Pages

Categories

Search

 

About FedCyber

FedCyber is an annual cybersecurity event hosted by Matt Devost & Bob Gourley that brings together several hundred attendees to advance the dialogue on critical enterprise and federal government challenges. The FedCyber web site serves as the community nexus and information aggregator.

2014 FedCyber Date Announced - Registration Open

Please visit Events.FedCyber.com to register for this year's event which will be held on November 5, 2014 in Tyson's Corner.

Video Overview of the 2013 Event

The FedCyber Wire

FedCyber Summit Quick Hits with Utica College

To get ready for the FedCyber Summit on Wednesday, we spoke to some of our sponsors about the current state of the Federal Cyber ecosystem, and what they are doing to advance it. I spoke with Joseph Giordano, Assistant Professor In Economic Crime Management, Chair, MS in Cybersecurity at Utica Co [...]


FedCyber Summit Quick Hits with Mu Dynamics

To get ready for the FedCyber Summit on Wednesday, we spoke to some of our sponsors about the current state of the Federal Cyber ecosystem, and what they are doing to advance it. I spoke with Greg McDermott, Director of Federal Operations from Mu Dynamics and asked him the following questions. Q: Wh [...]


FedCyber Summit Quick Hits with Fulcrum IT

To get ready for the FedCyber Summit on Wednesday, we spoke to some of our sponsors about the current state of the Federal Cyber ecosystem, and what they are doing to advance it. I asked Doug Meyer, Cyber Security Practice Manager of Fulcrum IT to answer the following questions: Q: What is the bigge [...]


Cyberwar is here, but are corporations prepared?

A recent article in Foreign Policy magazine is a wake up call for companies who are unaware of a cyberwar being waged right under their noses.  According to the author Joel Brenner, a retired intelligence official from the U.S. National Security Agency, criminals, hackers and terrorist groups a [...]


NSA Wants Top-Secret Smartphones

The National Security Agency’s secret agents may soon use smartphones to access classified data, but developing a secure portable device has proven a major challenge. Troy Lange, the NSA’s mobility mission manager, said he is developing a smartphone secure enough for spies to use, but ak [...]


Feds Chase Top IT Management Talent

The U.S. government’s program to improve federal information technology not only involves different types of electronic tools, such as cloud computing — it also involves improving the talent pool of federal IT personnel. A new initiative designed to attract the best and brightest talent [...]


CMU cyber researcher to get presidential award

A Carnegie Mellon University researcher has been named a Presidential Early Career Award winner in science and engineering for his work in cybersecurity. David J. Brumley, an assistant professor in CMU’s Electrical and Computer Engineering department, is among 20 young scientists and engineers [...]


Meet the Man Who Keeps Microsoft Safe and Secure

As the chief security officer for Microsoft, Mike Howard has more than a passing interest in the things he sees on the nightly news. Whether it’s an uprising in the Middle East, the ongoing threat of terrorism or a natural disaster somewhere in the world, the former CIA officer is prepared for [...]