You are viewing this page in an unauthorized frame window.
This is a potential security issue, you are being redirected to https://csrc.nist.rip
An unofficial archive of your favorite United States government website
Official websites do not use .rip
We are an unofficial archive, replace .rip by .gov in the URL to access the official website. Access our document index here.
We are building a provable archive!
A lock () or https:// don't prove our archive is authentic, only that you securely accessed it. Note that we are working to fix that :)
The Information Security and Privacy Advisory Board (ISPAB) is authorized by 15 U.S.C. 278g-4, as amended, and advises the National Institute of Standards and Technology (NIST), the Secretary of Homeland Security (DHS), and...
Presentations & Speakers at a Glance: .govCAR: Threat-based Approach to Cybersecurity Architecture Reviews, Branko Bokan, DHS; Zero Trust Architecture 101: What it Means for Federal Agencies, Scott Rose, NIST;...
The National Institute of Standards and Technology is hosting the first of a new series of workshops focusing on the Open Security Controls Assessment Language (OSCAL). OSCAL provides a standardized set of XML-, JSON- and...
On Tuesday, September 24, 2019, NIST is holding a one-day workshop entitled “Human Factors in Smart Home Technologies.” The workshop will address human considerations for smart home devices, including usability, user...
The Software and Supply Chain Assurance Forum (SSCA) provides a venue for government, industry, and academic participants from around the world to share their knowledge and expertise regarding software and supply chain risks,...
On Tuesday, September 10, 2019, NIST’s National Cybersecurity Center of Excellence Supply Chain Assurance project team is having an Industry Day, starting at 8:30am. The purpose of this Industry Day is to identify the issues...
The NIST Post-Quantum Cryptography Standardization Process has entered the next phase, in which 26 second-round candidates are being considered for standardization. NIST plans to hold a second NIST PQC Standardization...
Presentations & Speakers at a Glance: Building a Security Authorization Strategy for Cloud Service Providers, Jaime Noble, DOJ; FIPS 201-2, PIV of Federal Employees and Contractors, Hilde Ferraiolo, NIST. NOTE: THIS...
The Information Security and Privacy Advisory Board (ISPAB) is authorized by 15 U.S.C. 278g-4, as amended, and advises the National Institute of Standards and Technology (NIST), the Secretary of Homeland Security (DHS), and...
NIST will be hosting the third in a series of public workshops on the development of the Privacy Framework: An Enterprise Risk Management Tool on July 8th-July 9th in Boise, Idaho. We thank Boise State University for hosting...
The National Cybersecurity Center of Excellence (NCCoE) will host a workshop on Security for IPv6 Enabled Enterprises on Thursday, June 13th at 8:30 a.m. in Rockville, MD. NIST’s NCCoE is developing a project plan to examine...
Presentations & Speakers at a Glance: Keynote by Dr. Ron Ross (NIST); Updates from GAO; Presentations on Developing Security Control Overlays, Phishing, the NIST Privacy Framework and Collaboration Space. NOTE: THIS...
D.C. Area Crypto Day is a bi-annual, one-day regional meeting of cryptographic researchers to promote research collaborations and disseminate fresh, state-of-the-art results in cryptography. Previous D.C. Area Crypto Day...
32nd Annual Conference Innovations in Cybersecurity Awareness and Training: A 360 Degree Perspective FISSEA is a forum for Federal Information Security Educators to share information, effective practices, and...
The ISPAB is authorized by 15 U.S.C. 278g–4, as amended, and advises the National Institute of Standards and Technology (NIST), the Secretary of Homeland Security, and the Director of the Office of Management and Budget (OMB)...
Open the "Agenda" below to find links to the videos () and slide-decks of the presentations. Click here for a printable PDF version of the workshop schedule. We offered a free live webcast option: link full video 1st day;...
WEBCAST ONLY – Registration is not required to view the webcast, but registered viewers will receive a reminder and updates prior to the webcast. This webcast will provide a 2-hour overview and deep dive of the recently...
WEBCAST ONLY – Registration is not required to view the webcast, but registered viewers will receive a reminder and updates prior to the webcast. This webcast will provide a 2-hour overview and deep dive of the recently...
Presentations & Speakers at a Glance: Overview of the Useable Security Program, Mary Theofanos & July Haney, NIST; Security Fatigue, Brian Stanton, NIST; and Adopting Risk Metrics for an Effective Risk Management...
* "Relevance" merely indicates the search engine's score for a document. It is based on the search parameters and information in the document's detailed record.