You are viewing this page in an unauthorized frame window.
This is a potential security issue, you are being redirected to https://csrc.nist.rip
An unofficial archive of your favorite United States government website
Official websites do not use .rip
We are an unofficial archive, replace .rip by .gov in the URL to access the official website. Access our document index here.
We are building a provable archive!
A lock () or https:// don't prove our archive is authentic, only that you securely accessed it. Note that we are working to fix that :)
Presentations & Speakers at a Glance: Adopting a Vulnerability-based Risk Management Approach, Charles Wade, U.S. Air Force; Privacy Framework, Naomi Lefkovitz, NIST. NOTE: FORUM MEETINGS ARE OPEN TO ONLY...
On November 7-9, 2018, NIST will host the 2018 Cybersecurity Risk Management Conference. Building on previous NIST workshops, the conference aims to share and explore best practices and receive and discuss stakeholder input...
NIST and the Department of Health and Human Services (HHS), Office for Civil Rights (OCR) are pleased to co-host the 11th annual conference, Safeguarding Health Information: Building Assurance through HIPAA Security, on...
The National Institute of Standards and Technology (NIST), in coordination with the Department of Defense (DoD) and the National Archives and Records Administration (NARA), is hosting an informational workshop providing an...
This is the first in a series of public workshops NIST is hosting on the development of the Privacy Framework: An Enterprise Risk Management Tool. In this half-day event, on October 16th, in Austin, Texas, attendees will hear...
We are pleased to announce that a teleconference introducing the SCAP Version 2 effort has been scheduled for Thursday, October 4, 2018 at 1:00 PM Eastern time. David Waltermire from the National Institute of Standards and...
Presentations & Speakers at a Glance: FISMA SAOP Metrics, Charles Cutshall, OMB; and Ongoing Authorization, Kelley Dempsey, NIST & Lisa Barr, DHS. NOTE: FORUM MEETINGS ARE OPEN TO ONLY FEDERAL/STATE EMPLOYEES,...
This two-day workshop focuses on decreasing software security vulnerabilities by orders of magnitude, using the strong guarantees that only sound static analysis can provide. The workshop is aimed at developers, managers and...
Federal Register Notice Announcing this Meeting Meeting Minutes (Approved) Other supporting documentation will be posted here when it becomes available.
Presentations & Speakers at a Glance: Annual 2-Day Forum Meeting with a Keynote by the CIGIE IT Committee Chair, updates from the OMB, GAO, presentations by DHS, NIST, Dept of Fiscal Service, DOD, and FedRAMP (GSA)....
The Software and Supply Chain Assurance Forum (SSCA) provides a venue for government, industry, and academic participants from around the world to share their knowledge and expertise regarding software and supply chain risks,...
NIST has initiated a process to solicit, evaluate, and standardize one or more quantum-resistant public-key cryptographic algorithms. The submission deadline of November 30, 2017 has passed. Please see the Round 1 Submissions...
Practical, interactive workshop on using the Baldrige Cybersecurity Excellence Builder (BCEB) to assess the effectiveness and efficiency of your organization’s cybersecurity risk management program assess the...
Hardening the Human: The Power of Cybersecurity Awareness and Training 2017 FISSEA Educator of the Year Presented to Mike Petock Prof. Sushil Jajodia, 2016 FISSEA Educator of the Year, presented the 2017 FISSEA...
This workshop will discuss substantive public comments, including open issues) on a draft report about actions to address automated and distributed threats to the digital ecosystem as part of the activity directed by...
Presentations & Speakers at a Glance: Google Groups Intro & Forum Email List Migration Plans, Justin Senseney & Zak Mohamoud, NIST; Assessment & Authorization of Google Groups - Lessons Learned, John Connor & Rathini...
* "Relevance" merely indicates the search engine's score for a document. It is based on the search parameters and information in the document's detailed record.