About FedCyber

FedCyber is an annual cybersecurity event hosted by Matt Devost & Bob Gourley that brings together several hundred attendees to advance the dialogue on critical enterprise and federal government challenges. The FedCyber web site serves as the community nexus and information aggregator.

2014 FedCyber Date Announced - Registration Open

Please visit to register for this year's event which will be held on November 5, 2014 in Tyson's Corner.

Video Overview of the 2013 Event

The FedCyber Wire

Hackers Targeting Gmail, Hotmail for Attacks

via Microsoft Certified Professional Magazine Windows pros would do well to take note of a predominant trend in the realm of IT security as the week begins: e-mail accounts as both targets and attack vectors. Adobe announced that a recently patched vulnerability in its flash player on Sunday is stil [...]

50 Most Influential Government CIOs

via InformationWeek Government Check out InformationWeek’s Government CIO 50, our power list of top government CIOs–ranging from the NSA’s technology chief to innovators at the state and city government level. They’ve got vision, clout, and sometimes, billion-dollar IT bud [...]

U.S. bracing for digital attacks

via Boston Herald America’s enemies and competitors – from al-Qaeda to China and Russia – are ramping up their ability to launch devastating cyber attacks, and the nation’s electrical grid and water supply are among our most vulnerable targets, experts said yesterday, as th [...]

Hackers hit Atlanta FBI affiliate

via the Atlanta Journal-Constitution The FBI announced Sunday it shut down an Atlanta-based website that tracks cyber-crime after the site was compromised by a mysterious, yet increasingly audacious group of hackers. InfraGard Atlanta, a nonprofit partnership between local business, government and a [...]

How top U.S. government officials got hacked

via CNN Money NEW YORK (CNNMoney) — The targeted phishing scheme that struck hundreds of top U.S. government officials’ personal Gmail accounts was neither difficult to perform nor incredibly sophisticated. The attackers were able to pose as legitimate, trusted senders from the State Dep [...]