Germany continues to fret about Russian attempts to influence elections. NSA Director says a "nation-state" made a "conscious attempt" to affect US voting. Holiday cyber-risks and the cybercriminals' mindset. Lords pass Snooper's Charter. Russia to block LinkedIn.
Hans-Georg Maassen, head of the Bundesamt für Verfassungsschutz, adds his voice to warnings of potential Russian interference in German elections. In the US, NSA Director Admiral Rogers says that an unnamed state (but they're all looking at you, Russia) made "a conscious effort" to affect the recent US elections via WikiLeaks. Mother Jones wants Congress to investigate (and they sound surprisingly more like Mr. Deeds than they do their eponymous Wobbly).
A Passcode op-ed argues that the US elections' big lesson is that everyone (especially politicians and their staffs) needs to do cyber security better. Foreign Policy observes that repressive regimes have found ways of turning social media to unfortunate advantage—Twitter's rise as the daystar in the false dawn of Iran's Green Revolution now seems like ancient history.
Huawei and ZTE scramble to reassure customers about the Adup backdoor Kryptowire researchers found in too many phones.
Enigma Software predicts a holiday cybercrime spike, and others, including Core Security and Skycure, offer advice on staying safe while shopping. (Skycure's even got a run-down on the riskiest mall Wi-Fi systems.)
Recorded Future peers into the mind of the cybercriminal. Readers of Freakonomics and watchers of Donnie Brasco won't be surprised to learn that low-level cyberhoods lack skills and don't make much.
In the UK, the Snooper's Charter passes the Lords.
Because the Russian government cares as much about personal privacy as it does about combinations in restraint of trade, a Russian court has ruled that the countries ISPs must block LinkedIn.
Today's issue includes events affecting Australia, China, Germany, Russia, United Kingdom, and United States.
The CyberWire's regular daily Podcast will be out later this afternoon, with interviews, educational tips, and more on the stories of the day. Today we hear from our partners at the Ben-Gurion University of the Negev, as USB maven Ran Yahalom talks about the latest in this kind of hardware attack. And our guest, John LaCour, CEO of Phishlabs, will talk us through the ever-dangerous landscape of phishing attacks. If you enjoy the podcast, please consider giving it an iTunes review.
Cyber Attacks, Threats, and Vulnerabilities
Germany alarmed about potential Russian interference in election: spy chief (Reuters) Germany is alarmed that Russia may seek to interfere in its national elections next year, the domestic intelligence chief said, echoing concerns raised in the United States before Donald Trump's presidential election victory
NSA CHIEF: A nation-state made a 'conscious effort' to sway the US presidential election (Business Insider) The leader of the National Security Agency says there shouldn't be "any doubt in anybody's mind" that there was "a conscious effort by a nation-state" to sway the result of the 2016 presidential election
NSA chief: WikiLeaks US election disclosures were 'conscious effort by a nation-state' (International Business Times) The email leaks were 'not something that was done casually', suggests head of National Security Agency
The NSA Chief Says Russia Hacked the 2016 Election. Congress Must Investigate. (Mother Jones) It's up to Capitol Hill to protect American democracy
Alphabet's Eric Schmidt says Russia is the biggest cyber attack threat to the US (BusinessInsider) Eric Schmidt, the executive chairman of Google's parent company Alphabet, says he's worried about Russian cyber attacks against the US more than any other country
Opinion: The election's hard cybersecurity lesson (Christian Science Monitor Passcode) While politicians, pollsters, and the public will look for lessons in this historic presidential election, one of the biggest takeaways is everyone needs to do a better job when it comes to protecting their data
Hillary Clinton Supporters Doxxing, Harassing Electoral College Voters (Heatstreet) Supporters of Democratic presidential candidate Hillary Clinton have already gotten more than 4 million signatures on a petition asking the Electoral College to toss Donald Trump’s victory. But some, apparently, aren’t content to simply vent their frustrations online
How Social Media Helps Dictators (Foreign Policy) It's been hailed as "liberation technology." But it has a darker side
Chinese IoT Firm Siphoned Text Messages, Call Records (KrebsOnSecurity) A Chinese technology firm has been siphoning text messages and call records from cheap Android-based mobile smart phones and secretly sending the data to servers in China, researchers revealed this week
Shanghai surprise as cheap Android devices ‘phone home’ to China (Naked Security) If your business is a BYOD outfit, it might already have rock-solid rules to keep the network safe from lame passwords, dodgy apps, rooted phones, devices too old to get security updates (even if they’re brand new), unlocked screens, and the USB-stick-like ability to slather around malware
”New phone, who dis?” Huawei, ZTE respond to reports of secret back door in Android devices (Fast Company) In the wake of a New York Times report yesterday that millions of Android-based smart devices may contain a bug that sent consumers' private data to Chinese servers, Huawei and ZTE—two of the world's largest phone makers, which are based in Shenzhen, China, and who were also fingered as clients of the software developer, Shanghai Adups Technology Company—are hoping to tamp down concerns that their products were compromised. Since news broke of the "backdoor," fans and customers of both companies have scrambled to message boards looking for answers
Once again, Siri helps attackers bypass your iPhone’s passcode (Hot for Security) Over the years iPhones and iPads have been plagued on many occasions by passcode bypasses – a secret method that allows an attacker to unlock your iOS device and access your private data
Researchers identify domain-level service credential exploit (Help Net Security) CyberArk Labs unveiled new research detailing what it considers to be a significant risk across all Windows endpoints, including those on Windows 10 with Credential Guard enabled. The exploit could allow cyber attackers to harvest encrypted service credentials from the registry and inject them into a new malicious service to achieve lateral movement and full domain compromise
Example of Getting Analysts & Researchers Away (SANS Internet Storm Center) It is well-known that bad guys implement pieces of code to defeat security analysts and researchers. Modern malware's have VM evasion techniques to detect as soon as possible if they are executed in a sandbox environment. The same applies for web services like phishing pages or C&C control panels
Fake executive social media accounts threaten enterprises (Help Net Security) New research has uncovered numerous duplicative Twitter and LinkedIn accounts among Fortune 500 leaders, raising concerns about potential security vulnerabilities
SWIFT has not seen its last 'bank robbery' (CSO) Hackers continue to penetrate SWIFT's messaging system
Report: Surveillance cameras most dangerous IoT devices in enterprise (CSO) Networked security cameras are the most likely to have vulnerabilities
Is critical infrastructure the next DDoS target? (CSO) A massive Distributed Denial of Service attack shut down a portion of the internet recently. Experts say it is unlikely a similar attack could take down the grid or other critical infrastructure but acknowledge that security remains weak in the industry
Prepare for the Worst, Hope for the Best (Akamai Blogs) Leading up to the U.S Presidential Election last week, the oracles of the security world were warning of all the possible types of attacks we might see during the day of decision making. We were preparing for attacks against voting machines, disinformation spread through social media platforms, more email leaks, and above all Distributed Denial of Service (DDoS) attacks against everyone from the White House to news sites around the globe. Yet none of these seem to have materialized
Ransoc Desktop Locker Ransomware Scans Social Media Profiles for Exploitation (HackRead) Researchers have identified a new scheme of ransomware called Ransoc. It is a new type of desktop locking malware that gets activated after it discovers evidence of media files downloaded via torrents or child pornography links on the targeted computer
Wickedly Clever USB Stick Installs a Backdoor on Locked PCs (Wired) You probably know by now that plugging a random USB into your PC is the digital equivalent of swallowing a pill handed to you by a stranger on the New York subway
Cisco Unified Communications Manager Web Interface Cross-Site Scripting Vulnerability (Cisco) A vulnerability in several parameters of the ccmivr page of Cisco Unified Communication Manager (CallManager) could allow an unauthenticated, remote attacker to launch a cross-site scripting (XSS) attack against a user of the web interface on the affected system
AppRiver warns on security threat from games (Mobile World Live) Many top games on Google’s Play Store, with millions of global downloads, want permission for full network access and this can be a major security hazard, warned software security specialist AppRiver
Skycure Mobile Shopping Advisory Reveals Riskiest Shopping Malls for Mobile Devices (Marketwired) Fashion Show Mall in Las Vegas tops list of malls with most malicious Wi-Fi networks; report also warns of malicious shopping-related apps
Attention: Holiday Shopping May Be Hazardous To Your Mobile Device (Skycure) The 2016 holiday shopping season may be the most dangerous of all – to your smartphone
Malware Infections Expected to Spike During 2016 Holiday Shopping Season (Enigma Software) As millions of Americans prepare to spend billions of dollars in online holiday shopping, malware makers are gearing up for a big couple months as well. November and December are typically very busy months for malware infections on computers, and an increase in online holiday shopping is most likely to blame
Jingle Bells, Retail Sells, Attacks are on the Way (Part 2) (Core Security Blog) It’s that time of year where retail booms as the world goes shopping for gifts during the holiday season. It’s the time for retailers to shine. It’s also the time where retailers are most vulnerable to security risks as bad actors gear up to target retailers
Inside the Mind of Cyber Criminals (Recorded Future) To learn more about how cyber criminals operate in the dark web, we asked our own Andrei Barysevich a few questions. Below is what he had to say
NHS Cybersecurity: Breaches Up, Spending Low (Infosecurity Magazine) A new Freedom of Information (FoI) request has uncovered a litany of cybersecurity failings by NHS trusts across the UK
Security Patches, Mitigations, and Software Updates
SHA-1 Time Bomb: One Third of Websites Have Yet to Upgrade (Infosecurity Magazine) Over a third (35%) of the world’s websites are still using insecure SHA-1 certificates despite the major browser vendors saying they’ll no longer trust such sites from early next year, according to Venafi
WhatsApp tightens user privacy with encrypted video calls (Naked Security) Not that long ago, encryption was a technology that only techies and the paranoid worried about
Mozilla Patches 29 Vulnerabilities, Prevents MIME Confusion Attacks, in Firefox 50 (Threatpost) Mozilla addressed 29 vulnerabilities, three rated critical, when it released the latest iteration of its flagship browser, Firefox 50 and Firefox ESR 45.5, on Tuesday
Cyber attack readiness is falling – major global study reveals (Computer Business Review) Ponemon and IBM show worrying trend as cyber resilience is marked down since 2015
Cyber risk in advanced manufacturing: How to be secure and resilient (Help Net Security) Nearly half of surveyed manufacturing executives lack confidence their assets are protected from external threats, according to a new study from Deloitte and the Manufacturers Alliance for Productivity and Innovation (MAPI)
Concern and confusion over privacy and security of AR technology (Naked Security) A new study from ISACA has found consumers to be far more positive about the benefits of augmented reality (AR) than IT professionals. While 60% or more of consumers agree that a range of suggested AR applications would improve their life, only 21% of the thousands of business and technology professionals surveyed believe AR benefits outweigh the risks
While consumers remain complacent, hackers refine their skills (Help Net Security) A new Norton Cyber Security Insights Report found that consumers who were victims of cybercrime within the past year often continued their unsafe behavior. For example, while these consumers were more likely to use a password on every account, they were nearly twice as likely to share their password with others, negating their efforts
4 Common mistakes cyber startups make with new customers (Geektime) Cyber security is one of the fastest growing sectors, but comes with equally significant obstacles
Invincea Raises $10 Million in Strategic Growth Capital (BusinessWire) Led by ORIX Growth Capital and Comerica Bank, with New Atlantic Ventures, and Harbert Ventures participating, the additional capital will be used to accelerate Invincea’s growth as the company gains broad customer adoption with the industry’s highest performing next-generation antivirus security product
Uplevel Systems Raises $1.2M Funding to Launch New Managed Services Model to Small Business IT Consultants (Sys-Con Media) Hybrid service delivery equips consulting firms to remotely manage enterprise-class Wi-Fi, data security, storage, and VPNs via the cloud
AOL lays off 500 employees after adding 1,500 employees over the last 12 months (TechCrunch) AOL CEO Tim Armstrong just announced internally that there will be layoffs across AOL’s global workforce (AOL is TechCrunch’s parent company). The company will focus on mobile, video and data across two business units — media and platforms
Cylance Becomes First Technology Partner in NTT Security Cyber Security Innovation Programme with AI-based Advanced Endpoint Protection (ResponseSource) NTT Security, the global information security and risk management company, has today announced that it has chosen to work with next-generation endpoint security company Cylance on a joint go-to-market strategy
Intel Security looks to rally channel with "edgier" McAfee brand (Channel Life) McAfee is set to be reborn following recent announcements from Intel that it will spin off a majority ownership of its Intel Security Group (ISG) business unit to private investment firm TPG, creating an independent company - one that is far more edgier and with a fresh set of ideas, according to Technology Business Research
CACI Awarded Prime Position on $92 Million Multiple-Award Contract to Provide Operations Support to U.S. Space and Naval Warfare Systems Center Pacific (BusinessWire) Critical support for surveillance and reconnaissance operations that advance maritime dominance
Vencore to support Navy cyber efforts (C4ISRNET) Vencore has been awarded an $80 million Navy contract to support cyber efforts of Space and Naval Warfare Command Systems Center Pacific
Army plans industry day for R&D cyber defense acquisition (Washington Technology) The Army will host an industry day next month to discuss an upcoming contract for R&D related to defensive cyber operations
A10 Networks Extends its Salesforce CRM to the Channel with Impartner to Accelerate Indirect Revenue (PRNewswire) Global leader in application networking and security turns to Impartner's Partner Relationship Management solution to automate channel operations and drive channel growth
Cybereason Joins Coalition for Cybersecurity Policy & Law (PRWeb) Cybereason has joined the Coalition for Cybersecurity Policy & Law to take an active role in working with other public and private organizations to make cybersecurity policies more effective, ensuring a safer internet and making cybersecurity more robust for everyone
LookingGlass Ranked Number 90 Fastest Growing Company in North America on Deloitte’s 2016 Technology Fast 500™ (Yahoo!) LookingGlass Cyber Solutions™ today announced it ranked 90 on Deloitte’s Technology Fast 500™, a ranking of the 500 fastest growing technology companies in North America that are on the cutting edge and are transforming the way organizations do business
Wombat Security Technologies Ranked Number 144 Fastest Growing Company in North America on Deloitte's 2016 Technology Fast 500™ (PRNewswire) Attributes 602% revenue growth to a greater need for effective security training programs in a landscape where corporate breaches are a daily occurrence
Invincea Ranked Number 258th Fastest Growing Company in North America on Deloitte’s 2016 Technology Fast 500™ (BusinessWire) Two hundred and eighty-three percent revenue growth based on the success of X by Invincea machine learning next-gen antivirus security solution
VASCO Appoints Scott Clements as President and Chief Operating Officer (Econo Times) VASCO Data Security International, Inc. (NASDAQ:VDSI), a global leader in digital solutions including identity, security and business productivity, today announced that Scott Clements, currently VASCO’s EVP and Chief Strategy Officer, has been appointed President and Chief Operating Officer, effective immediately
HackerOne Appoints Former Zenefits CIO Justin Calmus To Accelerate Growth of the World's Largest Hacker Community (Broadway World) HackerOne, the leading bug bounty platform provider, today announced the appointment of Justin Calmus as Vice President of Hacker Success
Splunk Hires Salesforce.com Marketing Exec As Its New CMO (CRN) Splunk, the developer of operational and machine data management software, is building up its top executive ranks, hiring Saleforce.com marketing executive Brian Goldfarb as the company's new chief marketing officer and Richard Campione for the new post of chief product officer
Products, Services, and Solutions
Adobe To Pay $1 Million Compensation In Data Breach Case (Dark Reading) Personal data of more than 500,000 consumers from 15 states were stolen in the 2013 breach of Adobe server
NSS Labs Expands Research Offerings with new Virtual Firewall Test (Marketwired) Evaluation of virtual firewall vendors on security and management
NetWatcher Offers Complimentary Cyber Promiscuity Score (Broadway World) NetWatcher, a Managed Detection and Response Provider, today announced it is offering a free Cyber Promiscuity Score™ (CPS) as part of its easy to use enterprise-level, Cyber Threat Intelligence solution
Lastline Expands Effort to Defend Large Enterprises from Advanced Malware (Marketwired) Industry leading evasive malware solution improves detection, shared intelligence and scalability
Cloud Security Alliance Launches Crowdfunded Cloud Security Management Solution (Cloud Security Alliance) STARWatch SaaS application empowers organizations to manage compliance & risks using CSA Standards and Best Practices
Maritz Motivation Solutions Introduces New Tools To Prevent Fraud in Loyalty Programs (IT Business Net) Maritz Motivation Solutions announced that the company has introduced a new LoyaltyNext® Fraud Management Suite, an evolution in enabling marketers and brands to detect and prevent fraud in loyalty programs
Qualys Cloud Platform Receives FedRAMP Authority To Operate (Marketwired) Certified platform provides federal agencies continuous view of their security and compliance posture across global IT assets
Explain Vulnerability & Risk Metrics To Management (The Street) Sergeant Laboratories is excited to announce the launch of a new information series to highlight top issues present in the information security industry
Conosco partners with Webroot to provide enhanced cyber security protection and support for customers (PRNewswire) Webroot SecureAnywhere® Business Endpoint Protection to provide continuous threat protection with a minimal footprint
Malwarebytes Premium 3.0 announced (Ghacks) Malwarebytes, maker of the popular Anti-Malware application for Windows,released a first beta version of Malwarebytes Premium 3.0 for the operating system
IBM Built a Copy of the Internet for Mock Cyberattacks (PC Magazine) A new Massachusetts facility will help companies recover from attacks
eScan launches Total Security Suite and Internet Security Suite for Businesses, with PBAE technology to provide protection from ransomware (IT Web) eScan, one of the leading anti-virus and cyber security solution providers, now brings you its latest security solutions: eScan Total Security Suite for Business and eScan Internet Security Suite for Business for small to corporate segments. These products are designed and developed with thorough research and feedback from decision-makers across these business segments
Corero Combats Terabit DDoS Attacks With Terabit Scale Protection (Yahoo!) Corero Network Security (CNS.L), a leading provider of real-time security solutions against DDoS attacks, today has announced the ability to provide a Terabit of mitigation capacity with automatic DDoS defense technology at an unprecedented price point
Dropbox Strengthens Security Solutions With Expanded Symantec Partnership (BusinessWire) Dropbox grows security ecosystem to better protect enterprise customers
Technologies, Techniques, and Standards
NIST unveils Internet of Things cybersecurity guidance (Federal Times) As the number of devices connecting to the internet increases exponentially every day, cybersecurity experts have grown concerned about the varying degrees of digital protections each offer
NIST Special Publication 800-160 (Systems Security Engineering: Considerations for a Multidisciplinary Approach in the Engineering of Trustworthy Secure Systems) (NIST) With the continuing frequency, intensity, and adverse consequences of cyber-attacks, disruptions, hazards, and other threats to federal, state, and local governments, the military, businesses, and the critical infrastructure, the need for trustworthy secure systems has never been more important to the long-term economic and national security interests of the United States
Soltra winds down; what does it mean for STIX/TAXII? (Eclectic iq) STIX/TAXII standards have become “HTML of Cyber Security” and enable widespread, simple and low-cost information sharing for global enterprises across industries. EclecticIQ, top provider of STIX/TAXII-compliant Threat Intelligence Platform, commends Soltra for protecting industry as early adopter
The Army's cyber ops has a data problem (Federal Times) The Army’s cyber operations are challenged by the amount of data flowing through the network, according to the service’s cyber director in the Army’s G-3/5/7 branch
Design and Innovation
Security experts divided on ethics of Facebook's password purchases (CSO) Last week, Facebook CSO Alex Stamos told conference attendees in Lisbon that the company buys stolen passwords on the black market
Human drivers will bully robot cars, says CEO of Mercedes-Benz USA (Los Angeles Times) Dietmar Exler, chief executive of Mercedes-Benz USA, is often asked why it's taking so long to develop self-driving cars
Former Cisco Systems executive warns auto industry about narrow thinking (Los Angeles Times) Over decades at Motorola and Cisco Systems, Padmasree Warrior saw how mobile phones and networking equipment became more powerful and feature-rich through software advances
Cyber security will ‘forever be a moving target’ (Automotive World) The threat of hacking may always be present in the automotive industry, writes Michael Nash
Business needs AI defence against AI attacks, says Darktrace (Computer Weekly) Cyber attackers are turning to machine learning to create smarter attacks and defenders will require similar technology to detect them, warns Darktrace
Here's how quantum cryptography will make online shopping truly secure (TechCrunch) Data security has become a chief concern for retailers and banks that need to protect their customers against the growing threat of cybercrime, the costs of which hurt businesses to the tune of $400 billion each year
Legislation, Policy, and Regulation
'Snoopers’ Charter' Set To Become Law In UK (Dark Reading) Surveillance bill goes through British Parliament and awaits only the Royal assent to become law before the year ends
Snoopers’ Charter Passes Lords Test (Infosecurity Magazine) The House of Lords has passed the controversial Investigatory Powers Bill or Snoopers’ Charter and very soon the legislation will enshrine in law for the first time the mass surveillance of the populace by the security services
The US–China Cybersecurity Disconnect (Modern War Institute) The relationship between China and cybersecurity is difficult to unpack, mainly because it does not fit traditional interpretations of how a state regulates operations in other, non-cyber domains. Beijing is the subject of significant criticism about cyber threats that originate within China. The United States government has struggled to respond to China’s cybersecurity posture, but the disconnect between the United States and China is exacerbated by two significant differences
America’s Top Spy Talks Snowden Leaks and Our Ominous Future (Wired) Public appearances don’t come easily to James Clapper, the United States director of national intelligence
Hacked by a teenager or foreign spy? FireEye CEO urges governments to attribute state cyber attacks (Computer Business Review) If governments know a state actor is responsible, FireEye CEO Kevin Mandia believes that they should say so
Big Change Coming to Government Hacking Powers (Digital Guardian) In two weeks, the federal government will gain significant new authority to perform remote searches of devices anywhere in the country, with a single warrant. The new power will go into effect on Dec. 1, and though Congress has the ability to prevent that from happening, it’s looking less and less likely that they will
Trump Cyber Security Team and Policy Slow to Take Shape (Fortune) The U.S. could become more vulnerable to threats
FCC abides by GOP request, deletes everything from meeting agenda (Ars Technica) FCC chair takes all rulemakings off agenda one day after GOP lawmakers' request
DIUx Should Continue Reporting to Pentagon Chief in Trump Administration, Director Says (Federal Times) Over the last year, the Defense Innovation Unit Experimental (DIUx) office has been at the core of Secretary of Defense Ash Carter’s push for greater innovation inside the Pentagon — so much so that Carter has the unit reporting directly to his office to bypass the typical department bureaucracy and ensure its success
Cybercom Commander: Public-Private Partnerships Needed for Cybersecurity (DoD News) The public-private cybersecurity partnership between private companies and U.S. Cyber Command and other federal agencies has been uneven so far despite some fledgling success, but collaboration is critical given growing threats to everyone from cyberspace, the commander of U.S. Cyber Command said here yesterday
Are data sets the new critical infrastructure? (Federal Times) Philip Quade of the National Security Agency's Cyber Task Force discusses what information should be protected by the Department of Homeland Security as a critical infrastructure
Army's cyber electromagnetic cells highlight need to get operational policy right (Federal Times) The Army stood up cyber electromagnetic activity cells that can — by way of challenging capabilities integration work — operate effectively at the tactical level, the cyber director in the Army’s G-3/5/7 division said. Among the key challenges, however, is working through some of the bureaucratic hurdles
Army Cyber to break ground on Fort Gordon headquarters (US Army) In a ceremony to be held here Nov. 29, Secretary of the Army Eric Fanning will join Army Cyber Command and Second Army commander Lt. Gen. Paul M. Nakasone to break ground on construction for a new Army Cyber headquarters facility that will draw together the Army's Cyber operations, capability development, training, and education in one location
Litigation, Investigation, and Law Enforcement
Regulator talks to telcos after Aussies' info found for sale online (CSO) Fairfax Media had reported the data was up for sale by an Indian security firm
ISPs ordered to block LinkedIn in Russia (CSO) Russia's telecommunications regulator has ordered LinkedIn be blocked following a court ruling that it breached Russian privacy law
Antivirus Vendors Are Watching Kaspersky, Microsoft Battle Closely (CRN) As Moscow-based Kaspersky Lab looks to take on Microsoft for alleged antitrust violations, some other antivirus vendors say they are watching the situation closely to see if they also need to step in
Court Ruling in Palantir-Army Clash Leaves Much In Question (Defense News) The US Court of Federal Claim’s 104-page opinion in the Palantir lawsuit against the US Army sends the service back to do a more thorough analysis of commercially available options for its intelligence analysis framework, but it does not define exactly how the Army should conduct the analysis or what would be considered a satisfactory level of market research
Facebook and WhatsApp - Part II (Wapack Labs) In the United Kingdom, Facebook is once again being prevented from sharing data with their subsidiary WhatsApp
For a complete running list of events, please visit the Event Tracker.
Versus16 (San Francisco, California, USA, Nov 17, 2016) Versus is not an ordinary event. Versus is not about pitching products or preaching to the choir. Versus is about challenging what you think you know about cybersecurity, about technology, about doing business in the digital age.
Israel HLS and Cyber 2016 (Tel Aviv, Israel, Nov 14 - 17, 2016) Where physical and cyber security meet. Topics include intelligence, cyber crime, and counter-terrorism, defending critical infrastructures, a smart global world, mass events--the integrative approach, and emergency readiness.
SANS Healthcare CyberSecurity Summit & Training 2016 (Houston, Texas, USA, Nov 14 - 21, 2016) SANS will be hosting its 4th Annual Healthcare Cybersecurity Summit. Join us and hear top security experts from leading healthcare companies discuss proven approaches for securing and succeeding in the new healthcare environment. You'll have the opportunity to meet with leaders from top organizations and see what really works in securing healthcare. As we know, healthcare has been undergoing major changes. Patients are demanding more convenient and personalized care. Digital health is changing the way that doctors and patients interact. New technologies allow patients to track their own health and generate data that was previously not available to care providers. Additionally, health information exchanges are being created to enable access to electronic medical records across disparate organizations. The Healthcare CyberSecurity Summit will take aim at the major challenges organizations face as they balance the security, compliance, and innovation required to thrive in this quickly changing market
Versus 16 (San Francisco, California, USA, Nov 17, 2016) Versus is not an ordinary event. Versus is not about pitching products or preaching to the choir. Versus is about challenging what you think you know about cybersecurity, about technology, about doing business in the digital age
Focusing On The Future: Prioritizing Security in the Digital Economy (Washington, DC, USA, Nov 18, 2016) In today's digital economy, developing and prioritizing a cyber strategy is critical to address diverse and evolving threats, foster trust in the technology we use, and define a path forward where security is seen as a business enabler. Join The Chertoff Group for a premier post-election cyber conference that will convene thought leaders across government and industry to share their unique points of view and insights with regard to critical policy, technology, and risk management issues that will be shaping the security agenda.
Data Breach & Fraud Prevention Summit Asia (Mumbai, India, Jun 8, 2016) ISMG’s Data Breach & Fraud Prevention Summit Asia – Mumbai is a one-day event that will focus on the latest fraud techniques and technologies, as well as a holistic, strategic approach to looking at the data breach threat that impacts all industries. Whether you are forming opinions on how to view the recent global Apple Vs. FBI debate, want to learn more about the breach incidents, or just look forward to networking with your peers on cybersecurity challenges, we are confident you will gain tremendous insight throughout the event. CyberWire readers can use the discount promo code "CW20" when registering with firstname.lastname@example.org to receive 20% off the conference price.
SCSC Cyber Security Conclave 2.0 Conference and Exhibition (Hyderabad, India, Nov 22 - 23, 2016) India’s leading two-day cyber security event is returning in November 2016, once again bringing together over hundreds of cyber security experts, senior officials and policy-makers from across the public and private sector to provide an update on cyber security instances, share best practice strategies, and help India to combat cyber threats.
4th Ethiopia Banking & ICT Summit (Addis Ababa, Ethiopia, Nov 25, 2016) The 4th Ethiopia Banking & ICT Summit is the ONLY event in Horn of Africa that focuses on technology innovations and trends in the Banking and ICT sectors. This annual summit brings together Financial Institutions, Information Technology Vendors, high profile CIOs, CISOs, CTOs Risk and Compliance Officers and COOs to explore how they can utilize the newest technologies to further increase mobility, enhance security, support new products and services, and improve customers’ experience to secure their competitive edge.
Insider Threat Program Development Training For NISPOM CC 2 (Aberdeen, Maryland, USA, Aug 10 - 11, 2016) Insider Threat Defense will hold a two-day training class on Insider Threat Program Development (National Insider Threat Policy-NISPOM Conforming Change 2). For a limited time the training is being offered at a discounted rate of $795 (normally $1395). The training is comprehensive and provides students with the knowledge and resources to develop and implement a robust Insider Threat Program. Insider Threat Defense has trained over one hundred fifty organizations and has become the "go-to company" for Insider Threat Program Development Training.
Internet of Things (IoT) (Elkridge, Maryland, USA, Nov 29, 2016) This cybergamut Technical Tuesday features Dr. Susan Cole, currently the Cybersecurity Lead for a Federal Information Systems Controls Audit Management (FISCAM) preparation team and also provides consulting support to small companies. The Internet of Things (IoT) is becoming more embedded in everyday life, often without people being aware. This talk centers on defining what IoT really is, discussing why it has exploded exponentially, and identifying challenges to future implementation of IoT, including security challenges.
CIFI Security Summit (Toronto, Ontario, Canada, Nov 30 - Dec 1, 2016) The Annual CIFI Security Summit takes place all over the world, Asia, Europe, Australia & North America. These summits are essential 2 day conferences and exhibitions bringing together leading security experts from around the globe to discuss Cyber Intelligence, Digital forensics, Cyber Security and Cyber Investigations. This is the only event of its kind that will run 4 simultaneous streams over 2 days in addition to case studies, demonstrations from global business leaders and a 30+ Exhibition.
AlienVault USM Webcast (Online, Dec 1, 2016) Host-based intrusion detection systems (HIDS), work by monitoring activity that is occurring internally on a host. HIDS look for unusual or nefarious activity by examining logs created by the operating system, looking for changes made to key system files, tracking installed software, and sometimes examining the network connections a host makes. AlienVault USM integrates HIDS with other key security controls to help you get the most out of host-based monitoring.
Cyber Threats Master Class (Turin, Italy, Dec 1 - 2, 2016) The UNICRI Masterclass on Cyber Threats aims to provide media and public relations professionals, as well as those planning a career in public information and communication, with a deeper understanding of new security threats to states and citizens. The focus of the course is on cyber threats, internet governance and the role of media. Application deadline is October 2, 2016.
Disrupt London (London, England, UK, Dec 3 - 6, 2016) TechCrunch Disrupt is the world’s leading authority in debuting revolutionary startups, introducing game-changing technologies, and discussing what’s top of mind for the tech industry’s key innovators. Disrupt gathers the best and brightest entrepreneurs, investors, hackers, and tech fans for on-stage interviews, the Startup Battlefield competition, a 24-hour Hackathon, Startup Alley, Hardware Alley, and After Parties.
US Department of Commerce Cyber Security Trade Mission to Turkey ( Ankara and Istanbul, Turkey, Dec 5 - 8, 2016) Now is the time to expand in Turkey! The growth and frequency of cyber-attacks in recent years has increased the demand to protect critical data and infrastructure of governments and businesses. Turkey is increasing resources in the public and private sectors to tackle these complex cyber threats. Apply now for this mission. Recruitment for the mission will begin immediately and conclude no later than September 16, 2016. The U.S. Department of Commerce will review applications and make selection decisions on a rolling basis beginning May 2, 2016 until the maximum of 20 participants is selected. Applications received after September 16, 2016 will be considered only if space and scheduling constraints permit.
NCCoE Speaker Series: Understanding, Detecting & Mitigating Insider Threats (Rockville, Maryland, USA, Dec 6, 2016) Insider threats are growing at an alarming rate, with medium-to-large company losses averaging over $4 million every year. Smaller businesses are at risk too, and it is estimated that in 2014, over half of all cyber attacks targeted companies with less than 1,000 employees. The majority of these breaches are caused accidentally by internal employees or contractors, which means that, whether their intent is malicious or not, people represent the greatest risk to a company's cyber security. Join us for the December 6th NCCoE Speaker Series and learn from the leading experts, including Mitre's Principal Behavioral Psychologist Dr. Deanna Caputo, how you can keep your business safe from these costly and preventable breaches.
Weaponizing Data Science for Social Engineering: Automated E2E Spear Phishing on Twitter (Elkridge, Maryland, USA, Dec 6, 2016) This cybergamut Technical Tuesday features ZeroFox data scientist John Seymour, who will present a recurrent neural network that learns to tweet phishing posts targeting specific users. Historically, machine learning for information security has prioritized defense: think intrusion detection systems, malware classification and botnet traffic identification. Offense can benefit from data just as well. Social networks, especially Twitter with its access to extensive personal data, bot-friendly API, colloquial syntax and prevalence of shortened links, are the perfect venues for spreading machine-generated malicious content.
Practical Privacy Series 2016 (Washingto, DC, USA, Dec 7 - 8, 2016) This year, the Practical Privacy Series will return to Washington, DC, with its rapid, intensive education that arms you with the knowledge you need to excel on the job. We’re programming some stunningly good sessions right now—we can’t wait to share them with you!
CISO Southern Cal (Los Angeles, California, USA, Dec 8, 2016) A data breach is not only a PR nightmare, but cause for customers to turn to competitors, exposing sensitive company information and racking up fines from industry regulators. In order for organizations to operate smoothly, CISOs and IT security executives need to be ahead of the hackers, and kept abreast of the latest IT security topics and trends. The CISO Summit brings together C-level IT security executives, industry analysts and solution providers to discuss challenges and best practices in a relaxed, yet focused business setting. Agenda sessions include panel discussions, think tanks, analyst Q&A sessions and much more
SANS Cyber Defense Initiative 2016 (Washington, DC, USA , Dec 10 - 17, 2016) Make plans to attend SANS Cyber Defense Initiative 2016 (CDI). SANS is the one educational organization known for developing the cybersecurity skills most in need right now. SANS Cyber Defense Initiative 2016 will feature courses in IT security, security management, IT audit, penetration testing, and computer forensics, including short courses that can be taken with a long course to enhance your training. Every course, evening talk, and special event is designed to equip you with cutting-edge knowledge and skills required to combat today's cyber criminals. SANS events offer you a unique opportunity to learn from the best cybersecurity teachers in the country. At SANS events you get the kind of hands-on, immersion training that you can put to work immediately
Privacy, Security and Trust: 14th Annual Conference (Auckland, New Zealand, Dec 12 - 14, 2016) This year’s international conference focuses on the three themes of Privacy, Security and Trust. It will provide a forum for global researchers to unveil their latest work in these areas and to show how this research can be used to enable innovation. The main aims of the conference are: To highlight the innovative research happening globally with three main themes: Privacy, Security and Trust. Academics from across the globe will come together to discuss solutions related to PST risks and to showcase the research methods that are able to minimise future cybercrime issues. To foster new ideas and conversation in order to reduce the amount of PST issues globally and to create enduring change in the behaviour and attitudes towards PST. To draw together PST practitioners, researchers, and government to showcase the latest PST research outputs and initiatives. We envisage that industry participants will implement the PST initiatives that are discussed and showcased at the conference into their practice.