Computer Security Resource Center

Computer Security Resource Center

Computer Security
Resource Center

Events

November 18, 2015
Recent, well-publicized cybersecurity incidents within the retail space has impacted the industry—weakening consumer confidence, eroding privacy, and damaging businesses’ brand and reputation. As the holiday season...
November 3, 2015 - November 4, 2015
Three tracks are being designed to enable attendees to gain the maximum benefit from the NICE 2015 Conference:Track 1: Accelerate Learning and Skills Development - Invoke a sense of urgency in both the public and private...
October 21, 2015 - October 23, 2015
(All presentations in .pdf format.)Federal Register Notice Announcing MeetingMinutesWednesday, October 21NIST and NSA Future Plans for Quantum Resistant Cryptography  Vincent M. Boyle, NSA Lily Chen...
October 1, 2015 - October 2, 2015
Full Details (Agenda, Case Studies & Workshop Briefings)On October 1-2, 2015, NIST will host a workshop to share information on Best Practices in Cyber Supply Chain Risk Management, which will provide insights on...
September 9, 2015 - September 11, 2015
The 2015 Cybersecurity Innovation Forum is a three-day event hosted by the National Institute of Standards and Technology, with participation from the National Security Agency, and the Department of Homeland Security. This...
September 2, 2015 - September 3, 2015
NIST and the Department of Health and Human Services (HHS), Office for Civil Rights (OCR) are pleased to co-host the 8th annual conference, Safeguarding Health Information: Building Assurance through HIPAA Security...
August 26, 2015 - August 27, 2015
Federal Computer Security Managers Forum - August 2015(Program)
July 20, 2015 - July 21, 2015
There are several emerging areas in which highly constrained devices are interconnected, typically communicating wirelessly with one another, working in concert to accomplish some task. Examples of these areas include...
June 11, 2015 - June 12, 2015
Elliptic curve cryptography will be critical to the adoption of strong cryptography as we migrate to higher security strengths. NIST has standardized elliptic curve cryptography for digital signature algorithms in FIPS 186...
June 10, 2015 - June 12, 2015
(All presentations in .pdf format.)Federal Register Notice Announcing MeetingMinutes  Wednesday, June 10Information Technology Laboratory (ITL) Realignment and Proposed Applied Cybersecurity Division  Donna...
April 30, 2015
Federal Computer Security Managers Forum - April 2015
April 2, 2015 - April 3, 2015
Full Workshop DetailsThe advent of practical quantum computing will break all commonly used public key cryptographic algorithms. In response, NIST is researching cryptographic algorithms for public key-based key agreement...
March 24, 2015 - March 25, 2015
28th Annual Conference, March 24-25, 2015Agenda with Presentation Links - Posted April 2, 2015"Changes, Challenges, and Collaborations: Effective Cybersecurity Training"Conference ProgramFISSEA Educator of the Year...
March 3, 2015 - March 4, 2015
FIPS 201-2 Supporting Special Publications Workshop
February 12, 2015
Federal Computer Security Managers Forum - February 2015
February 11, 2015 - February 13, 2015
(All presentations in .pdf format.)Federal Register Notice Announcing MeetingAgenda (Final)Minutes FAA Unmanned Aircraft Systems Update Stephen George, FAAPresentation on Breaches and Breach Reporting...
February 3, 2015
Direct Digital Manufacturing (DDM) involves fabricating physical objects from a data file using computer-controlled processes with little to no human intervention. It includes Additive Manufacturing (AM), 3D printing...