About FedCyber

FedCyber is an annual cybersecurity event hosted by Matt Devost & Bob Gourley that brings together several hundred attendees to advance the dialogue on critical enterprise and federal government challenges. The FedCyber web site serves as the community nexus and information aggregator.

2015 FedCyber Date Announced - Registration Open

This year's event will be held on November 10, 2015 in Tyson's Corner. Register today at Events.FedCyber.Com

FedCyber 2014 Overview

Video Overview of the 2013 Event

The FedCyber Wire

DHS official: U.S. seeing increase in cyber attacks

“The number of cyber attacks aimed at taking over systems that control utilities and other critical industries is on the rise, according to a senior Department of Homeland Security official. ‘It’s certainly a trend,’ said Greg Schaefer, assistant secretary for DHS’ Offi [...]

GAO finds gaps in federal wireless network cybersecurity

“The Government Accountability Office (GAO) has uncovered gaps in security for wireless networks at federal agencies – gaps that hackers could exploit. The GAO reviewed wireless network security at 24 federal agencies, concluding that the application of measures to improve security and limit [...]

US works to secure networks as hackers advance

“It will take several more years for the government to fully install high-tech systems to block computer intrusions, a drawn-out timeline that enables criminals to become more adept at stealing sensitive data, experts say. As the Department of Homeland Security moves methodically to pare down [...]

FBI Warns Of Mobile Cyber Threats

“The agency’s Internet Crime Complaint Center (IC3) said that creative criminals will be using scams called ‘smishing’ or ‘vishing’ to steal people’s personal information, such as bank account numbers, personal identification number (PIN) codes, or credit ca [...]

Apple launches federal integrator strategy

“The company recently launched a program to formalize relationships with systems integrators and sell its products — chief among them, the iPad tablet computer and the iPhone — on an enterprise level in the government and commercial markets.” (Source: Apple launches federal integrato [...]

ManTech To Buy Federal IT Contractor for $75 Million

“ManTech said this week it plans to purchase private federal contractor MTCSC for $75 million, a move that will expand its cybersecurity, network engineering, and systems integration practices. “ (Source: ManTech To Buy Federal IT Contractor for $75 Million — Government Contractors [...]

Hacker uses cloud computing to crack passwords

“A German hacker claims to have used cloud computing to crack passwords stored in an algorithm that was developed by the NSA. Hacker Thomas Roth announced on Tuesday that he has used one of Amazon Web Service’s Cluster GPU Instances to crack the passwords encrypted in a Secure Hashing Al [...]

Intrusion detection honeypots simplify network security

“Intrusion detection is a complex business. Whether you deploy an intrusion detection system (IDS), or you collect and analyze the computer and device logs on your network, identifying malicious traffic in a sea of legitimate activity can be both difficult and time consuming. A honeypot makes [...]

IronKey Enterprise Wins Homeland Security Award

“IronKey Enterprise has won a Homeland Security Award for Best Data Security/Loss Management Solution from Government Security News (GSN). IronKey was presented with the award on November 8th in Washington, DC. IronKey Enterprise protects mobile data for government employees by combining the w [...]

Sorting Through the Government Data Explosion

“In May 2009, the Obama administration started putting raw government data on the Web. It started with 47 data sets. Today, there are more than 270,000 government data sets, spanning every imaginable category from public health to foreign aid. This was all done in the name of openness, transpa [...]

Cyber Command Achieves Full Operational Capability

DoD has announced Cyber Command has achieved full operational capability, marking another point along DoD’s path to be better able to defend internal networks and computers and perhaps better able to serve in defense of other federal departments and one day parts of our civilian infrastructure.   [...]

Catalyst for Transformation

“In the two years since the U.S. State Department deployed a digital security dashboard to monitor a key unclassified network of 5,000 routers and 40,000 host computers that support 285 foreign posts, automated data collection has enabled the department to implement risk-based scoring, reducin [...]