Pages

Categories

Search

 

About FedCyber

FedCyber is an annual cybersecurity event hosted by Matt Devost & Bob Gourley that brings together several hundred attendees to advance the dialogue on critical enterprise and federal government challenges. The FedCyber web site serves as the community nexus and information aggregator.

2015 FedCyber Date Announced - Registration Open

This year's event will be held on November 10, 2015 in Tyson's Corner. Register today at Events.FedCyber.Com

FedCyber 2014 Overview

Video Overview of the 2013 Event

The FedCyber Wire

Turkish Man Sent to Prison in U.S. for $55M Cyber Heist

“Turkish citizen Ercan Findikoglu, aged 35, was sentenced on Friday by a New York court to 8 years in prison for his leadership role in a cybercriminal organization that caused significant losses to banks worldwide. Findikoglu, known online as ‘Segate,’ ‘Predator’ and ‘Oreon,’ pleaded [...]


Malware Attacks on Polish Banks Linked to Lazarus Group

“The recently discovered attacks aimed at banks in Poland appear to be part of a bigger campaign targeting financial organizations around the world, and researchers have found some links to the threat actor known as Lazarus.” Source: Malware Attacks on Polish Banks Linked to Lazarus Group | Secu [...]


Cyber capabilities support U.S. kill/capture missions

“The Air Force has conducted a multitude of cyber missions over the last year that have contributed to captured or killed terrorists. According to written testimony provided to the House and Senate Armed Services committees this week, Air Force Vice Chief of Staff Gen. Stephen Wilson said ‘the A [...]


Are companies doing enough on the IoT security front?

“Meantime, IoT continues to take hold. A survey of nearly 1,000 enterprise IT buyers worldwide conducted by 451 Research from August to October 2016 shows that 71 percent of enterprises are gathering data for IoT initiatives today. Organizations expect to increase their IoT technology investments [...]


Microsoft to Rate Corporate Cybersecurity

“Microsoft on Friday will begin grading its commercial customers’ Office 365 security settings in an effort to fortify its software and services that are frequent targets of hackers. One insurance company, Hartford Financial Services Group Inc., plans to take the security score into account when [...]


Threat Hunting Becoming Top Of Mind Issue For SOCs

“Security operations centers that have implemented hunting practices have reported substantial gains in their ability to spot and weed out threats. For example, respondents in the LinkedIn survey that had implemented a threat-hunting platform say they were able to detect and investigate threats in [...]


DHS enhanced analysis of Grizzly Steppe election hack

DHS analysts leverage the Cyber Kill Chain model to analyze, discuss, and dissect malicious cyber activity. The phases of the Cyber Kill Chain are Reconnaissance, Weaponization, Delivery, Exploitation, Installation, Command and Control, and Actions on the Objective. This section will provide a high- [...]