Computer Security Resource Center

Computer Security Resource Center

Computer Security
Resource Center

Events

Showing 151 through 175 of 214 matching records.
March 23, 2010 - March 25, 2010
WELCOME to FISSEA’s 23rd Annual Conference:  "Unraveling the Enigma of Role-Based Training"March 23 - 25, 2010Location:   NIHNational Institutes of Health Natcher Conference Center Bethesda, Maryland
January 11, 2010
The Governor of Maryland, Martin O’Malley, hosted a Cyber Maryland Summit at NIST on January 11, 2010. The purpose of the CyberMaryland Summit was to:Release an inaugural Cyber Security Report and unveil the...
December 2, 2009 - December 3, 2009
(All presentations in .pdf format.)Federal Register Notice (None Provided for this Meeting)Minutes (None Provided)Wednesday, December 2, 2009Cloud Computing and the US Government Trusted Internet Connection (TIC) Program...
December 1, 2009 - December 3, 2009
The purpose of the 3-day workshop is to provide a high-level tutorial of the six part standard, ISO/IEC 24727 - Identification cards – Integrated circuit card programming interfaces, a multi-part standard for...
December 1, 2009
Measure More, Spend Less on the Way to Better Security – John Streufert, U.S. Department of StatePresentations for the following events are located on the MAX Portal:C&A Cost Estimation Workshop2009 Annual Offsite...
October 13, 2009 - October 14, 2009
On October 13-14, NIST sponsored an End-to-End Voting System Workshop designed to bring together researchers in cryptography, security, and usability and election practitioners including election officials and voting...
October 7, 2009
Information Security and Privacy Advisory Board (ISPAB) October 2009 Meeting
September 1, 2009 - September 3, 2009
NIST and the National Security Agency (NSA) co-hosted the Privilege Management Workshop at NIST in Gaithersburg, Maryland, on September 1-3, 2009.Workshop ResultsNISTIR 7665, Proceedings of the Privilege Management...
July 29, 2009 - July 31, 2009
(All presentations in .pdf format.)Federal Register Notice Announcing MeetingMinutesWednesday, July 29TIC External Connections Sean Donelan, Program Manager, Network and Infrastructure Security, DHSData.Gov Panel...
June 8, 2009 - June 9, 2009
A CKM Workshop was held at NIST on June 8-9, 2009. Approximately 100 people participated in the Workshop at NIST on-site and approximately 90 people participated via a Webcast service. The program consisted of five keynote...
May 18, 2009 - May 19, 2009
To discuss challenges, tips, and techniques for implementing the requirements of the HIPAA Security Rule, with particular focus on strategies for assessing the effectiveness of implemented security controls to support...
April 1, 2009 - April 3, 2009
(All presentations in .pdf format.)Federal Register Notice Announcing MeetingMinutesWednesday, April 1Consensus Audit Guidelines John Gilligan, Gilligan Group, Inc.DNS Sec Report Fiona Alexander, NTIA Tim Polk, ...
February 25, 2009 - February 28, 2009
The purpose of the SHA-3 Conference was to allow the submitters of the first round candidates to present their algorithms, and for NIST to discuss the way forward with the competition.Selected NIST Presentations:System...
December 3, 2008 - December 5, 2008
(All presentations in .pdf format unless otherwise specified.)Federal Register Notice Announcing MeetingMinutesWednesday, December 3, 2008OMB Update Mike Howell, OMBNRC CSTB Report Briefing Herb Lin, NRC CSTB...
September 4, 2008 - September 5, 2008
(All presentations in .pdf format.)Federal Register Notice Announcing MeetingMinutesDHS Cyber Security Center Activities Brief -- Cyber History, Future and Questions Rod Beckstrom, Director, Department of Homeland...
June 4, 2008 - June 6, 2008
(All presentations in .pdf format.)Federal Register Notice Announcing MeetingMinutesVA Data Breach Follow-Up Adair Martinez, Deputy Assistant Secretary for Information Protection and Risk Management, Department of...
June 3, 2008 - June 4, 2008
This workshop explores innovative and practical applications of pairing-based cryptography. Pairings have been used to create identity-based encryption schemes, but are also a useful tool for solving other cryptographic...
March 18, 2008
This one-day workshop addressed software security and the Draft FIPS 140-3 specification (July 2007 draft).
January 16, 2008
To discuss challenges, tips, techniques and issues surrounding implementing, adhering to and auditing HIPAA Security Rule requirements. Hear directly from CMS OESS leadership and discuss update to NIST SP 800-66.HIPAA...
December 6, 2007 - December 7, 2007
(All presentations in .pdf format.)Federal Register Notice Announcing MeetingMinutesNIST Computer Security Division (CSD) Briefing Donna Dodson, NIST Deputy Cyber Security Advisor and Computer Security Division, Deputy...
September 6, 2007 - September 7, 2007
(All presentations in .pdf format.)Federal Register Notice Announcing MeetingMinutesComputer Security Division Activities William Curt Barker, Division Chief, Computer Security Division, NISTCreating Value from...
June 7, 2007 - June 8, 2007
(All presentations in .pdf format.)Federal Register Notice Announcing MeetingMinutesNIST Briefing:NIST Overview Briefing      Dr. James M. Turner, NIST Deputy DirectorComputer Security Activities...
May 24, 2007
Secure Biometrics "Match-on-Card" Workshop
March 22, 2007 - March 23, 2007
(All presentations in .pdf format.)Federal Register Notice Announcing MeetingMinutesGround Zero Restoration Dave Rosenzweig, Vice President Network Operations - Manhattan RestorationNIST-ITL IPv6 Project Stephen...
December 7, 2006 - December 8, 2006
(All presentations in .pdf format.)Federal Register Notice Announcing MeetingMinutesThe National Finance Center and Hurricane Katrina Gilbert Hawk, USDASSA OIG's Use of Contractors to Comply with FISMA Gale Stone...

<< first   < previous   1     2     3     4     5     6     7     8     9  next >  last >>