NICE (National Initiative for Cybersecurity Education) Conference 2015
|
NICE (National Initiative for Cybersecurity Education) Conference 2015
November 3-4, 2015 San Diego, CA |
|
Ready to Work: Equipping Our Cybersecurity Workers With The Skills to Compete
in a 21st-Century Economy NICE 2015 is being designed to be a rallying point around cybersecurity education and workforce development. It provides:
|
|
|
|
Join thought leaders from education, government, industry and non-profits as we address the future cybersecurity education needs of the nation.
The event will take place over two days in San Diego, CA. All companies with supporting programs, technology or with a voice in the cyber education marketplace are invited to exhibit their latest technologies and services at this event. Learn more
Sponsorships are also available for additional exposure.
|
|
|
|
Educational Tracks include:
Track 1: Accelerate Learning and Skills Development
Track 2: Establish a Diverse Learning Community
Track 3: Workforce Development and Career Planning
|
|
Cybersecurity has emerged as one of the leading creators of jobs and opportunity for all economic sectors. An ecosystem of technology providers, policy makers, legal expertise, banking, insurance, devices, educational programs and devices have emerged to deal with the cyber security issues that have become commonplace. In turn, the marketplace has responded by demanding a new workforce capable of taking on this challenge.
For more information on the NICE initiative and the 2015 Conference, please visit https://www.fbcinc.com/
|
|
Questions? Please contact your FBC Account Manager directly, or FBC’s Customer Outreach at 800-878-2940 x283 / katie@fbcinc.com.
|
SecurityBSides DC 1st Round Ticket Sales Open Now
Get them while they are hot. SecurityBSides DC registration will be opening for FIRST round ticket sales tonight at just past midnight, EDT! The event is in October, and you can find more details on the Web site at bsidesdc.org. The registration page will open automatically at the appointed hour.
Black Hat USA 2015 Wraps Up Record-Breaking Week in Las Vegas
SAN FRANCISCO, Aug. 10, 2015 /PRNewswire/ — Black Hat, the world’s leading family of information security events, today highlights some of the special events and initiatives that helped make Black Hat USA 2015 a record-breaking show. In its 18th year, the event welcomed more than 11,000 of the most security-savvy professionals across the InfoSec spectrum – spanning academia, world-class researchers, and leaders in the public and private sectors. Boasting more than 110 innovative research-based Briefings presented by more than 190 researchers and speakers, as well as 70 in-depth Trainings, attendees of Black Hat USA 2015 experienced the most intensive schedule to date. For more information about the event and to download available whitepapers and presentations, visit: blackhat.com/us-15/.
The Black Hat Review Board, comprised of 24 of the world’s foremost security experts, evaluated more submissions this year than ever before – resulting in the most robust schedule in Black Hat history.
Show Highlights
- Keynote Jennifer Granick, Director of Civil Liberties at the Stanford Center for Internet and Society and one of the most respected legal minds in the industry, presented “The Lifecycle of a Revolution.” Granick delivered her dynamic presentation about the dying dream of Internet freedom to a packed keynote room, filled with more than 6,000 attendees.
- Black Hat Arsenal returned for its sixth year, offering researchers and the open source community a venue to demonstrate tools they develop and use in their daily professions – from visualization and phishing to collaborative analysis and pentesting. This year’s event featured 58 tools, the largest Arsenal event to date.
- Black Hat’s “Beyond the Gender Gap: Empowering Women in Security” panel and luncheon featured some of the top women in the security field sharing their paths to success, as well as insight on recruiting, retaining and the professional advancement of women in the security industry.
- Black Hat Business Hall was action-packed, as more than 200 of the industry’s top companies showcased their latest technologies and solutions alongside the newly launched International Pavilion and Career Zone, as well as the Innovation City for impressive startups.
Giving Back
Black Hat is driven by the needs of the security community. Giving back and helping to foster the next generation of security professionals is a top priority and we are proud to highlight some of our most recent initiatives:
- Electronic Frontier Foundation Support: for the second year in a row, Black Hat is proudly donating $50,000 to the EFF to continue supporting their important work in protecting civil liberties within the digital world. Black Hat has a strong partnership with the EFF to provide pro-bono legal consultations to security researchers on the legality of any research or data they plan to present at the annual shows.
- Academic Scholarships: From a combination of speaker nominations and direct applications, Black Hat USA 2015 provided 153 students with complimentary full Briefings passes.
- Future Female Leaders Scholarship Program: brand new this year, Black Hat and the Executive Women’s Forum (EWF) teamed up to award 27 full scholarships to female students in the Information Security, IT Risk Management and Privacy industries.
- Youth for Technology Foundation Support: in support of the Youth for Technology Foundation (YTF), this year Black Hat developed an exclusive Black Hat USA 2015 t-shirt for the show with all proceeds being directly donated to help bring technology and education to low-income communities in the U.S. and rural communities in developing nations.
Top sponsors of Black Hat USA 2015 include: Diamond Sponsors: FireEye, Lieberman Software, Qualys, RSA, and Tenable Network Security; Platinum Plus Sponsors: AlienVault, Cisco, Digital Guardian, Fidelis Cybersecurity, HP, Lockheed Martin Corporation, LogRhythm, Palo Alto Networks, Inc., Raytheon | Websense, and Webroot; Platinum Sponsors: Bromium, Core Security Technologies, Fortinet, IBM, Optiv Security, Proofpoint, Inc., Tripwire, and ZeroFOX Inc.
What’s Next: Black Hat Europe 2015
Following a blockbuster week in Las Vegas, Black Hat is busy preparing for Black Hat Europe 2015, a four-day event taking place November 10-13, 2015 at the Amsterdam RAI Exhibition and Convention Centre in Amsterdam, Netherlands. The event will bring together an international security audience for two days of intense classroom-style Trainings followed by two days of the infamous Black Hat Briefings presented by some of the most renowned experts in the industry. For more information and to register, please visit: blackhat.com/eu-15/.
Future Black Hat Dates and Events
- Black Hat Europe 2015, Amsterdam RAI, Amsterdam, NL, November 10-13, 2015
- Black Hat Executive Summit 2015, Omni Montelucia Resort, Scottsdale, AZ, December 8-10, 2015
- Black Hat Asia 2016, Marina Bay Sands, Singapore, March 29 – April 1, 2016
- Black Hat USA 2016, Mandalay Bay, Las Vegas, Nevada, July 30 – August 4, 2016
About Black Hat
For more than 17 years, Black Hat has provided attendees with the very latest in information security research, development, and trends. These high-profile global events and trainings are driven by the needs of the security community, striving to bring together the best minds in the industry. Black Hat inspires professionals at all career levels, encouraging growth and collaboration among academia, world-class researchers, and leaders in the public and private sectors. Black Hat Briefings and Trainings are held annually in the United States, Europe and Asia, and are produced by UBM Tech. More information is available at: blackhat.com.
About UBM Tech
UBM Tech engages technology professionals live and online through its world-class brands, including Black Hat, InformationWeek, Enterprise Connect, Game Developers Conference (GDC), Dark Reading, HDI, GTEC, Network Computing and Interop. We’re dedicated to fostering real engagement by creating environments where the technology industry can make connections, share insights, and network effectively. UBM Tech is the only media company that delivers large-scale industry events, leading online brands and content marketing services serving the Enterprise IT, Information Security, Game Development, Enterprise Communications and Technical Services and Support communities. UBM Tech is a part of UBM (UBM.L), a global provider of media and information services with a market capitalization of more than $2.5 billion. For more information, go to http://tech.ubm.com.
Logo – http://photos.prnewswire.com/prnh/20150810/257119LOGO
SOURCE Black Hat
RELATED LINKS
http://www.blackhat.com
NSA sets date for purge of surveillance phone records
A posting from NakedSecurity titled “NSA sets date for purge of surveillance phone records ” by
The National Security Agency (NSA) has set a date to purge phone records collected during its bulk surveillance program.
“Analytic access” to the five years worth of records will end on 29 November, and they’ll be destroyed three months later, it said in a statement released on Monday.
There are two reasons for the three-month lag:
- The bulk telephony metadata has to be preserved until civil litigation regarding the program is resolved or until courts relieve NSA of such obligations. From the statement:
As soon as possible, NSA will destroy the Section 215 bulk telephony metadata upon expiration of its litigation preservation obligations.
- Also, “solely for data integrity purposes” to verify the records produced under the new, targeted production authorized by the USA Freedom Act, the NSA will allow technical personnel to access the historical metadata for those additional three months.
For a while there, it didn’t look like the NSA would ever let go of its death grip on the records.
“Plus ça change, plus c’est la même chose, well, at least for 180 days,” US Foreign Intelligence Surveillance Court (FISC) Judge Michael W. Mosman wrote last month, as he jauntily granted a six-month extension to the agency’s bulk collection of phone metadata.
To read more click here.
Code Theft: Protecting IP At The Source
An interesting article from DarkReading titled “Code Theft: Protecting IP At The Source” by Anna Chiang.
Your corporate assets are at risk and every day that you avoid taking action shortens the time until your IP will be leaked. Here are six steps toward better data security.
The security world is awash with various malware-centric cyber kill chain models and advanced styles of threat defense that focus on network traffic, payload, and endpoint analyses. But if you step back and look at what most security tools and frameworks are trying to accomplish at a very high level, it boils down to:
- Detecting and/or blocking adversaries as they try to get inside your organization to steal your valuable data and intellectual property (IP)
- Detecting and/or blocking adversaries as they try to exfiltrate that IP and data to use for their own purposes
To read more click here:
Online Security: How The Experts Keep Safe
An interning article titled “Online Security: How The Experts Keep Safe” from information week by Thomas Claburn.
In the 1976 thriller Marathon Man, Nazi war criminal Dr. Christian Szell tortures runner “Babe” Levy to find out whether it’s safe for him to retrieve diamonds stored in a bank deposit box.
“Is it safe?” Szell asks repeatedly. Levy, who doesn’t know, can’t provide a satisfactory answer.
It isn’t safe online, but many people try to achieve some measure of security by keeping their passwords safe in their heads.
Someone could beat you about the head, a technique euphemistically known as “rubber-hose cryptanalysis,” to obtain your secrets. It didn’t work inMarathon Man, but it can.
Fortunately, that’s not a scenario likely to concern most Internet users. But it demonstrates one of several vulnerabilities that come with trying to remember passwords. There’s another issue that may be more relevant: Memory doesn’t scale. Trying to remember multiple passwords, if they’re as complex as they should be, is a recipe for failure.
Google software engineer Iulia Ion, research scientist Rob Reeder, and user experience researcher Sunny Consolvo set out to explore the difference between security experts and the rest of us. They detailed their findings in the paper “Comparing Expert and Non-Expert Security Practices,” which they presented at last week’s Symposium on Usable Privacy and Security.
To read more click here:


