U.S. flag   An unofficial archive of your favorite United States government website
Dot gov

Official websites do not use .rip
We are an unofficial archive, replace .rip by .gov in the URL to access the official website. Access our document index here.

Https

We are building a provable archive!
A lock (Dot gov) or https:// don't prove our archive is authentic, only that you securely accessed it. Note that we are working to fix that :)

Search CSRC

Use this form to search content on CSRC pages.

For a phrase search, use " "


Limit results to content tagged with of the following topics:
Showing 401 through 425 of 13562 matching records.
Events June 11, 2015 - June 12, 2015
https://csrc.nist.rip/events/2015/workshop-on-elliptic-curve-cryptography-standards

Elliptic curve cryptography will be critical to the adoption of strong cryptography as we migrate to higher security strengths. NIST has standardized elliptic curve cryptography for digital signature algorithms in FIPS 186 and for key establishment schemes in NIST Special Publication 800-56A.  In FIPS 186-2, NIST recommended 15 elliptic curves of varying security levels for use in these elliptic curve cryptography standards. The provenance of the curves was not fully specified, leading to recent public concerns that there could be a hidden weakness in these curves. We remain confident in...

Events April 6, 2016 - April 7, 2016
https://csrc.nist.rip/events/2016/cybersecurity-framework-workshop-2016

Full Workshop Details   Executive Order 13636, Improving Critical Infrastructure Cybersecurity, directed NIST to work with stakeholders to develop a voluntary framework for reducing cyber risks to critical infrastructure. Version 1.0 of the Cybersecurity Framework, released on February 12, 2014, was developed in an open manner with input from stakeholders in industry, academia, and government, including a public review and comment process, workshops, and other means of engagement. In the time since the Framework's publication, NIST's primary goals have been to raise awareness of the...

Events August 30, 2016 - August 31, 2016
https://csrc.nist.rip/events/2016/exploring-the-dimensions-of-trustworthiness-chall

Trustworthiness is a critical concern stakeholders have about Cyber-Physical Systems (CPS) and the Internet of Things (IoT) and their deployment. The National Institute of Standards and Technology's Smart Grid and Cyber-Physical Systems Program Office released its CPS Framework in May 2016 and, there, trustworthiness is captured as a high-level concern encompassing safety, security, privacy, resilience, and reliability. While there are many efforts, in multiple sectors, to study these characteristics of systems they are typically considered separately and in isolation. This can result in work,...

Events
43%
October 4, 2016 - October 5, 2016
https://csrc.nist.rip/events/2016/fall-2016-software-and-supply-chain-assurance-foru

Fall 2016 Software and Supply Chain Assurance Forum

Events April 21, 2016
https://csrc.nist.rip/events/2016/federal-computer-security-managers-forum-april-2

Presentations & Speakers at a Glance: Trustworthy Email, Scott Rose, NIST;  Best Practices for PIV Authentication, Hilde Ferraiolo, NIST; and Baseline Tailor, SW-aided Security Control Selection, Joshua Lubell, NIST. NOTE:  FORUM MEETINGS ARE OPEN TO ONLY FEDERAL/STATE EMPLOYEES, HIGHER EDUCATION EMPLOYEES, AND THEIR DESIGNATED SUPPORT CONTRACTORS.  REGISTRANTS MUST USE A .GOV, .EDU, OR .MIL ADDRESS FOR SIGN-UP.  SUPPORT CONTRACTORS MUST INDICATE THE AGENCY OR ORGANIZATION THEY SUPPORT.  The Federal Computer Security Program Managers Forum (the "Forum") is an informal group...

Events August 16, 2016 - August 17, 2016
https://csrc.nist.rip/events/2016/federal-computer-security-managers-forum-august

Presentations & Speakers at a Glance: Keynotes by OMB; Updates from the Federal CISO Council and GAO; and  Presentations by NIST, FedRAMP (GSA), Dept of Treasury, and DHS. NOTE:  FORUM MEETINGS ARE OPEN TO ONLY FEDERAL/STATE EMPLOYEES, HIGHER EDUCATION EMPLOYEES, AND THEIR DESIGNATED SUPPORT CONTRACTORS.  REGISTRANTS MUST USE A .GOV, .EDU, OR .MIL ADDRESS FOR SIGN-UP.  SUPPORT CONTRACTORS MUST INDICATE THE AGENCY OR ORGANIZATION THEY SUPPORT.  The Federal Computer Security Program Managers Forum (the "Forum") is an informal group sponsored by the National Institute of Standards and...

Events January 28, 2016
https://csrc.nist.rip/events/2016/federal-computer-security-managers-forum-january

Federal Computer Security Managers Forum - January 2016

Events October 26, 2016 - October 26, 2016
https://csrc.nist.rip/events/2016/federal-computer-security-managers-forum-octobe

Presentations & Speakers at a Glance: National Cybersecurity Center of Excellence (NCCoE) Overview, Bill Newhouse, NIST;  Developing ISCM Assessment Methodology, Chad Baer, DHS. NOTE:  FORUM MEETINGS ARE OPEN TO ONLY FEDERAL/STATE EMPLOYEES, HIGHER EDUCATION EMPLOYEES, AND THEIR DESIGNATED SUPPORT CONTRACTORS.  REGISTRANTS MUST USE A .GOV, .EDU, OR .MIL ADDRESS FOR SIGN-UP.  SUPPORT CONTRACTORS MUST INDICATE THE AGENCY OR ORGANIZATION THEY SUPPORT.  The Federal Computer Security Program Managers Forum (the "Forum") is an informal group sponsored by the National Institute of Standards...

Events March 15, 2016 - March 16, 2016
https://csrc.nist.rip/events/2016/fissea-29th-annual-conference

29th Annual Conference March 15-16, 2016 The Quest for the Un-hackable Human: The Power of Cybersecurity Awareness and Training FISSEA Agenda with Presentation Links Conference Program Program focus: Awareness, Training, Education, and Certification issues New techniques for developing and conducting effective, meaningful training Workforce development Cybersecurity governance IG Metrics Internet of Things Social networking - social media Continuous Diagnostics and Mitigation (CDM) Training for the trainers Attendees gain: Big impact for low cost Networking opportunities...

Events June 15, 2016 - June 17, 2016
https://csrc.nist.rip/events/2016/ispab-june-2016-meeting

The Information Security and Privacy Advisory Board (ISPAB) met from June 15-17, 2016, at the U.S. Access Board in Washington, D.C. All sessions were open to the public. Federal Register Notice Announcing Meeting Minutes (Approved)

Events March 23, 2016 - March 25, 2016
https://csrc.nist.rip/events/2016/ispab-march-2016

The Information Security and Privacy Advisory Board (ISPAB) met March 23-25, 2016, at the U.S. Access Board in Washington, D.C. All sessions were open to the public. Federal Register Notice Announcing Meeting Minutes

Events October 26, 2016 - October 28, 2016
https://csrc.nist.rip/events/2016/ispab-october-2016-meeting

The Information Security and Privacy Advisory Board (ISPAB) met on October 26-28, 2016, at NIST. All sessions were open to the public. Federal Register Notice Announcing Meeting Minutes

Events October 17, 2016 - October 18, 2016
https://csrc.nist.rip/events/2016/lightweight-cryptography-workshop-2016

NIST hosted the second Lightweight Cryptography Workshop on October 17-18, 2016.  In 2013, NIST initiated the lightweight cryptography project to study the performance of the current NIST-approved cryptographic standards on constrained devices and to understand the need for a dedicated lightweight cryptography standard, and if the need is identified, to design a transparent process for standardization. In 2015, NIST held the first Lightweight Cryptography Workshop in Gaithersburg, MD, to get public feedback on the requirements and characteristics of real-world applications of lightweight...

Events October 11, 2016 - October 11, 2016
https://csrc.nist.rip/events/2016/nccoe-workshop-derived-piv-credentials

The NCCoE is currently working on a project which aims to explore and implement commercial off-the-shelf solutions that demonstrate derived PIV credential issuance, lifecycle management, and usage. On October 12, 2016, the NCCOE will host a workshop to present the current direction of the Derived PIV Credentials project (including a high level architecture and current technology partners) and to understand stakeholders’ implementations, challenges, and desired usage. Full Details

Events September 29, 2016 - September 30, 2016
https://csrc.nist.rip/events/2016/nsci-high-performance-computing-security-workshop

In July of 2015, the President of the United States issued Executive Order 13702 to create a National Strategic Computing Initiative (NSCI). The goal of the NSCI is to maximize the benefits of High-Performance Computing (HPC) for economic competitiveness and scientific discovery. Security for HPC systems is essential for HPC systems to provide the anticipated benefits. The purpose of this workshop is to identify security priorities and principles that should be incorporated into the strategy of the NSCI, to bring together stakeholders from industry, academia, and Government, and also to...

Events August 23, 2016
https://csrc.nist.rip/events/2016/open-meeting-of-the-commission-on-enhancing-na-(1)

The Commission on Enhancing National Cybersecurity will meet Tuesday, August 23, 2016, from 9:00 a.m. until 5:00 p.m. Central Time at the University of Minnesota's TCF Bank Stadium-DQ Club Room. The primary purpose of the meeting is to discuss the challenges and opportunities for organizations and consumers in securing the digital economy. In particular, the meeting will address: (1) Challenges confronting consumers in the digital economy; (2) innovation (Internet of Things, healthcare, and other areas); and (3) assured products and services. The meeting will support detailed recommendations...

Events July 14, 2016
https://csrc.nist.rip/events/2016/open-meeting-of-the-commission-on-enhancing-na-(2)

The Commission on Enhancing National Cybersecurity will meet Thursday, July 14, 2016, from 9:00 a.m. until 5:00 p.m. Central Time at the Hilton University of Houston. The primary purpose of the meeting is to discuss the challenges and opportunities facing cybersecurity for critical infrastructure, as well as State and local governments and cybersecurity. In particular, the meeting will address: (1) Current and future effects of critical infrastructure on the digital economy; (2) critical infrastructure cybersecurity challenges affecting the digital economy; and (3) cybersecurity challenges and...

Events September 19, 2016
https://csrc.nist.rip/events/2016/open-meeting-of-the-commission-on-enhancing-nation

The Commission on Enhancing National Cybersecurity will meet Monday, September 19, 2016 from 9:00 a.m. until 5:00 p.m. Eastern Time at the American University Washington College of Law, Claudio Grossman Hall, Yuma Building. The primary purpose of the meeting is to discuss the challenges and opportunities for organizations and consumers in securing the digital economy. In particular, the meeting will address: (1) International concerns; (2) review of current state of cybersecurity; (3) growing and securing the digital economy; and (4) innovation and technology in the government. The meeting...

Events September 8, 2016
https://csrc.nist.rip/events/2016/privacy-controls-workshop-next-steps-for-nist-spe

NIST and the Department of Transportation (DOT) co-hosted a public workshop to gather input on the privacy controls in Appendix J of NIST Special Publication 800-53, Revision 4. The workshop explored the effectiveness and challenges of applying the current privacy controls in 800-53 and whether changes should be made in the publication’s fifth revision. Panelists and attendees participated in facilitated discussions on topics including potential amendments to the privacy control families, broader guidance on the relationship between the privacy and security controls, and the need for...

Events May 2, 2016 - May 3, 2016
https://csrc.nist.rip/events/2016/random-bit-generation-workshop-2016

Full Workshop Details Cryptography and security applications make extensive use of random numbers and random bits, particularly for the generation of cryptographic keying material. A key to initiate a cryptographic algorithm needs to be unpredictable and statistically unique, that is, to have at most a negligible chance of repeating the value of a previously selected key. Selecting a key at random ensures that there is no known structure to the key selection process that an adversary might be able to use to determine the key, other than by an exhaustive search. NIST is in the process of...

Events October 19, 2016 - October 20, 2016
https://csrc.nist.rip/events/2016/safeguarding-health-information-building-assuranc

NIST and the Department of Health and Human Services (HHS), Office for Civil Rights (OCR) are pleased to co-host the 9th annual conference, Safeguarding Health Information: Building Assurance through HIPAA Security, on October 19-20, 2016 at the Capital Hilton, Washington, D.C. The conference will explore the current healthcare cybersecurity landscape and the Health Insurance Portability and Accountability Act (HIPAA) Security Rule. This event will highlight the present state of healthcare cybersecurity, and practical strategies, tips and techniques for implementing the HIPAA Security Rule....

Events
43%
July 13, 2016 - July 15, 2016
https://csrc.nist.rip/events/2016/software-and-supply-chain-assurance-forum

Summer 2016 SSCA event

Events December 5, 2016 - December 6, 2016
https://csrc.nist.rip/events/2016/ssr-2016-security-standardisation-research

Over the last two decades a very wide range of standards have been developed covering a wide range of aspects of cyber security. These documents have been published by national and international formal standardisation bodies, as well as by industry consortia. Many of these standards have become very widely used - to take just one example, the ISO/IEC 27000 series of standards has become the internationally adopted basis for managing corporate information security.Despite their wide use, there will always be a need to revise existing security standards and to add new standards to cover new...

Events May 25, 2016 - May 25, 2016
https://csrc.nist.rip/events/2016/trustworthy-suppliers-framework-forum

Please join us as we introduce a Trustworthy Supplier Framework, a toolbox developed to assist in understanding component protection options and inform better buying decisions as part of supply chain risk management. Although this effort began in support of the Department of Defense, the Institute for Defense Analyses is now seeking to engage a broader set of stakeholders in industry, government and academia to provide input and shape the Framework's contents to best address supply chain risk in commercial-off-the-shelf (COTS) products. The Trustworthy Supplier Framework maps various existing...

<< first   < previous   5     6     7     8     9     10     11     12     13     14     15     16     17     18     19     20     21     22     23     24     25     26     27     28     29  next >  last >>