Computer Security Resource Center

Computer Security Resource Center

Computer Security
Resource Center

2015 Cybersecurity Innovation Forum

The 2015 Cybersecurity Innovation Forum is a three-day event hosted by the National Institute of Standards and Technology, with participation from the National Security Agency, and the Department of Homeland Security. This event brings government and industry together to focus on current, emerging, and future challenges, technologies, projects, solutions, and research in trusted computing, security automation, and information sharing.

The technical program covers four tracks:

  • Trusted Computing
  • Security Automation
  • Cyber Information Sharing
  • Research

Tracks include lectures, panel sessions and several will include live demonstrations.


  • Describe current and existing activities (guidance, solutions and technologies that can be used now)
  • Demonstrate solutions built on real world products that address specific current issues
  • Describe emerging activities (guidance, solutions, and technologies that are in progress or draft)
  • Describe new areas of research, concept ideas, and future activities
  • Bring together government requirements and industry solutions
  • Explore gaps or challenges that could be solved by trusted computing, security automation, information sharing disciplines, or an integrated approach of the three disciplines

Event Details

Starts: September 09, 2015 - 08:30 AM EST
Ends: September 11, 2015 - 12:30 PM EST

Format: In-person Type: Forum


Attendance Type: Open to public
Audience Type: Industry,Government,Academia


Walter E. Washington Convention Center in Washington, D.C

Related Events

<< 2014 Cybersecurity Innovation Forum

Related Pages

Presentation: A Funny Thing Happened on the Way to OASIS: From Specifications to Standards
Presentation: A Quantum World and how NIST is Preparing for Future Crypto
Presentation: A Secure Toolchain Competition
Presentation: About the NCCOE
Presentation: Automated Indicator Sharing
Presentation: Better Circuits for Boolean Functions
Presentation: Case Studies in ISAC Information Sharing
Presentation: Challenges and Opportunities in Cyber Information Sharing
Presentation: Crowdsourcing Intelligence: Friend or Foe?!
Presentation: Cyber Risk Leadership Keynote
Presentation: Cyber Threat Intelligence Sharing: Lessons Learned
Presentation: Cybersecurity Headline News - Changing the Story
Presentation: Cybersecurity: Not Just a Sprint, a Marathon
Presentation: Derived PIV Credentials Proof of Concept Research
Presentation: DevOps and Container Security
Presentation: Disrupting the Revolution of Cyber-Threats with Revolutionary Security
Presentation: Employee Password Usability Survey
Presentation: Enabling Better Security Automation by Adding Context
Presentation: Enterprises and Encryption: Why Remote Management Matters
Presentation: Entropy as a Service: Unlocking the full Potential of Cryptography
Presentation: Evolving Security Automation Standards
Presentation: File-Sharing Through NGAC/ABAC for Secure Collaboration
Presentation: FIPS 140, Quo Vadis?
Presentation: FIPS 202 and Keccak-Derived Functions
Presentation: Firmware Integrity Verification, Monitoring and Reporting Tool with Mapping to NIST Guidelines
Presentation: Global Platform Root of Trust
Presentation: Graphic File Carving Demonstration
Presentation: Guidance and Usage Scenarios for Implementers and Users of Software Identification Tags
Presentation: Haven: Shielding Applications from an Untrusted Cloud
Presentation: Integrated Adaptive Cyber Defense: Integration Spiral Results
Presentation: Intel Identity Protection Technology
Presentation: Intel Identity Protection Technology (IPT)
Presentation: It's Complicated. Three perspectives on the tough issues: Privacy, Risk Management, Liability, and m
Presentation: Legal Issues in Sharing Cyber Threat Intelligence: What are the Real Concerns?
Presentation: LTE Security - How Good is it?
Presentation: Mobile Application Security for Public Saftey
Presentation: Mobile Identity Management for Public Safety
Presentation: National Cybersecurity Center of Excellence Attribute Based Access Control
Presentation: Network Security and Lightweight Cryptography
Presentation: NIST Interagency Report (IR) 8055 Proof of Concept Implementation
Presentation: NIST's Cryptographic Module Validation Program
Presentation: NSTIC: Sowing seed in the Identity Ecosystem
Presentation: OVAL Governance & Roadmap
Presentation: OVAL Repository Transition
Presentation: Overview of ITL's Public Safety Cybersecurity Efforts
Presentation: Panel Discussion: Making SWID Tags Successful in the Marketplace
Presentation: Security Automation and Continuous Monitoring (SACM)
Presentation: Security Automation Challenges: Open Source
Presentation: Security Automation Program Update
Presentation: Security, Automation, and the Cloud
Presentation: Sharing Actionable Threat Indicators Using SCAP
Presentation: Sharing Actionable Threat Indicators Using SCAP
Presentation: SHARKSEER Zero Day Net Defense
Presentation: System Firmware: The Emerging Malware Battlefront
Presentation: TCG TNC: Automating End-to-end Trust
Presentation: The Cyber OODA Loop: How Your Attacker Should Help You Design Your Defense
Presentation: The Cyber Threat Intelligence Sharing Exchange Ecosystem Program
Presentation: The NIST Randomness Beacon
Presentation: The Whole is Greater...
Presentation: Threat-Based "Cyber Operations Rapid Assessment" (CORA)
Presentation: Usable Security
Presentation: USG Research Focus Keynote
Presentation: Using Risk Management to Improve Privacy in Information Systems
Presentation: War Stories from the Cloud: Rise of the Machines
Presentation: What's The Right Security for IoT?
Presentation: Why TPM 2.0? Reasons for Upgrade: Use Cases for the Latest Release of the TPM Specification
Created January 04, 2017, Updated January 27, 2017