Combating threats and protecting the enterprise data in the digital workspace.

Digital workspaces bring enormous benefits to organizations and their employees across the globe, but require new thinking when it comes to security. In our perimeter-less digital world, protecting, detecting, and remediating threats requires intelligence-driven approaches. Check out VMware’s insightful white paper describing a new, comprehensive and predictive approach. It highlights the importance of securing the evolving digital workspace and the need for enterprises to embrace a framework of trust between the components in their ecosystem.

The daily briefing.

Special Section: News from RSA 2018 (our regular summary appears below)

Private sector's pledge to renounce offensive cyber operations.

The Microsoft-led initiative in which thirty-four companies signed an undertaking not to engage in offensive cyber operations hasn't, for all of its good intentions, received uniformly positive reviews. The agreement was featured on the Conference's opening day. Some observers think it resembles other large-scale resolutions and legislation in that it fails to make necessary distinctions, and fails to do justice to the complexity of computer network operations.

One such complexity involves the familiar problem of dual use. Some security legislation and international cyber non-proliferation agreements (Wassenaar prominent among them) have come under criticism for the possibility that they might unintentionally criminalize legitimate vulnerability research, for example. 

Other issues raised concern the undertaking's lack of teeth (it is after all a voluntary avowal of intentions) and the signatories' lack of involvement in delivering offensive cyber capabilities to governments.

A warning concerning state-directed cyber operations.

Early in the conference US Secretary of Homeland Security Nielsen, while expressing hope that nations would evolve some sensible norms to restrain them in cyberspace, made it clear that the US had offensive cyber capabilities and would be willing to use them in response to an attack. (In a conversation this morning the Chertoff Group's Adam Isles characterized Secretary Nielsen's speech as the Administration's way of laying down a marker that consequences would be imposed on nations who conduct cyberattacks against the US.)

Yesterday European Commission Vice-President Andrus Ansip described the real and current threat of nation-state cyber attacks with the hard-won, disillusioned clarity an Estonian official usually brings to the matter. He called out numerous examples of Russian offensive operations in cyberspace (and it's noteworthy that he included descriptions of that country's recent information operations, especially the disinformation surrounding the Salisbury nerve agent attacks). He offered a warning near the end of his presentation concerning the necessity of preparing for a full-spectrum of cyber conflict: "If we fail to do so, if the West fails to unify – we risk being exploited by those who would use cyberspace as a weapon to harm our free and open societies and economies. ."By not acting, we make ourselves an easy target."

Reflections on the sector's labor shortage.

 We spoke yesterday with Booz Allen Hamilton vice president Chad Gray about his company's just-released Cyber Talent Survey. That survey calls out the pressure businesses feel from investors and boards to take ownership of their cybersecurity, and it observes that this pressure has in some cases driven companies into short-term solutions that can have long-term deleterious effects. Gray cautioned against thinking that technical solutions would be able to do more than augment human talent. Some functions can, and will be, de-skilled through automation, but the net effect of such advances will be to increase the efficiency of an organization's human talent.

That there is a talent shortage seems clear, but it's not simply a special case of some more general shortage of technically skilled workers. The shortfall, he said, "is driven by more frequent, more sophisticated attacks," and especially by "repurposed nation-state tools being used by criminals." It's the protean, adaptable quality of the threat that makes it difficult for security practitioners to handle. They need to stay current and engaged, since the opposition's tactics shift and require new skillsets of defenders. 

"Top talent attracts other top talent," Gray observed. Experts in various domains cross-pollinate when they work together on teams. It's important to rotate experts to face different challenges, lest their skills grow stale. This isn't a mater of creating career paths, he noted. There's no reason a highly skilled analyst, for example, should have to become a manager. But there are many reasons to give that analyst fresh opportunities to work against new and emerging threats.

Booz Allen is a strong believer in the value of wargaming, not only in training and response preparation, but also in vetting talent. They make particular use of their game "BREACHED" in the course of executive training provided to their customers. 

Today's regular daily summary starts here.

New Zealand has joined the three Five Eyes sisters who have called out exploitation of Cisco Smart-Install-enabled devices. CERT-NZ doesn't specifically call out Russia as the author of the ongoing campaign against such devices, but it does reference with agreement the US-CERT report that does, so it's safe to conclude that the view from Wellington is much the same as that from Canberra, London, and Washington.

Russia for its part has denied doing anything of the kind. Government spokesman Dmitry Peskov said the accusations were unfounded. Echoing the sorts fo demands for evidence Moscow issued after the nerve agent attack in Salisbury, Peskov called the accusations "feeble," and said Russia had no idea what the Five Eyes' assertions were based on: "Such accusations are typically thrown into the air and no one even bothers to offer any arguments anymore."

Symantec researchers warn of a new problem, "trustjacking." It occurs when a user pairs an iPhone to a Mac laptop or workstation, at the point where users are asked if they trust this computer. (Maybe users should be more circumspect.)

Radware warns of "Stresspaint," a Chrome login information-stealing Trojan served by a Windows app that presents itself as a stress-relief tool.

LocalBlox, a company that scrapes data from the various sources on the web and builds profiles of individuals for marketing purposes, has been found to have leaked data. It's apparently, according to researchers at UpGuard, an AWS misconfiguration issue: they say they found forty-eight-million records exposed in an S3 bucket.

[250]

Cylance is proud to be the CyberWire sustaining sponsor for 2018. Learn more about how Cylance prevents cyberattacks at cylance.com

Today's edition of the CyberWire reports events affecting Australia, China, Estonia, the European Union, Russia, the United Kingdom, and the United States.

Cyber is the new battlefield.

Become a Cyber Spartan and Defend the Gates of America. At Invictus International Consulting we are hiring elite cyber, intelligence, and technology experts to serve our government and commercial clients. Join us.

On the Podcast

In today's podcast we hear from our partners at Palo Alto Networks, as Rick Howard talks about the very notion of a "cyber moon shot." Our guest is Malcolm Harkins from Cylance, who argues that it's unacceptable to adopt the attitude that bad guys getting in is inevitable.

Sponsored Events

XM Cyber is coming to RSA (San Francisco, California, United States, April 16 - 20, 2018) Visit XM Cyber at the Israeli Pavilion, South Hall booth 635, to experience the first automated APT simulation platform to expose, assess and amend every attack path to organizational critical assets.

HackNYC2018 (New York, New York, United States, May 8 - 10, 2018) Cyber attacks are often called non-violent or non-kinetic attacks, but the simple truth is that there is a credible capability to use cyber attacks to achieve kinetic effects. Kinetic Cyber refers to a class of cyber attacks that can cause direct or indirect physical damage, injury or death solely through the exploitation of vulnerable information systems and processes. Use code CWIRE20 for 20% off the $50.00 individual ticket price.

8th Annual (ISC)2 Security Congress (New Orleans, Louisiana, United States, October 8 - 10, 2018) The (ISC)2 Security Congress brings together the sharpest minds in cyber and information security for over 100 educational sessions covering 17 tracks. Join us to learn from the experts, share best practices, and make invaluable connections. Your all-access conference pass includes educational sessions, workshops, keynotes, networking events, career coaching, expo hall and pre-conference training. Save your seat at congress.isc2.org.

Selected Reading

Dateline San Francisco: the latest from the RSA Conference

Photo gallery: RSA Conference 2018 Expo (Help Net Security) The RSA Conference 2018 is underway at the Moscone Center in San Francisco. Here are a few photos from the Expo floor. Featured companies: LogRhythm, Qualys, Sophos, RSA Conference, Intel, AWS, IBM Security, Wombat Security, A10

DHS Secretary Nielsen Bares Cyber Teeth at RSA (Meritalk) At the RSA Cybersecurity Conference in San Francisco, Department of Homeland Security (DHS) Secretary Kirstjen Nielsen made it clear that the United States has “a full spectrum of response options” to defend against cyber attacks and hacks.

Speech by Vice-President Ansip on cybersecurity at the RSA Conference 2018 (European Commission) Ladies and gentlemen, It is a pleasure to be with you today. Many thanks for inviting me to San Francisco. When it comes to cyber-attacks, you could say my experience is somehow special. Estonia is

RSA President: Cybersecurity Tech Accord Statement Is "Too Broad," Offensive Capability Needs To Be Better Defined (CRN) "I think it's too broad of a statement," said RSA President Rohit Ghai. "I think it needs to be qualified with some more granular descriptors of 'what do we mean by offensive capability?'"

Gold Galleon Hacking Group Plunders Shipping Industry (Threatpost) Researchers have identified a hacking group behind several widescale maritime shipping industry business email compromise (BEC) attacks since June.

Cryptographers spank blockchain, social media (ZDNet) RSA Conference panel takes hard look at current issues. The group also questions the industry's obsession with increasing speeds at the expense of security.

ESET launches new enterprise security products (Computer Dealer News) After reaching out to enterprise IT security specialists across the world, cybersecurity firm ESET says it's developed a single console that can

Future cyber threats will come from inside the architecture (Fifth Domain) “The Five Most Dangerous Attack Techniques” read the marquee guiding attendees of the RSA cybersecurity conference to this morning’s keynote panel. As the audience shuffled to find seats in the bluely lit room, the four panelists from SANS institute launched into a rapid fire assessment of multiple threats, some of which certainly seemed dangerous.

Cyber Educators International (CEI) Launches at RSA 2018 (PRWeb) Cyber Educators International (CEI) announced today the launch of an industry-driven initiative focused on creating a global community of edu

Fidelis Cybersecurity Extends Its Automated Detection & Response Platform to Protect Cloud Assets with Intelligent Deception (BusinessWire) Fidelis Cybersecurity® (Fidelis), a leading automated detection and response provider, today announced that its latest release of the Fidelis Elevate™

In preparation for the GDPR, CoSoSys launches Endpoint Protector 5.1 (Help Net Security) CoSoSys announced the latest update of its award-winning flagship Data Loss Prevention product, Endpoint Protector 5.1, which brings added functionalities to key features and a boost for GDPR compliance.

Open-source library for improving security of AI systems (Help Net Security) IBM researchers have created the Adversarial Robustness Toolbox, an open-source library to help researchers improve the security of real-world AI systems.

Anomali partners with Visa to offer global payment breach intelligence (Help Net Security) Anomali announced a partnership with Visa to provide cyber security teams with global payment breach intelligence drawn from Visa Threat Intelligence, to better detect and manage breaches involving payment information in retail, hospitality, restaurant and other sectors.

CrowdStrike Wins SC Award for Best Security Company Second Year in a Row (BusinessWire) CrowdStrike, the leader in cloud-delivered endpoint protection, today announced that the company was recognized by the 2018 SC Awards as Best Security

All-woman tech panel warns of inadequate online legal protections (Irish Times) OURSA, set up as alternative to RSA conference, says emerging technologies can be used for surveillance of users

SC Media's Cable Car News Videos with Bradley Barth (SC Media US) SC Media's Senior Reporter Bradley Barth took five cybersecurity experts on a field trip during RSA 2018 and conducted what may be the industry's first ser

Cyber Attacks, Threats, and Vulnerabilities

Russia’s Grizzly Steppe gunning for vulnerable routers (Naked Security) Russian Government hackers stand accused of targeting millions of routers

Russia denies ‘feeble’ US, UK charges of internet tampering (Fifth Domain) In a joint statement Monday, the U.S. Department of Homeland Security, the FBI and the U.K.’s National Cyber Security Centre said the main targets in the alleged tampering of routers and other networking equipment include “government and private-sector organizations,” as well as providers of “critical infrastructure” and internet service providers.

Turnbull warns business of Russian cyber attacks (The West Australian) PM met with counterparts from Britain, Canada and NZ, who are part of the ‘five eyes’ group that shares intelligence.

Russian Cyber Threat (Information Security Buzz) Days after the missile strike on Syria, GCHQ and the FBI have warned of a potential retaliation by Russia– in the form of a cyber attack. The NCSC is on high alert and concern is growing among executives who fear severe disruption of critical infrastructure. IT security experts commented below. Bill Conner, CEO at SonicWall: “Cyber attacks like …

CERT NZ issues security alert about Smart Install-enabled Cisco devices (Security Brief) CERT NZ has issued a bulletin about a cyber attack campaign that is targeting Cisco devices that have enabled Smart Install (SMI).

Tripwire Survey 70 Percent of Energy Security Professionals Concerned About Catastrophic Failure (Tripwire) While recognizing physical consequences of cyberthreats, proper investment lacking

'I Feel Free': Russian Students In U.K. Unmoved By Kremlin's Call To Come Home (RadioFreeEurope/RadioLiberty) Russia's state aid agency is urging students studying abroad to return home, citing growing anti-Russian sentiment in Europe. Russian students in England say such concerns are nonsense.

Cyber-terrorism: more Hollywood fad than genuine fear (ITWeb) While there can be no doubt that cyber-crime and cyber-terrorism are real threats, the dangers they pose are nowhere near what blockbuster films would have you believe.

New hacker groups emerging in Asia and in the Middle East, finds Kaspersky (SC Media UK) Security researchers observed a noticeable spurt in the activities of advanced persistent threat groups based in certain parts of Asia and the Middle East.

LocalBlox found leaking info on tens of millions of individuals (Help Net Security) LocalBlox, a company that "crawls, discovers, extracts, indexes, maps and augments data in a variety of formats from the web and from exchange networks" and ties it all together to create profiles on individuals for marketing purposes, has been found leaking information on tens of millions of individuals.

'Trustjacking' Could Expose iPhones to Attack (WIRED) Have you used a friend's laptop to charge your iPhone and gotten a prompt that says, "Trust This Computer?" Say yes, and the computer will be able to access your phone settings and data while they're connected. And while it doesn't feel like your answer really matters—your phone will charge either way—researchers from Symantec warn that this seemingly minor decision has much higher stakes than you'd think.

iOS Trustjacking Attack Exposes iPhones to Remote Hacking (Bleeping Computer) Symantec researchers have found a loophole in how iPhone users pair devices with Mac workstations and laptops. They say attackers can exploit this flaw —which they named Trustjacking— to take over devices without the phone owner's knowledge.

Stresspaint Malware Steals Facebook Credentials and Session Cookies (Bleeping Computer) Security researchers have spotted a new information stealer that collects Chrome login data from infected victims, along with session cookies, and appears to be looking for Facebook details in particular, according to a Radware threat alert the company shared with this reporter.

TaskRabbit Takes Down App And Website After Getting Hacked (Information Security Buzz) TaskRabbit, a web-based service that connects freelance handymen with clients in various local US markets, has emailed customers admitting it suffered a security breach. The company has taken down its app and website while law enforcement and a private cyber-security firm are investigating the incident. IT security experts commented below. Tim Helming, Director of Product …

Hard drive borking malware found lurking behind Minecraft skins (Inquirer) The unsophisticated malware looks more like a trolling attempt than a clever cyber attack

Cyber crooks are more interested in exploiting people, not software flaws, claims Proofpoint (Computing) Ransomware, phishing, cryptocurrency threats and cloud attacks all growing fast, warns security report

Cyber attack on testing company affected several other states (Franklin Home Page) The cyber attack that stopped some students from taking standardized tests in Tennessee this week also affected several other states. At a hearing about the testing problems in the Tenne

Security Patches, Mitigations, and Software Updates

Google Chrome 66 Released Today Focuses on Security (BleepingComputer) Google has moved Chrome 66 to the stable channel and starting earlier today has begun updating users to the browser's new major version — Chrome 66.0.3359.117.

Cisco plugs critical hole in WebEx, users urged to upgrade ASAP (Help Net Security) Cisco has fixed a critical vulnerability in its WebEx videoconferencing software that could be exploited to compromise meeting attendees' systems by simply opening a booby-trapped Flash file shared in a meeting.

Cyber Trends

State of Cybersecurity Study: Security Budgets Increasing, But Qualified Cybertalent Remains Hard to Find (BusinessWire) ISACA released its State of Cybersecurity 2018 report at RSA today. The report details the skills in most demand, time it takes to hire and more.

State of Cybersecurity 2018 (Cybersecurity Nexus) For the fourth year in a row, ISACA has surveyed security leaders worldwide to determine their insights and experiences with key cybersecurity issues, ranging from workforce challenges and opportunities to the emerging threat landscape.

C-suites are hopelessly under-prepared for AI (Business Insider Australia) Deloitte Human Capital Trends 2018 report says 1 in 4 organisations using AI and robotics

Ransomware Moving into Business-Critical Systems; Employees a Key Weakness, Research Shows (Security Boulevard) Ransomware attacks are moving away from the consumer space and into business-critical systems, encrypting entire databases and servers, commanding bigger ransom requests and inflicting more damage than ever, according to an analysis of data from 67 organizations.

Looking for the weak links in Australia’s data breach battle (ARN) More than half of Australian businesses may have experienced breaches in the past year, but how is the data getting out?

Marketplace

Army DCO using streamlined acquisition, data analytics to defend cyberspace (FederalNewsRadio.com) The Army’s new framework for a rapid process to acquire cyber defensive tools is a good example of how DoD acquisition systems are about providing the warfighters as much capability as possible.

Polaris Alpha builds out cyber offerings (Jane's 360) Polaris Alpha announced on 16 April that it had acquired Maryland-based cyber solutions firm Fourth Dimension Engineering.

MacB’s Enlighten IT Consulting Wins U.S. Cyber Command Contract (Washington Exec) Enlighten IT Consulting, a MacAulay-Brown Inc. company, has been awarded a prime contract to provide big data platform sustainment and engineering services to the U.S. Cyber Command.

Booz Allen Hamilton Announces Formation of the Booz Allen Foundation (BusinessWire) Booz Allen Hamilton today announced the formation of the Booz Allen Foundation with an initial pledge of $5 million.

ZeroFOX Names Industry Thought Leader Dr. Sam Small as Chief Security Officer (BusinessWire) ZeroFOX, the social media security category leader, today announced the hiring of Dr. Sam Small as Chief Security Officer (CSO). In his new role, Dr.

Products, Services, and Solutions

Securonix Unveils Strategic Alliance to Combat Cyberattacks in the Cloud (GlobeNewswire News Room) Protects cloud infrastructure and cloud apps against cyber attacks using the most advanced security analytics

Simplify and Secure Your Online Logins with a YubiKey (WIRED) As we become more dependent upon online platforms for social and professional purposes, it grows increasingly important that we embrace stronger online security measures.

Cyber Risk Assessment is Just the Beginning (CMMI Institute) Manage Up your cybersecurity resilience, readiness and board confidence with the world’s first cyber capability maturity management platform

Technologies, Techniques, and Standards

GDPR: securing data is more than just a technology fix, it’s about understanding human behaviour (MicroscopeUK) Neal Lillywhite, VP EMEA Channel at Forcepoint, argues GDPR is about people and processes as well as technology

Want to Prevent Cyberattacks? Don't Count on Employee Training to Stop Them. (Governing) Tips from a cybersecurity expert.

Verizon: Lack of Interoperability, Consistency Slows Automation (Light Reading) Verizon executive Vickie Lonker thinks both vendors and network service providers can do a better job to move forward faster.

Explaining the Crypto in Cryptocurrency (Investopedia) Cryptocurrencies like Bitcoin and Ethereum have gained immense popularity thanks to their decentralized, secure and anonymous nature, which supports the peer-to-peer architecture and makes it possible to transfer funds and other digital assets between two different individuals without a central authority.

Sophos Study Uncovers ‘Dirty Secrets’ of Firewalls (eWEEK) Dirty secret No. 1: IT managers simply cannot identify nearly half (45 percent) of their organization’s network traffic. In fact, nearly 25 percent cannot identify a whopping 70 percent of their network traffic.

Design and Innovation

Can data science save social media? (TechCrunch) The unfettered internet is too often used for malicious purposes and is frequently woefully inaccurate. Social media -- especially Facebook -- has failed miserably at protecting user privacy and blocking miscreants from sowing discord.

Research and Development

Energy Department announces funding opportunity for energy sector cybersecurity (Daily Energy Insider) The U.S. Department of Energy (DOE) made Monday a $25 million funding opportunity announcement (FOA) for research, development and demonstration (RD&D) of innovations that advance cyber resilient energy delivery systems.© Shutterstock “Energy cybersecurity is a ... Read More »

Researchers propose scheme to secure brain implants (Help Net Security) A group of researchers from KU Leuven, Belgium, have proposed a practical security scheme that would allow secure communications between a widely used implantable neurostimulator - an electrical brain implant used to treat a number of medical issues - and its external device programmer.

Academia

Texas A&M Shuts Down 2 Chinese Learning Institutes Deemed National Security Threats (The Daily Signal) A bipartisan letter from two Texas congressmen flagged the institutes as "a threat to U.S. national security" that serves as "a platform for China’s intelligence collection and political agenda."

'Nerd-speak' and thwarting hacks: Top youth cyber-security competition comes to Baltimore (Baltimore Sun) The Loyola Blakefield team — the only Maryland school to make it to the final round of the national CyberPatriot contest — spent hours in quiet concentration, trying to earn points by defeating hackers and securing the computer servers of a fictional company.

College of Southern Nevada recognized for cybersecurity education (Las Vegas Review-Journal) The College of Southern Nevada is the first school in the state to be recognized by two federal agencies for its work in cybersecurity education.

Cybersecurity Means Job Security (UANews) Meet Louis A. Clark. He is 54 years old, 6-foot-3 and 159 pounds. He lives at 4676 Joyce St. His blood type is B-positive, he drives a 1996 Maserati Ghibli and his favorite color is orange. But that's not all there is to know about Clark. He is active on social media. His mother's maiden name (Cottman), his first pet's name (Pirate) and his favorite sports team (Raiders) aren't the secure computer password questions he thinks they are. And there's this: He has connections to an organized-crime family.

Legislation, Policy, and Regulation

With proposed cuts, what happens to DISA’s mission? (C4ISRNET) If DISA gets eliminated, where will its functions go? The answer isn't clear.

Bolton era begins with exits and anxiety at National Security Council (CNN) By the start of John Bolton's second week as national security adviser, five top officials at the National Security Council had already resigned under pressure, been fired or decided to leave.

Two CIA Vet Takes on CIA Nominee Haspel & Those Tapes (The Cipher Brief) Cipher Brief experts Todd Rosenblum and General Michael Hayden share their views on Gina Haspel's nomination - and the destruction of "those tapes."

Litigation, Investigation, and Law Enforcement

Senators demand more information about DC mobile snooping devices (CNN) A bipartisan group of four Senate privacy hawks are demanding the Department of Homeland Security publish more information about the evidence of mobile snooping devices in Washington and surrounding areas.

Why Zuckerberg’s testimony doesn’t add up (New York Post) Mark Zuckerberg proudly trotted out a number when he was being questioned last week by Congress: His company, Facebook, would soon double the security team that monitors content on the site, to 20,…

Former Student Charged in Cyber Attack (WILX) An attack on Ingham Intermediate School District's online network and the person police say is responsible was one of its own students. The incident happened in February 2017.

Cyber Events

For a complete running list of events, please visit the event tracker on the CyberWire website.

XM Cyber is coming to RSA
HackNYC2018

Upcoming Events

5th Annual Cybersecurity Summit (McLean, Virginia, USA, April 24, 2018) Join the Potomac Officers Club for the Fifth Annual Cybersecurity Summit to hear from public and private sector leaders on how federal agencies can improve their respective data security measures.

Secutech (Taipei, Taiwan, April 25 - 27, 2018) To meet the rising demand for intelligent and customised solutions, Secutech converges security and safety, ICT, IoT, artificial intelligence, big data, edge computing, intelligent video analytics and deep learning to enable you to create new value in the rapidly evolving market, and provide intelligent solutions in factory, retail, healthcare, transportation, home, building and safe city sectors.

Industrial Control Systems (ICS) Cyber Security Conference Asia (Singapore, April 25 - 27, 2018) The Central ICS/SCADA Cyber Security Event of the Year for the APAC Region. Three days of multi-track training & workshops for days for operations, control systems and IT security professionals to connect on SCADA, DCS PLC and field controller cyber security.

INFILTRATE (Miami Beach, Florida, USA, April 26 - 27, 2018) INFILTRATE is a "pure offense" security conference aimed at the experienced to advanced practitioner. With the late-90s hacker con as its inspiration, the event has limited attendance in order to foster a close-knit, casual and open environment for speakers and attendees. There are no sponsored talks, panels or other gimmicks, just two days of carefully vetted, highly technical talks which present new research in advanced exploitation techniques, vulnerability discovery, malware/implant design, anti-forensics and persistent access. Speakers include hackers from all across the offensive spectrum. The conference also hosts advanced training classes in web hacking, exploit development, cryptanalysis, kernel exploitation, Java attacks and other techniques (April 22-25). Now in its eighth year, the two-day, single track conference is organized by Dave Aitel and Immunity Inc., and is held in warm, sunny Miami Beach.

Automotive Cybersecurity Summit 2018 (Chicago, Illinois, USA, May 1 - 8, 2018) Smart Vehicles. Smart Infrastructures. The 2nd annual Automotive Cybersecurity Summit brings together public and private-sector manufacturers, suppliers, assemblers, technology providers and V2X partners to discuss the increasingly complex and interdependent relationships between smart vehicles and ever-expanding smart infrastructures. The SANS Automotive Cybersecurity Summit was created to develop and foster a culture of cyber-awareness in organizations across the vehicle supply chain as we work together to understand risks, safeguard organizations, their products, and their customer from the evolving threat landscape.

Application of the Law of War to Cyber Operations (Washington, DC, USA, May 3, 2018) Cyber law experts meeting at the George Washington University will cover Title 10 vs. Title 32 vs. Title 50 and the lawful and operational restrictions related to these authorities. The panelists will discuss the legal processes of projecting power in the domain of cyberspace and what capabilities require legal review relating to Defensive Cyberspace Operations (DCO) -- both Internal Defense Measure (IDM) and Response Actions (RA) -- as well as Offensive Cyberspace Operations (OCO).

Global Cyber Security in Healthcare & Pharma Summit (London, England, UK, May 3 - 4, 2018) The number of cyber-attacks in healthcare is on the rise, and the industry must do more to prevent and respond to these incidents. The Global Cyber Security in Healthcare & Pharma Summit 2018 will bring together high-level representatives from around the globe to create a cybersecurity roadmap for the future. Attendees will come from all areas of cybersecurity for the healthcare, medical devices and pharmaceutical sectors. Experts will examine the cybersecurity landscape in these three industries, with a particular focus on strategies for protection and incident response, as well as on business/regulatory considerations. Central to the aims of this event is facilitating collaboration and cooperation amongst the diverse stakeholders that will be in attendance.

Decompiling the Government: Getting Technologists and Policymakers to Speak the Same Language (New York, New York, USA, May 3, 2018) This event brings together technologists and leading policymakers, lawyers, and journalists to bridge the gap between non-technical and technical cyber professionals and features Lisa Monaco, former Assistant to the President for Homeland Security and Counterterrorism and current Distinguished Senior Fellow at New York University Law School and Senior Fellow at Harvard’s Kennedy School of Government.

Secure Summit DC (Washington, DC, USA, May 7 - 8, 2018) (ISC)² Secure Summit DC will assemble the best minds in cybersecurity for two days of insightful discussions, workshops and best-practices sharing. The goal of the event is to equip security leaders to tackle today's threats, as well as arm them with the knowledge, tools and expertise to protect their organizations and advance their careers. Registered attendees will be immersed in two days of insightful, strategic cybersecurity knowledge.

HACKNYC (New York, New York, USA, May 8 - 10, 2018) The recent flood of data breach news may numb us to the threat of attacks with kinetic effects--direct or indirect physical damage, injury, or death. Hack NYC focus’ on our preparation for, and resilience to, the genuine potential for kinetic cyber attack. Be part of defining solutions and illuminate risks aimed at critical national Infrastructure. Hack NYC is about sharing big ideas on how we will fortify our daily life and economic vitality. The threat of attack aimed at Critical National Infrastructure is real as services supporting our communities and businesses face common vulnerabilities and an unspoken kinetic threat.

Insider Threat Program Management With Legal Guidance Training Course (Herndon, Virginia, USA, May 8 - 9, 2018) This training will provide the ITP Manager, Facility Security Officer, and others (CIO, CISO, Human Resources, IT, Etc.) supporting an ITP, with the knowledge and resources to develop, manage, or enhance an ITP. A licensed attorney with extensive experience in Insider Threats and Employment Law, will provide legal guidance related to ITP's, the collection, use and sharing of employee information, and employee computer user activity monitoring. Insider Threat Defense has trained over 500+ organizations and has become the "Leader-Go To Company" for ITP Management Training.

SecureWorld Kansas CIty (Kansas City, Missouri, USA, May 9, 2018) Connecting, informing, and developing leaders in cybersecurity. SecureWorld conferences provide more content and facilitate more professional connections than any other event in the Information Security industry. Join your fellow InfoSec professionals for high-quality, affordable cybersecurity training and education. Earn 6-12 CPE credits through 30+ educational elements, learning from nationally recognized industry leaders. Attend featured keynotes, panel discussions, breakout sessions, and solution vendor displays-all while networking with local peers.

Cyber Investing Summit (New York, New York, USA, May 15, 2018) Now in its third year, the Cyber Investing Summit is an all-day conference focusing on investing in the cyber security industry, which is predicted to exceed $1 trillion in cumulative spending on products and services over the next five years from 2017 to 2021. Panels will explore the financial opportunities, trends, challenges, and investment strategies available in the high growth cyber security sector. Speakers include leading cyber professionals, technology analysts, venture capitalists, fund managers, investment advisors, government experts, and more. Attendees will have the opportunity to network with key influencers in the investment and cyber security industries. A cocktail reception will be held following the presentations.

Third Annual Cyber Investing Summit (New York, New York, USA, May 15, 2018) Renowned cyber security executive David DeWalt will deliver the keynote address at the Third Annual Cyber Investing Summit. The Cyber Investing Summit is a unique all-day conference focused on the financial opportunities available in the rapidly growing cyber security industry. Panels will explore sector investment strategies, market growth forecasts, equity valuations, merger and acquisition activity, cryptocurrency protection, funding for startups, and more. Speakers include leading Chief Information Security Officers, VC founders, financial analysts, cyber security innovators from publicly traded and privately held companies, and government experts.

The Cyber Security Summit: Dallas (Dallas, Texas, USA, May 15, 2018) This event is an exclusive conference connecting Senior Level Executives responsible for protecting their company’s critical data with innovative solution providers & renowned information security experts. Learn from cyber security thought leaders and Engage in panel discussions focusing on trending cyber topics such as Sr. Leadership’s Best Approach to Cyber Defense, What’s Your Strategic Incident Response Plan?, Protecting your Enterprise from the Human Element and more. Your registration includes a catered breakfast, lunch, and cocktail reception. Receive half off your admission with promo code cyberwire50 at CyberSummitUSA.com and view details including the full agenda, participating solution providers & confirmed speakers. Tickets are normally $350, but only $175 with promo code.

Digital Utilitites Europe (Amserdam, the Netherlands, May 16 - 17, 2018) The conference will bring together key industry stakeholders to address the current challenges of the digitisation in the utilities sector. Join us in Amsterdam to hear latest business case studies and gain insight into technological advancements within the industry, as well as unique strategies utilised by to meet demands of rapidly changing energy consumer/prosumer market.

SecureWorld Houston (Houston, Texas, USA, May 17, 2018) Connecting, informing, and developing leaders in cybersecurity. SecureWorld conferences provide more content and facilitate more professional connections than any other event in the Information Security industry. Join your fellow InfoSec professionals for high-quality, affordable cybersecurity training and education. Earn 6-12 CPE credits through 30+ educational elements, learning from nationally recognized industry leaders. Attend featured keynotes, panel discussions, breakout sessions, and solution vendor displays-all while networking with local peers.

Ignite18 (Anaheim, California, USA, May 21 - 24, 2018) Palo Alto Networks' sixth annual conference features highly technical insights based on firsthand experiences with next-generation security technologies, groundbreaking new threat research, or innovative technical best practices. Don’t miss this outstanding opportunity to share your expertise with our Ignite community of distinguished security professionals and researchers.

AFCEA/GMU Critical Issues in C4I Symposium (Fairfax, Virginia, USA, May 22 - 23, 2018) The AFCEA/GMU Critical Issues in C4I Symposium brings academia, industry and government together annually to address important issues in technology and systems research and development. The agenda for 2018 focuses on: innovations in software engineering, advances in data security, blockchain impact on C4I, exploiting machine learning, collaborative community resilience, IoT impact on national security, understanding information warfare, innovations in IT acquisition, and disruptive mobility technology.

3rd Annual Nuclear Industrial Control Cybersecurity and Resilience Overview (Warrington, England, UK, May 22 - 23, 2018) Now in its 3rd year, the Cyber Senate Nuclear Industrial Control Cyber Security and Resilience Conference will take place on May 22/23rd in Warrington United Kingdom. This two day executive forum will include presentations, roundtable working groups and panel sessions. Together we will address the escalating cyber risk and resilience challenges associated with the adoption and convergence of operational technologies in enterprise facing architecture. Practitioners will gain further insight into how to best respond to evolving cyber threats, the importance of effective risk management throughout the nuclear supply chain, innovations in detection and mitigation, configuration management and how can we incorporate resilience into critical control system components and business process.

PCI Security Standards Council’s Asia-Pacific Community Meeting (Tokyo, Japan, May 23 - 24, 2018) Join us for: networking opportunities, updates on industry trends, insights and strategies on best practices, engaging keynotes and industry expert speakers. The PCI Security Standards Council’s 2018 Asia-Pacific Community Meeting is the place to be. We provide you the information and tools to help secure payment data. We lead a global, cross industry effort to increase payment security by providing industry-driven, flexible and effective data security standards and programs that help businesses detect, mitigate and prevent criminal attacks and breaches.

North American Financial Information Summit (New York, New York, USA, May 23, 2018) Data is the most vital asset of any financial services firm. With volumes increasing exponentially, and the complexity and structure continuously changing, it is more vital than ever to keep on top of EDM strategy and analytical capabilities, while of course remaining compliant. Join us for the only conference around to challenge your current data strategy and evaluate your technology investments. Have your voice heard at interactive workshop tables, learn from peers facing the same challenges at their respective firms, listen to the experts, hear their success stories, and meet 350+ senior decision makers over 5 networking breaks - all this for only one day out of the office!

SecureWorld Atlanta (Atlanta, Georgia, USA, May 30 - 31, 2018) Connecting, informing, and developing leaders in cybersecurity. SecureWorld conferences provide more content and facilitate more professional connections than any other event in the Information Security industry. Join your fellow InfoSec professionals for high-quality, affordable cybersecurity training and education. Earn 12-16 CPE credits through 60+ educational elements learning from nationally recognized industry leaders. Attend featured keynotes, panel discussions, breakout sessions, and solution vendor displays-all while networking with local peers.

RISKSEC (New York, New York, USA, May 31, 2018) Welcome to the 2018 New York City RiskSec Conference. As SC Media approaches our 30th anniversary, we fully understand the avalanche of cybersecurity-related problems, responsibilities and aspirations you face. Like no other time before, data security is crucial to you and your corporate executives. With an avalanche of massive data breaches that compromised millions of users’ data and cost senior-level executives their jobs and the endless other types of attacks that leveraged both new and traditional techniques, 2017 seemed yet another banner year for the infosec industry. We expect this year will be just as active as our attendees will face the challenge of both the criminal element and nation states stepping up their aggressive activities. On top of these, insider threats, supply chain vulnerabilities, regulatory demands and increasing dependence on IoT, AI, cloud apps, mobile devices and still other technologies will continue to convolute your tactical and strategic cybersecurity aims.

THE CYBERWIRE
Compiled and published by the CyberWire editorial staff. Views and assertions in linked articles are those of the authors, not the CyberWire.
The CyberWire is published by Pratt Street Media and its community partners. We invite the support of other organizations with a shared commitment to keeping this informative service free and available to organizations and individuals across the globe.