Shamoon third-wave post-mortems. Ransomware protection companies fighting off criminal DDoS. New ransomware strains described. Netgear patches routers. Malicious SVG files. Keysight said ready to buy Ixia. ISIS and immigration. A Shaltai-Boltai retrospective.
Shamoon post-mortems continue as affected Saudi networks mop up the infection.
Over the past week ransomware protection companies Emsisoft and Dr. Web were both hit with distributed denial-of-service attacks, apparently in retaliation for both companies' good work in offering decryption tools and other security assistance to ransomware victims. Emsisoft has told Bleeping Computer that they believe the author of MRCR is responsible for organizing the campaign.
Trend Micro is describing another ransomware campaign, which they're calling "RANSOM_NETIX.A." It's targeting Windows users who also use Netflix, and it's holding their Netflix login credentials hostage. And the Cockrell Hill, Texas, police department has also fallen victim to ransomware. In their case it's thought the infestation came through the usual spam vectors. Security firm Acronis identifies the ransomware strain as "Osiris," an evolved version of Locky. The police declined to pay, instead biting the bullet and wiping the infected server, accepting the loss of several years' worth of records.
Trustwave reports Netgear routers are susceptible to authentication bypass flaws. They disclosed their findings to Netgear, which is making security updates available.
Several researchers are reporting use of malicious SVG image files in the wild.
In industry news, Keysight's rumored acquisition of Ixia seems to be happening, with Ixia fetching $1.6 billion.
ISIS is making hay of President Trump's order restricting immigration from seven Muslim-majority countries. Its narrative suggests (1) ISIS represents Islam, and (2) Islam is the victim here.
Those following Russia's FSB shake-up may wish to revisit an old interview with Shaltai-Boltai.
Notes.
Today's issue includes events affecting Australia, Austria, India, Iran, Iraq, Libya, Pakistan, Russia, Somalia, Sudan, Syria, United States, and and Yemen.
Today's CyberWire daily podcast will feature our partners at the University of Maryland's Center for Health and Homeland Security, as Ben Yelin keeps us up-to-date on the IRS and Coinbase. And we'll have a guest from RiskIQ as well: Ian Cowger talks about the malvertising report RiskIQ released this morning.
A special edition of our Podcast will discuss how to become a smarter buyer of cyber security. Every day there seems to be a new security product on the market, with many of them claiming to provide something that you simply can’t live without. Companies appear and disappear, and businesses are faced with difficult, confusing, and often expensive choices. In this CyberWire special edition, we explore how businesses are navigating the process of choosing products and technologies in a crowded marketplace. We talk to some key stakeholders to find out what drives their purchasing decisions, and what they wished their vendors knew before they came knocking on their doors.
Cyber Attacks, Threats, and Vulnerabilities
Destructive computer virus ‘Shamoon’ hits Saudi Arabia for third time (GulfNews) The attack effected government agencies petrochemical companies and IT service providers
Emsisoft Website Hit by DDoS Attack as Company Releases Ransomware Decrypter (BleepingComputer) In the past week, two security firms, Dr.Web and Emsisoft, suffered DDoS attacks at the hands of cyber-criminals who attempted to bring down their websites as payback for meddling with their illegal activities.
What is DDoS – Distributed Denial of Service? Webopedia Definition #hosting #service (VDS) DDoS is a type of DOS attack where multiple compromised systems, which are often infected with a Trojan. are used to target a single system causing a Denial of Service (DoS) attack. Victims of a DDoS attack consist of both the end targeted system and all systems maliciously used and controlled by the hacker in the distributed attack.
Malware Capable of Paralyzing an Entire Ministry Neutralized (Panda Security Mediacenter) Last December, we saw a large-scale spam campaign that spread malware to more than ten countries, and specifically targeted a major European ministry.
Picky ransomware targets specific subset of would-be Netflix users - Help Net Security (Help Net Security) Aspiring Netflix users who don't want to actually pay for the popular video on demand service are being targeted with a new type of ransomware.
Netflix Scam Spreads Ransomware (Dark Reading) A program found on suspicious websites aims to trick Windows/PC users into creating fake Netflix logins so it can deliver ransomware.
Ransomware steals 8 years of data from Texas police department (CSO Online) Videos that were evidence to crimes are now lost. Attorneys are ready to pounce.
CVE-2017-5521: Bypassing Authentication on NETGEAR Routers (Trustwave) Home routers are the first and sometimes last line of defense for a network. Despite this fact, many manufacturers of home routers fail to properly audit their devices for security issues before releasing them to the market. As security researchers,...
Hundreds of Thousands of Netgear Routers Vulnerable to Password Bypass (Threatpost | The first stop for security news) Hundreds of thousands–potentially more than one million–Netgear routers are susceptible to a pair of vulnerabilities that can lead to password disclosure.
Dozens of Netgear products vulnerable to authentication bypass flaws (CSO Online) Simon Kenin, a security researcher at Trustwave, was – by his own admission – being lazy the day he discovered an authentication vulnerability in his Netgear router. Instead of getting up out of bed to address a connection problem, he started fuzzing the web interface and discovered a serious issue.
SVG Image Format Set for Wider Adoption in Malware Distribution (BleepingComputer) SVG has all the makings of a great malware distribution medium, and crooks are bound to migrate to this new file format, now that Google has moved to ban .js email attachments.
Many Android VPN Apps Breaking Privacy Promises (Threatpost | The first stop for security news) Academics studying 283 Android VPN apps quantified a number of problems associated with native platform support for VPN clients through the BIND_VPN_SERVICE.
Are America’s Airlines Under Cyber Attack? (NASDAQ.com) For the second time in a week, a major U.S. airline grounded its fleet after its computer systems stopped working. The latest incident involved Delta Air Lines (NYSE: DAL) , which canceled 170 flights on Sunday and another 110 on Monday because its "essential IT systems went down" over the weekend.
Details on 200,000 racing fans exposed by IndyCar (CSO Online) Chris Vickery, a security researcher for MacKeeper, recently discovered an open Rsync server hosting the personal details for at least 200,000 racing fans. The data comes from a now defunct racing forum called DownForce, which closed several years ago, leaving Vickery to question why the data was kept in the first place.
Sex club for women exposes members’ private photographs (Naked Security) Poorly configured website left photos available online – we offer tips on how to protect your privacy when you sign up to sensitive sites
The overlooked security threat in your office: printers (iTnews) Attacks can cause physical damage.
Malvertising Rises 132% in 2016 Over 2015, Says RiskIQ Research (BusinessWire) RiskIQ digital threat detection data indicates a sharp increase in malvertising trend
RiskIQ’s 2016 Malvertising Report (RiskIQ) Once again, malvertising was on the rise in 2016. To combat this problem, RiskIQ scans over 2 billion pages and 15 million mobile apps per day, resulting in a curated blacklist of malicious ads from across the Internet.
EyePyramid and a Lesson on the Perils of Attribution - TrendLabs Security Intelligence Blog (TrendLabs Security Intelligence Blog) In the past weeks, information-stealing malware EyePyramid made headlines after it was used to steal 87GB of sensitive data from government offices, private companies and public organizations. More than 100 email domains and 18,000 email accounts were targeted, including those of high-profile victims in Italy, the U.S., Japan and Europe.
Should You Worry About Your Oculus Sensor Spying on You? We Asked the Expert (Motherboard) Researcher who discovered you can get clear images through the Oculus Rift's sensors discusses the pros and cons of a camera-based system.
Security Patches, Mitigations, and Software Updates
Web GUI Password Recovery and Exposure Security Vulnerability (Netgear) NETGEAR is aware of the security issue that can expose web GUI login passwords while the password recovery feature is disabled. This vulnerability occurs when an attacker can access the internal network or when remote management is enabled on the router. Remote management is turned off by default; users can turn on remote management through advanced settings.
Cyber Trends
Half the Web Is Now Encrypted. That Makes Everyone Safer (WIRED) Computer security news is usually pretty dismal. But today the web got safer in a very important way.
Irregular application testing: App security in healthcare - Help Net Security (Help Net Security) Nearly half (45%) of NHS trusts scan for application vulnerabilities just once a year, with less only 8% doing so on a daily basis, according to Veracode.
Machine learning in cybersecurity will boost big data, intelligence, and analytics spending - Help Net Security (Help Net Security) ABI Research forecasts machine learning in cybersecurity will boost big data, intelligence, and analytics spending to $96 billion by 2021.
Insurers prepare for worst: cyber attack followed by a hurricane (Financial Times) Sector tries ‘war game’ to judge its readiness for $200bn in losses
Security Operations Centers Falling Below Optimal Levels (HealthITSecurity) A recent study found that SOCs are not as strong as they should be, which healthcare entities should take note of as they mitigate cybersecurity risk.
What's In Store For Global Cyber Security In 2017 (Forbes) 2016 was a particularly eventful year in the cyber threat landscape. Nation-state operations played large in the US presidential election, database breaches grew ever larger and cybercriminal tactics more innovative. Individual activists and mass-participation campaigns continued to target companies and organizations for ideological reasons. 2017 will be a year when geopolitical shifts and technological advances by nation-state and criminal actors will combine to create an unprecedentedly complex cyber threat landscape.
Marketplace
Keysight Technologies to grab Ixia for $1.6 billion (TheStreet) The $19.65 per share tie-up with the network security and software solutions provider is set to close by October's end.
IBM Beefs Up Cybersecurity Tools with Agile 3 Solutions Buy (CIO Today) Tech giant IBM has announced plans lo acquire Agile 3 Solutions, a software developer used by C-level and senior executives to help visualize, understand and manage risks associated with the protection of sensitive data.
Data61 wants Australia to go all-in on fintech and cybersecurity innovation (ZDNet) The country's innovation body has urged industry and government to create startups by fostering 'collaboration' between the financial services and cybersecurity sectors in Australia.
Hackers for good: A bug bounty hunter's path to America (The Christian Science Monitor) So-called 'bug bounty' programs, which pay ethical hackers anywhere in the world for reporting security flaws, are the ticket for one Indian security researcher to study in the US.
Cryptomathic joins EEMA (Security Document World) EEMA, the European think tank focussed on identification, authentication, privacy, risk management, cyber security, the Internet of Things and mobile applications, has announced that Cryptomathic has joined as a corporate member.
FPF Joins National Cyber Security Alliance in San Francisco for Data Privacy Day 2017 - Future of Privacy Forum (Future of Privacy Forum) On January 26, 2017, Jules Polonetsky, FPF's CEO, joined the National Cyber Security Alliance and other FPF members and friends at Twitter headquarters for its Data Privacy Day Event 2017. The event featured livedstreamed panels, TED-style talks, and interviews focusing on the latest privacy issues for consumers and business.
Digital Shadows Strengthens its Team of Advisors with Security Industry Veterans (MENAfn) Digital Shadows today announced that several leading cybersecurity luminaries including Art Coviello, Tim Belcher, Jim Bandanza, Dr Srinivas Mantripragada
Products, Services, and Solutions
Cylance Joins CyberWire's Podcast Partner Program (Yahoo! Finance) Cylance experts and researchers to provide regular educational commentary for the CyberWire's global cybersecurity news program.
Unisys Launches Advanced Cyber Resilience Service (Scoop) Resilience testing and planning service uses proven wargaming methodologies to identify threats, develop countermeasures, build long-term response plans and organise and train team members for continuous operations.
WatchGuard unveils new threat detection and response to security suite (IT Brief) “As cyber criminals continue to leverage increasingly varied and sophisticated threat vectors, many companies’ endpoints represent unnecessary risks."
Technologies, Techniques, and Standards
Why companies shouldn't feel helpless in the fight against ransomware - Help Net Security (Help Net Security) According to recent reports, ransomware is now a billion dollar business for cybercriminals. Attackers are honing in on the weak spots of organisations; hu
6 Free Ransomware Decryption Tools (Dark Reading) The No More Ransom group has been working to get free decryptor tools into the hands of security professionals and the general public.
Safe solution proactively protects data in motion. (Infosecurity Magazine) Deploying IPsec packet layer protection without encryption at the lowest network levels leaves points of entry open
Many firms in the dark on cyber security investment (ComputerWeekly) UK businesses need to adopt a risk-based approach to cyber security spending to ensure the best ROI and most appropriate data protection, says industry expert Michael Dieroff.
Six best practices for managing cyber alerts - Help Net Security (Help Net Security) Security pros know that the number of cyber alerts is growing at a frantic pace. Even a mid-sized company can face tens of thousands of alerts every month.
How to use One Time Pad cryptography with a Raspberry Pi (TechRadar) It has never been harder to be entirely certain that any message you send can be transmitted or received in absolute secrecy.
'Threat hunter' emerges as new enterprise security role (SearchCIO) The threat hunter, an emerging category of IT security pros, aims to detect incidents that technology overlooks, bolstering security operations centers.
Design and Innovation
Facebook Designs New Account Recovery System That's Actually Pretty Clever (BleepingComputer) Today, at the USENIX Enigma conference, Facebook engineers announced a new mechanism for recovering access to lost online accounts, which relies on the cooperation between different online services.
Forgotten passwords are bane of the Internet. Facebook wants to fix that (Ars Technica) New Facebook service aims to make security questions a thing of the past.
Facebook Tackles Account Recovery with Delegated Recovery Protocol (Threatpost | The first stop for security news) Facebook’s Delegated Recovery delegates account-recovery permissions to third-party accounts controlled by the user. GitHub is the program’s first partner.
Cisco fosters Blockchain protocol development, IBM shows why technology could relieve security anxiety (Network World) Cisco has helped form a consortium to develop blockchain that could secure Internet of Things applications and more while new study by IBM shows why the technology could become invaluable for businesses worldwide.
How Machine Learning Can Improve Healthcare Cybersecurity (HITInfrastructure) Healthcare cybersecurity will become more airtight as machine learning technology is introduced into health IT infrastructures.
Research and Development
Teleportation-Based Continuous Variable Quantum Cryptography. (arXiv:1408.5012v2 [quant-ph] UPDATED) (Quantiki) We present a continuous variable (CV) quantum key distribution (QKD) scheme based on the CV quantum teleportation of coherent states that yields a raw secret key made up of discrete variables for both Alice and Bob.
Academia
Dates Announced for 2017 Cyber Quests Competition (US Cyber Challenge) Hackers to compete for selective spots at U.S. Cyber Challenge’s Summer 2017 Cyber Camps
Cyber security 'bootcamp' coming to City Colleges (Columbia Chronicle) Cyber security is an essential tool internet users need to ensure their safety, according to local experts, and now Chicagoans will be able to study it at a local community
US Naval Academy Trains Future Cyber Warriors (Fifth Domain | Cyber) Paul Tortora, director of the U.S. Naval Academy's Center for Cyber Security Studies, discusses cyber education.
5 Colleges With NSA-Recognized Cyber Security Programs (University Herald) There are already a number of universities with cyber security programs that are recognized by the National Security Agency.
Governor McAuliffe Announces Cyber Vets Virginia Training Initiative Partnership With SANS Institute’s VetSuccess Academy (AlexandriaNews) Governor Terry McAuliffe today announced an expansion of his Cyber Vets Virginia initiative to include training offered by the SANS Institute. The new offerings provide veterans another pathway into the cybersecurity workforce via the SANS VetSuccess Immersion Academy.
Legislation, Policy, and Regulation
Net PoliticsThe Cybersecurity Dilemma: Where Thucydides Meets Cyberspace - Net Politics (Council on Foreign Relations - Net Politics) The great Greek historian Thucydides wrote of the Peloponnesian War, “It was the rise of Athens, and the fear this inspired in Sparta, that caused war to be inevitable.”
In light of political news, cybersecurity priority does not change (Infosecurity Magazine) In light of political news, cybersecurity priority does not change
Trump's Immigration Order Is a Propaganda Victory for ISIS (Defense One) The American president has reinforced the victimhood narrative at the core of the Islamic State’s recruitment pitch.
National Security Council Changes Are Very Significant, Hayden Says (NPR.org) Rachel Martin talks to ex-NSA and CIA director Michael Hayden about the reorganization of the White House National Security Council. Political adviser Steve Bannon has a permanent seat at the table.
Trump Set to Sign Cybersecurity EO as Election Hack Fallout Continues (Infosecurity Magazine) Trump Set to Sign Cybersecurity EO as Election Hack Fallout Continues. Reports have suggested recent Russian arrests are linked to US election hack
Assessing the Draft Cyber Executive Order (Lawfare) Amidst the whirlwind of executive orders and presidential memoranda that have been in the news, it was easy to miss a purported draft of President Trump’s first executive order (EO) covering cybersecurity issues, leaked to the Washington Post and released on Friday, January 27. The order, titled “Strengthening U.S. Cyber Security and Capabilities,” calls for several 60- and 100-day assessments of the state of U.S. cybersecurity and the identification of areas of improvement. This mirrors the approach taken by President Obama, who ordered his own 60-day cyberspace review shortly after assuming office.
Decoding the 2017 NDAA’s Provisions on DoD Cyber Operations (Lawfare) Thanks to the at-times breathless coverage of the Obama Administration’s deliberations on cyber warfare policy and organization (and now the Trump Administration’s tweets and early proposals), it can be easy to forget that Congress can exert significant power when it comes to the roles, responsibilities, and authorities of executive branch agencies, including the different components of the military.
Column: Protecting nation's electrical grid from cyber attack (Fredericksburg.com) Americans do not simply rely on electric power—it is required for our existence as much as our modern way of life.
Litigation, Investigation, and Law Enforcement
‘A man who’s seen society's black underbelly’: Meduza meets ‘Anonymous International’ — Meduza (Meduza) After a year’s existence, the data-leaking blog Anonymous International, better known as Shaltai Boltai (Humpty Dumpty), has never released truly important documents to the public. Nevertheless, every one of Shaltai’s publications causes a sensation on Russian social networks. (Some of the group’s leaks include private emails allegedly belonging to Deputy Prime Minister Arkady Dvorkovich, Duma Deputy Robert Schlegel, Kremlin official Timur Prokopenko, and Prime Minister Dmitri Medvedev himself, as well as several other politicians.) While targeting such individuals, Shaltai also provides readers with at least a general idea of how the Putin Administration functions. Meduza’s special correspondent, Daniil Turovsky, traveled to Bangkok and met with one of the leaders of Anonymous International, in order to learn more about the group’s origins and why it’s doing what it does.
FBI Assistance Provided to Local Law Enforcement During the Black Lives Matter Movement (FBI) This release consists of FBI materials concerning assistance provided to local law enforcement agencies during the Black Lives Matter demonstrations in July and August 2016.
Europol Teams Up with Global Cyber Alliance to Improve Security (Infosecurity Magazine) Europol Teams Up with Global Cyber Alliance to Improve Security. MoU will see the two work on DMARK and Internet Immunity initiatives
FBI v. Apple: One year later, it hasn’t settled much (CSO Online) At the one-year anniversary of the battle between the FBI and tech giant Apple over unlocking an iPhone, surveillance and privacy rules have not really changed. But they could this coming year, and the debate over that is as intense as ever.
Brazil’s Prisoners Are Coordinating Riots On Smuggled Cell Phones (Motherboard) "The communication of violence has become as important as the violence itself.”
Pakistan puts head of militant charity under house arrest (Fox News) Pakistan has placed the leader of a charity linked to a militant group under house arrest.
Hafiz Saeed put under house arrest; JuD likely to be banned: Reports - Times of India (The Times of India) Mumbai terror attack mastermind Hafiz Saeed has been put under house arrest on Monday at the Qadisiyyah Mosque near Chouburji in Lahore, a Pakistan news channel reported. The organisation is also likely to be banned, the report said.
Man logs into Facebook account of the woman using his stolen laptop (Naked Security) Two wrongs don’t make a right: even if you find someone using your stolen laptop via remote-control software it doesn’t mean you can snoop through their stuff
PG&E is now a convicted felon with court-ordered oversite (Control Global) PG&E is now a convicted felon, fined $3Million, and required to have a monitor for their natural gas operations (beyond the oversite of the CPUC). Additionally, the judge ordered PG&E to serve five years of probation, and PG&E must run a three month advertising campaign on television publicizing PG&E’s convictions.
For a complete running list of events, please visit the Event Tracker.
Upcoming Events
National Credit Union - Information Sharing & Analysis Organization - 2017 Tech Conference (Cape Canaveral, Florida, USA, Jan 31 - Feb 2, 2017) Join us for three days of Cyber Security topics that are pertinent to Credit Union cyber resilience, real-time security situational awareness information sharing, and coordinated response in the global credit union community! Protecting the Credit Union’s global infrastructure to sustain cyber resilience requires an unprecedented level of public- and private-sector cooperation, collaboration and coordination and includes access to the real-time availability of proactive “actionable” threat intelligence; analysis of potential impacts; coordinated countermeasure solutions and response; cybersecurity best practice adoption and role-based workforce education.
Southern Virginia - Cyber Security Lunch & Learn (Norfolk, Virginia, USA, Feb 2, 2017) Cyber security experts discuss security incident response. Dealing with cyber security risk is an exercise in managing daily chaos. Organizations know they need to improve their posture but common roadblocks often get in the way. Join us for lunch and an action-oriented discussion about ways you can improve your security incident response program in 2017. The conversation will be led by certified SANS instructor Alissa Torres, and Rsam CISO Bryan Timmerman. Attend and earn CPE credits towards your ISACA and (ISC)2 certifications.
Insider Threat Program Development Training For NISPOM CC 2 (Toms River, NJ, USA, Feb 6 - 7, 2017) Insider Threat Defense announced it will hold a 2 day training class on Insider Threat Program Development (NISPOM Conforming Change 2) on Feb. 6-7, 2017, in Toms River, NJ. For a limited time the training is being offered at a discounted rate of $795 (Normally $1395). The training is comprehensive and provides students with the knowledge and resources to develop, implement and manage a robust Insider Threat Program / Working Group. Insider Threat Defense has trained over 500+ organizations and has become the "Leader-Go To Company" for Insider Threat Program Development Training.
The Risks and Benefits of Artificial Intelligence and Robotics (Cambridge, England, UK, Feb 6 - 7, 2017) The Risks and Benefits of Artificial Intelligence and Robotics Workshop aims to provide media and security professionals with an in-depth understanding of the implications that the rapid advancement of AI technology may affect the global community in both the physical and structural spheres and the potential impact of the future evolution of such technology, especially in terms of security. Emphasis will be given to the way in which AI and autonomous robotics can be represented and communicated in the media.
SANS Southern California - Anaheim 2017 (Anaheim, California, USA, Feb 6 - 11, 2017) Learn practical, relevant tips and techniques from industry leaders. Join us for SANS Southern California - Anaheim 2017, and choose from eight courses on cyber defense, penetration testing, incident response, threat hunting, ethical hacking, IT management and ICS/SCADA security. Some of our courses are in alignment with DoD Directive 8570 requirements for Baseline IA Certifications, and most courses have GIAC Certification attempts available. Take advantage of this opportunity to sharpen your skills and advance your career.
Cyber Protect Conference (Nottingham, England, UK, Feb 9, 2017) Business owners have been invited to attend Nottinghamshire's first-ever cybercrime conference to learn how to better protect their data. The Cyber Protect Conference is being jointly hosted by the county's Police and Crime Commissioner Paddy Tipping and Nottinghamshire Police, and will include presentations from cyber security experts. The event, which takes place on Thursday, February 9, at The Atrium in Nottingham, is free of charge and open to small and medium-sized enterprises (SMEs) across the county.
Workplace Violence & Response To Active Shooter Events Meeting (Laurel, Maryland, USA, Feb 9, 2017) The National Insider Threat Special Interest Group (NITSIG) will be hosting a meeting on February 9, 2017, at the Johns Hopkins University Applied Physics Laboratory, Laurel, MD. The meeting will be exclusively focused on workplace violence and responding to an active shooter event. Presenters include experts from the Occupational Safety and Health Administration (OSHA), and the Maryland State Police. It's free to attend. Prominent among the topics to be discussed will be threats directed from the Internet.
RSA Conference 2017 (San Francisco, California, USA, Feb 13 - 17, 2017) The current state of cybersecurity means there are many opportunities for the industry as a whole to collaborate on new innovations. Discovering the next great opportunity will require everyone to embrace new and unique perspectives from a broadly diverse base of people and sources. RSA Conference 2017 provides the opportunity for all attendees at all levels to grow their knowledge, exchange ideas with peers and further their careers. With opportunity comes great responsibility for the future. Our actions today will have a lasting impact on the strength of the industry—and the safety of the world—tomorrow. At RSA Conference 2017, you will learn about new approaches to info security, discover the latest technology and interact with top security leaders and pioneers. Hands-on sessions, keynotes and informal gatherings allow you to tap into a smart, forward-thinking global community that will inspire and empower you.
Using STIX/TAXII to share automated cyber threat data (San Francisco, California, USA, Feb 15, 2017) Cybersecurity experts representing the financial sector, healthcare, utilities, software providers, government, academia and nonprofits continue to define/develop the STIX/TAXII specifications as the solid foundation for standardizing threat information. This large group of public and private sector organizations and companies are working together to advance the STIX/TAXII specifications in the OASIS Cyber Threat Intelligence Technical Committee. These specs have already dramatically streamlined the analysis of threat data. We invite cybersecurity experts and decision makers to be part of the conversation.
Insider Threat Program Development Training For NISPOM CC 2 (Simi Valley, CA, USA, Feb 22 - 23, 2017) Insider Threat Defense announced it will hold a 2 day training class on Insider Threat Program Development (NISPOM Conforming Change 2) on Feb. 22-23, 2017, in Simi Valley, CA. For a limited time the training is being offered at a discounted rate of $795 (Normally $1395). The training is comprehensive and provides students with the knowledge and resources to develop, implement and manage a robust Insider Threat Program / Working Group. Insider Threat Defense has trained over 500+ organizations and has become the "Leader-Go To Company" for Insider Threat Program Development Training.
Risky Business (London, England, UK, Feb 23, 2017) How are you tackling Cyber Crime in the Property Transaction? Join our panel of expert speakers at the IET in London to find out more about cyber crime in the property transaction and the steps you can take to protect the best interests of your firm and your client.
The 2nd China Automotive Cyber Security Summit 2017 (Shanghai, China, Feb 24, 2017) CACSS2017 will Provide a platform for Automotive OEMs, Tier 1 suppliers, Automotive security solution/ technology/products developers,Automotive electronics companies, IT companies, Mobile data suppliers, Automotive insurance companies, and automotive cyber security experts to address government regulations developing trends, Automotive cyber security standards, updated vulnerabilities, “Black Hat” behaviour motivations, State-of-the-Art technology solutions, critical cyber security challenges and collaboration initiatives; Help you to understand tailored smart car cyber security products and solutions, build up a set of effective cyber security management system and improve the capability of protecting smart cars. This second to non Automotive cyber security industry event will assure you to understand China Automotive cyber security industry business opportunities, network with China local customers and consolidate your worldwide leadership.
SANS Dallas 2017 (Dallas, Texas, USA, Feb 27 - Mar 4, 2017) We are pleased to invite you to attend SANS Dallas 2017, on February 27- March 4 at The Westin Dallas Downtown, located in the heart of the city. We have selected several of our top information security courses to provide you with the training and certification that you need to boost your career by learning from the best! SANS instructors are industry professionals who will ensure that you not only learn the material, but that you will also be able to apply what you learn your first day back in the office.
Autonomous Vehicles Silicon Valley (Santa Clara, California, USA, Feb 28 - Mar 2, 2017) The road to autonomy: Regulation. Consumer Acceptance. Safety & Security. Explore the latest technologies and hottest issues for the autonomous vehicles industry.
The Cyber Security Summit: Denver (Denver, Colorado, USA, Mar 1, 2017) This event is an exclusive conference connecting Senior Level Executives responsible for protecting their companies’ critical data with innovative solution providers & renowned information security experts. Learn from cyber security thought leaders including: Mary McCord, Asst. Attorney General for National Security, U.S. Dept. of Justice & Chad Alvarado, Supervisory Special Agent, Cyber Task Force, FBI Denver Division. Engage in panel discussions focusing on trending cyber topics including Emerging Threats to IoT & Big Data, Insider Threats, and Compliance. Receive half off your admission with promo code cyberwire50 at CyberSummitUSA.com and view details including the full agenda, participating solution providers & confirmed speakers
International Cyber Risk Management Conference (ICRMC) (Toronto, Ontario, Canada, Mar 2 - 3, 2017) The third annual International Cyber Risk Management Conference (ICRMC) brings together a world class roster of experts with cross-sector, global and multidisciplinary expertise to share knowledge, lessons learned, and methodology on cyber security. We are delighted to build on last year’s very successful ICRMC. Cyber security has grown into a global pandemic and organizations of all sizes are struggling with questions on how to mitigate, manage, and transfer cyber risk. We’ve structured our agenda based on delegate feedback and our exceptional 2017 Advisory Committee is determined to provide engaging high-profile speakers and compelling content to share knowledge, captivate and educate. Visit www.icrmc.com for details.
SANS San Jose 2017 (Milpitas, California, USA, Mar 6 - 11, 2017) Securing and defending your network has never been more important as attacks and breaches make the news daily. Gain the skills and tools you need to win the battle against the wide range of cyber adversaries who want to harm your environment. SANS San Jose 2017 offers six hands-on, intensive cyber security training courses.
15th annual e-Crime & Cybersecurity Congress (London, England, UK, Mar 7 - 8, 2017) Europe's largest and most sophisticated gathering of senior cybersecurity professionals from international business, governments, law enforcement and intelligence agencies.
Investing in America’s Security: Cybersecurity Issues (Jersey City, New Jersey, USA, Mar 10, 2017) Please join us for the 5th Annual Northeast Regional Security Education Symposium hosted by the Professional Security Studies Department at New Jersey City University. The Symposium’s keynote address will be delivered by Milan Patel of K2 Intelligence, formerly the FBI’s Cyber Division Chief Technology Officer. Speakers include NJCCIC Director Michael Geraghty. NJCU students pursuing their D.Sc. degree will present academic research posters and a panel of experts will discuss careers in cyber security.
IAPP Europe Data Protection Intensive 2017 (London, Englan, UK, Mar 13 - 16, 2017) Set in London, the Data Protection Intensive delivers innovative solutions to today’s top privacy and data protection challenges. Known for its exceptional programming, the Intensive has come into its own as a leading forum for practical data protection education.
Rail Cyber Security Summit (London, England, UK, Mar 14 - 15, 2017) Now in its second year, the event will take place at the Copthorne Tara Kensington hotel in London between March 14th and 15th 2017 and will feature a range of experts from the rail transport industry, as well as leading Government and global cyber security leaders and academics working in the field.
CyberUK 2017 (Liverpool, England, USA, Mar 14 - 16, 2017) Announcing the UK government's flagship IA and cyber security event, for 2017. This is a three day event that will bring together cyber security leaders and professionals from across the UK’s information security communities from both the public and private sector. The NCSC’s partnership with information security businesses of all sizes is essential in strengthening the UK’s cyber resilience. CyberUK 2017 will play a key role in defining the role industry must play in achieving this step change, and is expected to attract 1,600 information assurance (IA) and cyber security leaders and professionals.
Cybersecurity: The Leadership Imperative (New York, New York, USA, Mar 16 - 17, 2017) Cyber risk impacts every element of your organization – and even the most brilliant information security expertise must be supported by a cross-functional cybersecurity structure and culture to succeed. Cybersecurity: The Leadership Imperative will provide case studies and actionable insights on building and maintaining a structure in which leaders across the organization are able to work together seamlessly to comprehend, measure and respond to cyber risk challenges.