Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Secure .gov websites use HTTPS
A lock ( ) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.

Events

Showing 226 through 250 of 341 matching records.
April 4, 2013 - April 5, 2013
The Cyber Security Research Alliance (CSRA) and National Institute of Standards and Technology (NIST) are sponsoring a two day workshop to explore emerging research needs for cybersecurity in cyber-physical systems with the...
March 19, 2013 - March 21, 2013
Save the Date for the 26th Annual Conference “Making Connections in Cybersecurity and Information Security Education” March 19-21, 2013 Gaithersburg, Maryland FINAL Agenda with Presentations Call for Participation Now...
February 26, 2013 - February 28, 2013
Full Workshop Details The Election Assistance Commission (EAC) and NIST sponsored a two-and-a-half day symposium to explore emerging trends in voting system technology with the diverse election community at large. The...
February 13, 2013 - February 15, 2013
(All presentations in .pdf format.) Federal Register Notice Announcing Meeting Minutes Update on Administrative Priorities for Cybersecurity Policy - 2 handouts (PDF files) Handout #1     Handout #2 Agency IG Audit and...
February 1, 2013
This meeting was not held due to closure of federal government.   
December 6, 2012
Presentations & Speakers at a Glance: Census Risk Management Program Implementation, Jaime Noble, Department of Justice; and Use of Cybersecurity Function Codes, Harold Welch, OPM.  NOTE:  FORUM MEETINGS ARE OPEN TO...
December 5, 2012 - December 6, 2012
Full Workshop Details Cryptography and security applications make extensive use of random numbers and random bits, particularly for the generation of cryptographic keying material. A key to initiate a cryptographic algorithm...
October 15, 2012 - October 16, 2012
There is a great demand from federal departments and agencies for supply chain risk management (SCRM) guidance. However, the ICT supply chain discipline is in an early stage of development with diverse perspectives on...
October 11, 2012
Presentations & Speakers at a Glance: Preparing for and Responding to Certification Authority Compromise and Fraudulent Certificate Issuance, Paul Turner & Joe Jarzombek, DHS; and Software Assurance: Enabling Security and...
October 10, 2012 - October 12, 2012
(All presentations in .pdf format.) Federal Register Notice Announcing Meeting Minutes SP 800-53 Rev. 4, Security and Privacy Controls for Federal Information Systems and Organizations Ron Ross, NIST Fellow, Computer...
September 10, 2012 - September 11, 2012
NIST conducted a two-day Key Management Workshop on September 10-11. The subject of the workshop concerned the technical and administrative aspects of Cryptographic Key Management Systems (CKMSs) that existed at the time and...
August 9, 2012
Presentations & Speakers at a Glance: Electricity Subsector Cybersecurity Risk Management Process, Marianne Swanson, NIST, Scott Saunders, Sacramento Municipal Utility District, Matthew Light, NERC; and  PIV...
July 25, 2012
NIST is hosting a public workshop on the Revised Draft Federal Information Processing Standards (FIPS) 201-2. The purpose of the workshop is to exchange information on Revised Draft FIPS 201-2, answer questions, and provide...
June 12, 2012 - June 13, 2012
Presentations & Speakers at a Glance: Updates from National Security Staff, GAO;  Presentations from NIST, US-CERT, Dept. of Transportation, and GSA. NOTE:  FORUM MEETINGS ARE OPEN TO ONLY FEDERAL/STATE EMPLOYEES,...
June 6, 2012 - June 7, 2012
NIST and the Department of Health and Human Services (HHS), Office for Civil Rights (OCR) co-hosted the 5th annual conference, Safeguarding Health Information: Building Assurance through HIPAA Security on June 6 & 7, 2012 at...
May 30, 2012 - June 1, 2012
(All presentations in .pdf format.) Federal Register Notice Announcing Meeting Minutes FISMA, RMF partnership with CNSS Dr. Ron Ross, NIST Fellow Exploring the Future of Privacy for Federal IT  Toby Levin, (Moderator)...
May 30, 2012
While security risks on the Internet continue to exist in many areas, one increasingly exploited threat is the global rise of botnets. A botnet infection can lead to the monitoring of a consumer's personal information and...
April 23, 2012 - April 24, 2012
On April 23 and 24, 2012, the NIST ITL Computer Security Division will host a two-day workshop about the cyber security needed for cyber-physical systems (CPSs), with a focus on results of research and real-world deployment...
April 1, 2012
This meeting was not held due to closure of the federal government. 
March 27, 2012 - March 29, 2012
FISSEA’s 25th Annual Conference:  "A New Era in Cybersecurity Awareness, Training, and Education" March 27 - 29, 2012 Agenda & Keynote Speakers FINAL Agenda: Updated March 21, 2012 This year’s theme, “A New Era in...
March 22, 2012 - March 23, 2012
The purpose of the Third SHA-3 Candidate Conference was to discuss the SHA-3 finalist algorithms, and to solicit public feedback before NIST selected a winning algorithm for standardization later in 2012. Call for Papers...
March 13, 2012 - March 14, 2012
"Technologies and Standards Enabling the Identity Ecosystem" The workshop focused on how technologies and standards can help the framework of the identity ecosystem coalesce.  The two day workshop featureed plenary...
February 9, 2012
Presentations & Speakers at a Glance: Federal Risk and Authorization Management Program (FedRAMP), Matt Goodrich, GSA; and NIST SP 800-63-1, NIST. NOTE:  FORUM MEETINGS ARE OPEN TO ONLY FEDERAL/STATE EMPLOYEES,...
February 1, 2012 - February 3, 2012
(All presentations in .pdf format.) Federal Register Notice Announcing Meeting Minutes Panel discussion: Economic Incentives for Medical Device Security Kevin Fu, Associate Professor, Computer Science, University of...
December 8, 2011 - December 9, 2011
"Working with encrypted data without decrypting" We have long known that encryption has some amazing properties. Those of us who don't think in terms of mathematical formulas often think of encryption as "putting a message...

<< first   < previous   5     6     7     8     9     10     11     12     13     14  next >  last >>