Tracking Shamoon 2. Charger ransomware detected and ejected from Google Play. RATs evolve. Is there a database vigilante out there? Cisco patches WebEx Chrome Plug-in. M&A updates.
Saudi Arabia is concerned about the latest rounds of Shamoon 2, which this week are disclosed to have hit chemical industry targets as well as the Labor Ministry. These incidents indicate a shift in Shamoon 2's target set: the November attacks involving the malware most prominently focused on aviation operations.
Check Point warns of "Charger," a newly discovered ransomware strain found in the EnergyRescue app in the Google Play Store. Google's Android security team has managed to interdict the malware before it reached the point of mass infection. In the case of Charger, the extortionists' threat is release, sale, or other abuse of stolen data, mostly contacts and SMS messages. "All your data is already stored on our servers!" crow the hoods, who demand $180 in protection money. The malware was available for about four days before being taken down; the incident moves Ars Technica to skepticism about the effectiveness of Play Store security scans.
zScaler and Malwarebytes are warning that two newly evolved remote access Trojans (RATs) are circulating in the wild. zScaler reports that SpyNote is flying the false flag of a Netflix app. Malwarebytes says that the well-known AndroRAT has become more stable, added new functionality, and increased its obfuscation.
It seems a "vigilante" (as Motherboard characterizes the actor) is finding poorly secured databases and inserting an empty folder into them to warn admins.
Cisco is patching its WebEx Chrome Plug-in. Users are advised to update.
In industry news, RiskIQ buys Maccabim; Verizon says nothing about Yahoo!
Today's issue includes events affecting Australia, Ecuador, Estonia, Russia, Saudi Arabia, Sweden, United Kingdom, and United States.
In today's CyberWire podcast we hear from our partners at Lancaster University, as Awais Rashid describes how Internet-of-things vulnerabilities affect healthcare. Our guest is Michael Lipinski from Securonix on claims that the Anthem data breach was the work of a nation-state (he's skeptical).
A special edition of our Podcast is still up and available. It covers buying cyber security. Every day there seems to be a new security product on the market, with many of them claiming to provide something that you simply can’t live without. Companies appear and disappear, and businesses are faced with difficult, confusing, and often expensive choices. In this CyberWire special edition, we explore how businesses are navigating the process of choosing products and technologies in a crowded marketplace. We talk to some key stakeholders to find out what drives their purchasing decisions, and what they wished their vendors knew before they came knocking on their doors.
Cyber Attacks, Threats, and Vulnerabilities
Saudi Arabia just got hit with another cyber attack (StepFeed) It's the second cyberattack in three months
Saudi Arabia warns over cyber attacks as labor ministry hit - Saudi Gazette (Saudi Gazette) Saudi Arabia warned organizations in the Kingdom on Monday to be on the alert for cyber attacks including a version of the destructive Shamoon virus, as a chemicals firm reported a network disruption and the Ministry of Labor and Social Development said it had been attacked. An alert from the telecoms authority advised
Charger mobile ransomware steals contacts and SMS messages (Help Net Security) Charger mobile ransomware locks the device and displays a message demanding payment. The ransom demand is for 0.2 Bitcoins or roughly $180.
Ransomware app hosted in Google Play infects unsuspecting Android user (Ars Technica) "ALL YOUR DATA IS ALREADY STORED ON OUR SERVERS!" malicious app warned.
Smartphone Ransomware Is a Looming Threat (Consumer Reports) Smartphone ransomware attacks are spreading, Consumer Reports notes, and researchers say they've found malware called Charger in a Google Play Store app.
Severe vulnerability in Cisco's WebEx extension for Chrome leaves PCs open to easy attack (CSO Online) If you have the Cisco WebEx Chrome browser extension installed make sure you're running the latest version.
SpyNote RAT posing as Netflix app (Cloud Security Solutions | Zscaler) As users have become more attached to their mobile devices, they want everything on those devices. There’s an app for just about any facet of one’s personal and professional life, from booking travel and managing projects, to buying groceries and binge-watching the latest Netflix series.
Mobile Menace Monday: AndroRAT Evolved (Malwarebytes Labs) An increasing amount of mobile malware known as Android/Trojan.AndroRAT has been seen in the wild lately. AndroRAT is a contraction of Android and RAT (Remote Access Trojan)
Graftor Variant Leveraging Signed Microsoft Executable (Cylance) DLL hijacking is not a new technique by any means, but that makes it no less effective. The Cylance Threat Guidance team investigates how malware leverages this technique.
Android Pattern Lock ‘can be cracked in five attempts’ – here’s what to do (Naked Security) Wait, what? Android’s Pattern Lock can be easily cracked? Here’s some advice to help you secure your phone
Data Fragmentation Foments Big Security Gaps (Infosecurity Magazine) 76% of data security pros believe in the maturity of their data security strategy, but 93% report persistent technical challenges.
Malicious SVG Files in the Wild (SANS Internet Storm Center) In November 2016, the Facebook messenger application was used to deliver malicious SVG files to people . SVG files (or "Scalable Vector Graphics") are vector images that can be displayed in most modern browsers (natively or via a specific plugin).
Researcher Finds Hidden Twitter ‘Star Wars’ Bot (Infosecurity Magazine) Researcher Finds Hidden Twitter ‘Star Wars’ Bot. Massive network of fake accounts linked to a single entity
Bad Bots Up Their Human Impersonation Game (Dark Reading) Every third website visitor was an attack bot in 2016, and humans represent just under half of all Internet traffic, new Imperva data sample shows.
A Vigilante Is Warning Admins of Open Databases Before They Get Hacked (Motherboard) Maybe this is the hero we need right now.
That online job candidate may be carrying a virus (CSO Online) LinkedIn and other social networks are becoming targets for threat actors since they know it's a great way to bypass company's defenses, according to cybersecurity firm Cylance. LinkedIn is typically a site that is not blocked by network filters to allow HR departments the freedom to communicate with prospective job candidates.
Hacker Selling 1 Billion user accounts stolen from Chinese Internet Giants (HackRead) A Dark Web marketplace is where you can buy anything from illegal drugs to weapons and several other products including digital goods. In a recent listing,
Clash of Clans Maker Hacked (Infosecurity Magazine) A vulnerability in the software it uses to run its forums allowed hackers to access forum user information.
St. Louis Public Library Recovers from Ransomware Attack (Threatpost | The first stop for security news) Services are being restored to the St. Louis Public Library computer system after a ransomware attack impacted access to machines and data at all 17 branches.
Even Cybercriminals Get Spammed (Motherboard) Including Russian-speaking crooks.
Security Patches, Mitigations, and Software Updates
Cisco Patches Critical Flaw in WebEx Chrome Plugin (Threatpost | The first stop for security news) Cisco has fixed a vulnerability in its WebEx extension for Chrome that allowed for remote code execution on computers running the plugin.
Majority of Organizations are in the Dark Regarding Daily Network Attacks, According to New Global Research from DomainTools (PRNewswire) DomainTools, the leader in domain name and DNS-based cyber threat...
Report: 111 billion lines of code will have to be secured this year - SD Times (SD Times) Report reveals the importance of application security and the increase of new software being written
Arbor: DDoS attacks growing faster in size, complexity - Cyberscoop (Cyberscoop) Arbor Networks, because it provides services to so many large internet providers, has visibility into about a third of all global internet traffic.
Bot Traffic Report 2016 (Imperva Incapsula) The annual Imperva Incapsula Bot Traffic Report, now in its fifth year, is an ongoing statistical study of the bot traffic landscape. For our latest report we examined 16.7+ billion visits to 100,000 randomly-selected domains on the Incapsula network to tackle the following questions
All-Time High of 1,093 Data Breaches Reported in U.S. in 2016 (eSecurity Planet) The number represents a 40 percent increase over the previous year, according to a recent report.
2016 Year End Data Breach Quickview Report (Risk Based Security) Get your complimentary copy of Risk Based Security's Year End 2016 Data Breach Quick View. Executive summary of data breaches.
Consumers worried about privacy more than ever - Help Net Security (Help Net Security) 84% of U.S. consumers expressed concern regarding the security of their PII and 70% told IDC that their concern is greater today than just a few years ago.
Key cloud adoption trends and challenges for government entities - Help Net Security (Help Net Security) Major barriers to cloud adoption are concerns about unauthorized access, the risk of losing control over data, as well as backup and recovery.
Report: Saudis aware of online risks, but hold businesses responsible for data breaches (Arab News) Saudi consumers place responsibility for protecting their personal data firmly on organizations holding their data — and not themselves, said a report.
IoT MSSPs market revenues to top $11 billion in 2021 - Help Net Security (Help Net Security) Industrial applications are set to be the core focus for IoT MSSPs with ABI Research forecasting overall market revenues to increase fivefold in 2021.
Verizon stays mum on Yahoo as customer growth rebounds (CNET) The Yahoo deal's supposed to be the next big step in Verizon's transformation, but it's on hold as both companies assess the impact of Yahoo's data breaches.
RiskIQ Deepens Digital Threat Mitigation Capabilities with Acquisition of Maccabim (BusinessWire) Increase in brand abuse, malvertising, spear phishing, spoofing requires more automated digital threat triage, legal coordination and response
Exclusive: Keysight Technologies explores acquisition of Ixia: sources (Reuters) Keysight Technologies Inc (KEYS.N), a provider of software and equipment to the electronics and wireless communications industries, is in talks to acquire U.S. data technology company Ixia (XXIA.O), according to people familiar with the matter.
Zuckerberg Charity Acquires Artificial Intelligence Startup | NewsFactor Network (News Factor) Philanthropic organizations do not typically make acquisitions, but that is exactly what the Chan Zuckerberg Initiative (CZI) is doing with search engine startup Meta to provide free access to researchers.
Cisco to buy app management vendor AppDynamics for US$3.7 billion (CRN Australia) Supporting transition toward software-centric solutions.
SentinelOne Secures $70 Million to Meet Growing Demand to Replace Traditional Antivirus - SentinelOne (SentinelOne) Series C Round Brings Total Funding to More Than $110 Million PALO ALTO, Calif.—January 25, 2017—SentinelOne, the company transforming endpoint security by delivering real-time protection powered by machine learning and dynamic behavior analysis, today announced it has raised an additional $70 million in Series C financing. The company plans to use this new infusion of... Read more »
Secret Double Octopus Raises $6M Series A (eSecurity Planet) Multi-factor security firm gets new financial backing as it takes aim at growing share in the authentication market.
This Cyber Security Play Should Be In Your Portfolio (Seeking Alpha) Check Point delivers the best ROIC in the cyber security landscape. Growth has rejuvenated due to a ramp up in sales efficiency. The cloud and advanced security
Check Point’s money machine: each revenue dollar converted to 50 cents of profit - Business (Haaretz) The Israeli company has stayed atop the international cybersecurity market by sticking to a winning formula.
Maryland’s two largest tech groups are merging (Baltimore Business Journal) Maryland's two largest technology associations — the Tech Council of Maryland and the Chesapeake Regional Tech Council — have merged, the groups announced Tuesday evening during the Maryland Policy and Leadership Dinner in Annapolis.
State leadership tours Fort Gordon cyber facilities (Augusta Chronicle) Georgia leaders will be in Augusta on Tuesday to take a look at the developing cybersecurity missions at Fort Gordon and around the Augusta community.
Cybersecurity Veteran Ron Gula Joins Eastwind Networks Advisory Board (Yahoo! Finance) Eastwind Networks, the cybersecurity solutions and breach analytics cloud platform designed to provide visibility, forensics and incident response capabilities to enterprises, is thrilled to announce a new member to its Board of Advisors, Ron Gula.
WhiteHat Security Hires Accomplished IT Sales Leader Matthew Handler as Senior Vice President of Global Sales (JMI) WhiteHat Security, the only application security provider that combines the best of technology and human intelligence, today announced the appointment of strategic IT sales veteran Matthew Handler as the company’s Senior Vice President of Global Sales, effective immediately. Handler will oversee WhiteHat Security’s overall sales strategy and execution worldwide, as well as sales operations, solutions, and expanding the company’s strategic alliance partners and programs.
Products, Services, and Solutions
NSS Labs Releases Caws 2.2: A Cyber Threat Protection Platform Delivering Threat Discovery, Analysis And Automation (NSS Labs) NSS Labs, Inc., the global leader in operationalizing cybersecurity, today announced CAWS 2.2, a Cyber Threat Protection Platform and Cyber Threat Impact (CTI) Product to deliver comprehensive threat visibility, contextual threat analysis and security workflow automation. CAWS CTI is powered by NSS Labs’ BaitNET™ threat harness with over 40% unique threats and live exploits discovered in the wild, to deliver real-time, 24x7 threat discovery and analysis, with one-of-a-kind capture, harvest and replay technology.
NSFOCUS Introduces Comprehensive Web Application Security Solution (Yahoo! Finance) Complex attacks on web-based applications are on the rise, accounting for approximately 40 percent of all data breaches in 2016. To combat this growing threat, NSFOCUS, an intelligent hybrid security solutions provider, today introduced its Web Application Security solution – to ensure enterprises are
Cryptzone Named to CIOReview Magazine’s 20 Most Promising AWS Solution Providers (Cryptzone) AppGate, a Software-Defined Perimeter purpose-built for the AWS environment, earns accolade.
ThreatQuotient and Vandis Partner to Customize Threat Intelligence for Accelerated Detection and Response (Yahoo! Finance) ThreatQuotient™, a trusted threat intelligence platform innovator, today announced a strategic partnership with Vandis to better serve the threat operations and management needs of their shared customers.
Infoblox Launches ActiveTrust® Cloud to Extend Protection for Remote Workers and Branch Offices (Yahoo! Finance) Infoblox Inc., the network control company that provides Actionable Network Intelligence, today announced the global availability of Infoblox ActiveTrust ® Cloud. Delivered ...
New Akamai Tool Can Secure Remote Devices (Meritalk) Akamai released a tool on Jan. 24 that government agencies can use to secure their telecommuting employees’ devices.
Swimlane Integrates Its Automated Security Platform with HPE Security Arcsight ESM (Yahoo! Finance) Swimlane, a leader in automated incident response and security orchestration, announced today an integration with HPE Security Arcsight Enterprise Security Manager (ESM), HPE's comprehensive security information and event management solution that identifies
Google Home builds out its ecosystem with Honeywell and Belkin WeMo support (TechCrunch) Google was a bit late to the connected home party. The company’s Echo competitor Home officially launched in November of last year, and slowly but surely,..
Morphisec SIEM Integration substantially increases efficacy of security operations (Yahoo! Finance) Morphisec, leading developer of Moving Target Defense (MTD) cybersecurity products, today announces integration with leading security incident and event ...
EdgeWave Boosts Security Capabilities and Granular Policy Management for its Industry Recognized iPrism Secure Web Gateway Solution (Marketwired) EdgeWave, Inc.® (www.edgewave.com), a cybersecurity firm based in La Jolla, California, announced today the release of EdgeWave iPrism™ Secure Web Gateway 8.1. This release is focused on delivering enhanced security and deeper, more granular policy control and management for enterprises
‘ShareSafe,’ From Logikcull, Arms Businesses in Critical Fight Against Data Breach and Cybercrime (BusinessWire) In a move that will go far in strengthening organizations’ ability to protect sensitive data from the rising tides of data breach and cybercrime, Logikcull, the leading provider of cloud-based Legal Intelligence solutions, has introduced an instant-sharing feature that provides critical safeguards around the most vulnerable business information.
Thycotic Releases Secret Server v10.1 (PRNewswire) Thycotic, a provider of privileged account management (PAM) and endpoint...
DuckDuckGo Search Engine Hits a Milestone with 14 Million Searches a Day (HackRead) DuckDuckGo is an Internet search engine which has been experiencing phenomenal growth culminating in the company hitting a milestone of 14 million searches
World’s most popular email server praised as ‘near-impenetrable’ (Naked Security) Exhaustive audit by external experts found only three minor flaws
Monero, the Drug Dealer’s Cryptocurrency of Choice, Is on Fire (WIRED) As the black market caught on to its anonymity properties, Monero became the fastest growing cryptocurrency of 2016.
Technologies, Techniques, and Standards
The Trouble With DMARC: 4 Serious Stumbling Blocks (Dark Reading) Popularity for the Domain-based Message Authentication, Reporting and Conformance email authentication standard is growing. So why are enterprises still struggling to implement it?
As attacks rise, we ask: how secure is your Hadoop installation? (Naked Security) As database break-ins spread, we offer some advice for checking on your installations
Can equipping your security team reduce the impact of a breach? (Infosecurity Magazine) After a year of breaches, Can equipping your security team reduce the impact?
What your security scientists can learn from your data scientists to improve cybersecurity (TechCrunch) Security remains one of the top unresolved challenges for businesses. Billions of dollars have been spent on security technology over the last 30 years, yet..
Four lesser-known WiFi security threats and how to defend against them (CSO Online) You’ve hardened your network against all the common weaknesses, now we’ll show you how to take your wireless security to the next level.
Design and Innovation
When is a blockchain not a blockchain? (Naked Security) Financial services businesses have taken the original blockchain concept in a new direction – so why are the purists so upset about Accenture’s approach?
Research and Development
US Intelligence seeks a universal translator for text search in any language (Ars Technica) MATERIAL program seeks help for analysts searching “low resource” languages.
Bitglass Awarded Patent for Agentless Mobile Security (Yahoo! Finance) Bitglass, the total data protection company, today announced it has been awarded a patent for agentless secure app access and selective wipe of corporate data on any device. The technology, covered by ...
Vencore supporting DARPA with jam-resistant networks (C4ISRNET) Vencore has been awarded a DARPA prime contract to develop jam-resistant networks.
Leidos to Sponsor Air Force Association’s Cyber Education Program; Chuck Heflebower Comments - GovCon Executive (GovCon Executive) Leidos will continue to sponsor the Air Force Association's cyber education program for the eighth consecutive year
Legislation, Policy, and Regulation
Cyberconscripts: Baltic draftees can choose IT over infantry (Bismarck Tribune) The tiny Baltic nation of Estonia is experimenting with the idea of cyberconscription, a move that gives draftees with tech skills the chance to work shoring
Trump and the Intelligence Community Deserve a Do-Over (The National Interest) How the new administration can recover from damage done during the 2016 election.
Need to Reorganize US Spy Agencies (Consortium News) On President Trump’s first full day in office, he went to the CIA and promised to back the nation’s spy agencies, but his time would be better spent downsizing the sprawling intelligence community, says Ivan Eland.
Digital Rights Activists Hail Trump’s Death Blow Against TPP (WIRED) But they worry about what future deals will mean for privacy and access.
Comcast, AT&T, and ISP lobbyists are excited about Trump’s FCC chair (Ars Technica) Ajit Pai repeatedly sided with ISPs on FCC rules, will be "formidable opponent."
Net Neutrality Advocates Blast Trump’s New FCC Boss Ajit Pai (Motherboard) Open internet activists fear Pai will reverse crucial free speech protections.
James Comey will reportedly stay on as FBI director in Trump's administration (Business Insider) President Donald Trump has reportedly asked James Comey to stay on as FBI director in his administration.
AG Nominee Backs Law Enforcement’s Ability to ‘Overcome’ Encryption (Threatpost | The first stop for security news) President Trump’s attorney general pick Jeff Sessions says law enforcement should be able to “overcome” encryption in criminal investigations.
CYBERCOM's new buying power now closer to reality (FederalNewsRadio.com) CYBERCOM is in the midst of creating its own acquisition office to handle its new spending authority.
Air Force CISO: Adversaries are watching you (C4ISRNET) Peter Kim, Air Force CISO, warned that adversaries are constantly monitoring public and private activity.
Integrating Cyber a Top Priority, Says Vice Adm. Michael Gilday (Fifth Domain) Since taking the helm of U.S. 10th Fleet Cyber Command in July, Vice Adm. Michael Gilday has worked to maximize his experience as a surface warfare officer and the former director of operations/J-3 at U.S. Cyber Command, among other past assignments.
Cyber Training Battalion Opens New Company in Oklahoma (Fifth Domain) A new Cyber Training Battalion company, Charlie, has been activated at Fort Sill in Lawton, Oklahoma, according to an article in The Lawton Constitution tweeted by the Army Cyber Command and Second Army.
Hiring freeze result of Trump team's review of federal agencies (FederalNewsRadio.com) President Donald Trump signed an executive order Monday implementing a federal hiring freeze.
OMB nominee Mulvaney open to expanding hiring freeze to contractors (FederalNewsRadio.com) Rep. Mick Mulvaney (R-S.C.) offered his first insights into his management ideas during nomination hearings to be the next director of OMB.
Worry more about attrition, not the 90-day hiring freeze, human capital experts say (FederalNewsRadio.com) HR experts say President Trump's hiring freeze leaves plenty of room for interpretation, and that attrition should worry agencies more than a 90-day freeze.
Litigation, Investigation, and Law Enforcement
ATO chooses PwC to investigate 2016's HPE storage failure (CRN Australia) Caused by HPE 3PAR failure.
UK courts experiencing surge in cyber-crime case load (Register) Value of fraud surpasses £1bn for first time in five years
Court denies US government appeal in Microsoft overseas email case (CSO Online) A U.S. appeals court will not reconsider its groundbreaking decision denying Department of Justice efforts to force Microsoft to turn over customer emails stored outside the country.
Court ruling stands: US has no right to seize data from world’s servers (Ars Technica) Outcome means hot-button privacy topic could reach US Supreme Court.
Decision looms on Assange extradition to Sweden (Fox News) Swedish authorities are getting closer to either indicting WikiLeaks founder Julian Assange for rape stemming from an incident in August 2010 or letting it drop, Fox News has learned.
Police in Indianapolis Have Had Stingray Cell Site Simulators Since 2012 (Motherboard) Previously unreported, the IMPD has had a StingRay since 2012, ascertained from their Non Disclosure Agreement with the FBI.
Ex-Goldman Sachs programmer found guilty, again, of source code theft (Ars Technica) Court: It's silly to let Sergey Aleynikov go free just because he stole digital files.
For a complete running list of events, please visit the Event Tracker.
Newly Noted Events
Risky Business (London, England, UK, Feb 23, 2017) How are you tackling Cyber Crime in the Property Transaction? Join our panel of expert speakers at the IET in London to find out more about cyber crime in the property transaction and the steps you can take to protect the best interests of your firm and your client.
2017 Community College Cyber Summit (C3S) (National Harbor, Maryland, USA, Jun 28 - 30, 2017) 3CS is the only national academic conference focused on cybersecurity education at community colleges. Four tracks are available for college faculty and administrators, IT faculty who are involved or who would like to become involved in cybersecurity education, non-IT faculty in critical infrastructure fields who are interested in incorporating cybersecurity topics into their curricula, decision makers in positions that influence cybersecurity education programs, and community college students interested in learning about security or expanding their current knowledge.
SANS Cyber Threat Intelligence Summit & Training 2017 (Arlington, Virginia, USA, Jan 25 - Feb 1, 2017) Join SANS at this innovative Summit as we focus on enabling organizations to build effective cyber threat intelligence analysis capabilities. Most organizations are familiar with threat intelligence, but have no real concept of how to create and produce proper intelligence. The 2017 Summit will focus on specific analysis techniques and capabilities that can be used to properly create and maintain Cyber Threat Intelligence in your organization. Attend this summit to learn and discuss directly with the experts who are doing the CTI analysis in their organizations. What you learn will help you detect and respond to all ranges of adversaries including some of the most sophisticated threats targeting your networks
Blockchain Protocol and Security Engineering (Stanford, California, USA, Jan 26 - 27, 2017) This conference will explore the use of formal methods, empirical analysis, and risk modeling to better understand security and systemic risk in blockchain protocols. The conference aims to foster multidisciplinary collaboration among practitioners and researchers in blockchain protocols, distributed systems, cryptography, computer security, and risk management.
CyberTech (Tel Aviv, Israel, Jan 30 - 31, 2017) Cybertech is the most significant conference and exhibition of cyber technologies outside of the United States. Cybertech provides attendees with a unique and special opportunity to get acquainted with the latest innovations and solutions featured by the international cyber community. The conference's main focuses are on networking, strengthening alliances and forming new connections. Cybertech also provides an incredible platform for Business to Business interaction.
Enigma (Oakland, CA, USA, Jan 30 - Feb 1, 2017) Join a diverse mix of experts and enthusiasts from industry, academia, and government for three days of presentations and open sharing of ideas. Our focus is on current and emerging threats and defenses in the growing intersection of society and technology. Our goal is to foster an intelligent and informed conversation with the community and with the world, including a wide variety of perspectives, backgrounds, and experiences.
National Credit Union - Information Sharing & Analysis Organization - 2017 Tech Conference (Cape Canaveral, Florida, USA, Jan 31 - Feb 2, 2017) Join us for three days of Cyber Security topics that are pertinent to Credit Union cyber resilience, real-time security situational awareness information sharing, and coordinated response in the global credit union community! Protecting the Credit Union’s global infrastructure to sustain cyber resilience requires an unprecedented level of public- and private-sector cooperation, collaboration and coordination and includes access to the real-time availability of proactive “actionable” threat intelligence; analysis of potential impacts; coordinated countermeasure solutions and response; cybersecurity best practice adoption and role-based workforce education.
Southern Virginia - Cyber Security Lunch & Learn (Norfolk, Virginia, USA, Feb 2, 2017) Cyber security experts discuss security incident response. Dealing with cyber security risk is an exercise in managing daily chaos. Organizations know they need to improve their posture but common roadblocks often get in the way. Join us for lunch and an action-oriented discussion about ways you can improve your security incident response program in 2017. The conversation will be led by certified SANS instructor Alissa Torres, and Rsam CISO Bryan Timmerman. Attend and earn CPE credits towards your ISACA and (ISC)2 certifications.
Insider Threat Program Development Training For NISPOM CC 2 (Toms River, NJ, USA, Feb 6 - 7, 2017) Insider Threat Defense announced it will hold a 2 day training class on Insider Threat Program Development (NISPOM Conforming Change 2) on Feb. 6-7, 2017, in Toms River, NJ. For a limited time the training is being offered at a discounted rate of $795 (Normally $1395). The training is comprehensive and provides students with the knowledge and resources to develop, implement and manage a robust Insider Threat Program / Working Group. Insider Threat Defense has trained over 500+ organizations and has become the "Leader-Go To Company" for Insider Threat Program Development Training.
The Risks and Benefits of Artificial Intelligence and Robotics (Cambridge, England, UK, Feb 6 - 7, 2017) The Risks and Benefits of Artificial Intelligence and Robotics Workshop aims to provide media and security professionals with an in-depth understanding of the implications that the rapid advancement of AI technology may affect the global community in both the physical and structural spheres and the potential impact of the future evolution of such technology, especially in terms of security. Emphasis will be given to the way in which AI and autonomous robotics can be represented and communicated in the media.
SANS Southern California - Anaheim 2017 (Anaheim, California, USA, Feb 6 - 11, 2017) Learn practical, relevant tips and techniques from industry leaders. Join us for SANS Southern California - Anaheim 2017, and choose from eight courses on cyber defense, penetration testing, incident response, threat hunting, ethical hacking, IT management and ICS/SCADA security. Some of our courses are in alignment with DoD Directive 8570 requirements for Baseline IA Certifications, and most courses have GIAC Certification attempts available. Take advantage of this opportunity to sharpen your skills and advance your career.
Workplace Violence & Response To Active Shooter Events Meeting (Laurel, Maryland, USA, Feb 9, 2017) The National Insider Threat Special Interest Group (NITSIG) will be hosting a meeting on February 9, 2017, at the Johns Hopkins University Applied Physics Laboratory, Laurel, MD. The meeting will be exclusively focused on workplace violence and responding to an active shooter event. Presenters include experts from the Occupational Safety and Health Administration (OSHA), and the Maryland State Police. It's free to attend. Prominent among the topics to be discussed will be threats directed from the Internet.
RSA Conference 2017 (San Francisco, California, USA, Feb 13 - 17, 2017) The current state of cybersecurity means there are many opportunities for the industry as a whole to collaborate on new innovations. Discovering the next great opportunity will require everyone to embrace new and unique perspectives from a broadly diverse base of people and sources. RSA Conference 2017 provides the opportunity for all attendees at all levels to grow their knowledge, exchange ideas with peers and further their careers. With opportunity comes great responsibility for the future. Our actions today will have a lasting impact on the strength of the industry—and the safety of the world—tomorrow. At RSA Conference 2017, you will learn about new approaches to info security, discover the latest technology and interact with top security leaders and pioneers. Hands-on sessions, keynotes and informal gatherings allow you to tap into a smart, forward-thinking global community that will inspire and empower you.
Using STIX/TAXII to share automated cyber threat data (San Francisco, California, USA, Feb 15, 2017) Cybersecurity experts representing the financial sector, healthcare, utilities, software providers, government, academia and nonprofits continue to define/develop the STIX/TAXII specifications as the solid foundation for standardizing threat information. This large group of public and private sector organizations and companies are working together to advance the STIX/TAXII specifications in the OASIS Cyber Threat Intelligence Technical Committee. These specs have already dramatically streamlined the analysis of threat data. We invite cybersecurity experts and decision makers to be part of the conversation.
Insider Threat Program Development Training For NISPOM CC 2 (Simi Valley, CA, USA, Feb 22 - 23, 2017) Insider Threat Defense announced it will hold a 2 day training class on Insider Threat Program Development (NISPOM Conforming Change 2) on Feb. 22-23, 2017, in Simi Valley, CA. For a limited time the training is being offered at a discounted rate of $795 (Normally $1395). The training is comprehensive and provides students with the knowledge and resources to develop, implement and manage a robust Insider Threat Program / Working Group. Insider Threat Defense has trained over 500+ organizations and has become the "Leader-Go To Company" for Insider Threat Program Development Training.
SANS Dallas 2017 (Dallas, Texas, USA, Feb 27 - Mar 4, 2017) We are pleased to invite you to attend SANS Dallas 2017, on February 27- March 4 at The Westin Dallas Downtown, located in the heart of the city. We have selected several of our top information security courses to provide you with the training and certification that you need to boost your career by learning from the best! SANS instructors are industry professionals who will ensure that you not only learn the material, but that you will also be able to apply what you learn your first day back in the office.
Autonomous Vehicles Silicon Valley (Santa Clara, California, USA, Feb 28 - Mar 2, 2017) The road to autonomy: Regulation. Consumer Acceptance. Safety & Security. Explore the latest technologies and hottest issues for the autonomous vehicles industry.
The Cyber Security Summit: Denver (Denver, Colorado, USA, Mar 1, 2017) This event is an exclusive conference connecting Senior Level Executives responsible for protecting their companies’ critical data with innovative solution providers & renowned information security experts. Learn from cyber security thought leaders including: Mary McCord, Asst. Attorney General for National Security, U.S. Dept. of Justice & Chad Alvarado, Supervisory Special Agent, Cyber Task Force, FBI Denver Division. Engage in panel discussions focusing on trending cyber topics including Emerging Threats to IoT & Big Data, Insider Threats, and Compliance. Receive half off your admission with promo code cyberwire50 at CyberSummitUSA.com and view details including the full agenda, participating solution providers & confirmed speakers
International Cyber Risk Management Conference (ICRMC) (Toronto, Ontario, Canada, Mar 2 - 3, 2017) The third annual International Cyber Risk Management Conference (ICRMC) brings together a world class roster of experts with cross-sector, global and multidisciplinary expertise to share knowledge, lessons learned, and methodology on cyber security. We are delighted to build on last year’s very successful ICRMC. Cyber security has grown into a global pandemic and organizations of all sizes are struggling with questions on how to mitigate, manage, and transfer cyber risk. We’ve structured our agenda based on delegate feedback and our exceptional 2017 Advisory Committee is determined to provide engaging high-profile speakers and compelling content to share knowledge, captivate and educate. Visit www.icrmc.com for details.
SANS San Jose 2017 (Milpitas, California, USA, Mar 6 - 11, 2017) Securing and defending your network has never been more important as attacks and breaches make the news daily. Gain the skills and tools you need to win the battle against the wide range of cyber adversaries who want to harm your environment. SANS San Jose 2017 offers six hands-on, intensive cyber security training courses.
15th annual e-Crime & Cybersecurity Congress (London, England, UK, Mar 7 - 8, 2017) Europe's largest and most sophisticated gathering of senior cybersecurity professionals from international business, governments, law enforcement and intelligence agencies.