Executive Coach Chris Coffey is Featured Speaker at ISSA-LA 4th Annual Information Security Summit

/
World renowned executive and leadership coach Chris Coffey will be a featured speaker at the Los Angeles Chapter of the Information Systems Security Association’ s (ISSA-LA) fourth annual Information Security Summit on Wednesday, May 16, 2012 at Hilton Universal City Hotel in Los Angeles. The theme of the one-day Summit is The Growing Cyber Threat: Protect Your Business. Mr. Coffey will discuss concepts from his soon-to-be published book Innovative Questions and demonstrate how to turn around the perceptions of others by simply asking the right questions. In the world of high-tech Internet information security, asking the right questions means helping professionals in the field to communicate effectively with executives and business leaders who have difficulty understanding the complexity and the seriousness of cybercrime and how it can affect their businesses.

JS:Cruzer-B, JS/Obfuscated, JS/Cruzer.C.gen, JS/TrojanDownloader.Agent.NKW

/
A malicious and encoded javascript file was found inside the site content and is being used to distribute malware (from newportalse.com and other domains). Any user visiting the infected site could be compromised (desktop antivirus will flag it as JS:Cruzer-B, JS/Obfuscated, JS/Cruzer.C.gen, JS/TrojanDownloader.Agent.NKW and others, depending on the intermediary domains and AV product).

SANSFIRE 2012 is coming to Washington, DC

/
SANSFIRE 2012 will take place at our Hilton Washington and Towers campus, July 6-15. There will be more than 40 SANS IT Security Training courses available. This training event is powered by the (ISC) Internet Storm Center and is an opportunity to meet the ISC handlers.

SC eSymposium: Cyber espionage

/
Cyber espionage - Those engaging in cyber espionage to steal classified and/or proprietary data from U.S. agencies and other organizations are riding high. Foreign spies, including U.S. allies, are increasingly launching digital assaults against the nation to steal sensitive economic secrets, according to a recent report by the U.S. Office of National Counterintelligence Executive. The theft of this critical information shows that attackers - state-sponsored or not - are enlisting whatever weaknesses in systems they can to steal corporate and government data, often going unnoticed for months. Experts share background on the types of attacks to watch out for and what to do to thwart them.