Hacker dumps Cellebrite mobile forensic code. IRS warns of W-2 fraud combined with BEC. Cisco router vulnerabilities. Windows zero-day and BSOD. Mobile carriers patch. Iranian cyber policy and pushback from dissidents. Mixed signals from US on Russian hacking?
The hacker who breached mobile forensic tool provider Cellebrite last year has dumped code he (or she or they) claims to have obtained from that company. The proclaimed motive is to demonstrate that such tools, once developed, inevitably find their way into undesirable hands. Cellebrite's main product is the Universal Forensic Extraction Device (UFED), thought to be widely used by British and US police to unlock phones in the course of criminal investigations. The hacker's dump includes tools related to cracking Android, Blackberry, and older iOS devices. Motherboard reports that experts say the code looks like jailbreaking exploits adapted to forensic purposes.
In the US, the Internal Revenue Service (IRS) warns that criminals are combining W-2 tax form theft with business email compromise in fraud campaigns expected to continue through the end of tax season.
Bitdefender and the SANS Institute have analyses of Cisco router vulnerabilities likely to be of particular concern with respect to home networks.
US-CERT warns of a Windows zero-day that could be exploited to bring about the BSOD (that is, the "blue screen of death").
Verizon and Sprint are rolling out Android patches.
Iran continues to find cyber operations an attractive means of striking foreign enemies and exerting domestic control. An Iranian dissident is taking a pirate-radio-inspired approach to pirate podcasting to circumvent censorship.
Mixed signals from the US about Russian hacking. The US Treasury Department is modifying sanctions against the FSB. On the other hand, the US Army is funding a Ukrainian cyber defense center.
Notes.
Today's issue includes events affecting European Union, France, Germany, Iraq, NATO, Russia, Tunisia, Ukraine, United Kingdom, and United States.
In today's podcast we hear from our partners at Accenture, as Malek Ben Salem discusses embedded device security. We also have as our guest Frederick Lane, who will talk about his new book Cybertraps for Expecting Moms and Dads.
We've also got a new special edition of the podcast out. In this one we speak with industry experts and editors covering the cyber beat to get their take on the outlook for 2017 in cyber security.
San Francisco: the latest about RSA
National Cyber Security Alliance Aligns with RSA® Conference to Educate and Empower All Digital Citizens to Stay Safer Online and to Manage Their Personal Data (Yahoo! Finance) The National Cyber Security Alliance (NCSA), the nation's leading nonprofit promoting cybersecurity and privacy awareness and education, is once again proud to join RSA® Conference 2017 as an association sponsor. RSA Conference is the world's largest
Cyber Attacks, Threats, and Vulnerabilities
Hacker Dumps iOS Cracking Tools Allegedly Stolen from Cellebrite - Motherboard (Motherboard) The hacker says this demonstrates that when organizations make hacking tools, those techniques will eventually find their way to the public.
Cellebrite Hack Highlights Dangers of State Snooping (Infosecurity Magazine) Cellebrite Hack Highlights Dangers of State Snooping. Data extraction firm’s products used by police in US and UK
IRS: Scam Blends CEO Fraud, W-2 Phishing (KrebsOnSecurity) Most regular readers here are familiar with CEO fraud — e-mail scams in which the attacker spoofs the boss and tricks an employee at the organization into wiring funds to the fraudster. Loyal readers also have heard an earful about W-2 phishing, in which crooks impersonate the boss and request a copy of all employee tax forms. According to a new “urgent alert” issued by the U.S. Internal Revenue Service, scammers are now combining both schemes and targeting a far broader range of organizations than ever before.
Scammers are blending W-2 phishing with wire fraud - Help Net Security (Help Net Security) Scammers are blending W-2 phishing with wire fraud, sending emails aimed at stealing organizations' money after they've already tried to get employee info.
Cyren Ltd exposes malicious sensitive data and Bitcoin swiping malware (IBS INtelligence) A menacing malware outbreak targeting banking customers which is thieving passwords and Bitcoin from PCs has been uncovered by Cyren Ltd.
Critical Cisco security hole could lead to hackers seizing control of thousands of home routers - Bitdefender (Bitdefender) Here’s how things normally work. When you leave your house you make sure that you’ve locked your front door behind you. You ensure that you’ve shut your windows. Maybe, if you’re going to be away for a while, you might even set your burglar alarm. But the rise of the Internet of Things has changed …
Cisco - Issue with Clock Signal Component (SANS Internet Storm Center) One of our readers, Dalibor Cerar, sent us an email about an issue impacting Cisco...at this point. While its a hardware issue, the result if it occurs is a self inflicted Denial of Service. Cisco released a notice on February 2 that some of its products had an issue with the Clock Signal component manufactured by a supplier. This was discovered late in November 2016.
0-Day Security Flaw Could Lead Windows Devices to BSOD (HackRead) The United States Computer Emergency Readiness Team (US-CERT) has discovered a zero-day vulnerability in the SMB service of Microsoft Windows which lets at
Windows DRM Files Used to Decloak Tor Browser Users (BleepingComputer) Downloading and trying to open Windows DRM-protected files can deanonymize Tor Browser users and reveal their real IP addresses, security researchers from Hacker House have warned.
Facebook friend suggestion that should be impossible • /r/privacy (reddit) I was just looking through the friend suggestions on Facebook. A very old ex girlfriend from 20 years ago popped up. I truly can't see how they...
Phishing test results in a barely-passing grade for users (CIO) Diligent recently surveyed 2,000 people to see who got caught hook, line and sinker for the phishing scam.
Global Application and Network Security report finds ransom is top motivation for cyber attacks, IoT botnets a major concern (VanillaPlus - The global voice for B/OSS) Radware®, a provider of cyber security and application delivery solutions ensuring the digital user experience for applications in virtual, cloud, and soft
Security Patches, Mitigations, and Software Updates
Verizon and Sprint roll out January security update for Galaxy devices – Samsung Update (Samsung Update) BY H. Parvez / February 1, 2017 / News, OS Updates In order to keep the Android ecosystem protected from the ever-growing malware threats, ...
How WhatsApp is fighting spam after its encryption rollout (TechCrunch) WhatsApp proved itself to be the most YOLO-crypto company of 2016 when it turned on end-to-end encryption by default last April for its more than 1 billion..
Google Adds Security Key Enforcement to G Suite Apps, Hosted S/MIME to Gmail (Threatpost | The first stop for security news) Google pumped more life into the use of physical keys as a second form of authentication when it added Security Key enforcement support to G Suite.
Cyber Trends
Businesses Fear Brand Damage More Than Security Breaches (Dark Reading) Organizations struggling with risk management are more concerned about brand damage than cyberattacks, new Ponemon study shows.
Who’s Watching the Cloud? Moving to the Cloud Demands More Visibility - Netreo (Netreo) Although a study by Netreo shows a majority of businesses feel they have adequate visibility over IT functions hosted in the cloud, there is still plenty of uncertaintyIrvine, Calif. – February 2, 2017 – A recent poll of IT professionals on behalf of Netreo, a provider of IT monitoring and management software, showed as companies …
Just One in Four Banks Confident of Breach Detection (Infosecurity Magazine) Just One in Four Banks Confident of Breach Detection. Capgemini study reveals misplaced consumer trust in financial institutions
Marketplace
Understand risk at the board level to tackle cybersecurity issues (Infosecurity Magazine) How do boards and directors prepare for the increasing accountability of cybersecurity?
Will Microsoft's $1 Billion Cybersecurity Play Hurt Smaller Players? -- The Motley Fool (The Motley Fool) The tech giant plans to spend billions to drive third-party security players out of its “One Windows” ecosystem.
Cyber Security leader Utimaco closes investment round led by EQT Mid Market (Marketwired) Utimaco, a global leader in high-end cyber security solutions, has successfully received all regulatory approvals for its new investor EQT Mid Market, a deal first announced in October 2016. The investment will be used to further accelerate the growth of Utimaco worldwide with a particular focus on expanding its footprint in North America.
Fortinet CFO Says Sales Reorg Is Working: Stock Soars After Strong Q4 Earnings And Forecast (CRN) "Sometimes it just takes time for the gears to connect completely, especially when your building a lot of functions at the same time," said Fortinet CFO Andrew Del Matto, during the company's fourth quarter earnings call on Thursday.
Wandera Powering Into 2017 with Exponential Company Growth (Digital Journal) Wandera, the leader in Enterprise Mobile Security and Data Management, has today announced that the company continues to experience rapid growth across its key business segments.
Symantec revenue surges 15% thanks to enterprise security | InfotechLead (InfotechLead) Security company Symantec Corp. posted revenue of $1,041 million (+15 percent) in its third quarter of fiscal year 2017 results, ended December 30, 2016. Symantec generated $644 million (+30 percent) from enterprise security business and $397 million (–4 percent) from consumer security business in Q3. The technology company is forecasting a drop in revenue in …
Symantec CEO Clark: “Feel Very Good About Our Ability to Grow the Top Line’ (Barrons) Shares of security technology provider Symantec (SYMC) are up 26 cents, or 1%, at $27.51, rebounding from last night’s after-hours losses, after the company yesterday delivered better-than-expected fiscal Q3 results but a Q4 outlook below consensus.The key question for the Street today is the extent of revenue growth in years to come, given that the “core" enterprise security business continued to decline.
Mozilla gives up on last vestiges of Firefox OS, lays off 50 (Ars Technica) Browsers remain the only area in which the nonprofit has had much market success.
Blockchain innovator Guardtime wins contract for next-generation Nato cyber range (International Business Times UK) Estonian MoD and Nato will shape how Nato range users will prep for current complex cyber-threat landscape.
Life of: A Principal Security Consultant (Infosecurity Magazine) Life of: A Principal Security Consultant
BNP Paribas poaches from consultant for this hot senior U.S. tech role - eFinancialCareers (eFinancialCareers) Investment banks are desperate to bring in this expertise, so have to look outside of the industry.
HD Moore Joins Research-Driven Consulting Firm (Dark Reading) Metasploit creator joins Atredis Partners.
Products, Services, and Solutions
New infosec products of the week: February 3, 2017 - Help Net Security (Help Net Security) New approach to continuous Docker container security NeuVector’s solution for container security is itself a container. The application automatically learn
Startup to embed Cylance engine into its cyber detection and prevention solutionsnull (GSN) Bricata, LLC, a developer of network intrusion detection and prevention solutions, today announced an OEM relationship with Cylance® Inc. Cylance is the first cybersecurity company to employ machine learning and artificial intelligence to create a lightweight, independent malware conviction engine.
Avast Releases Three New Decryption Tools to Fight Ransomware (softpedia) There are now 14 anti-ransomware tools available from Avast
IT & Cyber Experts Launch M&A Tech and Security Due Diligence - American Security Today (American Security Today) In an effort to assist organizations discover and mitigate potential risks which can seriously influence the value of an acquisition, Primitive Logic and AsTech Consulting, have launched a Merger & Acquisition (M&A) Tech and Security Due Diligence Partnership. This partnership focuses on providing material information about technologies and products, including security, to key stakeholders involved in a M&A …
Cyphort Enhances Security, Automation, and Analytics of its Adaptive Detection Fabric (GlobeNewswire News Room) Innovative advanced threat defense platform adds protection for cloud-based email, auto-mitigation capabilities, and a richer set of contextual threat analytics for security teams
ServiceNow Integrates Security Platform With Palo Alto Networks, Tanium To Speed Up Security Incident Responses (CRN) The new partners will contribute threat detection and endpoint security information directly into the ServiceNow Security Operations platform's automated workflows.
Bitglass Brings Real-Time Inline Security to AWS and Custom Cloud Apps (Yahoo! Finance) Bitglass, the total data protection company, today announced support for Amazon Web Services and custom apps -- two major additions that extend the capabilities of Bitglass' market-leading Cloud Access ...
Security Intelligence Platform from Exabeam launched (App Developer Magazine) Exabeam has announced its new Security Intelligence Platform, designed to decrease the risk of cyber threats for organizations of any size.Recent data.
Distil Networks Releases Web Application Security Industry's First Access Control List to Leverage Device Fingerprints (Marketwired) Distil Universal ACL offers a policy-driven, easy-to-manage approach, eliminating the pain of managing and updating longs lists of IP addresses
Rapid7 Enables IoT Hardware Security Testing with Metasploit (Yahoo! Finance) Rapid7, Inc., a leading provider of data and analytics solutions for security and IT, today announced that security teams can now link hardware directly into the Metasploit Framework ...
QuintessenceLabs: Advanced quantum cybersecurity products with high-speed true random numbers, encryption key management, and one time pad encryption. - CTOvision.com (CTOvision.com) QuintessenceLabs delivers a trusted security foundation protecting sensitive data on your premises, in the cloud or in uncontrolled environments. Founded in 2006, QuintessenceLabs addresses the most difficult security challenges facing companies, helping implement robust security strategies to protect data today and in the future. QuintessenceLabs products include: - an enterprise scale true random number generator …
LightCyber Introduces New Tools For Corporate Security Assurance (Source Security) The LightCyber Security Operations Center OPEX Calculator helps quantify the accuracy and efficiency of security tools.
Tunisia rolls out nationwide public key infrastructure secured by Thales (Thales) New national PKI helps grow digital economy by enabling trusted online services for government, enterprise and citizens.
FireMon Makes Automated Change Management Even Easier for Palo Alto Networks Customers (Yahoo! Finance) FireMon, the global leader in Network Security Policy Management , today announced an extension of its Intelligent Policy Automation framework to now include automated policy implementation for Palo Alto ...
Fortinet Introduces the World’s First Terabit Firewall Appliance and Market Leading 100 Gbps NGFW Chassis (Yahoo! Finance) Ken Xie, founder, chairman of the board and chief executive officer at Fortinet“ Cloud computing, IoT, and a hyper-connected digital economy have been straining enterprise ...
Checkmarx Announces Open Beta Support For Scala Programming Language To Ensure Vulnerability Detection (Source Security) Checkmarx CxSAST addresses more than 20 different programming languages, and Scala is its latest addition.
Technologies, Techniques, and Standards
Process industry initiative to develop standards-based, secure control systems - looking for utility support (Control Global) The process industry initiative to develop a standards-based, secure-by-design control system is getting interest from many different industry sectors. Unfortunately, there are no electric utilities participating. February 28th, I will be participating in a webinar with the ExxonMobil Chief Engineer to discuss the initiative and what it means to power utilities - http://www.opengroup.org/events/our-webinars
Recommendations to help the security of ICS-SCADA systems - Help Net Security (Help Net Security) A new ENISA study identified good practices and recommendations to help the security of ICS-SCADA against modern cyber threats.
Routers Under Attack: Current Security Flaws and How to Fix Them - TrendLabs Security Intelligence Blog (TrendLabs Security Intelligence Blog) How is it possible for users to lose hundreds of dollars in anomalous online bank transfers when all of their gadgets have security software installed?
Email insecurity threatens political campaigns and even elections (Infosecurity Magazine) Email insecurity threatens political campaigns, organizations and even elections.
How to minimize the risk and impact of identity fraud - Help Net Security (Help Net Security) Here are seven recommendations from Javelin Strategy & Research for consumers to follow in order to minimize the risk and impact of identity fraud.
5 Cybersecurity Tools You Company Should Have (Connecticut Post) According to a recent Verizon Data Breach Investigations Report, 60 percent of cyber-attacks target SMBs, largely because they are easier targets. In the scramble to secure the cloud, hardware is often overlooked, says Christoph Schell, president, Americas, HP Inc.
Design and Innovation
IoT: security first, innovation second? (Computing) Securing identity data for IoT environments must be a foundation of identity and access management infrastructure, says Hans Zandbelt
The Warbot Builders of the Middle East Spill Their Secrets (WIRED) The tech behind new remote-operated 'bots is homebrewed, inelegant---and deadly.
Come Fly with Me: Securing the Drone (Infosecurity Magazine) New report seeks to aid the safe and secure creation and operation of unmanned aircraft systems
Lego builds social network that should be safe for kids (Naked Security) Experts welcome Lego’s decision not to allow free text or avatars for young users
Research and Development
University of Surrey scientist publishes blueprint for large-scale quantum computer (Computing) Don't try this at home - unless you have a lot of money.
What Does It Take to Test Quantum Cryptography? Physicists, Lasers, and an Airplane (WIRED) Experts claim that quantum cryptography will be more secure than any encryption technique we use today.
Researchers break data transfer efficiency record (Phys.org) Researchers at the Department of Energy's Oak Ridge National Laboratory have set a new record in the transfer of information via superdense coding, a process by which the properties of particles like photons, protons and electrons are used to store as much information as possible.
Academia
'This is the new reality': Panelists speak for Pitt cyber security institute (Pittsburgh Post-Gazette) The precise identity and motivations of the hackers who leaked sensitive Democratic emails during last year’s presidential election may never be known. But they left fingerprints that were familiar to Andrei Soldatov, a journalist who has written about Russia’s security state for the past 20 years.
A Hogwarts For Cyber Protection? (Dark Reading) How the UK is minting a new generation of cybersecurity wizards.
University of Maryland announces ‘Discovery District’ (Maryland Daily Record) The University of Maryland has dubbed a roughly 150-acre area near the College Park campus, which includes development along Baltimore Avenue as well as pro
Legislation, Policy, and Regulation
Why Iran's favorite weapon is the cyber attack (Business Insider) Cyber attacks allow Iran "to strike at adversaries globally, instantaneously, and on a sustained basis."
A Pirate Podcast App Takes on Iran’s Hardline Censors (WIRED) RadiTo hopes to bring forbidden audio to Iran's growing audience of smartphone users---and stay a step ahead of the country's internet filters.
EU tools up for cyber war (EurActiv.com) As the member states rapidly progress in their own personal cyber arms race, the bloc’s institutions risk being left behind. EURACTIV Germany reports.
Europe being destabilised by Russian cyber attacks, warns defence secretary Sir Michael Fallon (Computing) Fallon calls for EU states to increase spending on defence and cyber security.
MPs question UK's cyber attack defences - BBC News (BBC News) A skills shortage and "chaotic" handling of data breaches undermine confidence, report says.
Parliament Slams Woeful Government Security Efforts (Infosecurity Magazine) Parliament Slams Woeful Government Security Efforts. Chaos still reigns in Whitehall, says Public Accounts Committee
US Army Funds Cyber-center for Ukraine Military (Infosecurity Magazine) The project comes amid concerns about Russian hacking within the Ukraine.
Treasury changes Obama sanctions on Russian security agency (UPI) The U.S. Treasury revised sanctions on Russia that barred cybersecurity sales to Moscow's top security bureau -- a move criticized by some Democrats.
Trump Loosens Sanctions on Russian Spy Agency Linked to Election Hack (Washington Free Beacon) The Treasury Department on Thursday announced the loosening of sanctions on Russia's spy service that were imposed by former President Obama for Moscow's intelligence operations targeting the 2016 presidential election
Trump order on cybersecurity to include nod to IT modernization, report says - Fedscoop (Fedscoop) An executive order President Donald Trump is expected to sign on federal cybersecurity will direct agency heads to “plan for the deliberate modernization of the federal executive branch IT,” a White House official told Tuesday’s press pool. While reporters have not yet seen the official language of the executive order, a White House official on Tuesday read a statement for reporters indicating …
Two Huge Challenges for Trump’s Cybersecurity Team (LifeZette) There is a lot of talk these days about solving the big cybersecurity threats to the United States. Former New York City Mayor turned international security contractor Rudy Giuliani says he is “this close.” Former President Obama, continuing his legacy-polishing job, latched onto this growing threat during his final days by declaring that, “During my administration, we have executed a consistent strategy focused on three priorities,” and went on to name an increased level of defense, deterring and disrupting malicious activity, and responding to and recovering from attacks. He failed to mention that in spite of repeated policy reviews, cybersecurity frameworks, international “common understandings,” cyberinformation sharing acts and countless new initiatives, the Office of Personnel Management (OPM) suffered the largest breach in U.S. government history. We also have to stop worrying about collateral damage. Our enemies don’t. SONY Pictures, Target Stores, Home Depot, JP Morgan Chase, Yahoo, Dyn, and hundreds of other breaches all occurred while the National Institute of Standards,
Here's How Trump Could Take Control Of Every U.S. Polling Place (The Huffington Post) A last-minute Obama decision may empower federal authorities to run the "election infrastructure" in the name of national security.
A hearing on OPM turned into a nonsensical shouting match over cybersecurity (Cyberscoop) What was scheduled to be a relatively blasé bureaucratic update to members of the House Committee on Oversight and Government Reform regarding OPM’s cybersecurity posture diverged from prepared witness testimony and instead became a grandstanding showcase laden with hyperbole. During Thursday’s hearing, lawmakers displayed what appeared to be a basic misunderstanding of federal cybersecurity, encryption …
Elijah Cummings blasts GOP inaction on Russia after Reps. Chaffetz and Lynch erupt in shouting match (Raw Story) On Thursday, a House Oversight Committee hearing regarding Russian attempts to interfere with the 2016 U.S. presidential election erupted in a shouting match between committee chairman Rep. Jason Chaffetz (R-UT) and Rep. Stephen Lynch (D-MA).
Litigation, Investigation, and Law Enforcement
Russian Lawyer Says FSB Officers, Kaspersky Manager Charged With Treason (RadioFreeEurope/RadioLiberty) А Russian lawyer has confirmed the arrests of two Federal Security Service (FSB) officers and a manager at a Russian cybersecurity company on treason charges, and that they are suspected of passing classified information to U.S. intelligence.
Two Arrested For CCTV Camera Hack On Washington, DC - Dark Reading (Dark Reading) A British man and Swedish woman have reportedly been arrested in the UK for the cyberattack ahead of Trump's inauguration.
Hunting for evidence, Secret Service unlocks phone data with force or finesse (The Christian Science Monitor) At a dedicated phone forensics facility in Tulsa, Okla., the Secret Service breaks into about 40 phones a year that could contain valuable information related to criminal investigations.
Audit: DHS cyber center lacks metrics - Cyberscoop (Cyberscoop) DHS has no way of measuring the cyber center's effectiveness, but government officials and business executives who used its services seemed satisfied.
NY Attorney General Settles Acer Data Breach Suit (Media Post) New York State Attorney General Eric T. Schneiderman has settled a data breach case for Acer Service Corporation.
Gamers lose suit over retention of biometric faceprints (Naked Security) Judge dismisses basketball siblings’ suit, saying concerns about retention are ‘not concrete enough’
Children's Medical Center of Dallas Pays $3.2 Million Fine for HIPAA Violations (eSecurity Planet) The organization failed to encrypt patient data after an unencrypted, non-password protect BlackBerry containing PHI was lost in 2009.
For a complete running list of events, please visit the Event Tracker.
Newly Noted Events
ISSA Mid Atlantic Security Conference (Rockville, Maryland, USA, Mar 10, 2017) Join us for a full day of training by industry leaders discussing some of the latest topics in tactics and techniques for preparing for cyber-attacks. This conference will feature a variety of presentations and cutting edge training opportunities, including hands-on demonstrations and workshops.
Upcoming Events
Insider Threat Program Development Training For NISPOM CC 2 (Toms River, NJ, USA, Feb 6 - 7, 2017) Insider Threat Defense announced it will hold a 2 day training class on Insider Threat Program Development (NISPOM Conforming Change 2) on Feb. 6-7, 2017, in Toms River, NJ. For a limited time the training is being offered at a discounted rate of $795 (Normally $1395). The training is comprehensive and provides students with the knowledge and resources to develop, implement and manage a robust Insider Threat Program / Working Group. Insider Threat Defense has trained over 500+ organizations and has become the "Leader-Go To Company" for Insider Threat Program Development Training.
The Risks and Benefits of Artificial Intelligence and Robotics (Cambridge, England, UK, Feb 6 - 7, 2017) The Risks and Benefits of Artificial Intelligence and Robotics Workshop aims to provide media and security professionals with an in-depth understanding of the implications that the rapid advancement of AI technology may affect the global community in both the physical and structural spheres and the potential impact of the future evolution of such technology, especially in terms of security. Emphasis will be given to the way in which AI and autonomous robotics can be represented and communicated in the media.
SANS Southern California - Anaheim 2017 (Anaheim, California, USA, Feb 6 - 11, 2017) Learn practical, relevant tips and techniques from industry leaders. Join us for SANS Southern California - Anaheim 2017, and choose from eight courses on cyber defense, penetration testing, incident response, threat hunting, ethical hacking, IT management and ICS/SCADA security. Some of our courses are in alignment with DoD Directive 8570 requirements for Baseline IA Certifications, and most courses have GIAC Certification attempts available. Take advantage of this opportunity to sharpen your skills and advance your career.
Cyber Protect Conference (Nottingham, England, UK, Feb 9, 2017) Business owners have been invited to attend Nottinghamshire's first-ever cybercrime conference to learn how to better protect their data. The Cyber Protect Conference is being jointly hosted by the county's Police and Crime Commissioner Paddy Tipping and Nottinghamshire Police, and will include presentations from cyber security experts. The event, which takes place on Thursday, February 9, at The Atrium in Nottingham, is free of charge and open to small and medium-sized enterprises (SMEs) across the county.
Workplace Violence & Response To Active Shooter Events Meeting (Laurel, Maryland, USA, Feb 9, 2017) The National Insider Threat Special Interest Group (NITSIG) will be hosting a meeting on February 9, 2017, at the Johns Hopkins University Applied Physics Laboratory, Laurel, MD. The meeting will be exclusively focused on workplace violence and responding to an active shooter event. Presenters include experts from the Occupational Safety and Health Administration (OSHA), and the Maryland State Police. It's free to attend. Prominent among the topics to be discussed will be threats directed from the Internet.
RSA Conference 2017 (San Francisco, California, USA, Feb 13 - 17, 2017) The current state of cybersecurity means there are many opportunities for the industry as a whole to collaborate on new innovations. Discovering the next great opportunity will require everyone to embrace new and unique perspectives from a broadly diverse base of people and sources. RSA Conference 2017 provides the opportunity for all attendees at all levels to grow their knowledge, exchange ideas with peers and further their careers. With opportunity comes great responsibility for the future. Our actions today will have a lasting impact on the strength of the industry—and the safety of the world—tomorrow. At RSA Conference 2017, you will learn about new approaches to info security, discover the latest technology and interact with top security leaders and pioneers. Hands-on sessions, keynotes and informal gatherings allow you to tap into a smart, forward-thinking global community that will inspire and empower you.
Using STIX/TAXII to share automated cyber threat data (San Francisco, California, USA, Feb 15, 2017) Cybersecurity experts representing the financial sector, healthcare, utilities, software providers, government, academia and nonprofits continue to define/develop the STIX/TAXII specifications as the solid foundation for standardizing threat information. This large group of public and private sector organizations and companies are working together to advance the STIX/TAXII specifications in the OASIS Cyber Threat Intelligence Technical Committee. These specs have already dramatically streamlined the analysis of threat data. We invite cybersecurity experts and decision makers to be part of the conversation.
Insider Threat Program Development Training For NISPOM CC 2 (Simi Valley, CA, USA, Feb 22 - 23, 2017) Insider Threat Defense announced it will hold a 2 day training class on Insider Threat Program Development (NISPOM Conforming Change 2) on Feb. 22-23, 2017, in Simi Valley, CA. For a limited time the training is being offered at a discounted rate of $795 (Normally $1395). The training is comprehensive and provides students with the knowledge and resources to develop, implement and manage a robust Insider Threat Program / Working Group. Insider Threat Defense has trained over 500+ organizations and has become the "Leader-Go To Company" for Insider Threat Program Development Training.
Maritime & Port Security ISAO: Operationalizing Cyber Resilience (Cape Canaveral, Florida, USA, Feb 22 - 24, 2017) The Maritime & Port Security Information Sharing & Analysis Organization (MPS-ISAO) convenes its inaugural conference “Maritime & Port Cyber Resilience - Adding a New Layer of Cybersecurity” February 22-24, 2017 at the Global Situational Awareness Center at NASA/Kennedy Space Center, Florida.
Risky Business (London, England, UK, Feb 23, 2017) How are you tackling Cyber Crime in the Property Transaction? Join our panel of expert speakers at the IET in London to find out more about cyber crime in the property transaction and the steps you can take to protect the best interests of your firm and your client.
The 2nd China Automotive Cyber Security Summit 2017 (Shanghai, China, Feb 24, 2017) CACSS2017 will Provide a platform for Automotive OEMs, Tier 1 suppliers, Automotive security solution/ technology/products developers,Automotive electronics companies, IT companies, Mobile data suppliers, Automotive insurance companies, and automotive cyber security experts to address government regulations developing trends, Automotive cyber security standards, updated vulnerabilities, “Black Hat” behaviour motivations, State-of-the-Art technology solutions, critical cyber security challenges and collaboration initiatives; Help you to understand tailored smart car cyber security products and solutions, build up a set of effective cyber security management system and improve the capability of protecting smart cars. This second to non Automotive cyber security industry event will assure you to understand China Automotive cyber security industry business opportunities, network with China local customers and consolidate your worldwide leadership.
Second Annual International Security Conference (Riyadh, Saudi Arabia, Feb 27 - 28, 2017) The conference will facilitate national, regional and international collaboration between government, industry and critical infrastructure organizations. It will also feature investors who want to diversify their portfolio into international companies, particularly in the field of cyber security sectors where innovation could benefit the regional cyberdefense capacity.
SANS Dallas 2017 (Dallas, Texas, USA, Feb 27 - Mar 4, 2017) We are pleased to invite you to attend SANS Dallas 2017, on February 27- March 4 at The Westin Dallas Downtown, located in the heart of the city. We have selected several of our top information security courses to provide you with the training and certification that you need to boost your career by learning from the best! SANS instructors are industry professionals who will ensure that you not only learn the material, but that you will also be able to apply what you learn your first day back in the office.
Autonomous Vehicles Silicon Valley (Santa Clara, California, USA, Feb 28 - Mar 2, 2017) The road to autonomy: Regulation. Consumer Acceptance. Safety & Security. Explore the latest technologies and hottest issues for the autonomous vehicles industry.
The Cyber Security Summit: Denver (Denver, Colorado, USA, Mar 1, 2017) This event is an exclusive conference connecting Senior Level Executives responsible for protecting their companies’ critical data with innovative solution providers & renowned information security experts. Learn from cyber security thought leaders including: Mary McCord, Asst. Attorney General for National Security, U.S. Dept. of Justice & Chad Alvarado, Supervisory Special Agent, Cyber Task Force, FBI Denver Division. Engage in panel discussions focusing on trending cyber topics including Emerging Threats to IoT & Big Data, Insider Threats, and Compliance. Receive half off your admission with promo code cyberwire50 at CyberSummitUSA.com and view details including the full agenda, participating solution providers & confirmed speakers
International Cyber Risk Management Conference (ICRMC) (Toronto, Ontario, Canada, Mar 2 - 3, 2017) The third annual International Cyber Risk Management Conference (ICRMC) brings together a world class roster of experts with cross-sector, global and multidisciplinary expertise to share knowledge, lessons learned, and methodology on cyber security. We are delighted to build on last year’s very successful ICRMC. Cyber security has grown into a global pandemic and organizations of all sizes are struggling with questions on how to mitigate, manage, and transfer cyber risk. We’ve structured our agenda based on delegate feedback and our exceptional 2017 Advisory Committee is determined to provide engaging high-profile speakers and compelling content to share knowledge, captivate and educate. Visit www.icrmc.com for details.
SANS San Jose 2017 (Milpitas, California, USA, Mar 6 - 11, 2017) Securing and defending your network has never been more important as attacks and breaches make the news daily. Gain the skills and tools you need to win the battle against the wide range of cyber adversaries who want to harm your environment. SANS San Jose 2017 offers six hands-on, intensive cyber security training courses.
15th annual e-Crime & Cybersecurity Congress (London, England, UK, Mar 7 - 8, 2017) Europe's largest and most sophisticated gathering of senior cybersecurity professionals from international business, governments, law enforcement and intelligence agencies.
Investing in America’s Security: Cybersecurity Issues (Jersey City, New Jersey, USA, Mar 10, 2017) Please join us for the 5th Annual Northeast Regional Security Education Symposium hosted by the Professional Security Studies Department at New Jersey City University. The Symposium’s keynote address will be delivered by Milan Patel of K2 Intelligence, formerly the FBI’s Cyber Division Chief Technology Officer. Speakers include NJCCIC Director Michael Geraghty. NJCU students pursuing their D.Sc. degree will present academic research posters and a panel of experts will discuss careers in cyber security.
IAPP Europe Data Protection Intensive 2017 (London, Englan, UK, Mar 13 - 16, 2017) Set in London, the Data Protection Intensive delivers innovative solutions to today’s top privacy and data protection challenges. Known for its exceptional programming, the Intensive has come into its own as a leading forum for practical data protection education.
Rail Cyber Security Summit (London, England, UK, Mar 14 - 15, 2017) Now in its second year, the event will take place at the Copthorne Tara Kensington hotel in London between March 14th and 15th 2017 and will feature a range of experts from the rail transport industry, as well as leading Government and global cyber security leaders and academics working in the field.
CyberUK 2017 (Liverpool, England, USA, Mar 14 - 16, 2017) Announcing the UK government's flagship IA and cyber security event, for 2017. This is a three day event that will bring together cyber security leaders and professionals from across the UK’s information security communities from both the public and private sector. The NCSC’s partnership with information security businesses of all sizes is essential in strengthening the UK’s cyber resilience. CyberUK 2017 will play a key role in defining the role industry must play in achieving this step change, and is expected to attract 1,600 information assurance (IA) and cyber security leaders and professionals.
Cybersecurity: The Leadership Imperative (New York, New York, USA, Mar 16 - 17, 2017) Cyber risk impacts every element of your organization – and even the most brilliant information security expertise must be supported by a cross-functional cybersecurity structure and culture to succeed. Cybersecurity: The Leadership Imperative will provide case studies and actionable insights on building and maintaining a structure in which leaders across the organization are able to work together seamlessly to comprehend, measure and respond to cyber risk challenges.
BSides Canberra (Canberra, Australia, Mar 17 - 18, 2017) BSidesCbr is a conference designed to advance the body of Information Security knowledge, by providing an annual, two day, open forum for discussion and debate for security engineers and their affiliates. We produce a conference that is a source of education, collaboration, and continued conversation for information technologists and those associated with this field. The technical and academic presentations at BSidesCbr are given in the spirit of peer review and advanced knowledge dissemination. This allows the field of Information Security to grow in breadth and depth, and continue in its pursuit of highly advanced scientifically based knowledge.