You are viewing this page in an unauthorized frame window.
This is a potential security issue, you are being redirected to https://csrc.nist.gov.
An official website of the United States government
Here’s how you know
Official websites use .gov A
.gov website belongs to an official government
organization in the United States.
Secure .gov websites use HTTPS A
lock (
) or https:// means you’ve safely connected to
the .gov website. Share sensitive information only on official,
secure websites.
Presentations & Speakers at a Glance: Combinatorial Methods in Software Testing, Rick Kuhn, NIST; and Federal PKI Security Profile, Matt King. NOTE: FORUM MEETINGS ARE OPEN TO ONLY FEDERAL/STATE EMPLOYEES, HIGHER...
Full Workshop Details The National Institute of Standards and Technology (NIST) hosted a workshop on Cryptography for Emerging Technologies and Applications that is intended to identify the cryptographic requirements for...
Presentations & Speakers at a Glance: NARA's Controlled Unclassified Information (CUI) Implementation Guidance for Executive Order 13556, Patrick Viscuso, NARA; and Telework Reference Architecture, Oscar Ahumada, DHS....
To encourage development of test methods, metrics and tools for evaluating the effectiveness of mitigations against non-invasive attacks on cryptographic modules. CALL FOR PAPERS (Submission has been closed. Updated Aug....
Presentations & Speakers at a Glance: NIST's Work in Mobile App Security, Jeff Voas, NIST. NOTE: FORUM MEETINGS ARE OPEN TO ONLY FEDERAL/STATE EMPLOYEES, HIGHER EDUCATION EMPLOYEES, AND THEIR DESIGNATED SUPPORT...
(All presentations in .pdf format.) Federal Register Notice Announcing Meeting Minutes NIST Updates Donna Dodson, NIST Cloud Security and Privacy ISIMC Cloud Security Earl Crane, Department of Homeland Security Handout...
Presentations & Speakers at a Glance: Unclassified Threat Briefing from US-CERT, updates from GAO, DHS Federal Network Security, and presentations by FDA, NIST, NOAA and Census. Slides are not available from this...
The Master of Software Engineering (MSE) Professional program at Carnegie Mellon University and the National Institute of Standards and Technology (NIST) held a free, one day seminar on new, industrial strength techniques for...
The HHS Office for Civil Rights (OCR) enforces the HIPAA Privacy Rule, which protects the privacy of individually identifiable health information; the HIPAA Security Rule, which sets national standards for the security of...
During this two-day workshop, NIST introduced Draft FIPS 201-2 and elicited questions, comments and feedback. Presentations Overview (Goals of the workshop, purpose of the revision, overall revision process, summary of...
Presentations & Speakers at a Glance: Application Security in the SDLC, Terry Fletcher, FAA Application Security Costs Tim Howard, NOAA NOTE: THIS MEETING IS OPEN TO ONLY FEDERAL/STATE EMPLOYEES, HIGHER EDUCATION...
Presentations & Speakers at a Glance: Application Security Costs, Tim Howard; and Application Security in the SDLC, Terry Fletcher, FAA. NOTE: FORUM MEETINGS ARE OPEN TO ONLY FEDERAL/STATE EMPLOYEES, HIGHER...
WELCOME to FISSEA’s 24th Annual Conference: "Bridging to the Future – Emerging Trends in Cybersecurity" March 15 - 17, 2011 Location: NIST National Institute of Standards and Technology Gaithersburg, Maryland
Presentations & Speakers at a Glance: Security Information Standardization and Automation, John Banghart, NIST. NOTE: FORUM MEETINGS ARE OPEN TO ONLY FEDERAL/STATE EMPLOYEES, HIGHER EDUCATION EMPLOYEES, AND...
Presentations & Speakers at a Glance: An Enterprise Continuous Monitoring Technical Reference Architecture, Peter Mell, NIST; and Information Security Continuous Monitoring (Ongoing Monitoring in Support of...
(All presentations in .pdf format.) Federal Register Notice Announcing Meeting Minutes Research Priorities of Moving Targets, Economic Incentives, Trusted Spaces Pat Muoio, ODNI US Cert – National Vulnerability Database...
Presentations & Speakers at a Glance: Federal Virtual Training Environment (FedVTE) & Federal Cybersecurity Training Exercise (FedCTE), Benjamin Scribner, DHS; and Supply Chain Risk Management, Marianne Swanson....
NIST was in the process of developing a DRAFT Special Publication on the Cryptographic Key Management Design Framework. The draft was scheduled for release for an initial public comment period in June 2010. The development...
The purpose of the Second SHA-3 Candidate Conference was to discuss the second-round candidates, and to obtain feedback for the selection of the finalists soon after the conference. Call for Papers August 2010 SHA-3...
Full Workshop Details The Election Assistance Commission (EAC), Federal Voting Assistance Program (FVAP) of the Department of Defense, and NIST sponsored a workshop to explore the technical issues associated with remote...
(All presentations in .pdf format.) Federal Register Notice Announcing Meeting Minutes Usability Research in Support of Cyber Security: A Password Policy Taxonomy Kevin Killhoury, NIST NASA Continuous Monitoring Program...
As part of its initiative to ensure that the Internet continues to spawn growth and innovation, the Department of Commerce will hold a symposium on "Cybersecurity and Innovation in the Information Economy" on July 27, 2010,...
On Thursday, May 20, 2010, NIST held a 1-day forum & workshop on Cloud Computing. The purpose of this forum & workshop -- The Federal Chief Information Officer is charged with improving performance and lowering the cost...