2nd Annual Trusted Computing Conference
To get the latest scoop about the conference, be sure to read “Trusted Computing Group Experts and Members to Address Attendees of the NSA Trusted Computing Conference & Exposition,” featured in Yahoo! Finance. Want to find out more about the speakers highlighted in this article; take a moment to check out the conference agenda.
1. Registration
2. Agenda
3. Exhibitor Listing
4. Hotel – Book your room reservation by Friday, 2 September to ensure reduced rate.
Mobile Security eSymposisum – LIVE next Thursday
SC Magazine is offering you a new opportunity to earn CPE credits at no cost and with no travel required.
SC eSymposium: Mobile Security
Date: Thursday, September 8 at noon
Location: Your computer
Earn CPE credits for attending*
Click on the link below to register for FREE:
http://sc.haymarketcomm.net/r/
To safeguard mobile devices used by business executives, the data stored on them and the connectivity to corporate networks they enable is a constant trial – one that is infrequently satisfactorily remedied. This is leaving many security pros comparing themselves to Sisyphus rolling a giant boulder up a steep hill over and over. The difference: mobile security troubles only grow heavier. Not only are smartphones, tablets and other devices now ubiquitous, they’re often brought from home. So, just how are companies supposed to secure these things – some private, some corporate-issued? How can such a heterogeneous environment be centrally managed and safeguarded? What about all those applications end-users keep downloading? What about the data they want to download on them? Any legal ramifications? How does the company stay compliant? We’ll provide some answers.
Platinum sponsors:
Accellion
Ping Identity
Thawte
Featured exhibitor:
WinMagic
SC World Congress 24/7 exhibitors:
ArcSight
Cisco
Secunia
Solutionary
Sophos
Click on the link below to register for FREE:
http://sc.haymarketcomm.net/r/
For more information, please e-mail mailto:maggie.keller@
*SC Magazine is a designated (ISC)2 CPE provider. CPE credits will be issued to only live attendees with (ISC)2 credentials.
Morto Computer Worm Infecting Computers via Remote Desktop Protocol (RDP)
A new worm called Morto has begun making the rounds on the Internet in the last couple of days, infecting machines via RDP (Remote Desktop Protocol).
The worm is generating a large amount of outbound RDP traffic on networks that have infected machines, and Morto is capable of compromising both servers and workstations running Windows.
If you have any questions or need assistance, please let me know and I will follow up with you.
Additional Information:
v http://threatpost.com/en_us/blogs/new-worm-morto-using-rdp-infect-windows-pcs-082811
v http://www.microsoft.com/security/portal/Threat/Encyclopedia/Entry.aspx?Name=Worm%3aWin32%2fMorto.A
v http://blogs.computerworld.com/18870/morto_worm_spreading_fast_via_rdp?af
Security Conference “DerbyCon” Makes a Splash in the Information Security Field with a Huge Speaker Lineup. A New Hackercon is Born
DerbyCon is a new hacker conference in the heart of Louisville, Kentucky’s 4th Street Live. DerbyCon isn’t just another security conference, we’ve taken the best elements from all of the conferences we’ve ever been to and put them into one. This conference is a place you can call home, where you can meet each other or new people, party, and learn.
Welcome to a new age in security conferences, a new beginning, and a new way to share in the information security space. Our goal is to create a fun environment where the security community can come together and share ideas. Before we even released the CFP, our speaker list has filled up with of some of the industry’s best and brightest minds. That fact alone shows that DerbyCon is poised to change the face of security cons.
Some of these speakers include:
Dave Kennedy (ReLIK) – Founder DerbyCon, Creator Social-Engineer Toolkit, Fast-Track
Adrian Crenshaw (Irongeek) – Founder, DerbyCon, Irongeek.com, Co-Host, ISD Podcast
Martin Bos (PureHate) – Founder, DerbyCon, Question-Defense, BackTrack Developer
HD Moore (hdm) – Founder Metasploit, CSO Rapid7
Chris Nickerson – Founder Lares Consulting, Exotic Liability
Kevin Mitnick – Founder, Mitnick Security Consulting
Ed Skoudis – Founder, InGuardians, SANS Instructor
Bruce Potter (gdead) – Founder, The Shmoo Group, Co-Founder/CFO, Ponte Technologies
Chris Gates (carnal0wnage) – Rapid7, Attack Research
Chris Hadnagy (loganWHD) – Founder, Social-Engineering.org
Paul Asadoorian – Tenable Networks, Founder, Pauldotcom
Larry Pesce (haxorthematrix) – NWN Corporation, Co-Host, Pauldotcom
James Lee (egypt) – Rapid7, Metasploit Development Team
Peter Van Eeckhoutte (corelanc0d3r) – Founder, corelanc0d3r Team
Carlos Perez (darkoperator) – Tenable Networks, Metasploit Development Team
Jim O’Gorman (elwood) – Founder, Social-Engineer.org
Thomas D’Otreppe (Mister_X) – Creator, Aircrack-ng
Int0x80 – Dual Core Music
DerbyCon offers both conference level talks as well as high-end two-day training for those wanting to do additional activities. There are a number of events scheduled including the awesome appearance of nerdcore rapper Int0x80 from Dual Core. Capture The Flag (CTF), Network King of the Hill, Lockpick Village, Soldering Village, and Marathon “Hacker Movie” Theater are just a few of the events scheduled. BSIDES Kentucky will also be running at the same time as the training. There will always be something for people of different interests to do while at DerbyCon, whether it be the talks during the day or training and BSIDES at night.
DerbyCon is from September 30 – October 2nd, 2011. Tickets to this event are limited – registration begins Friday, April 29, 2011. If your interested in speaking or to be a trainer, Call For Papers is now officially open and accepting submissions. Be sure to check out http://www.derbycon.com for more information about the con and to register!
1105 MEDIA ANNOUNCES KEYNOTES FOR INAUGURAL 2011
1105 MEDIA ANNOUNCES KEYNOTES FOR INAUGURAL 2011
GEOSPATIAL SUMMIT
Event Highlights GIS Technologies Critical to Government Decision Making and Disaster Response Time
| Falls Church, VA – August 17, 2011– 1105 Government Information Group, the leading provider of integrated information and media for the government information technology (IT) market, today announced new keynote presenters for its 2011 Geospatial Summit. The event will be held September 13, 2011 at the Hyatt Dulles in Herndon, Virginia.The opening keynote address, GIS to the Rescue: The Critical Role of Geospatial Technology in Disaster Response will provide an account of a real-world emergency response from veteran disaster relief expert Michael Byrne, Leader -National Incident Management Assistance Team – Blue (N-IMAT Blue), Federal Emergency Management Agency (FEMA), as well as the technical expertise of Russ Johnson, Director – Public Safety and Homeland Security, Esri.
The closing keynote address will be delivered by Letitia Long, Director – National Geospatial-Intelligence Agency (NGA). Director Long has a distinguished career serving the intelligence and engineering community for over 30 years. NGA is a Department of Defense combat support agency and a member of the U.S. Intelligence Community, providing imagery, geospatial and targeting analysis for U.S. national defense, disaster relief, and safety of navigation. Focusing on Geographic Information Systems (GIS) – which integrate data, hardware, and software for capturing, analyzing, and displaying all forms of geographical information – the intensive, one-day Summit will offer educational opportunities for government managers on how to best use GIS technologies and data as critical decision support tools. In addition, experts will share best practices in designing and implementing an efficient GIS system that effectively integrates into an agency’s operations. Other featured sessions include a keynote panel on Why GIS, Why Now: Doing More with Less. Speakers include Mark DeMulder, Director of U.S. Geological Survey’s National Geospatial Program, EPA Geospatial Information Officer Jerry Johnston, and Mike Ratcliffe of the U.S. Census Bureau. “Government leaders on federal, state, and local levels are realizing the powerful advantage of implementing GIS strategies and tools as part of their decision making process,” said Michael Raggiani, Senior Event Director for the Summit. “Through a combination of real-world case studies presented by recognized thought-leaders in the field, the summit participants will gain valuable insight into how this emerging technology can assist government agencies in meeting their mission.” For more information on this event visit, |
About 1105 Government Information Group
1105 Government Information Groupis the leading provider of integrated information and media for the government information technology market. Our comprehensive portfolio of print, online, event, custom media and research products distinctively serves the information needs of the government IT buying team-agency executives, program managers, IT managers and systems integrators-across all segments of federal, state and local government. Flagship news and information brands include Defense Systems, Federal Computer Week, FEND, GCN, and Washington Technology. Flagship events include the Federal 100, FOSE, GCN Gala, GovSec, U.S. Law and a series of conferences focused on collaboration, networking and education. www.1105govinfo.com
Media Contact:
Kim Andreotta
ConnellyWorks, Inc.
571-323-2585 ext. 2150
U.N. Cybersecurity Arm Endorses EC-Council’s Global CyberLympics
Aug 4, 2011 | ALBUQUERQUE, NM – The cybersecurity executing arm of the United Nations has endorsed the Global CyberLympics, a new initiative by the EC-Council to foster stronger international cooperation on information security issues and to improve cybersecurity training and awareness in developing nations and third world countries.
Created by EC-Council, the Global CyberLympics is a series of ethical hacking games comprised of both offensive and defensive security challenges that will take place starting from September across six continents. Teams will vie for regional championships, followed by a global championship round to determine the world’s best cybersecurity team. The EC-Council is sponsoring over $400,000 worth of prizes at the CyberLympics.
The Global CyberLympics is supported by the International Multilateral Partnership Against Cyber Threats (IMPACT), the cybersecurity executing arm of the United Nations’ specialized agency – the International Telecommunications Union (ITU). With this support, the Global CyberLympics hopes to be able to promote its mission to 136 partner countries.
“The Global CyberLympics could help to foster a greater sense of partnership and cooperation between countries on the issue of cybersecurity,” said Mohd Noor Amin, Chairman of IMPACT. “By sharing knowledge, training and resources, we can help to improve the level of cybersecurity in many countries and regions around the world.”
“Our purpose with the Global CyberLympics initiative is to help establish true cybersecurity partnerships across borders,” said Jay Bavisi, Chairman of the Global CyberLympics Organizing Committee and president of EC-Council. “We are very proud and honored for this initiative to be supported by key players in the information security community, including IMPACT, the world’s first United Nations-backed global alliance for cybersecurity, as well as some of the most reputable events such as GITEX, the largest IT tradeshow in the Middle East region, and Hacktivity, the largest hackers conference in central and eastern Europe.”
The games come at a crucial time as global cyber threats appear to be escalating. According to the U.S. Cyber Consequences Unit, the annual loss of intellectual property and investment opportunities is $6 to $20 billion as a result of hacking. In a recent article about cyber espionage attacks against the US, the magazine Vanity Fair even referred to 2011 as “the Year of the Hack.”
The EC-Council’s mission with the Global CyberLympics is to unify global cyber defense through the games, along with the following objectives:
- Capacity Building: Discover new talents, methods and ideas; and to encourage development in the field of information security. Besides discovering gifted hackers and cyber-defenders, the Global CyberLympics will also inspire the development of Information security professionals of the future.
- Raising Awareness: Educate the global community, especially in developing nations and third world countries, on the issues of Information security, and encourage further development of the field. This will raise awareness towards increased education and ethics in information security.
- Global Peace: Foster friendshipand create cohesiveness between information security professionals, whether as an individual, representing a corporation or for a national agency, and encourage frequent exchange of essential information, technology and skills.
Regional championships will be held in various locations across different continents, and co-hosted with reputable IT/information security conferences and tradeshows, as follows:
- North America Eastern | Hacker Halted USA – Miami, USA
- North America Western | TakeDownCon – Las Vegas, USA
- South America | H2HC – Sao Paolo, Brazil
- Europe | Hacktivity – Budapest, Hungary
- Middle East & India | GITEX – Dubai, UAE
- Asia Pacific | Hacker Halted APAC – Kuala Lumpur, Malaysia
- Africa | TakeDownCon – Johannesburg, South Africa
The CyberLympics world final is tentatively scheduled for the first quarter of 2012, with its venue still being decided.
EC-Council has selected iSight Partners’ Threatspace platform as the Official Technology Partner of the Global CyberLympics 2011-12.
Registration for the Global CyberLympics is open, and more details can be found at the official Global CyberLympics website: http://www.cyberlympics.org.
