Pages

Categories

Search

 

About FedCyber

FedCyber is an annual cybersecurity event hosted by Matt Devost & Bob Gourley that brings together several hundred attendees to advance the dialogue on critical enterprise and federal government challenges. The FedCyber web site serves as the community nexus and information aggregator.

2015 FedCyber Date Announced - Registration Open

This year's event will be held on November 10, 2015 in Tyson's Corner. Register today at Events.FedCyber.Com

FedCyber 2014 Overview

Video Overview of the 2013 Event

The FedCyber Wire

FusionX: Persistent Cyber Risk Management

By Bob Gourley FusionX is a firm made up of long-term and highly trusted associates who I have served with for over a fifteen years (including  Matt Devost and Tom Parker). I know them well and consider them to be among the most capable consultants in cyber security. Their methods and models h [...]


Join us at the 2013 Federal Forum, August 6th

By Ryan Kamauff On August 6th at the Ronald Reagan Center in Washington DC, MeriTalk and Brocade will be hosting a fantastic event. It will be hosted by Anthony Robbins, the Vice President of Federal Sales at Brocade. Lloyd Carney, CEO at Brocade will be introducing Terry Halvorsen, CIO of the Navy [...]


Hype Alert! Cyber Damage Estimates Hacked!

By Bob Gourley There are threats to our nation’s IT infrastructure and I advocate we all be serious about them. But it is counter productive to exaggerate the threat. The same can be said about the threat of cyber theft of corporate intellectual property and even the espionage threat. These are se [...]


Viber Attacked By Syrian Electronic Army

“Viber has confirmed a situation earlier this morning in which Viber appeared to have been hacked by the Syrian Electronic Army (a pro-government group of computer hackers aligned with Syrian President Bashar al-Assad). AppleSpot originally reported on the hack that affected the Viber support page [...]


The Challenge Posed by Chinese Psychological Warfare

“Beijing hopes to win future conflicts without firing a shot. How? By using psychological warfare to manipulate both a nation’s leaders and its populace—affecting the thought processes and cognitive frameworks of allies and opponents alike. Indeed, the PRC’s psychological warfare operations [...]


Indonesia Joins China as Cyber-Attack Powerhouse

“Indonesia isn’t known as an epicenter for hacking, but the Southeast Asian country was the source of 21 percent of the world’s cyber-attack traffic in the first quarter of this year, according to a report by Akamai Technologies to be published later today. The type of activity observed in Ind [...]


Announcing the 2013 Data Impact Awards

By Bob Gourley Cloudera has just announced an awards program designed to highlight repeatable solutions that achieve great things for key mission areas. This program, called the “Data Impact Award,” will bring focus to CDH users and the applications they are building around the Big Data solution [...]