About FedCyber

FedCyber is an annual cybersecurity event hosted by Matt Devost & Bob Gourley that brings together several hundred attendees to advance the dialogue on critical enterprise and federal government challenges. The FedCyber web site serves as the community nexus and information aggregator.

2015 FedCyber Date Announced - Registration Open

This year's event will be held on November 10, 2015 in Tyson's Corner. Register today at Events.FedCyber.Com

FedCyber 2014 Overview

Video Overview of the 2013 Event

The FedCyber Wire

Back to the future – Moonlight Maze

Michael Johnson Thomas Rid of King’s College London presents the previously untold story of MOONLIGHT MAZE, the first known state-on-state computer espionage campaign in history (really the first “advanced persistent threat or APT). A detailed account is in the last chapter of his book R [...]

Now Available: ThreatConnect Powered by SAP HANA™

Bob Gourley Editor’s note: We love seeing good friends and associates in the press, especially when they are combining strengths to build something most every enterprise needs. -bg ThreatConnect + SAP HANA: Intelligence-Driven Defense Supercharged with In-Memory Computing ARLINGTON, Va.– [...]

Hack of Democrats’ Accounts Was Wider Than Believed

“A Russian cyberattack that targeted Democratic politicians was bigger than it first appeared and breached the private email accounts of more than 100 party officials and groups, officials with knowledge of the case said Wednesday. The widening scope of the attack has prompted the F.B.I. to broade [...]

Why the ‘cyber kill chain’ needs an upgrade

“One of the most popular models for analyzing cyberattacks doesn’t focus  enough on what to do after adversaries break into networks successfully, which they inevitable will do, Black Hat 2016 attendees were told this week in Las Vegas. IT resume makeover: Don’t try to please everyone Writing [...]

How to hack a government (to overthrow it)

“And while hilarious at times, it was a surprising eye-opener about how common hacking techniques combined with military know-how could help topple a regime. But Rock noted that it takes more than just sitting behind a keyboard to be a kingmaker. To fill in the knowledge gaps he had, he Via OODA L [...]

Spear Phishing in Tehran

“It wasn’t: The email had actually been sent from a hacker likely working on behalf of the Iranian government. The links to the requested forms contained malware designed to spy on its recipients — a human rights activist and likely others in the Iranian diaspora — on behalf of Tehran. Via O [...]

The state of cyber security: we’re all screwed

“In his keynote, Kaminsky called for a federal agency devoted to security issues, similar to the National Institutes of Health, that can ‘create engineering solutions to the real-world security problems that we have’. ‘It can’t just be two guys,’ he said. ‘I need a pile of nerds to be [...]