About FedCyber

FedCyber is an annual cybersecurity event hosted by Matt Devost & Bob Gourley that brings together several hundred attendees to advance the dialogue on critical enterprise and federal government challenges. The FedCyber web site serves as the community nexus and information aggregator.

2015 FedCyber Date Announced - Registration Open

This year's event will be held on November 10, 2015 in Tyson's Corner. Register today at Events.FedCyber.Com

FedCyber 2014 Overview

Video Overview of the 2013 Event

The FedCyber Wire

Starwood Hotels Says Payment Systems Were Hacked

“Starwood Hotels, which operates well-known hotel brands such as Westin, Sheraton, W Hotels and Le Méridien, said Friday that hackers had infected point of sale payment systems in some of its locations in North America.  The company disclosed that payment systems at ‘a limited number’ of i [...]

How Islamic State Teaches Tech Savvy to Evade Detection

“Terror groups have for years waged a technical battle with Western intelligence services that have sought to constrain them through a web of electronic surveillance. The Paris attacks, apparently planned under the noses of French and Belgian authorities, raise the possibility that Islamic State a [...]

Britain develops cyber attack powers to take on IS

British spies are developing an offensive cyber capability to attack terrorists, hackers and rogue states, finance minister George Osborne said on Tuesday after warning Islamic State militants wanted to launch deadly cyber attacks of their own. Source: Britain develops cyber attack powers to take on [...]

AT&T joins DHS Einstein cybersecurity program

AT&T — one of the three major Internet service providers, along with Verizon and CenturyLink — signed a contract with DHS to provide intrusion prevention services through Einstein 3, allowing DHS to deploy the sophisticated firewall at agencies that use AT&T as their ISP. Source: AT& [...]

What lies behind the JPMorgan Chase cyber-attack

“The simplest scam was using the stolen data as a source of victims. The alleged fraudsters would cold-call these people and pressure them to buy near-worthless shares. The price of these thinly traded securities would then rise, enabling the fraudsters (who bought them first) to make an easy prof [...]