Pages

Categories

Search

 

About FedCyber

FedCyber is an annual cybersecurity event hosted by Matt Devost & Bob Gourley that brings together several hundred attendees to advance the dialogue on critical enterprise and federal government challenges. The FedCyber web site serves as the community nexus and information aggregator.

2015 FedCyber Date Announced - Registration Open

This year's event will be held on November 10, 2015 in Tyson's Corner. Register today at Events.FedCyber.Com

FedCyber 2014 Overview

Video Overview of the 2013 Event

The FedCyber Wire

China Coal Bank website hacked by Japan hackers

“The official website of newly created Chinese coal bank has been hacked and defaced by Japanese based hackers. ‘www.MeitanBank.com’, It is reportedly the first bank in the world with coal as the core focus, founded by JinBen Investment Group co and 15 coal firms. The website has been defaced [...]


Reference to Cyber Security “Wake-Up Calls”

By Bob Gourley   We have previously discussed research and analysis we did for the Cyber Conflict Studies Association on the many “Wake-Up Calls” the nation’s policy makers have declared themselves to have had regarding cyber security. If history is any predictor of the past, we will still be [...]


NSA ‘infected’ 50,000 networks with malware

“The US National Security Agency (NSA) infected 50,000 networks with malware, Dutch newspaper NRC has reported. The Tailored Access Operations department used it to steal sensitive information, according to a censored slide leaked by former NSA contractor Edward Snowden.” Source: BBC News – NS [...]


FedCyber 2013 DoD Information Sharing Survey

FedCyber Community, During our 2013 Annual FedCyber Summit, the Honorable James Miller, Under Secretary of Defense for Policy, tasked our attendees with providing his office with feedback and recommendations in the area information sharing and over classification. We’d appreciate your compl [...]


An Introduction to Risk Analysis

By Dawid Czagan The goal of risk management is to deliver optimal security at a reasonable cost. This article introduces quantitative risk analysis, cost/benefit analysis, risk handling, and types of countermeasures. The CIA Triad Risk is related with vulnerabilities, which threaten the confidential [...]


FireEye Links Chinese Cyberattacks to Single Source

“The researchers say the evidence suggests there is a single group in China – akin to a defense contractor – that built these cyberweapons and distributed them to various hacking teams who focused on different targets. ‘Many seemingly unrelated cyberattacks may, in fact, be part of a broader [...]


Smartphone Ownership Almost Doubles Staggering Stats

By Bob Gourley There are some rather staggering stats associated with smartphones that every enterprise technologist should track. What better way than visually? The infographics below does just that:   This Infographic is produced by Coupon Audit (provides Zappos coupon code) and CTOvision .   Wo [...]


Reference to Cyber Security “Wake-Up Calls”

“Here is some safe analysis for you: In the future, senior US policy-makers will declare that they have had a ‘wake-up call’ regarding the cyber threat. Your enterprise, whether you are in or out of government, will also have senior leaders that will make that statement. It is easy to make thi [...]