About FedCyber

FedCyber is an annual cybersecurity event hosted by Matt Devost & Bob Gourley that brings together several hundred attendees to advance the dialogue on critical enterprise and federal government challenges. The FedCyber web site serves as the community nexus and information aggregator.

2015 FedCyber Date Announced - Registration Open

This year's event will be held on November 10, 2015 in Tyson's Corner. Register today at Events.FedCyber.Com

FedCyber 2014 Overview

Video Overview of the 2013 Event

The FedCyber Wire

French spy, not lynch mob killed Gaddafi: Report

“A French secret serviceman shot dead Libya’s former strongman Col Muammar Gaddafi and not a lynch mob of rebels as he lay trapped and cornered in a sewage pipe in his home town of Sirte. In addition, Gaddafi was betrayed by the Syrian leader, Bashar al Assad, who gave his mobile number to P [...]

The Battle to Protect Confidential Data

“To get access to corporate networks, thieves use a variety of techniques. Phishing e-mails entice employees to click on links that surreptitiously load malware onto their computers, for instance, opening the door to corporate networks. Then there’s a relatively recent and increasingly commo [...]

The CIA Burglar Who Went Rogue

“Codes have always been primary espionage targets, but they have become more valuable as encryption programs have become both more common and more complex. Today, even the National Security Agency, the nation’s code-making and -breaking arm and its largest intelligence agency, has trouble ke [...]

Iran Unblocks Gmail

“Internet users in Iran can now access Gmail through the HTTPS protocol, but Tehran claims new restrictions are coming for YouTube viewers.” Source:Iran Unblocks Gmail | Fast Company Original Source [...]

Who Is Winning The Real Cyber War?

By BobGourley “The empires of the future are the empires of the mind,” said Sir Winston Churchill at Harvard University in 1943. He frequently spoke of humanity’s minds in descriptions of the future and this is such an important point. It is our brains that give us both the vision [...]

White House Hack Attack

“Hackers linked to China’s government broke into one of the U.S. government’s most sensitive computer networks, breaching a system used by the White House Military Office for nuclear commands, according to defense and intelligence officials familiar with the incident. One official said the [...]

Assumption of Breach and Defense Planning

By AdamElkus Given the explosive (and thinly sourced) nature of Bill Gertz’s allegations (China! Carriers! Nukes!) in his latest Free Beacon post it is important to watch the story as it develops. At first glance, the story doesn’t quite seem to match the hype. A spear-phishing attack ag [...]