Welcome to another edition of our Weekly Rewind – where we summarize all our posts from the last week. The top stories this week were 3) “OPM (cough) Proposes New Cyber Security Guidelines”, 2) “(ISC)2 Bylaws Change Vote”, and 1) “Creating REAL Threat Intelligence…with Evernote Slides from Defcon 23 Wall of Sheep”. If you missed anything or happened to be offline, we hope you find this summary post useful as a quick reference. A la Schneier … you can also use this rewind post to talk about the security stories in the news that we haven’t covered remote-access.
GenCyber – Cyber Summer Camp: Looking for another summer camp to send your kids to? Look no further than the NSA- sponsored GenCyber program. As detailed in the New York Times article below, the camps are geared toward kids in grades K – 12 and is free to attend. While the students get to learn basic security skills, the NSA gets a pipeline of younger talent interested in cyber security to hopefully head off the growing government skills gap. For more information on GenCyber and their summer camps, check out their website at Gen-Cyber.info. (continued here)
OPM (cough) Proposes New Cyber Security Guidelines: From the organization responsible for probably one of the worst intelligence breaches in recent history, the Office of Personnel Management (OPM), come draft guidelines and forthcoming cyber security compliance requirements for contractors they do business with. I’ll just leave that here for you all to ponder a bit. (continued here)
Creating REAL Threat Intelligence … with Evernote Slides from Defcon 23 Wall of Sheep: In this updated version of my threat intel framework presentation (using Evernote as a backend database) at Defcon 23 Wall of Sheep, I have added additional feeds and updated the initial tag framework to help better organize data between Open Source feeds, a case management system, and an information sharing repository. As before there are also a few implementation examples. Thanks to the Ming and the Wall of Sheep crew for having me! (continued here)
(ISC)2 Bylaws Change Vote: So while we were all out enjoying hacker summer camp, CISSP holders may have received an email from (ISC)2 concerning “Notice of special meeting of the members” on August 7th for the purpose of “To approve of (ISC)2 modifying the (ISC)2 bylaws currently in effect since July 17, 2004 and replace them with the proposed amended and restated bylaws.” The proposed updates include more flexible voting options and term limits for the board. Wim Remes (@wimremes), a former chairman of the board, has a nice post summarizing the changes. (continued here)
Hope everyone had a wonderful week! Have a great weekend!