About FedCyber

FedCyber is an annual cybersecurity event hosted by Matt Devost & Bob Gourley that brings together several hundred attendees to advance the dialogue on critical enterprise and federal government challenges. The FedCyber web site serves as the community nexus and information aggregator.

2015 FedCyber Date Announced - Registration Open

This year's event will be held on November 10, 2015 in Tyson's Corner. Register today at Events.FedCyber.Com

FedCyber 2014 Overview

Video Overview of the 2013 Event

The FedCyber Wire

FedCyber 2013 DoD Information Sharing Survey

FedCyber Community, During our 2013 Annual FedCyber Summit, the Honorable James Miller, Under Secretary of Defense for Policy, tasked our attendees with providing his office with feedback and recommendations in the area information sharing and over classification. We’d appreciate your compl [...]

An Introduction to Risk Analysis

By Dawid Czagan The goal of risk management is to deliver optimal security at a reasonable cost. This article introduces quantitative risk analysis, cost/benefit analysis, risk handling, and types of countermeasures. The CIA Triad Risk is related with vulnerabilities, which threaten the confidential [...]

FireEye Links Chinese Cyberattacks to Single Source

“The researchers say the evidence suggests there is a single group in China – akin to a defense contractor – that built these cyberweapons and distributed them to various hacking teams who focused on different targets. ‘Many seemingly unrelated cyberattacks may, in fact, be part of a broader [...]

Smartphone Ownership Almost Doubles Staggering Stats

By Bob Gourley There are some rather staggering stats associated with smartphones that every enterprise technologist should track. What better way than visually? The infographics below does just that:   This Infographic is produced by Coupon Audit (provides Zappos coupon code) and CTOvision .   Wo [...]

Reference to Cyber Security “Wake-Up Calls”

“Here is some safe analysis for you: In the future, senior US policy-makers will declare that they have had a ‘wake-up call’ regarding the cyber threat. Your enterprise, whether you are in or out of government, will also have senior leaders that will make that statement. It is easy to make thi [...]

5 DC-Area Meetups for Security Pros and Noobs

By BryanHalfpap 5 DC-Area Meetups for Hackers, Security Pros, and Enthusiasts: Name: Charmsec Site: Format: “Happy-Hour” talks When: Last Thursday of the month @ 7:00pm Where: Baltimore Why: A smattering of MD’s Finest.  It’s a bit of a trek for most DC residents but it [...]

Automated Attack, Threat Intelligence Sharing Sought

“If you’re looking for tangible information sharing success stories around attack intelligence, some might point to the prompt publishing of indicators of compromise (IOC) as an example. Security and forensics companies will publish MD5 hashes of malware, IP addresses involved in attacks, malwar [...]