About FedCyber

FedCyber is an annual cybersecurity event hosted by Matt Devost & Bob Gourley that brings together several hundred attendees to advance the dialogue on critical enterprise and federal government challenges. The FedCyber web site serves as the community nexus and information aggregator.

2014 FedCyber Date Announced - Registration Open

Please visit to register for this year's event which will be held on November 5, 2014 in Tyson's Corner.

Video Overview of the 2013 Event

The FedCyber Wire

Boeing turns to IT as growth area

via Washington Technology The terrain of the federal market became increasingly tricky in 2010, with tight budgets and new policy directions. Boeing Co. relied on its skills learned from nearly a century of work as an aerospace and defense contractor to make gains in cybersecurity, information syste [...]

DISA using BRAC as IT forcing function

via Federal News Radio The Defense Information Systems Agency usually is on the leading edge in how it uses technology when compared to other federal agencies. But like all agencies, DISA has some areas of its IT infrastructure that are stuck in low gear. So that’s where the Defense Department [...]

Verizon sees its future in the cloud

via Washington Technology Verizon Communications Inc. is preparing to ride a government wave to cloud computing. “I think we will see every federal agency this year do something with a cloud opportunity, and our sights will be targeted right at those,” said Susan Zeleniak, group presiden [...]

Restructured BAE targets expansion

via Washington Technology A year ago, BAE Systems Inc. embarked on a major organizational restructuring designed to cut costs, streamline management and improve its ability to meet customer needs — and to respond to the exigencies of a changing government market. “It was a year-long proc [...]

China sets up cyber warfare division

via Defence Web China’s military has established a 30-person strong Internet security task force to protect China from cyber attacks. State media today reported that the ‘Blue Army’ was not intended to create a hacker force and would be used solely for defensive purposes. AFP reports that the [...]

Any Device, Any Time, Anywhere

via AFCEA Signal When it comes to the transition for C4I systems to cloud computing architectures, both the challenge–and the promise–boils down to “getting the right information to the right individual at the right time–and [doing] it securely.” Teri Takai, Assistant S [...]

The Explosion of Cybercrime

via Inform IT Cybercrime is broadly defined as any crime involving a computer or a network. In the last decade, the amount of cybercrime has grown substantially resulting in significant losses to businesses, and lining the pockets of criminals. This article presents some information about some of th [...]