the third annual Cyber Investing Summit
We continue our coverage of the Cyber Investing Summit, which met in Manhattan Tuesday. Our coverage today includes an overview and an account of the Summit's keynote.
Are you using threat intelligence to its full potential? Download this free report via Recorded Future to learn 12 common threat intelligence use cases.
We continue our coverage of the Cyber Investing Summit, which met in Manhattan Tuesday. Our coverage today includes an overview and an account of the Summit's keynote.
Now that ISIS has been considerably disrupted, Al Qaeda is working online to regain terrorist mindshare lost to the Caliphate. They're calling from the familiar playbook, but with their own emphasis on inspiring attacks in infidel lands.
Dragos offers details on the CHRYSENE threat group, specialists in hitting industrial control systems. Associated with the 2012 and 2016 Shamoon attacks on Saudi Aramco, CHRYSENE has, Dragos says, developed a sophistication beyond groups like Greenbug (a.k.a. OilRig). CHRYSENE's target list concentrates on the petrochemical, oil, gas, and electric generation sectors. It may be extending that target list beyond the Middle East.
AnonPlus, a hacktivist group believed to be based in Italy, has been attacking US state governments. New Mexico is the latest victim, but Idaho and Connecticut were also recently hit. AnonPlus in its communiqués follows the now familiar anarcho-syndicalist line—they have no leaders, they say—and their principal declared interest is opposition to censorship. It's unclear how defacing a workmen's compensation site (among others) fits AnonPlus's strategy, but the nuisance value is undeniable.
GDPR takes effect a week from tomorrow, and researchers continue to find sensitive data exposed online. Imperva has a useful timeline explaining what organizations will be expected to do within seventy-two hours of detecting a breach.
The US Senate passes a resolution restoring net neutrality. The issue now passes to the House.
The US House wants a full report from the Department of Homeland Security on cybersecurity issues surrounding ZTE.
Serbian police have popped the alleged DarkOverlord.
Today's issue includes events affecting China, Ecuador, France, NATO/OTAN, Russia, Serbia, United Kingdom, and United States.
A note to our readers: we'll be at the Jailbreak craft brewery in Laurel, Maryland, tomorrow, covering the latest in their series of cybersecurity symposia. This one's on reverse engineering.
The Dragos Intelligence Team tracks a number of industrial-focused activity groups aimed to exploit, disrupt, and potentially destroy industrial systems globally. Each week in May, Dragos will release new content discussing these adversary details that can be read here.
In today's podcast, we hear from our partners at Virginia Tech's Hume Center as Dr. Charles Clancy discusses how a skills shortage will affect the 5G network buildout. Our guest, Ryan Barnett from Akamai, talks about Drupalgeddon 2.0.
Third Annual Cyber Investing Summit Overview (The CyberWire) Capability gaps indicate opportunities. In cybersecurity, the best way to appreciate those opportunities is to recognize how technological advance also increases cyber risk.
Keynote: Games of inches and games of miles (The CyberWire) Looking for success as an investor or entrepreneur in cybersecurity? Know this: go-to-market is the long game.
With 'Islamic State' in tatters, al-Qaida renews call for jihad (Deutsche Welle) Al-Qaida's leader has urged sympathizers to wage war against the US for opening an embassy in Jerusalem. Experts say the move is an attempt to capitalize on the demise of its main competitor, the "Islamic State."
CHRYSENE (Dragos) CHRYSENE is an activity group targeting ICS operations.
‘You have the baddest of the bad guys after you’: Cyber threats in the energy sector (Norwich Evening News) The UK’s energy infrastructure is becoming an increasingly common target for hackers, according to cyber security experts.
Hacker Publicly Posts Data Stolen From Government-Linked Cyberespionage Group (Motherboard) Last week, Motherboard obtained data from the so-called ZooPark hacking group, which some suspect is connected to Iran. Now the hacker responsible has seemingly dumped the information after receiving a $1,000 payment.
Ecuador Spied on Assange at London Embassy: Report (SecurityWeek) Ecuador reportedly spied on WikiLeaks founder Julian Assange at its London embassy where he has been living since 2012.
Rash of Italian Cyberattacks Target State Governments (Government Technology) The group known as AnonPlus defaced three New Mexico Workers Compensation websites Wednesday, marking the third such attack on state government in six days.
Hacker Breaches Securus, the Company That Helps Cops Track Phones Across the US (Motherboard) A hacker has provided Motherboard with the login details for a company that buys phone location data from major telecom companies and then sells it to law enforcement.
Digital Shadows finds 1.5bn business, consumer files exposed online: one month before businesses face EUR20m fines under GDPR legislation (ITWeb) Vast exposure of data, 4 000 times larger than the Panama Papers, includes documents spanning payroll data, tax return information, medical records, credit card data and intellectual property.
Newly Discovered Malware Targets Telegram Desktop (Dark Reading) Russian-speaking attacker behind new malware capable of lifting credentials, cookies, desktop cache, and key files.
Why Did Email Fraud Attacks Grow 103% Year-Over-Year? (Proofpoint) Email fraud rose to new levels in 2017 and in the first quarter of 2018 and we continue to see an increase in both the size and scope of the problem. These socially engineered attacks, which target people rather than technology, are leveraging many different tactics to successfully lure money and other valuable information away from unsuspecting victims. According to the FBI, business email
Inside an Apple phishing attack (CSO Online) Today on Salted Hash, we’re going to look at a phishing attack from two sides. The first side will be what the victim sees. After that, we're going to see what the criminal sees. We'll also discuss some steps administrators can take to uncover these attacks in their own environments.
Malicious PDF Leads to Discovery of Adobe Reader, Windows Zero-Days (SecurityWeek) Researchers came across a malicious PDF file that exploited zero-day vulnerabilities in Adobe Reader and Windows
Some Firefox Screenshots End Up Publicly Accessible (SecurityWeek) Firefox screenshots that have been shared publicly end up discoverable via search engines, becoming accessible to everyone.
Efail: What A Disclosure FAIL That Was! (RiskBased Security) Yesterday, news broke of a “critical” vulnerability in OpenPGP and S/MIME, named ‘Efail’ that could lead to an attacker gaining access to plaintext emails.
EFAIL, a weakness in openPGP and S\MIME (SANS Internet Storm Center) The next named security issue has hit mainstream press, EFAIL... You may be asked some questions about it over the next day or so.
RIG EK Still Makes Waves, This Time with a Stealthy Backdoor (Threatpost) The main purpose of Grobios malware is to help attacker establish a strong, persistent foothold in a victim's system, in order to drop additional payloads later.
Research Conducted By Comodo Ca Reveals That More Than 1 Million Distrusted Website Certificates From Symantec Remain In Use (Dark Reading) Certificate Authority Aims to Help Businesses and Consumers Worldwide Increase Security of Professional and Personal Internet Usage and Prevent Potential Loss of Business
Google Duplex's gift for gab could be gift for hackers, too (American Banker) Google's new voice assistant technology may be the best right now at imitating human speech. That makes it a potentially powerful tool for bankers — and for cybercrooks.
Microsoft stops rollout of Windows 10 update for devices with select Intel, Toshiba SSDs (CRN Australia) Following user reports of crashing and reduced battery life.
Android device-makers told to provide more security updates by Google (WeLiveSecurity) Google has announced that they will be requiring Android device-makers to provide more security patches regularly in a bid to increase security within the Android ecosystem
Critical Code Execution Flaws Patched in Advantech WebAccess (SecurityWeek) Nearly a dozen vulnerabilities, including critical code execution flaws, patched in Advantech’s WebAccess HMI/SCADA product
Critical Command Injection Flaw Patched in Red Hat Linux (SecurityWeek) A critical vulnerability in the DHCP client in Red Hat Enterprise Linux could allow an attacker to execute arbitrary commands on impacted systems.
Red Hat admins, patch now – don’t let your servers get pwned! (Naked Security) A command injection bug in Red Hat’s DHCP client could allow an attacker to run any command on your computer. As root.
Frequency & Costs of DNS-Based Attacks Soar (Dark Reading) The average cost of a DNS attack in the US has climbed 57% over the last year to $654,000 in 2018, a survey from EfficientIP shows.
How Employees Engage With Company Cybersecurity Policies (Clutch) Our survey reveals that employees generally understand security best practices beyond their engagement with their companies' cybersecurity policies. Companies should emphasize communication and regular security policy training to curb security risks.
Microsoft Wins Lucrative Cloud Deal With Intelligence Community (Bloomberg.com) Microsoft Corp. said it’s secured a lucrative cloud deal with the intelligence community that marks a rapid expansion by the software giant into a market led by Amazon.com Inc.
RunSafe Security procures $2.4 mln seed (PE Hub) McLean, Virginia-based RunSafe Security, a provider of a patented cyberhardening process for vulnerable embedded systems and devices across critical infrastructure, has raised $2.4 million in seed funding. The lead investor was Alsop Louie Partner.
Auth0 Secures $55 Million in New Funding Round (SecurityWeek) Identity-as-a-Service (IDaaS) company Auth0 has raised $55 million in Series D funding led by Sapphire Ventures.
A DC Think Tank Is Using Fake Twitter Accounts And A Shady Expert To Reach The NSA, FBI And White House (BuzzFeed) ICIT bills itself as "America's Cybersecurity Think Tank." But BuzzFeed News found it's running fake Twitter accounts and its top expert has questionable credentials.
Apple reportedly looks to Virginia for another US campus (TechCrunch) It seems Virginia is for tech lovers. According to a report in The Washington Post, Apple has been searching for places to put hubs as it contemplates how to spend the $30 billion it has committed for new facilities and 20,000 new employees in the U.S. over the next five years — and it looks …
RunSafe Security Announces Availability of Software Guardian to Cyberh (PRWeb) RunSafe Security, the pioneer of a patented cyberhardening process for vulnerable embedded systems and devices across critical infrastructure, today announced the
Coinbase’s first investment, Compound, earns you interest on crypto (TechCrunch) Compound wants to let you borrow cryptocurrency, or lend it and earn an interest rate. Most cryptocurrency is shoved in a wallet or metaphorically hidden under a mattress, failing to generate interest the way traditionally banked assets do. But Compound wants to create liquid money markets for cryp…
Kingston Encrypted USB Drives are Key Component of Impending GDPR Compliance (BusinessWire) Kingston's encrypted USB drives are a key component of impending GDPR compliance and cyber security regulations.
EY launches a global IoT/OT Security Lab to help clients stay ahead of emerging threats (PR Newswire) The Warsaw-located lab focuses on prototyping cyber risk defense for critical infrastructures
RunSafe Security Announces Availability of Software Guardian to Cyberharden Vulnerable Embedded Systems and Devices (PRWeb) RunSafe Security, the pioneer of a patented cyberhardening process for vulnerable embedded systems and devices across critical infrastructure, today announced the
F-Secure Packs Best of Man and Machine Into New Security Offering (PR Newswire) Security perimeters are no longer enough to protect organizations from...
72 Hours: Understanding the GDPR Data Breach Reporting Timeline (Blog | Imperva) We're down to the wire with respect to the General Data Protection Regulation (GDPR) compliance deadline of May 25, 2018.
Companies ditch data as GDPR deadline approaches (Help Net Security) To reduce their exposure, the majority of companies are being more selective in the data they collect and manage, with 70 percent disposing of data ahead of the deadline for compliance.
FIDO Alliance Appoints Facebook to Board of Directors (Dark Reading) Facebook joins Google, Microsoft, Amazon, and Intel, all among major influential tech companies backing FIDO authentication.
Using Marketing Strategies to Influence Security Behaviour (Infosecurity Magazine) When it comes to influencing security behavior, it’s helpful to first look at effective marketing strategies.
You Should Be Using Two-Factor Authentication on Everything (Motherboard) Day three of our personal security tuneup: turn on that 2FA!
10 Security Behaviors That Anger Us (SecurityWeek) We can all be more understanding of people when they do exactly what we incentivize them to do. To that point, I offer “10 security behaviors that anger us, but that we incentivize".
Bitcoin Could Account for 0.5% of Total Global Energy Consumption By the End of the Year (Motherboard) New research suggests that Bitcoin will account for 0.5 percent of the world’s electricity demand by the end of this year. But one researcher says he still isn't getting the whole picture.
The Army is grooming an elite tier of electronic warriors (C4ISRNET) The service wants its approach to a cyber/EW workforce to mirror the relationship between special operations forces and the high-end special operators in Joint Special Operations Command.
Army realigns digital ‘hunters’ for rising electronic warfare (C4ISRNET) The directorate was re-aligned to increase test efficiency for ISR, EW, biometrics and counter IED systems.
The SEC creates an educational ‘token’ to stop scammers (TechCrunch) “Travel is expensive, but we are at the cusp of a revolution that will democratize travel and leisure for everyone,” reads the breathless whitepaper for HoweyCoins. “The Internet was the first part of the revolution. The other part is blockchain technology and cryptocurrencies.…
Forget scanning license plates; cops will soon ID you via your roof rack (Ars Technica) ELSAG LPR upgrade can ID "spare tire, bumper sticker, or a ride-sharing company decal."
Navy Cyber War Breakthrough - AI Finds Malware in Encrypted Traffic (Warrior Maven) Pentagon searches for malware buried in encrypted web traffic
Uncrackable encryption could be on the horizon (GCN) Recent experiments have shown it’s possible to transmit photons over long distances, major strides toward the goal of quantum cryptography.
Facebook’s Zuckerberg to Meet European Officials Next Week (Wall Street Journal) Facebook CEO Mark Zuckerberg will meet with French President Emmanuel Macron and other European officials next week, as the Silicon Valley giant tries to calm tension with regulators and policy makers on both sides of the Atlantic.
Who is Winning the Global Competition for Protecting Citizens' Data? (PR Newswire) Webroot, the Smarter Cybersecurity® company, revealed results from...
More Attention Needs to be on Cyber Crime, Not Cyber Espionage (TechNative) Much has been made in the news by governments identifying the serious threats of state-sponsored or directed actors, also known as advanced persistent threats (APT)...
MI5 Chief: Russia Risks Becoming An 'Isolated Pariah' (RadioFreeEurope/RadioLiberty) Russia is seeking to undermine European democracies and sow doubt in the West through malign activities and a "fog of lies," the head of Britain's domestic spy agency has told European intelligence chiefs.
How would NATO respond to a cyberattack? ¯\_(ツ)_/¯ (Fifth Domain) NATO Secretary General Jens Stoltenberg said it's hard to know exactly what a response could include but listed a range of possibilities.
Speech by NATO Secretary General Jens Stoltenberg at the Cyber Defence Pledge Conference (NATO/OTAN) Minister Parly, Ambassadors, Ladies and gentlemen. May I start by thanking France for hosting us today.
Senate Votes to Reinstate Obama-Era Net Neutrality Rules (Wall Street Journal) The Senate voted Wednesday to reinstate Obama-era open-internet rules, handing a symbolic defeat to the Trump administration over its efforts to roll back those regulations.
After Senate victory, House announces plans to force its own vote on net neutrality (TechCrunch) Hot on the heels of a surprising 52-47 Senate disapproval of the FCC's new, weaker net neutrality rules, the House of Representatives will soon attempt to force a similar vote. Representative Mike Doyle (D-PA) announced in a statement and at a press conference following the Senate vote that he will…
This Is Ajit Pai, Nemesis of Net Neutrality (WIRED) Star Wars references. Dorky tweets. Goofy videos. The FCC chair just wants to be one of the tech nerds, but he seems to be trying to destroy everything they believe in.
Trump eliminates national cyber-coordinator job, gives Bolton keys to the cybers (Ars Technica) Reps Lieu and Langevin introduce bill to restore job; IT industry asks White House to reconsider.
Trump's decision to eliminate role of cybersecurity czar rattles experts. Here's why. (NBC News) "This is definitely not the signal you want to send to your allies and your adversaries," a former cyber czar says.
DOE Multiyear Plan for Energy Sector Cybersecurity (US Department of Energy) Protecting America’s energy systems from cyber attacks and other risks is a top national priority.
Trump's CIA nominee wins Senate panel backing, confirmation expected (NBC News) The confirmation vote by the full Senate could occur before the end of the week.
Cambridge Analytica Shared Data With Russia: Whistleblower (SecurityWeek) Cambridge Analytica used Russian researchers and shared data with companies linked to Russian intelligence, a whistleblower told a congressional hearing.
Senators Grill Whistleblower on Cambridge Analytica's Inner Workings (WIRED) Christopher Wylie testified before the Senate Judiciary Committee Wednesday that Cambridge Analytica specialized in "disinformation, spreading rumors, kompromat, and propaganda."
Senate intelligence leaders: Russians schemed to help Trump (POLITICO) It's a powerful bipartisan endorsement of a conclusion that had been called into question by Republicans on the House Intelligence Committee.
FBI chief 'deeply concerned’ about companies like ZTE (POLITICO) Wray was facing pointed questions stemming from an out-of-left-field Trump tweet on Sunday about ZTE, which is floundering financially after U.S. regulators barred American companies from buying or selling ZTE products for seven years after it violated sanctions against doing business with Iran and North Korea.
House measure asks DHS to share info on potential ZTE cyberthreat (Cyberscoop) A resolution would task DHS with giving an assessment of cyber risks introduced by any use of ZTE products on federal, state, and local government networks.
What makes ZTE a cybersecurity threat? Congress wants to know (CNET) A proposed resolution would require the Homeland Security Department to hand over info on the Chinese phone maker.
Democrats call for firing of VA’s top technology official (Military Times) Camilo Sandoval, the former data operations director for Trump’s presidential campaign, took over the role last month.
China told ex-CIA officer: ‘We’ll take care of you for life’, say court papers (South China Morning Post) The Hong Kong-born Lee, suspected of being at the centre of one of the largest US intelligence breaches in decades, is expected to plead not guilty
Alleged CIA Leaker Tweeted That Chelsea Manning ‘Should Be Executed’ (Motherboard) Joshua Schulte posted a a series of tweets criticizing Chelsea Manning in 2010, when he was working at the CIA, and she had been identified as the source of WikiLeaks’ Afghanistan and Iraq War Logs.
Facebook faces fresh criticism over ad targeting of sensitive interests (TechCrunch) Is Facebook trampling over laws that regulate the processing of sensitive categories of personal data by failing to ask people for their explicit consent before it makes sensitive inferences about their sex life, religion or political beliefs? Or is the company merely treading uncomfortably and une…
WannaCry hero charged with creating Kronos banking malware (HackRead) The WannaCry ransomware hero and malware expert Marcus Hutchins (@Malwaretech on Twitter) has been charged with creating Kronos banking malware that stole banking data from users around the world.
Suspected Member of TheDarkOverlord Hacking Group Arrested in Serbia (BleepingComputer) Serbian police have arrested a 38-year-old man from Belgrade on suspicion of being part of the infamous The Dark Overlord (TDO) hacking crew.
Cybercrime now affecting more people than any other crime (Security Brief) The UK's National Crime Agency has reported organised criminals have exploited technology to make it the number one security threat
Europol and BT sign agreement to exchange threat intelligence data (Government Europa) Europol has signed a memorandum of understanding with communications company BT to exchange threat intelligence data and reinforce cybersecurity across Europe.
Serbia Arrests FBI-sought Cybercrime Suspect (SecurityWeek) Serbian police said they had arrested a man sought by the FBI under suspicion of being part of a group of cybercriminals who called themselves "The Dark Overlord".
For a complete running list of events, please visit the Event Tracker.
SecureWorld Houston (Houston, Texas, USA, May 17, 2018) Connecting, informing, and developing leaders in cybersecurity. SecureWorld conferences provide more content and facilitate more professional connections than any other event in the Information Security industry. Join your fellow InfoSec professionals for high-quality, affordable cybersecurity training and education. Earn 6-12 CPE credits through 30+ educational elements, learning from nationally recognized industry leaders. Attend featured keynotes, panel discussions, breakout sessions, and solution vendor displays-all while networking with local peers.
Ignite18 (Anaheim, California, USA, May 21 - 24, 2018) Palo Alto Networks' sixth annual conference features highly technical insights based on firsthand experiences with next-generation security technologies, groundbreaking new threat research, or innovative technical best practices. Don’t miss this outstanding opportunity to share your expertise with our Ignite community of distinguished security professionals and researchers.
AFCEA/GMU Critical Issues in C4I Symposium (Fairfax, Virginia, USA, May 22 - 23, 2018) The AFCEA/GMU Critical Issues in C4I Symposium brings academia, industry and government together annually to address important issues in technology and systems research and development. The agenda for 2018 focuses on: innovations in software engineering, advances in data security, blockchain impact on C4I, exploiting machine learning, collaborative community resilience, IoT impact on national security, understanding information warfare, innovations in IT acquisition, and disruptive mobility technology.
3rd Annual Nuclear Industrial Control Cybersecurity and Resilience Overview (Warrington, England, UK, May 22 - 23, 2018) Now in its 3rd year, the Cyber Senate Nuclear Industrial Control Cyber Security and Resilience Conference will take place on May 22/23rd in Warrington United Kingdom. This two day executive forum will include presentations, roundtable working groups and panel sessions. Together we will address the escalating cyber risk and resilience challenges associated with the adoption and convergence of operational technologies in enterprise facing architecture. Practitioners will gain further insight into how to best respond to evolving cyber threats, the importance of effective risk management throughout the nuclear supply chain, innovations in detection and mitigation, configuration management and how can we incorporate resilience into critical control system components and business process.
PCI Security Standards Council’s Asia-Pacific Community Meeting (Tokyo, Japan, May 23 - 24, 2018) Join us for: networking opportunities, updates on industry trends, insights and strategies on best practices, engaging keynotes and industry expert speakers. The PCI Security Standards Council’s 2018 Asia-Pacific Community Meeting is the place to be. We provide you the information and tools to help secure payment data. We lead a global, cross industry effort to increase payment security by providing industry-driven, flexible and effective data security standards and programs that help businesses detect, mitigate and prevent criminal attacks and breaches.
North American Financial Information Summit (New York, New York, USA, May 23, 2018) Data is the most vital asset of any financial services firm. With volumes increasing exponentially, and the complexity and structure continuously changing, it is more vital than ever to keep on top of EDM strategy and analytical capabilities, while of course remaining compliant. Join us for the only conference around to challenge your current data strategy and evaluate your technology investments. Have your voice heard at interactive workshop tables, learn from peers facing the same challenges at their respective firms, listen to the experts, hear their success stories, and meet 350+ senior decision makers over 5 networking breaks - all this for only one day out of the office!
SecureWorld Atlanta (Atlanta, Georgia, USA, May 30 - 31, 2018) Connecting, informing, and developing leaders in cybersecurity. SecureWorld conferences provide more content and facilitate more professional connections than any other event in the Information Security industry. Join your fellow InfoSec professionals for high-quality, affordable cybersecurity training and education. Earn 12-16 CPE credits through 60+ educational elements learning from nationally recognized industry leaders. Attend featured keynotes, panel discussions, breakout sessions, and solution vendor displays-all while networking with local peers.
RISKSEC (New York, New York, USA, May 31, 2018) Welcome to the 2018 New York City RiskSec Conference. As SC Media approaches our 30th anniversary, we fully understand the avalanche of cybersecurity-related problems, responsibilities and aspirations you face. Like no other time before, data security is crucial to you and your corporate executives. With an avalanche of massive data breaches that compromised millions of users’ data and cost senior-level executives their jobs and the endless other types of attacks that leveraged both new and traditional techniques, 2017 seemed yet another banner year for the infosec industry. We expect this year will be just as active as our attendees will face the challenge of both the criminal element and nation states stepping up their aggressive activities. On top of these, insider threats, supply chain vulnerabilities, regulatory demands and increasing dependence on IoT, AI, cloud apps, mobile devices and still other technologies will continue to convolute your tactical and strategic cybersecurity aims.
Cyber:Secured Forum (Denver, Colorado, USA, Jun 4 - 6, 2018) Cyber:Secured Forum will feature in-depth content on cybersecurity trends and best practices as related to the delivery of physical security systems and other integrated systems. Content is being collaboratively developed by SIA and PSA Security Network’s education teams and will feature top cybersecurity leaders. Additionally, sponsor exhibits will help showcase solutions related to cybersecurity, integrated systems and physical security solutions.
Campaign Cyber Defense Workshop (Boston, Massachussetts, USA, Jun 4, 2018) The Campaign Cyber Defense Workshop brings together experts from the region’s industry, university, and government organizations to address campaign security and effective practices for maintaining campaign integrity -- covering everything from data security to countering reputation attacks.
Gartner Security and Risk Management Summit 2018 (National Harbor, Maryland, USA, Jun 4 - 7, 2018) Prepare to meet the pace and scale of today’s digital business at Gartner Security & Risk Management Summit 2018. Transform your cybersecurity, risk management and compliance strategies and build resilience across the enterprise through leading-edge research and thinking on key topics such as agile architectures, BCM, cloud security, privacy and securing Internet of Things (IoT).
New York State Cybersecurity Conference (Albany, New York, USA, Jun 5 - 7, 2018) June 2018 marks the 21st annual New York State Cyber Security Conference and 13th Annual Symposium on Information Assurance (ASIA). Hosted by the New York State Office of Information Technology Services, in partnership with the University at Albany's School of Business, and The New York State Forum, Inc., the conference is part of a statewide effort to boost cyber security awareness and empower state and local governments, academia, organizations and citizens to take better control of their digital security.
The Cyber Security Summit: Boston (Boston, Massachusetts, USA, Jun 5, 2018) This event is an exclusive conference connecting Senior Level Executives responsible for protecting their company’s critical data with innovative solution providers & renowned information security experts. Learn from cyber security thought leaders and Engage in panel discussions focusing on trending cyber topics such as Sr. Leadership’s Best Approach to Cyber Defense, What’s Your Strategic Incident Response Plan?, Protecting your Enterprise from the Human Element and more. Your registration includes a catered breakfast, lunch, and cocktail reception. Receive half off your admission with promo code cyberwire50 at CyberSummitUSA.com and view details including the full agenda, participating solution providers & confirmed speakers. Tickets are normally $350, but only $175 with promo code.
SecureWorld Chicago (Chicago, Illinois, USA, Jun 5, 2018) Connecting, informing, and developing leaders in cybersecurity. SecureWorld conferences provide more content and facilitate more professional connections than any other event in the Information Security industry. Join your fellow InfoSec professionals for high-quality, affordable cybersecurity training and education. Earn 6-12 CPE credits through 30+ educational elements, learning from nationally recognized industry leaders. Attend featured keynotes, panel discussions, breakout sessions, and solution vendor displays-all while networking with local peers.
NSA 2018 Enterprise Discovery Conference (Ft. Meade, Maryland, USA, Jun 5 - 6, 2018) Hosted by the National Security Agency and the Federal Business Council (FBC). The EDC is the largest event held at NSA with over 1500 attendees from around the world. EDC provides a collaborative learning experience for professionals in the SIGINT Development field across the U.S. Intelligence Community and the other 5-Eyes partner nations: Australian Signals Directorate (ASD), Communications Security Establishment, Canada (CSE), Government Communications Headquarters, Great Britain (GCHQ), and Government Communications Security Bureau, New Zealand (GCSB).
Cyber//2018 (Columbia, Maryland, USA, Jun 6, 2018) Cyber touches all aspects of our life from the myriad of devices we have brought into our homes to those we employ on the job to increase and improve our productivity. Please join us for our 9th annual cyber conference, where we tackle some of the most relevant topics surrounding operating within the cyber landscape.
TU-Automotive Cybersecurity (Novi, MIchigan, USA, Jun 6 - 7, 2018) Co-located with the world's largest automotive technology conference & exhibition. The conference unites players from research labs, automakers, tier 1’s, security researchers, and the complete supply chain to plan for the imminent future.
SINET Innovation Summit 2018 (New York, New York, USA, Jun 7, 2018) Connecting Wall Street, Silicon Valley and the Beltway. SINET New York connects the United States’ three most powerful institutions and evangelizes the importance of industry, government and academic collaboration on security initiatives.
Transport Security and Safety Expo (Washington, DC, USA, Jun 11 - 12, 2018) Security incidents are expected to cost the world $6 trillion annually by 2021, making now the time to find out more at the 2018 Transport Security and Safety Expo. The transportation industry is rapidly digitizing, leading to greater risks and potential impacts from cyber and physical events. Understanding how to better safeguard operations and protect critical networks and infrastructure from damage is paramount, and opportunities like TSSX18 that bring the industry together for training and solutions are welcomed by SANS.
Transport Security & Safety Expo (Washington, DC, USA, Jun 11 - 12, 2018) The conference is devoted to the challenges and opportunities surrounding ensuring the safety and security of passengers and cargo in the digital age.
Dynamic Connections 2018 (Palm Springs, California, USA, Jun 12 - 14, 2018) Together with you, our customers and partners, we’ll come together for 2 ½ days to learn, explore and create the possible at Dynamic Connections 2018 (DC18). To get ahead of the most critical, most pervasive threat we face in the digital domain today, we must reach into the future and pull tomorrow’s innovation forward.
Norwich University Cyber Security Summit (Northfield, Vermont, USA, Jun 18 - 20, 2018) Norwich University’s College of Graduate and Continuing Studies (CGCS) is pleased to announce the second annual Cyber Security Summit in June 2018. The summit, presented in a continuing education format, welcomes Norwich alumni and others interested in exploring and discussing the latest in cyber security policy from both the federal level and the practical application of that policy on a local or business level.
Insider Threat Program Management With Legal Guidance Training Course (Tyson's Corner, Virginia, USA, Jun 19 - 20, 2018) This training will provide the ITP Manager, Facility Security Officer, and others (CIO, CISO, Human Resources, IT, Etc.) supporting an ITP, with the knowledge and resources to develop, manage, or enhance an ITP. A licensed attorney with extensive experience in Insider Threats and Employment Law, will provide legal guidance related to ITP's, the collection, use and sharing of employee information, and employee computer user activity monitoring. Insider Threat Defense has trained over 500+ organizations and has become the "Leader-Go To Company" for ITP Management Training.
GovSummit (Washington, DC, USA, Jun 27 - 28, 2018) GovSummit -- the government security conference hosted annually by the Security Industry Association -- brings together government security leaders with private industry technologists for top-quality information sharing and education on security topics affecting federal, state and even local agencies.
The Cyber Security Summit: DC Metro (Tysons Corner, Virginia, USA, Jun 28, 2018) Learn from cyber security experts from The U.S. Department of Justice, The NSA, Pulse Secure, CenturyLink and more as they brief you on the latest security threats facing your business. This event is an exclusive conference connecting Senior Level Executives responsible for protecting their company’s critical data with innovative solution providers. Receive $95VIP admission with promo code cyberwire95 at CyberSummitUSA.com ($350 without code). Your registration includes a catered breakfast, lunch, and cocktail reception. Passes are limited. Secure your ticket while space permits.