Maryland Cyber People's Choice Award: last day to vote for the CyberWire.
If you're a fan of the CyberWire, please vote for us today in Maryland Cyber's People's Choice Awards. (And thank you for your support.)
If you're a fan of the CyberWire, please vote for us today in Maryland Cyber's People's Choice Awards. (And thank you for your support.)
Now that we've cleared up any misunderstanding about the Atlantic Council's fictional exercise scenario, we continue our coverage of Cyber 9/12 with some perspective from the US Congress. The ranking member of the House Armed Services Committee, Rep. Jim Langevin (D-RI) looked back over his Congressional service and offered some optimism (he sees a general baseline of rudimentary but sound cyber knowledge among his colleagues) and some counsel (streamline oversight and avoid naive lawmaking by analogy).
Spam surged this week after a global drop-off dating to mid-December of 2016. The December-to-March hiatus occurred when the Necurs botnet ceased activity, apparently at its masters' command. Its sudden return seems due to a pump-and-dump penny stock campaign. Naked Security says the attempted manipulation involves InCapta Inc. (INCT), a pink-sheet-listed media company, but the scam seems to be a third-party caper.
Necurs had formerly been used principally to distribute ransomware. This reappearance of the criminal botnet with a new purpose doesn't mean that ransomware is yesterday's news: the SANS Internet Storm Center continues to track new Cerber infestations daily.
A vulnerability in Moodle's content management systems, widely used in universities, could expose academic servers to compromise. eLearning platforms are particularly at risk.
In the US, the IRS and the Department of Education have suspended their online Federal Student Aid (FSA) tool. The IRS's related Data Retrieval Tool was suspended as security precaution. It appeared leaky.
Investigation and recriminations continue to surround US election hacking.
Security services worldwide grapple with ISIS messaging.
UK authorities have joined the US in prohibiting large electronic devices from being carried aboard airline flights originating in specific airports. Tunisia, Turkey, Lebanon, Saudi Arabia, and Egypt are affected. The UK referenced only "evolving terrorist threats"; the US cited intelligence indicating jihadist plans to conceal explosives in devices like laptops.
US armed services are looking for ways of punishing bad online behavior. Whatever they come up with will no doubt fall under Article 134 of the UCMJ.
Today's issue includes events affecting Australia, China, Egypt, Finland, Jordan, Lebanon, Russia, Saudi Arabia, Tunisia, Turkey, Ukraine, United Arab Emirates, United Kingdom, and United States.
In today's podcast, we hear from our partners at the Johns Hopkins University as Joe Carrigan offers his take on the Cloudbleed bug. Our guest is Philip Susmann (from the Norwich University Applied Research Institutes) on Norwich's DECIDE cyber security simulation platform.
Special editions of the podcast are also up. See Perspectives, Pitches, and Predictions from RSA, and an overview of how artificial intelligence is being applied to security. And see also Cylance's video interview with our Producer.
"We've come a long way from where we were when I first started with cyber." (The CyberWire) US Representative Jim Langevin (D-RI), long-serving member of the House and currently ranking member of the House Armed Services Committee, addressed Cyber 9/12 with an account of how far he believed Congress had come, and what in his view impedes further progress.
NSA Official Suggests North Korea Was Culprit in Bangladesh Bank Heist (Foreign Policy) The deputy director of the NSA says he believes states have entered the bank-robbing business.
Necurs Botnet Returns with Get-Rich-Quick Spam (Infosecurity Magazine) The Necurs botnet has seen a recent spike in activity, shifting its intent from malware distribution to penny stock pump-and-dump spamming.
Switch From Ransomware to Stock Scam Spam by World's Worst Botnet Fiends (Cyware) Cybercriminals behind the Necurs botnet have reactivated the zombie network and returned to their original business of using compromised machines as conduits for spam distribution. In January, Cisco Talos reported that the Necurs botnet had gone offline, taking the typical volume of Locky ransomware-tainted spam emails with it.
Global spam volume goes back up to deliver huge pump-and-dump scam (Naked Security) Recently, global spam volumes plunged, but they’re back up, at least for now, with a huge pump-and-dump stock scam.
"Blank Slate" campaign still pushing Cerber ransomware (Internet Storm Center) Cerber ransomware has been a constant presence since it was first discovered in February 2016. Since then, I've seen it consistently pushed by exploit kits (like Rig and Magnitude) from the pseudoDarkleech and other campaigns. I've also been tracking Cerber on a daily basis from malicious spam (malspam).
Locky, Cerber Ransomware Skilled at Hiding (Threatpost) Since January, a number of ransomware families are sharing a common infrastructure with different techniques allowing the malware to hide from detection systems.
Microsoft's 'Application Verifier' bug-finder is easily pwnable (Register) Undocumented feature allows installation of persistent malware
Three UK's mobile customers experience new data breach (the Guardian) Customers logging into their accounts see other customers’ data usage and call history in ‘shocking breach of data privacy’
Critical Moodle Vulnerability Could Lead to Server Compromise (Threatpost) A critical vulnerability in Moodle, an open source system deployed across hundreds of thousands of universities, could expose the server to compromise.
Flaws in Moodle CMS put thousands of e-learning websites at risk (CSO Online) Organizations that use the popular Moodle learning management system should deploy the latest patches as soon as possible because they fix vulnerabilities that could allow attackers to take over web servers.
Code Execution Vulnerability Found in Libpurple IM Library (Threatpost) A severe vulnerability has been disclosed in libpurple, the library used in the development of a number of popular instant messaging clients, including Adium for the macOS platform.
IRS issues new tax scam warnings, FSA tool suspended due to security concerns (CSO Online) The Internal Revenue Service (IRS) has issued a new warning to businesses, taxpayers, and tax prep professionals about Phishing scams targeting the sensitive information they work with on a daily basis. Soon after, the IRS and the US Department of Education suspended a tool that helps people obtain financial aid for college.
Student Aid Tool Held Key for Tax Fraudsters (KrebsOnSecurity) Citing concerns over criminal activity and fraud, the U.S. Internal Revenue Service (IRS) has disabled an automated tool on its Web site that was used to help students and their families apply for federal financial aid.
Victims' real details helping hackers trick victims into installing banking malware (Graham Cluely) Malicious spam campaign embeds German users’ real-life addresses and personal details into poisoned emails.
Security failings exposed by hackers’ cyber attack on hospitals (Yorkshire Post) Hackers exposed basic security failings in a major cyber attack on three hospitals in the region, an investigation has found.
Why American Farmers Are Hacking Their Tractors With Ukrainian Firmware (Motherboard) A dive into the thriving black market of John Deere tractor hacking.
GitHub Uses Broken Cryptography, But It Has a Plan (Motherboard) SHA-1 rears its ugly head.
LastPass extensions can be made to cough up passwords, deliver malware (Help Net Security) LastPass Chrome and Firefox extensions contain flaws that could allow malicious websites to steal victims' passwords or execute commands on their computer.
Mediaserver Vulnerabilities Highlight Android’s March Security Bulletin (TrendLabs Security Intelligence Blog) The Android security bulletin for March, published last March 6, contains 15 vulnerabilities that we discovered and privately disclosed to Google. Like some of our previous discoveries, many of these new vulnerabilities concern Mediaserver, which is the component responsible for scanning and indexing all available media files in the Android operating system.
Verizon BlackBerry Priv March Security Update Released (Geeky Gadgets) Verizon Wireless has released a new software update for the BlackBerry Priv smartphone on its network and the update includes the March security update for
Will Vault7 Shake Infosec Like Edward Snowden? (Infosecurity Magazine) The Wikileaks ‘Vault7’ release earlier this month reignited the reality of state-sponsored espionage, and what our governments know about us
What is the average cost of a cyber attack and the next possible targets (Stock News USA) Fulminant development of technology has meant a breakthrough and a major reconfiguration of how companies develop their activities. New technologies do not include, however, only benefits, but also promote a number of risks, such as increasing
iovation Survey Reveals 85% of Banking Customers Across Generations Eager to Replace Passwords with More Modern Authentication Methods (Marketwired) Consumers share desire for increased security and improved user experience, but each generation has its own idea of the best password alternative
Are Small Business Owners Protecting Themselves from Cyber Attack? (Manta) Hackers are increasingly targeting small businesses, but few owners believe they are at risk of attack.
Goodbye Mama Bear, the cybersecurity community will miss you (CSO Online) Becky Bace, top woman in cybersecurity, has passed away.
Five Questions Board Members Should Ask Their CISO (Infosecurity Magazine) Organizations need to approach security from the first line defenses in the IT department up to the board room
Follow the money! Where VC security investment is occurring (CSO Online) Where is investment happening now in security? Jeff Fagan, the founder of Accomplice, tells us about priorities in VC funding today
Elisa goes shopping at enterprise-focused Santa Monica Networks (European Communications) Finland’s Elisa has acquired part of IT network and data centre company Santa Monica Networks as it looks to strengthen its offering to enterprise customers.
Celebrated Technology Leaders Come Together To Tackle Devasting Data Loss In Banking (PRNewswire) Three eminent technology leaders have joined forces to launch BOHH...
Why the Best Is Yet to Come for Palo Alto Networks, Inc. (The Motley Fool) The next-gen security company's top-line slowdown shouldn't last forever.
Is Ixia (XXIA) in Oversold Territory? (Oracle Examiner) In the last trading session, Ixia (XXIA) subtracted its value by -0.15% closing at the price of $19.55. The stock currently has market capitalization of 1.62 Billion, with average volume of 1.35 Million shares.
Cisco Systems Dividend Stock Analysis (Seeking Alpha) Whoa! Shaking off the cobwebs on my full-on dividend stock analysis skills here. It’s been quite some time since I’ve independently wrote an article on one divi
FireEye CEO: Russian hacking has changed the cybersecurity game (TheStreet) Kevin Mandiant says the security giant has adapted to the new geopolitical landscape, and hopes its results will follow.
Optus Business signs Energy Australia for telco and managed services (ZDNet) Optus Business has extended its telecommunications and managed services deal with Energy Australia for a further five years to provide security, datacentre, contact centre, and mobile management services.
Digital Shadows Appoints Alex Seton as VP Business & Corporate Development (Online PR Media) Alex Seton joins the rapidly growing leader in external digital risk management to drive global strategic partnering and corporate development efforts
Northrop's commercial cybersecurity spinoff just hired a former Trump transition official for its board (Washington Business Journal) A commercial cybersecurity company that spun off from Northrop Grumman Corp. (NYSE: NOC) earlier this year, known as BluVector, announced Tuesday that it’s hiring a former member of President Donald Trump’s transition team to its board of directors.
KnowBe4 Appoints Former Gartner Research Analyst Perry Carpenter as Chief Evangelist and Strategy Officer (Yahoo! Finance) Perry Carpenter, former Research Director, Security & Risk Management and esteemed analyst at Gartner, has joined KnowBe4 as Chief Evangelist and Strategy Officer. As the provider of the most popular platform for security awareness training and simulated phishing, KnowBe4 developed this new role to strengthen
Google will provide free cybersecurity tools for election organizers in Europe (Cyberscoop) As the threat of cyberattacks looms over Europe in the months preceding several crucial elections, Alphabet subsidiary companies Jigsaw and Google announced Tuesday the launch of a security tool package to help election organizers and civic groups ward off hackers and other forms of digital interference.
A Cybersecurity Arsenal That’ll Help ‘Protect Your Election’ (WIRED) Google and Jigsaw are helping protect elections from DDoS attacks and more.
Red Flag Windows: Microsoft modifies Windows OS for Chinese government (Ars Technica) Chinese government blocked Microsoft product purchases after NSA leaks.
Atos, Siemens sign cyber-security MoU in US market (Telecompaper) Atos and Siemens have expanded their strategic partnership by signing a Memorandum of Understanding (MOU) to collaborate on integrated services addressing the cyber-security needs of utility, oil and gas companies in the US market.
Sticky Password and ESET Team Up on a Password Management Solution (Benzinga) ESET Password Manager allows users to securely store and organize passwords
Gemalto’s HSM enables Microsoft Azure Information Protection customers to maintain full control of encryption keys (Gemalto) Organizations can now take advantage of “Hold Your Own Key” capabilities with on-premises SafeNet Luna HSMs to secure confidential data in Microsoft Azure and Microsoft Office 365
Code Dx Announces Integration with Burp Suite Application Security Tool (Marketwired) Code Dx now available in PortSwigger BApp Store offering Uusers greater application security coverage
DUBAI : DarkMatter’s Pegasus takes flight as UAE’s answer to Palantir - Intelligence Online (Intelligence Online) The cyber-security firm which has a special relationship with the Dubai police force is getting into data mining.
Microsoft Edge comes last in browser security battle (TechRadar) Chrome remains the undisputed champion at Pwn2Own
Waterfall Security Collaborates with Educational Organization Cybati for Indepth ICS Cybersecurity Training (Yahoo! Finance) Waterfall Security Solutions, a global leader in cybersecurity technologies for critical infrastructures and industrial control systems, today announced its collaboration with the cybersecurity educational organization Cybati. Cybati's mission
Best Mobile Antivirus (Computer Business Review) These five options for mobile antivirus include varying prices and features from household names, and some up and coming names...
Jamf gives admins zero day support for the latest Apple OS releases (BetaNews) New releases always present a challenge for system admins and that applies to Apple just as much as other systems.
High-Tech Bridge Teams with F5 to Deliver Comprehensive Web Application Security Testing (Yahoo! Finance) High-Tech Bridge, a leading web security company, announced today that it has joined the F5 Networks® Technology Alliance Program . High-Tech Bridge’s award-winning application security testing platform ImmuniWeb® leverages a machine learning technology for intelligent automation of web vulnerability
Transform Your SOC with Managed Services Using Carbon Black and QRadar (Security Intelligence) Carbon Black is a leader in next-generation endpoint security, and its products are initiating an evolution in SOC process and procedure.
IBM Automates Compliance Controls and Data Security for Multi-Cloud Workloads (PRNewswire) IBM (NYSE: IBM) today announced a new cloud-based...
Unused apps pose a huge security risk says Kaspersky Labs; here's what you could do for safety (Tech2) According to a report by Kaspersky Labs, your smartphone is vulnerable to threats, if you have a lot of unused apps installed on your phone.
Software development teams embrace DevSecOps automation (Help Net Security) Mature development organizations ensure automated security is woven into their DevOps practice, early, everywhere, and at scale, according to Sonatype.
Hybrid IT is becoming a standard enterprise model (Help Net Security) The hybrid IT enterprise model is becoming reality, but there’s no single playbook to get there. Automation helps reduce the operating costs.
Your Mac is not malware-proof: a look at the threats and defenses (Naked Security) What’s the state of play on malware for the Mac platform? We checked in with Sophos Labs for an update
Deception security doesn't have to be onerous or expensive (Help Net Security) When talking about deception security, most infosec pros' mind turns to additional solutions that companies have to buy, deploy, and manage.
Cyber threat sharing improved, but 'not the end of the road' (FederalNewsRadio.com) The intelligence community says it's laid groundwork for public-private cyber threat hub, but still far from cyber 911" that lawmakers, agencies envisioned.
Threat Intelligence and Analytics: Staying Ahead of Cyber Criminals (eSecurity Planet) Threat intelligence is the best way to stay one step ahead of cyber criminals and prevent information or financial losses. We offer a thorough overview of cyber threat intelligence and how to implement it in your business.
Future of the SIEM (Dark Reading) Current SIEM systems have flaws. Here's how the SIEM's role will change as mobile, cloud, and IoT continue to grow.
Trend Micro's three tips to catch a hacker (IT Brief) If you know what you’re looking for you might be able to spot a potential hacker and an impending cyber attack.
Forget Bitcoin. The Blockchain Could Reveal What’s True Today and Tomorrow (WIRED) The technology underlying bitcoin could fuel powerful systems for forecasting the future—and create a digital feed for facts.
Marshall alum wins prestigious NASA award, credits university’s digital forensics program for his success (Huntington News) Marshall alumnus Brad Roeher has received the Excellence in Values Award for his work with the NASA Independent Verification and Validation Program (IV&V) Secure Coding Portal.
UK follows US ban of electronic devices in cabins on some flights (CSO Online) The U.K. is joining the U.S. in its ban restricting passengers from bringing some electronic devices onto flights from the Middle East.
Rebuild Our Defenses for the Information Age (Wall Street Journal) AEI’s Mackenzie Eaglen writes that Trump’s infrastructure upgrades could start at the Pentagon, which still uses 8-inch floppy disks.
Army Central can’t 'look the other way' from network vulnerabilities (C4ISRNET) Lt. Col. Dwyke Bidjou, ARCENT’s deputy chief of information operations, spoke to C4ISRNET about strategy, some of which remains classified.
Military seeks new ways to punish bad online behavior (Military Times) Skeptical Congress members on Tuesday pressed senior military leaders to take more aggressive action to prevent and punish inappropriate online activity by service members, including posts of "intimate" images on social media sites.
In wake of Marines United nude-photo scandal, lawmakers question DOD social media policies (Stars and Stripes) Leaders from the Marines, Navy, Air Force and Army testified during a hearing held by a House armed services subcommittee about each service’s social media policies and the training in place after reports that some Marines and sailors had participated in a Facebook site that distributed nude photos of women in the service.
Cyber Firm at Center of Russian Hacking Charges Misread Data (VOA) Influential British think tank, Ukraine’s military dispute US cybersecurity firm report used to buttress claims of Russian hacking in presidential election
2 Detained for Possible Weapon Link in Paris Airport Attack (VOA) Paris prosecutor's office says two suspects remained in custody Tuesday after being detained Monday, and face possible preliminary charges of association with a terrorist enterprise
ISIS is winning the cyber war. Here's how to stop it. (TheHill) OPINION | We must beat ISIS at its own game.
How to Hunt a Lone Wolf (Foreign Affairs) To make one-off attacks less likely and prepare for those that do occur, governments should keep would-be terrorists isolated, build strong relationships between Muslim communities and law enforcement, monitor social media, and discredit the ideology that lone wolves embrace.
Russian bank claims hackers are trying to connect it to Trump (Naked Security) Claims of DNS spoofing between a Russian bank and a Trump server add ‘fake traffic’ to the lexicon of obfuscation
Russian hackers were likely surprised by blowback from cyberattacks on U.S. elections, analysts say (Los Angeles Times) Moscow may have miscalculated the fallout of its suspected hacking, which has led to the resignation of a high ranking U.S. official, Congressional hearings and a bipartisan circling of the wagons.
Ukraine Lawmaker Calls On U.S. To Investigate New 'Evidence' Of Secret Payments To Manafort (RadioFreeEurope/RadioLiberty) Paul Manafort is under scrutiny again after a Ukrainian lawmaker released documents he says show that U.S. President Donald Trump’s former campaign chairman went to great lengths to hide $750,000 tied to his work for former President Viktor Yanukovych.
GOP Lawmaker to FBI: Stop the Leaks in Russia Probe or Lose A Key Surveillance Tool (Defense One) After top cop confirms investigating the Trump campaign, a House member threatens to hold investigatory powers hostage.
Intel leaders express regret over Russian hacking response (TheHill) At a Thursday hearing on Russian interference in the 2016 election, FBI director James Comey said he regretted not being more forceful in notifying the Democratic party about the threat of Russian hackers.
Clinton camp unloads on Comey (POLITICO) “Russia probe that Comey confirmed was, as best we can tell, in effect before Nov. 8,” a former Clinton spokesman says.
Breitbart covered by FBI's Russia probe: Report (Washington Examiner) Breitbart News, the right-leaning news site that aggressively promoted Donald Trump's bid for the presidency, is part of the FBI's probe on Russia's influence of the election, according to a report.
A Court Will Decide if a GIF Can Be Considered a ‘Deadly Weapon' (Motherboard) Cases like this have strong implications for the roughly 10,000 people with photosensitive epilepsy in the US.
Park uses facial recognition to wipe out toilet paper thieves (Naked Security) ‘I am a bit uncomfortable about being watched in such places’, as one user of the public facilities in Beijing’s Tiantin Park noted, is probably the understatement of the week
For a complete running list of events, please visit the Event Tracker.
EnergySec Security Education Week (Austin, Texas, USA, May 14 - 19, 2017) The Energy Sector Security Consortium, Inc.'s Security Education Week is designed for early to mid career cybersecurity professionals currently employed at electric utilities in North America. Students will receive technical instruction on various topics including threat hunting, network packet analysis, and security assessments. Sessions will also cover operational technology used in the electric sector, and instructional workshops from industry vendors. Students will also participate in facility tours hosted by the Lower Colorado River Authority (LCRA), and evening activities designed to build relationships within industry and strengthen the community of cybersecurity professionals.
2017 ISSA International Conference (San Diego, California, USA, Oct 9 - 11, 2017) Each day, cyber threats become increasingly intricate and difficult to detect. Over the past year, we saw that with the rise of device connectivity came boundless opportunities for malicious hackers to attack device vulnerabilities. No cyber security professional can become an expert on these digital dangers without continued efforts to educate themselves on the industry’s latest trends and technologies. We look forward to welcoming you and as many as 900 of your colleagues and peers in San Diego as we discuss topics ranging from incident response to application security to business skills for the information security professional. Join us at the 2017 ISSA International Conference and we’ll help you navigate the Digital Danger Zone.
Maryland Cybersecurity Awards Celebration (Baltimore, Maryland, USA, Mar 22, 2017) Help us celebrate the best and brightest of the Maryland cyberscurity community as we honor the companies, organizations, and individuals that have protected businesses and government agencies with their cutting-edge technologies; thwarted cyber criminals with their outstanding cybersecurity services; demonstrated exemplary knowledge, expertise, leadership and innovative thinking; or made a significant contribution to Maryland’s cybersecurity ecosystem.
Integrated Adaptive Cyber Defense (IACD) Community Day (Laurel, Maryland, USA, Mar 23, 2017) Advancing cyber operations through secure automation & interoperability. Government agencies, commercial firms, research organizations, academic institutions and cyber security experts align in community efforts demonstrating cyber defenses art-of-the-possible, through automation and interoperability. Learn how to dramatically change the timeline and effectiveness of cyber defenses, increase community awareness and defensive capabilities. Free event, registration requested.
SANS Pen Test Austin 2017 (Austin, Texas, USA, Mar 27 - Apr 1, 2017) Every organization needs skilled people who know how to find vulnerabilities, understand risk, and help prioritize resources based on mitigating potential real-world attacks. That's what SANS Pen Test Austin is all about! If you like to break things, put them back together, find out how they work, and mimic the actions of real-world bad guys, all the while providing real business value to your organization, then this event is exactly what you need.
cybergamut Tech Tuesday: Software Defined Networking Forensics (Elkridge, Maryland, USA, and online at various local nodes, Mar 28, 2017) Volatility and Tshark were critical components in Booz Allen Hamilton winning the 2016 Digital Forensics Research Work Shop (DFRWS) international Software Defined Networking (SDN) digital forensics challenge. This was achieved by creating a prototype solution for the extraction of forensics artifacts from SSL/TLS encrypted packets between a software defined networking (SDN) switch and controller as well as a memory dump from the SDN switch. Mr. Bull and Mr. McAlister of Booz Allen Hamilton will articulate the steps which enabled the team to forensically enumerate the SDN network using only open source tools.
IT Security Entrepreneurs' Forum Bridging the Gap Between Silicon Valley & the Beltway (Mountain View, California, USA, Mar 28 - 29, 2017) SINET – Silicon Valley provides a venue where entrepreneurs can meet and interact directly with leaders of government, business and the investment community in an open, collaborative environment focused on identifying solutions to Cybersecurity challenges.
PCI Security Standards Council: 2017 Middle East and Africa Forum (Cape Town, South Africa, Mar 29, 2017) Join your industry colleagues for a full day of networking and one-of-a-kind partnership opportunities. Whether you want to learn more about updates in the payment card industry or showcase a new product, you’ll find it all at the 2017 Middle East and Africa Forum (MEAF).
Insider Threat 2017 Summit (Monterey, California, USA, Mar 29 - 30, 2017) The focus of the Insider Threat Summit is to discuss personnel security issues including cyber security challenges and capabilities, continuous evaluation of privileged identities and ethical physical security considerations. A heightened awareness of insider threats due to numerous newsworthy attacks and unauthorized leaks has brought us together for one main purpose: To better understand security challenges in order to better defend against insider threats.
2nd Annual Billington International Cybersecurity Summit (Washington, DC, USA, Mar 30, 2017) The 2nd Annual Billington International Cybersecurity Summit on March 30, 2017 at the National Press Club in Washington, DC will feature over 300 world class cybersecurity decision-makers from allied nations and the US in an intensive day of knowledge exchange and relationship building. NOTE: Attendees must be citizens of the U.S. or allied nations to attend this event. The summit, which will attract senior influencers in cybersecurity from allied nations across the world, has as its theme: Protecting Critical Infrastructure in a Connected World.
Yale Cyber Leadership Forum: Bridging the divide between law, technology, and business (New Haven, Connecticut, USA, Mar 30 - Apr 1, 2017) The Yale Cyber Leadership Forum will take place on Yale University's campus and will focus on bridging the divide between law, technology and business in cybersecurity. With McKinsey & Company as our knowledge partner, the Forum will integrate McKinsey’s extensive knowledge of best practices in cybersecurity with Yale’s scholarly expertise. The Forum will expose participants to effective approaches to recognizing, preparing for, preventing, and responding to cyber threats.
WiCyS 2017: Women in Cybersecurity (Tucson, Arizona, USA, Mar 31 - Apr 1, 2017) The WiCyS initiative has, since 2013, become a continuing effort to recruit, retain and advance women in cybersecurity. It brings together women (students/faculty/researchers/professionals) in cybersecurity from academia, research and industry for sharing of knowledge/experience, networking and mentoring.
GITECH Summit 2017: Revolution of Solutions (Annapolis, Maryland, USA, Apr 2 - 4, 2017) The GITEC Summit “Revolution of Solutions: Transforming Government” will be held April 2-4, 2017 at the Westin Annapolis. This year’s summit will focus on the continued transition and transformation surrounding the development, implementation, management and use of information technology for mission-critical functions.
InfoSec World Conference and Expo 2017 (ChampionsGate, Florida, USA, Apr 3 - 5, 2017) The conference will feature security practitioners who speak from experience on the real-world challenges companies are facing today. The conference is most suitable for those whose responsibilities include creating solutions. The organizers bill it as a training conference.
Cyber Security Summit: Atlanta (Atlanta, Georgia, USA, Apr 6, 2017) If you are a Senior Level Executive responsible for making your company’s decisions in regards to information security, then you are invited to register for the Cyber Security Summit: Atlanta. Receive 50% off of a Full Summit Pass when you register with code CYBERWIRE50 (standard price of $350, now only $175 with code). Register at CyberSummitUSA.com. The Cyber Security Summit: Atlanta is an exclusive conference connecting Senior Level Executives responsible for protecting their companies’ critical data with innovative solution providers & renowned information security experts. for details visit CyberSummitUSA.com.
SANS 2017 (Orlando, Florida, USA, Apr 7 - 14, 2017) Success in information security requires making a commitment to a career of learning, from the fundamentals to advanced techniques. To put you firmly on that learning path, join us at SANS 2017 in Orlando, Florida from April 7-14. This event features over 40 different cutting-edge courses taught by top industry professionals who will provide you with the best available information and software security training. SANS 2017 also features numerous opportunities to learn new skills, techniques, and trends at the SANS@Night talks, Vendor Expo, and Lunch-and-Learn sessions. You will hear about the latest and most important issues in talks led by SANS practitioners who are leading the global conversation on cybersecurity.
Unprecedented Counterintelligence Threats: Protecting People, Information and Assets in the 21st Century. (Arlington, Virginia, USA, Apr 10, 2017) This full day symposium will provide insights into evolving threats to the nations security and identify effective ways of addressing them. Highlights Include: A keynote address from National Counterintelligence Executive (NCIX) Bill Evanina. The presentation of a new paper from INSA’s Security Policy Reform Council, “Assessing the Mind of the Malicious Insider,” which discusses the psychological traits and stressors that lead to malicious behavior and identifies continuous evaluation methodologies that can provide early warning of destructive acts. A review of best practices in implementing insider threat programs in the public and private sectors. An assessment of the risks to key supply chains and the prospects of delivering goods uncompromised. A discussion of the greatly overlooked long-term impacts of the 2015 theft of OPM personnel data.
Hack In the Box Security Conference (Amsterdam, the Netherlands, Apr 10 - 14, 2017) Back again at the NH Grand Krasnapolsky, HITB2017AMS takes place from the 10th till 14th of April 2017 and features a new set of 2 and 3-day technical trainings followed by a 2-day conference with a Capture the Flag competition, technology exhibition with hackerspaces, lock picking villages and hardware related exhibits plus a free-to-attend track of 30 and 60 minute talks!
Cyber Warrior Women: Blazing the Trail (Catonsville, Maryland, USA, Apr 19, 2017) Join the Cybersecurity Association of Maryland, Inc. (CAMI), in partnership with The CyberWire, Fort Meade Alliance, and presenting sponsor Exelon Corporation, for "Cyber Warrior Women: Blazing the Trail." This special program is designed to spotlight some of Maryland’s diverse and dynamic female cybersecurity professionals with stories of triumph and tribulation, advice and inspiration. Can't join us in person? Host a viewing party with your colleagues or fellow students, or tune in individually.
SANS Baltimore Spring 2017 (Baltimore, Maryland, USA, Apr 24 - 29, 2017) SANS Institute, the global leader in information security training, today announced the course line-up for SANS Baltimore Spring 2017 taking place April 24 – 29. All courses offered at SANS Baltimore are open to civilians and veterans. Included among the course line-up are several master's degree and graduate certificate courses that are eligible for GI Bill benefits through the SANS Technology Institute graduate school.
Defence Information 2017 (Cranfield, England, UK, Apr 26 - 27, 2017) Defence Information 2017 is the major annual communications event of Joint Information Group activities (the JIG reports to the Defence Suppliers Forum) and the Event’s content spans both Information and Support. Our DI’17 Event examines some of the ‘people, process and technology’ issues critical to Team Defence being able to adopt, embed and exploit new (and often disruptive) Information and Communications Technology (ICT) capabilities and associated new ways of working - to productive effect.
Defence Information 2017 (Cranfield, England, UK, Apr 26 - 27, 2017) Defence Information 2017 is the major annual communications event of Joint Information Group activities (the JIG reports to the Defence Suppliers Forum) and the Event’s content spans both Information and Support. Our DI’17 Event examines some of the ‘people, process and technology’ issues critical to Team Defence being able to adopt, embed and exploit new (and often disruptive) Information and Communications Technology (ICT) capabilities and associated new ways of working - to productive effect.
Crimestoppers Conference (Eden Project, Bodelva, St Austell , Apr 27, 2017) Crimestoppers is organising a major one-day conference designed to help local businesses shore up their online security. A range of expert speakers will pinpoint typical cyber pitfalls to avoid. 80% of cyber crime is preventable and just a few key security steps can help avoid damaging your business reputation and finances
Atlantic Security Conference (Halifax, Nova Scotia, Canada, Apr 27 - 28, 2017) Atlantic Canada's non-profit, annual information security conference. AtlSecCon, the first security conference in Eastern Canada focusing on bringing some of the worlds brightest and darkest minds together with one common goal – to expand the pool of IT Security knowledge beyond its typical confines. AtlSecCon provides an unmatched opportunity for IT Professionals and Managers to collaborate with their peers and learn from their mentors.
SANS Automotive Cybersecurity Summit 2017 (Detroit, Michigan, USA, May 1 - 8, 2017) SANS will hold its inaugural Automotive Cybersecurity Summit to address the specific issues and challenges around securing automotive organizations and their products. Join us for a comprehensive look at automotive assembly, industry suppliers, embedded systems, and safeguarding extended customer and product data. The Summit will include two-days of in-depth presentations from top security experts and seasoned practitioners, hands-on learning exercises, and exclusive networking opportunities.
cybergamut Tech Tuesday: Distributed Responder ARP: Using SDN to Re-Engineer ARP from within the Network (Elkridge, Maryland, USA, and online at various local nodes, May 2, 2017) We present the architecture and initial implementation of distributed responder ARP (DR-ARP), a software defined networking (SDN) enabled enhancement of the standard address resolution protocol (ARP) intended to improve network security and performance by exerting much greater control over how ARP traffic flows through the network as well as over what actually delivers the ARP service. Presented by Mark Alan Matties, PhD of The Johns Hopkins University Applied Physics Lab.
Cyber Security Summit in Dallas (Dallas, Texas, USA, May 5, 2017) Sr. Level Executives are invited to learn about the latest threats & solutions in Cyber Security from experts from Proofpoint, CenturyLink, IBM and more. Register with promo code cyberwire50 for half off your admission (Regular price $350)