comes this year with the theme of “Boundless Collaboration, Boundless Protection”. It focuses on the cooperation in cybersecurity as one of key pillars to tackle the complexity and the scalability of the main challenges of today’s cyber threats. The regional cybersecurity summit has been conducted for the last 4 years under the umbrella of ITU-ARCC in Oman to share experience and knowledge, learn from each other, get in tight to recent updates and collaborate to enhance organizations’ cybersecurity became a must.
Inside Dark Web (Washington, DC, USA, Nov 1 - 2, 2016) Individuals, organizations, corporations, and governments use the Dark Web to protect themselves and their users, employees, customers, and citizens seeking a more accessible and secure Internet experience. Experts from government, the financial community, law enforcement and cyber security will give you the background history, current utilization and future thoughts about the fast growing misunderstood world of the Dark Web.
National Institute for Cybersecurity Education 2016 Conference and Expo (Kansas City, Missouri, USA, Nov 1 - 2, 2016) Cybersecurity has emerged as one of the leading creators of jobs and opportunity for all economic sectors. The demand for cybersecurity positions in both the public and private sector is large and growing, but the talent pool of cybersecurity workers is not yet able to keep up. The NICE 2016 Conference and Expo features thought leaders from education, government, industry and non-profits who are addressing the cybersecurity education, training, and workforce needs of the nation.
GTEC (Ottawa, Ontario, Canada, Nov 1 - 3, 2016) For the public sector and business, count on GTEC to help you keep up with the changing landscape of technology and service delivery in Canada. With our nationally recognized awards program and annual conference, plus our new learning products, GTEC is your destination of choice for innovation and excellence in public sector IT. The conference program will feature a close focus on the cyber threat, particularly the threat of cybercrime, and the Canadian response to that threat.
Black Hat Europe 2016 (London, England, UK, Nov 1 - 4, 2016) Black Hat is returning to Europe again in 2016, and we have quite an event in store. Here the brightest professionals and researchers in the industry will come together for a total of four days--two days of deeply technical hands-on Trainings, followed by two days of the latest research and vulnerability disclosures at our Briefings.
TECHEXPO Cyber Security Hiring Event (Tysons Corner, Virgina, USA, Jun 30, 2016) Cyber security professionals are invited to interview face-to-face with employers including The CIA, Deloitte, Intel Security, Northrop Grumman, Lockheed Martin, Deloitte, Vencore and many more. Hundreds of career opportunities are available in cyber security that need to be filled immediately. Bring copies of your resume with you and interview in person, representing yourself better than any online application ever could.
ISSA International Conference (Orlando, Florida, USA, Oct 22 - 23, 2014) Join us for solution oriented, proactive and innovative sessions focused on security as a vital part of the business.
SINET Showcase 2016: Highlighting and Advancing Innovation (Washington, DC, USA, Nov 2 - 3, 2016) SINET Showcase provides a platform to identify and highlight “best-of-class" security companies that are addressing industry and government’s most pressing needs and requirements. The chosen SINET 16 Innovators present their technological solutions to representatives from the ecosystem of the entrepreneur: venture capital, investment banking, system integration, academia, science, legal, policy, private industry and executives from the Federal Government, including civilian, intelligence and military professionals. Showcase’s objective is to increase awareness of innovative solutions that may lead to an investment in, or the purchase of, advanced technologies that will help secure our nation’s critical infrastructure and command-and-control systems.
3rd Annual Journal of Law and Cyber Warfare Conference (New York, New York, USA, Nov 3, 2016) The 2016 Journal of Law and Cyber Warfare symposium speakers represent an unparalleled group of cyber security experts with a wide variety of industry expertise and knowledge. Attendees will hear from experts on cyber security and cyber warfare from the military, government, private industry, and the public sector. Our panels are designed to provide attendees with thought leadership from a diverse group of experts who will share their experience and knowledge-base regarding topical cyber security issues. The symposium is a day long event comprised of panels, Q&A sessions, tool demonstrations and networking opportunities. Focused and thorough, there are take-aways for all attendees.
Security of Things World USA (San Diego, California, USA, Nov 3 - 4, 2016) Security. Privacy. Connected Devices. Exploring Security and the Internet of Things. A world class event focused on the next information security revolution. Be part of Security of Things World USA in November in San Diego to tailor your proposition to respond to the security concerns that preoccupy enterprise customers today and find pragmatic solutions to the most common security threats.
2nd Annual Summit: Global Cyber Security Leaders (Berlin, Germany, Nov 7 - 8, 2016) The Global Cyber Security Leaders 2016 is designed to provide unrivaled access to peers from across the globe, and encourage participants to discuss the current challenges and explore the ideas shaping tomorrow’s global cyber threat landscape. The interactive, fresh and content driven format is specifically designed for leaders, visionaries and decision makers across all geographies. Strengthen your global network and form lasting relationships with other forward-thinking and inspiring leaders.
IAPP Europe Data Protection Congress 2016 (Brussels, Belgium, Nov 7 - 10, 2016) The GDPR is finalised, the Data Protection Congress is returning to Brussels and you have a great deal of work ahead. Begin at the Congress, where you’ll find thought leadership, a thriving professional community and unrivaled education. It’s time to get to work: Start here.
SANS Miami 2016 (Coconut Grove, Florida, USA, Nov 7 - 12, 2016) Attend our new SANS Miami 2016 event, November 7-12 and choose from five hands-on, immersion-style cybersecurity training courses taught by real-world practitioners. Attackers are targeting you with increasing viciousness and stealth, and it's essential you understand the tools and techniques and learn the skills needed to protect your organizations. Get the training you need from SANS - the most trusted and by far the largest source for information security training in the world
Federal IT Security Conference (Columbia, Maryland, USA, Nov 8, 2016) The Federal IT Security Institute in partnership with PhoenixTS in Columbia, MD is hosting the first annual Federal IT Security Conference. Speakers from NIST, DHS, the Defense Department as well as private industry will be in attendance discussing the themes and trends that are influencing the Federal/DoD cyber landscape. All proceeds from the event go to help retrain Wounded Warriors to become cyber defenders at the Wounded Warrior Cyber Combat Academy.
11th Annual API Cybersecurity Conference & Expo (Houston, Texas, USA, Nov 9 - 10, 2016) Join us at the 11th Annual API Cybersecurity Conference & Expo and discover methods for thwarting the bad guys, what the scene looks like over the horizon and how the latest technologies can help you counter cyber espionage, address cyber warfare, and make your cyber efforts secure.
SecureWorld Seattle (Bellevue, Washington, USA, Nov 9 - 10, 2016) Join your fellow security professionals for affordable, high-quality cybersecurity training and education. Earn 12-16 CPE credits through 60+ educational elements learning from nationally recognized industry leaders. Attend featured keynotes, panel discussions & breakout sessions all while networking with local peers
Institute for Critical Infrastructure Technology Annual Gala and Benefit (Washington, DC, USA, Nov 10, 2016) The Annual ICIT Gala and Benefit is the year’s most prestigious gathering of legislative, agency and private sector leaders committed to protecting our Nation’s critical infrastructures. This intimate black-tie event will celebrate the minds of the most influential members of our community as well as the efforts of today’s most impactful cybersecurity leaders. The funds raised from this Benefit will be used exclusively to help sustain and grow the Institute’s research, publications and educational activities for the communities it serves.
Israel HLS and Cyber 2016 (Tel Aviv, Israel, Nov 14 - 17, 2016) Where physical and cyber security meet. Topics include intelligence, cyber crime, and counter-terrorism, defending critical infrastructures, a smart global world, mass events--the integrative approach, and emergency readiness.
SANS Healthcare CyberSecurity Summit & Training 2016 (Houston, Texas, USA, Nov 14 - 21, 2016) SANS will be hosting its 4th Annual Healthcare Cybersecurity Summit. Join us and hear top security experts from leading healthcare companies discuss proven approaches for securing and succeeding in the new healthcare environment. You'll have the opportunity to meet with leaders from top organizations and see what really works in securing healthcare. As we know, healthcare has been undergoing major changes. Patients are demanding more convenient and personalized care. Digital health is changing the way that doctors and patients interact. New technologies allow patients to track their own health and generate data that was previously not available to care providers. Additionally, health information exchanges are being created to enable access to electronic medical records across disparate organizations. The Healthcare CyberSecurity Summit will take aim at the major challenges organizations face as they balance the security, compliance, and innovation required to thrive in this quickly changing market
Infosec 2016 (Dublin, Ireland, Nov 15, 2016) Infosec 2016 conference addresses the critically important issues that threaten businesses in the information age By any measure, the digital threats that businesses and organisations of all sizes face are increasing
Kaspersky Academy Talent Lab (Online, then Prague, Czech Republic, Nov 15, 2016) Kaspersky Academy Talent Lab is an international cyber-world competition for young researchers and professionals aged 18-30 who are interested in the cybersecurity challenges facing the world. 50 finalists will travel to the global final event to Prague (all expenses covered by Kaspersky Lab) to present their projects & compete.
CISO Charlotte (Charlotte, North Carolina, USA, Nov 15, 2016) The CISO Summit brings together C-level IT security executives, industry analysts and solution providers to discuss challenges and best practices in a relaxed, yet focused business setting. Agenda sessions include panel discussions, think tanks, analyst Q&A sessions and much more
Pharma Blockchain Bootcamp (Edison, New Jersey, USA, Nov 16, 2016) Blockchain technology has gained recognition as one of the most disruptive technologies in the industrial world with the potential of redefining how businesses operate similarly the internet changed it more than 30 years ago. At this critical one-day learning seminar, bio/pharmaceutical professionals (tech + business) will uncover the key areas where blockchain applications could have a significant impact in securing, managing and leveraging the deluge of data throughout the enterprise from R&D to clinical to commercialization. Key issues to be addressed: what exactly is blockchain and why is it considered a disruptive innovation; where and why in the enterprise is pharma ripe for blockchain applications; the hidden business rewards that would be exposed; the legal and regulatory considerations with implementation, and much more.
Cybercon 2016 (Washington, DC, USA, Nov 16, 2016) The forum for dialogue on strategy and innovation to secure defense and government networks, as well as private-sector networks that hold their sensitive data.
Versus 16 (San Francisco, California, USA, Nov 17, 2016) Versus is not an ordinary event. Versus is not about pitching products or preaching to the choir. Versus is about challenging what you think you know about cybersecurity, about technology, about doing business in the digital age
Data Breach & Fraud Prevention Summit Asia (Mumbai, India, Jun 8, 2016) ISMG’s Data Breach & Fraud Prevention Summit Asia – Mumbai is a one-day event that will focus on the latest fraud techniques and technologies, as well as a holistic, strategic approach to looking at the data breach threat that impacts all industries. Whether you are forming opinions on how to view the recent global Apple Vs. FBI debate, want to learn more about the breach incidents, or just look forward to networking with your peers on cybersecurity challenges, we are confident you will gain tremendous insight throughout the event. CyberWire readers can use the discount promo code "CW20" when registering with firstname.lastname@example.org to receive 20% off the conference price.
SCSC Cyber Security Conclave 2.0 Conference and Exhibition (Hyderabad, India, Nov 22 - 23, 2016) India’s leading two-day cyber security event is returning in November 2016, once again bringing together over hundreds of cyber security experts, senior officials and policy-makers from across the public and private sector to provide an update on cyber security instances, share best practice strategies, and help India to combat cyber threats.
4th Ethiopia Banking & ICT Summit (Addis Ababa, Ethiopia, Nov 25, 2016) The 4th Ethiopia Banking & ICT Summit is the ONLY event in Horn of Africa that focuses on technology innovations and trends in the Banking and ICT sectors. This annual summit brings together Financial Institutions, Information Technology Vendors, high profile CIOs, CISOs, CTOs Risk and Compliance Officers and COOs to explore how they can utilize the newest technologies to further increase mobility, enhance security, support new products and services, and improve customers’ experience to secure their competitive edge.
CIFI Security Summit (Toronto, Ontario, Canada, Nov 30 - Dec 1, 2016) The Annual CIFI Security Summit takes place all over the world, Asia, Europe, Australia & North America. These summits are essential 2 day conferences and exhibitions bringing together leading security experts from around the globe to discuss Cyber Intelligence, Digital forensics, Cyber Security and Cyber Investigations. This is the only event of its kind that will run 4 simultaneous streams over 2 days in addition to case studies, demonstrations from global business leaders and a 30+ Exhibition.