Pages

Categories

Search

 

About FedCyber

FedCyber is an annual cybersecurity event hosted by Matt Devost & Bob Gourley that brings together several hundred attendees to advance the dialogue on critical enterprise and federal government challenges. The FedCyber web site serves as the community nexus and information aggregator.

2015 FedCyber Date Announced - Registration Open

This year's event will be held on November 10, 2015 in Tyson's Corner. Register today at Events.FedCyber.Com

FedCyber 2014 Overview

Video Overview of the 2013 Event

The FedCyber Wire

If Financial Systems are Hacked – Joker in the Pack

“Rather than hacking into an individual bank, the assailants might aim straight at the heart of global finance by choosing as their target parts of its essential ‘financial-market infrastructure’ (FMI), such as clearing houses or payments systems. FMIs are like the plumbing in a city: they fac [...]


Envisioning the Hack That Could Take Down NYC

“At 12:30 p.m., the Times published a story reporting that ‘government officials’ believed that the city was being hit with a wave of cyberattacks that appeared to be ongoing. A tipster claimed the hackers had caused at least a dozen car crashes and debilitated multiple hospitals and agencie [...]


US-Israel Sign Cyber Defense Declaration

“Israel and the United States signed a cyber defense declaration Tuesday calling for real-time operational connectivity through respective Computer Emergency Response Teams (CERTS) of both nations.” Source: US-Israel Sign Cyber Defense Declaration Via OODA Loop [...]


Gartner’s Top 10 Security Predictions 2016

“Today’s security professionals battle threats from outside the organizationas well as those from their own employees. But what about threats that they already know exist? The next few years will see a variety of attacks as well as progress in the technologies and processes that prevent them. At [...]


Incident Response Plans Reduce Cost of Data Breach

“However, the stand-out figures for security practitioners are the effect of the time-to-detect, encryption and incident response plans on the overall costs. These are all areas where specific action can reduce probable costs. And the probability of those costs can be calculated from this and e [...]