You are viewing this page in an unauthorized frame window.
This is a potential security issue, you are being redirected to https://csrc.nist.gov.
An official website of the United States government
Here’s how you know
Official websites use .gov A
.gov website belongs to an official government
organization in the United States.
Secure .gov websites use HTTPS A
lock (
) or https:// means you’ve safely connected to
the .gov website. Share sensitive information only on official,
secure websites.
The Cyber Security Research Alliance (CSRA) and National Institute of Standards and Technology (NIST) are sponsoring a two day workshop to explore emerging research needs for cybersecurity in cyber-physical systems with the...
Save the Date for the 26th Annual Conference “Making Connections in Cybersecurity and Information Security Education” March 19-21, 2013 Gaithersburg, Maryland FINAL Agenda with Presentations Call for Participation Now...
Full Workshop Details The Election Assistance Commission (EAC) and NIST sponsored a two-and-a-half day symposium to explore emerging trends in voting system technology with the diverse election community at large. The...
Presentations & Speakers at a Glance: Census Risk Management Program Implementation, Jaime Noble, Department of Justice; and Use of Cybersecurity Function Codes, Harold Welch, OPM. NOTE: FORUM MEETINGS ARE OPEN TO...
Full Workshop Details Cryptography and security applications make extensive use of random numbers and random bits, particularly for the generation of cryptographic keying material. A key to initiate a cryptographic algorithm...
There is a great demand from federal departments and agencies for supply chain risk management (SCRM) guidance. However, the ICT supply chain discipline is in an early stage of development with diverse perspectives on...
Presentations & Speakers at a Glance: Preparing for and Responding to Certification Authority Compromise and Fraudulent Certificate Issuance, Paul Turner & Joe Jarzombek, DHS; and Software Assurance: Enabling Security and...
(All presentations in .pdf format.) Federal Register Notice Announcing Meeting Minutes SP 800-53 Rev. 4, Security and Privacy Controls for Federal Information Systems and Organizations Ron Ross, NIST Fellow, Computer...
NIST conducted a two-day Key Management Workshop on September 10-11. The subject of the workshop concerned the technical and administrative aspects of Cryptographic Key Management Systems (CKMSs) that existed at the time and...
Presentations & Speakers at a Glance: Electricity Subsector Cybersecurity Risk Management Process, Marianne Swanson, NIST, Scott Saunders, Sacramento Municipal Utility District, Matthew Light, NERC; and PIV...
NIST is hosting a public workshop on the Revised Draft Federal Information Processing Standards (FIPS) 201-2. The purpose of the workshop is to exchange information on Revised Draft FIPS 201-2, answer questions, and provide...
Presentations & Speakers at a Glance: Updates from National Security Staff, GAO; Presentations from NIST, US-CERT, Dept. of Transportation, and GSA. NOTE: FORUM MEETINGS ARE OPEN TO ONLY FEDERAL/STATE EMPLOYEES,...
NIST and the Department of Health and Human Services (HHS), Office for Civil Rights (OCR) co-hosted the 5th annual conference, Safeguarding Health Information: Building Assurance through HIPAA Security on June 6 & 7, 2012 at...
(All presentations in .pdf format.) Federal Register Notice Announcing Meeting Minutes FISMA, RMF partnership with CNSS Dr. Ron Ross, NIST Fellow Exploring the Future of Privacy for Federal IT Toby Levin, (Moderator)...
While security risks on the Internet continue to exist in many areas, one increasingly exploited threat is the global rise of botnets. A botnet infection can lead to the monitoring of a consumer's personal information and...
On April 23 and 24, 2012, the NIST ITL Computer Security Division will host a two-day workshop about the cyber security needed for cyber-physical systems (CPSs), with a focus on results of research and real-world deployment...
FISSEA’s 25th Annual Conference: "A New Era in Cybersecurity Awareness, Training, and Education" March 27 - 29, 2012 Agenda & Keynote Speakers FINAL Agenda: Updated March 21, 2012 This year’s theme, “A New Era in...
The purpose of the Third SHA-3 Candidate Conference was to discuss the SHA-3 finalist algorithms, and to solicit public feedback before NIST selected a winning algorithm for standardization later in 2012. Call for Papers...
"Technologies and Standards Enabling the Identity Ecosystem" The workshop focused on how technologies and standards can help the framework of the identity ecosystem coalesce. The two day workshop featureed plenary...
Presentations & Speakers at a Glance: Federal Risk and Authorization Management Program (FedRAMP), Matt Goodrich, GSA; and NIST SP 800-63-1, NIST. NOTE: FORUM MEETINGS ARE OPEN TO ONLY FEDERAL/STATE EMPLOYEES,...
(All presentations in .pdf format.) Federal Register Notice Announcing Meeting Minutes Panel discussion: Economic Incentives for Medical Device Security Kevin Fu, Associate Professor, Computer Science, University of...
"Working with encrypted data without decrypting" We have long known that encryption has some amazing properties. Those of us who don't think in terms of mathematical formulas often think of encryption as "putting a message...