Use this form to search content on CSRC pages.
(All presentations in .pdf format.) Federal Register Notice Announcing Meeting Minutes NIAP Review Briefing Dr. Gregory N. Larsen, IDA Comments on the First Privacy Trust Survey of the U.S. Government Dr. Larry Ponemon, Ponemon Institute Mr. William J. Ferguson, CIO Institute, Carnegie Mellon University USPS Privacy and CRM Zoe Strickland, Ken Ceglowski and Emily Andrews, USPS If you have any questions or need information please e-mail Annie Sokol .
(All presentations in .pdf format.) Federal Register Notice Announcing Meeting Minutes Possible Government-Wide Information Security Enhancements Some Informal and Unofficial Thoughts Bruce Brody, ISPAB Board Member Federal Enterprise Architecture Security and Privacy Profile Sallie McDonald, U.S. Department of Homeland Security Cyber Security Practitioner (CSP) Professionalization Program: An Approach for Professional Development - Based on the Program Established at the Department of Veterans Affairs Bruce Brody, ISPAB Board Member A New World of Clues: NIST Provides Resources to...
Purpose To evaluate current personal identity verification technologies, systems, components, techniques, and procedures that would satisfy requirements for identifying Federal employees and contractors seeking access to Federal facilities and information systems. Topics Personal identity source document (ISD) authentication; verifying a claim of identity using fingerprint or facial images; use of security tokens such as integrated circuit cards for storing and processing identity credentials; communicating with security token reader/writers via electronic contact and contact-less methods;...
Presentations Introduction to Industry Day Workshop for FIPS 201 Personal Identity Verification For Federal Employees and Contractors Presentation on Special Publication 800-73 (SP 800-73), Integrated Circuit Card for Personal Identity Verification Jim Dray, NIST Identity Proofing, Registration and Credential Issuance Donna Dodson, NIST Biometric Data Specification on PIV Card Ramaswamy (Mouli) Chandramouli, NIST FIPS 201 Cryptography William (Tim) Polk, NIST
NIST held a Random Number Generation Workshop from July 19-22, 2004 in Gaithersburg, Maryland. See below for the workshop agenda and selected presentations. Workshop Agenda Comments Received on Draft ANS X9.82 Random Number Generation Presentations: Why Random Numbers for Cryptography, Miles Smid, Orion Security Solutions The Strategy Behind the Proposed Random Number Generation Standard, Paul Timmel X9.82 Part 1: Overview and Basic Principles, Don Johnson ANSI X9.82, Part 3: Deterministic Random Bit Generators (DRBGs), Elaine Barker, NIST Five DRBG Algorithms Based on Hash...
Day 1: FIPS 201 MANDATES Day 2: Implementation Schedule Presentations Requirements of Personal Identity Verification Standards and HSPD#12: OVERVIEW Federal Information Processing Standard (FIPS) 201, Personal Identity, Verification for Federal Employees and Contractors: Control Objectives Donna Dodson, NIST 2005 Security Industry Association: FIPS 201 Topology Standards on Steroids FIPS 201 Teresa Schwarzhoff, NIST Special Publication 800-73: Interfaces for Personal Identity Verification Jim Dray, NIST Certification and Accreditation of PIV Card Issuing Organizations Joan...
On Oct. 31-Nov. 1, 2005, 180 members of the global cryptographic community gathered in Gaithersburg, Maryland to attend the first Cryptographic Hash Workshop. The workshop was organized in response to a recent attack on the NIST-approved Secure Hash Algorithm SHA-1. The purpose of the workshop was to discuss this attack, assess the status of other NIST-approved hash algorithms, and discuss possible near-and long-term options. Call for Papers Workshop Report - The First Cryptographic Hash Workshop Selected Presentations: Where Should We Go From Here, Bill Burr, NIST Herding Hash...
(All presentations in .pdf format.) Federal Register Notice Announcing Meeting Minutes Background and Current Status: Use of Hashing Algorithms in the U.S. Federal Personal Identity Verification Program Biometrics Storage Format Selection for the U.S. Federal Personal Identity Verification Program Curt Barker, Computer Security Division, NIST NIST Hash Function Standards Status and Plans Bill Burr, Computer Security Division, NIST Updates on the Federal Enterprise Architecture Program Dick Burk, Chief Architect and Director of the Federal Enterprise Architecture (FEA) Program at...
(All presentations in .pdf format.) Federal Register Notice Announcing Meeting Minutes USPS: Building a Privacy and Consumer Policy Program Zoe Strickland, Privacy Officer, United States Postal Service NIST Industrial Control System Security Activities Keith Stouffer, National Institute of Standards and Technology Radio Frequency Identification (RFID) Intra-Government Council Handout Role of the Chief Privacy Officer John Fanning Radio Frequency Identification Technology in the Federal Government Douglas Devereaux, Technology Administration for Department of Commerce Presentation on...
(All presentations in .pdf format.) Federal Register Notice Announcing Meeting Minutes Overview of the Health Insurance Portability and Accountability Act (HIPAA) Privacy Rule and CMS' Implementation Mike Pagals, Director of Privacy Rights and Protection Staff at the Centers for Medicare and Medicaid Services (CMS) RFID: Radio Frequency Identification Nick Tsougas, SRA's Senior Logistics Consultant to the DOD Automatic Identification Technology (AIT) Office Privacy Issues in RFID Applications Anna Slomovic, RAND Corporation and EPIC If you have any questions or need information please...
(All presentations in .pdf format.) Federal Register Notice Announcing Meeting Minutes SCADA Briefing: NIST Industrial Control System Security Activities Keith Stouffer, NIST 21st Century Framework for Revisions to the Privacy Act of 1974 and Other Federal Privacy Statutes Status Report On Personal Identity Verification Standards and HSPD#12 Curt Barker, NIST Government Line of Business Initiative Overview: Information Systems Security (ISS): Line of Business (LOB) John Sindelar, General Services Administration Conceptual Proposal for a Joint Inquiry and Recommendations on a 21st...
On Wednesday, January 19, 2005 the Office of Management and Budget (OMB) and the General Services Administration (GSA) co-sponsored an all day meeting to hear and collect public comments regarding Homeland Security Presidential Directive-12 (HSPD-12). HSPD-12 mandates the issuance of a standard identification card to all federal employees and contractors doing long-term business with the federal government. There were approximately 200 meeting attendees. Meeting Minutes Agenda and Presentations SESSION 1 (8:30am -- 12:00pm) Opening Remarks Karen S. Evans, OMB GROUP ONE: Privacy Policy...
(All presentations in .pdf format.) Federal Register Notice Announcing Meeting Minutes The National Finance Center and Hurricane Katrina Gilbert Hawk, USDA SSA OIG's Use of Contractors to Comply with FISMA Gale Stone, Social Security Administration IG PCIE Panel on FISMA Judy Gordon, U.S. Department of Commerce, AIG HSPD-12 Update Carol Bales, OMB Security Metrics Panel On the Brittleness of Software and the Infeasibility of Security Metrics Steven M. Bellovin, Columbia University Secure One: HHS Measuring Information Security and FISMA Compliance Jaren Doherty, HHS Information...
(All presentations in .pdf format.) Federal Register Notice Announcing Meeting Minutes The State of the Privacy Act Ari Schwartz, Center for Democracy and Technology Geospatial Line of Business Overview –Security and Privacy Considerations Ivan B. DeLoatch, Department of Interior Information Technology Laboratory (ITL) - Strategic Planning Update Cita Furlani, Information Technology Laboratory, National Institute of Standards and Technology If you have any questions or need information please e-mail Annie Sokol .
(All presentations in .pdf and/or Powerpoint format.) Federal Register Notice Announcing Meeting Minutes Suite B Cryptography Elaine Barker, Computer Security Division, NIST IA Personnel Readiness: Training, Certification and Workforce Management George Bieber, Defense-wide IA Program (DIAP), DoD Update on NIAP Program Activities Audrey M. Dale, Director, NIAP / CCEVS, NSA FIPS 201 Evaluation Program April Giles, General Services Administration InfoSec/Privacy Considerations for Software in Advancing National Strategy to Secure Cyberspace (Panel Session) Steve Lipner, Moderator...
(All presentations in .pdf format.) Federal Register Notice Announcing Meeting Minutes NIST Computer Security Division Update Curt Barker, Division Chief, Computer Security Division, NIST The Implementation of Homeland Security Presidential Directive 12 David Temoshok, General Services Administration Law, Regulation and National Cyber Security: An Overview Greg Garcia, Vice President, Information Security Information Technology Association of America Privacy and Technology Project: Project Overview, Update And Next Steps Leslie Reis, Professor, The John Marshall Law School, Facilitator...
NIST held a one-day workshop for U.S. Government agencies on March 3, 2006, to discuss the NIST Personal Identity Verification Program (NPIVP).
The Second Cryptographic Hash Workshop was held on Aug. 24-25, 2006, at University of California, Santa Barbara, in conjunction with Crypto 2006. 210 members of the global cryptographic community attended the workshop. The workshop was organized to encourage hash function research and discuss hash function development strategy. Call for Papers Workshop Report - Second Cryptographic Hash Workshop Selected Presentations: Proposed Timeline for the Development of New Hash Functions, Elaine Barker, NIST How to Attack a Hash Function (in one easy lesson), John Kelsey, NIST
(All presentations in .pdf format.) Federal Register Notice Announcing Meeting Minutes NIST Computer Security Division (CSD) Briefing Donna Dodson, NIST Deputy Cyber Security Advisor and Computer Security Division, Deputy Division Chief, NIST Use and Implementation of Federal IT Security Products as a Baseline Patrick Howard, CISO, HUD Brenda Abrams, IG Auditor, GSA A Practical Guide To Web 2.0, Enterprise 2.0, and Information Assurance Hart Rossman, Chief Security Technologist, SAIC Social Networks, Web 2.0, and Security Sandy Smith, Manager of Technical Development, Forum One...
(All presentations in .pdf format.) Federal Register Notice Announcing Meeting Minutes NIST Briefing: NIST Overview Briefing Dr. James M. Turner, NIST Deputy Director Computer Security Activities William Curt Barker, Computer Security Division Chief, NIST Distributed Identification and Protection of Citizen Data Panel Distributed Identification and Consumer Data Protection Khaja Ahmed, Microsoft Privacy Summit -- hosted by the Public Policy Expert Group of the Liberty Alliance in conjunction with the Net-ID 2007 Conference NRC Privacy Study Engaging Privacy and Information...
(All presentations in .pdf format.) Federal Register Notice Announcing Meeting Minutes Ground Zero Restoration Dave Rosenzweig, Vice President Network Operations - Manhattan Restoration NIST-ITL IPv6 Project Stephen Nightingale and Doug Montgomery, NIST NIST ITL Security Metrics Activities William C. Barker, Computer Security Division, NIST Information Systems Security Line of Business (ISS LoB) Michael C. Smith, National Cyber Security Division, Department of Homeland Security Government Identity Projects & REAL ID: “Getting to Know You; Getting to Know All About You” Dan Combs,...
(All presentations in .pdf format.) Federal Register Notice Announcing Meeting Minutes Computer Security Division Activities William Curt Barker, Division Chief, Computer Security Division, NIST Creating Value from Vulnerability Tony Sager, Chief, Vulnerability Analysis & Operations Group Information Assurance Directorate National Security Agency Foundations of Measurement Science for Information Systems Ron Boisvert, Chief, Mathematical & Computational Sciences Division, NIST NIST Security Measurement NIST SP 800-55 Revision 1 William Curt Barker, Division Chief, Computer Security...
Secure Biometrics "Match-on-Card" Workshop
This one-day workshop addressed software security and the Draft FIPS 140-3 specification (July 2007 draft).
To discuss challenges, tips, techniques and issues surrounding implementing, adhering to and auditing HIPAA Security Rule requirements. Hear directly from CMS OESS leadership and discuss update to NIST SP 800-66. HIPAA Workshop Presentations All Powerpoint presentations have been converted to PDF format. HIPAA Security Overview Keynote Address Tony Trenkle, Director Office of E-Health Standards and Services (OESS), Centers for Medicare & Medicaid Services (CMS) AHIP Implementing Effective Training Programs to Avoid Data Security Breaches (AHIP - America's Health Insurance Plan)...