U.S. flag   An official website of the United States government
Dot gov

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Https

Secure .gov websites use HTTPS
A lock (Dot gov) or https:// means you've safely connected to the .gov website. Share sensitive information only on official, secure websites.

Events

Showing 201 through 225 of 276 matching records.
February 10, 2011
Presentations & Speakers at a Glance: Security Information Standardization and Automation, John Banghart, NIST.  NOTE:  FORUM MEETINGS ARE OPEN TO ONLY FEDERAL/STATE EMPLOYEES, HIGHER EDUCATION EMPLOYEES, AND...
December 14, 2010
Presentations & Speakers at a Glance: An Enterprise Continuous Monitoring Technical Reference Architecture, Peter Mell, NIST; and  Information Security Continuous Monitoring (Ongoing Monitoring in Support of...
November 3, 2010 - November 5, 2010
(All presentations in .pdf format.) Federal Register Notice Announcing Meeting Minutes Research Priorities of Moving Targets, Economic Incentives, Trusted Spaces Pat Muoio, ODNI US Cert – National Vulnerability Database...
October 14, 2010
Presentations & Speakers at a Glance: Federal Virtual Training Environment (FedVTE) & Federal Cybersecurity Training Exercise (FedCTE), Benjamin Scribner, DHS; and  Supply Chain Risk Management, Marianne Swanson....
September 20, 2010 - September 21, 2010
NIST was in the process of developing a DRAFT Special Publication on the Cryptographic Key Management Design Framework. The draft was scheduled for release for an initial public comment period in June 2010. The development...
August 23, 2010 - August 24, 2010
The purpose of the Second SHA-3 Candidate Conference was to discuss the second-round candidates, and to obtain feedback for the selection of the finalists soon after the conference. Call for Papers August 2010 SHA-3...
August 6, 2010 - August 7, 2010
Full Workshop Details The Election Assistance Commission (EAC), Federal Voting Assistance Program (FVAP) of the Department of Defense, and NIST sponsored a workshop to explore the technical issues associated with remote...
August 4, 2010 - August 6, 2010
(All presentations in .pdf format.) Federal Register Notice Announcing Meeting Minutes Usability Research in Support of Cyber Security: A Password Policy Taxonomy Kevin Killhoury, NIST NASA Continuous Monitoring Program...
July 27, 2010
As part of its initiative to ensure that the Internet continues to spawn growth and innovation, the Department of Commerce will hold a symposium on "Cybersecurity and Innovation in the Information Economy" on July 27, 2010,...
May 20, 2010
On Thursday, May 20, 2010, NIST held a 1-day forum & workshop on Cloud Computing. The purpose of this forum & workshop -- The Federal Chief Information Officer is charged with improving performance and lowering the cost...
May 11, 2010 - May 12, 2010
The HHS Office for Civil Rights (OCR) enforces the HIPAA Privacy Rule, which protects the privacy of individually identifiable health information; the HIPAA Security Rule, which sets national standards for the security of...
April 7, 2010 - April 9, 2010
(All presentations in .pdf format.) Federal Register Notice Announcing Meeting Minutes NIST Issues – SCAP—Security Automation and Vulnerability Management John Banghart, NIST Health IT David McDaniel, VHA Adam...
March 23, 2010 - March 25, 2010
WELCOME to FISSEA’s 23rd Annual Conference:  "Unraveling the Enigma of Role-Based Training" March 23 - 25, 2010 Location:   NIH National Institutes of Health Natcher Conference Center Bethesda, Maryland
January 11, 2010
The Governor of Maryland, Martin O’Malley, hosted a Cyber Maryland Summit at NIST on January 11, 2010. The purpose of the CyberMaryland Summit was to: Release an inaugural Cyber Security Report and unveil the Maryland...
December 2, 2009 - December 3, 2009
(All presentations in .pdf format.) Federal Register Notice (None Provided for this Meeting) Minutes (None Provided) Wednesday, December 2, 2009 Cloud Computing and the US Government Trusted Internet Connection (TIC)...
December 1, 2009 - December 3, 2009
The purpose of the 3-day workshop is to provide a high-level tutorial of the six part standard, ISO/IEC 24727 - Identification cards – Integrated circuit card programming interfaces, a multi-part standard for interoperable...
December 1, 2009
Presentations & Speakers at a Glance: Measure More, Spend Less on the Way to Better Security – John Streufert, U.S. Department of State. NOTE:  FORUM MEETINGS ARE OPEN TO ONLY FEDERAL/STATE EMPLOYEES, HIGHER EDUCATION...
October 13, 2009 - October 14, 2009
On October 13-14, NIST sponsored an End-to-End Voting System Workshop designed to bring together researchers in cryptography, security, and usability and election practitioners including election officials and voting system...
October 7, 2009
Information Security and Privacy Advisory Board (ISPAB) October 2009 Meeting
September 1, 2009 - September 3, 2009
NIST and the National Security Agency (NSA) co-hosted the Privilege Management Workshop at NIST in Gaithersburg, Maryland, on September 1-3, 2009. Workshop Results NISTIR 7665, Proceedings of the Privilege Management...
July 29, 2009 - July 31, 2009
(All presentations in .pdf format.) Federal Register Notice Announcing Meeting Minutes Wednesday, July 29 TIC External Connections Sean Donelan, Program Manager, Network and Infrastructure Security, DHS Data.Gov Panel...
June 8, 2009 - June 9, 2009
A CKM Workshop was held at NIST on June 8-9, 2009. Approximately 100 people participated in the Workshop at NIST on-site and approximately 90 people participated via a Webcast service. The program consisted of five keynote...
May 18, 2009 - May 19, 2009
To discuss challenges, tips, and techniques for implementing the requirements of the HIPAA Security Rule, with particular focus on strategies for assessing the effectiveness of implemented security controls to support...
April 1, 2009 - April 3, 2009
(All presentations in .pdf format.) Federal Register Notice Announcing Meeting Minutes Wednesday, April 1 Consensus Audit Guidelines John Gilligan, Gilligan Group, Inc. DNS Sec Report Fiona Alexander, NTIA Tim Polk, NIST...
February 25, 2009 - February 28, 2009
The purpose of the SHA-3 Conference was to allow the submitters of the first round candidates to present their algorithms, and for NIST to discuss the way forward with the competition. Selected NIST Presentations: System...

<< first   < previous   3     4     5     6     7     8     9     10     11     12  next >  last >>