Over the last two decades a very wide range of standards have been developed covering a wide range of aspects of cyber security. These documents have been published by national and international formal standardisation bodies,...
The Information Security and Privacy Advisory Board (ISPAB) met on October 26-28, 2016, at NIST. All sessions were open to the public. Federal Register Notice Announcing Meeting Minutes
NIST NCCoE National Cybersecurity Center of Excellence (NCCoE) Overview William (Bill) Newhouse, NIST Developing ISCM Assessment Methodology Chad Baer, DHS Hyperlinks for the IETF Security Automation and Continuous...
NIST and the Department of Health and Human Services (HHS), Office for Civil Rights (OCR) are pleased to co-host the 9th annual conference, Safeguarding Health Information: Building Assurance through HIPAA Security, on...
In 2013, NIST initiated the lightweight cryptography project to study the performance of the current NIST-approved cryptographic standards on constrained devices and to understand the need for a dedicated lightweight...
The NCCoE is currently working on a project which aims to explore and implement commercial off-the-shelf solutions that demonstrate derived PIV credential issuance, lifecycle management, and usage. On October 12, 2016, the...
In July of 2015, the President of the United States issued Executive Order 13702 to create a National Strategic Computing Initiative (NSCI). The goal of the NSCI is to maximize the benefits of High-Performance Computing (HPC)...
The Commission on Enhancing National Cybersecurity will meet Monday, September 19, 2016 from 9:00 a.m. until 5:00 p.m. Eastern Time at the American University Washington College of Law, Claudio Grossman Hall, Yuma Building....
NIST and the Department of Transportation (DOT) co-hosted a public workshop to gather input on the privacy controls in Appendix J of NIST Special Publication 800-53, Revision 4. The workshop explored the effectiveness and...
Trustworthiness is a critical concern stakeholders have about Cyber-Physical Systems (CPS) and the Internet of Things (IoT) and their deployment. The National Institute of Standards and Technology's Smart Grid and...
The Commission on Enhancing National Cybersecurity will meet Tuesday, August 23, 2016, from 9:00 a.m. until 5:00 p.m. Central Time at the University of Minnesota's TCF Bank Stadium-DQ Club Room. The primary purpose of the...
The Commission on Enhancing National Cybersecurity will meet Thursday, July 14, 2016, from 9:00 a.m. until 5:00 p.m. Central Time at the Hilton University of Houston. The primary purpose of the meeting is to discuss the...
The Information Security and Privacy Advisory Board (ISPAB) met from June 15-17, 2016, at the U.S. Access Board in Washington, D.C. All sessions were open to the public. Federal Register Notice Announcing Meeting...
Please join us as we introduce a Trustworthy Supplier Framework, a toolbox developed to assist in understanding component protection options and inform better buying decisions as part of supply chain risk management. Although...
Full Workshop Details Cryptography and security applications make extensive use of random numbers and random bits, particularly for the generation of cryptographic keying material. A key to initiate a cryptographic algorithm...
Full Workshop Details Executive Order 13636, Improving Critical Infrastructure Cybersecurity, directed NIST to work with stakeholders to develop a voluntary framework for reducing cyber risks to critical...
The Information Security and Privacy Advisory Board (ISPAB) met March 23-25, 2016, at the U.S. Access Board in Washington, D.C. All sessions were open to the public. Federal Register Notice Announcing Meeting Minutes
29th Annual Conference March 15-16, 2016 The Quest for the Un-hackable Human: The Power of Cybersecurity Awareness and Training FISSEA Agenda with Presentation Links Conference Program Program focus: Awareness,...
Federal Computer Security Managers Forum - January 2016
* "Relevance" merely indicates the search engine's score for a document. It is based on the search parameters and information in the document's detailed record.