Pages

Categories

Search

 

About FedCyber

FedCyber is an annual cybersecurity event hosted by Matt Devost & Bob Gourley that brings together several hundred attendees to advance the dialogue on critical enterprise and federal government challenges. The FedCyber web site serves as the community nexus and information aggregator.

2015 FedCyber Date Announced - Registration Open

This year's event will be held on November 10, 2015 in Tyson's Corner. Register today at Events.FedCyber.Com

FedCyber 2014 Overview

Video Overview of the 2013 Event

The FedCyber Wire

Business groups slam China’s draft cybersecurity rules

“In a letter addressed to Chinese Premier Li Keqiang, 46 global business groups spanning finance, information technology, insurance and manufacturing urged Beijing to revise its draft cyber rules, which they said would hamper trade. The signatories include industry associations from Asia, Australi [...]


Back to the future – Moonlight Maze

Michael Johnson Thomas Rid of King’s College London presents the previously untold story of MOONLIGHT MAZE, the first known state-on-state computer espionage campaign in history (really the first “advanced persistent threat or APT). A detailed account is in the last chapter of his book R [...]


Now Available: ThreatConnect Powered by SAP HANA™

Bob Gourley Editor’s note: We love seeing good friends and associates in the press, especially when they are combining strengths to build something most every enterprise needs. -bg ThreatConnect + SAP HANA: Intelligence-Driven Defense Supercharged with In-Memory Computing ARLINGTON, Va.– [...]


Hack of Democrats’ Accounts Was Wider Than Believed

“A Russian cyberattack that targeted Democratic politicians was bigger than it first appeared and breached the private email accounts of more than 100 party officials and groups, officials with knowledge of the case said Wednesday. The widening scope of the attack has prompted the F.B.I. to broade [...]


Why the ‘cyber kill chain’ needs an upgrade

“One of the most popular models for analyzing cyberattacks doesn’t focus  enough on what to do after adversaries break into networks successfully, which they inevitable will do, Black Hat 2016 attendees were told this week in Las Vegas. IT resume makeover: Don’t try to please everyone Writing [...]