Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Secure .gov websites use HTTPS
A lock ( ) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.

Events

Showing 201 through 225 of 331 matching records.
March 12, 2014 - March 14, 2014
(All presentations in .pdf format.) Federal Register NoticAnnouncing Meeting Minutes Updates on FedRAMP Sarbari Gupta, President & CEO, Electrosoft, Cybersecurity-Focused Strategy Quantum World and how NIST is preparing...
March 4, 2014 - March 5, 2014
NIST conducted a two-day Key Management Workshop on March 4-5, 2014. The workshop was held to discuss a draft of NIST Special Publication (SP) 800-152 ("A Profile for U.S. Federal CKMS") that was made available for public...
February 20, 2014
Presentations & Speakers at a Glance: Controlled Unclassified Information: Executive Order 13556, Patrick Viscuso, NARA.  Cross Agency Priority Goals, John Banghart, NSS. NOTE:  FORUM MEETINGS ARE OPEN TO ONLY...
January 28, 2014 - January 30, 2014
The 2014 Cybersecurity Innovation Forum, to be held January 28-30, 2014, at the Baltimore Convention Center in Baltimore, Md., will focus on the existing threat landscape and provide presentations and keynotes on current and...
December 19, 2013 - December 20, 2013
(All presentations in .pdf format.) Federal Register Notice Announcing Meeting Minutes Enhance Shared Situational Awareness (ESSA): Information Sharing Architecture (ISA) - Framework & Requirements Brief - Information...
December 12, 2013
Presentations & Speakers at a Glance: Overview of the Continuous Diagnostics and Mitigation (CDM) Program and Blanket Purchase Agreement (BPA), George Moore, DHS; and Update on Executive Order 13636, Improving Critical...
October 1, 2013
This meeting was not held due to closure of federal government. 
August 8, 2013
Presentations & Speakers at a Glance: NIST Special Publication 800-53, Revision 4, Dr. Ron Ross, NIST;  Ongoing Authorization - Case Studies Panel Discussion, Alex Ruiz, Sharon Jurado, Emery Csulak, & Jeff Eisensmith,...
July 17, 2013
Agenda Workshop Minutes All presentations are in PDF format. Welcome to the ABAC Workshop    NIST Special Publication 800-162: Attribute Based Access Control Definition and Considerations    Towards an ABAC Family of...
June 12, 2013 - June 14, 2013
(All presentations in .pdf format.) Federal Register Notice Announcing Meeting Minutes FISMA - Perspectives from OMB and DHS  Dave Otto, Branch Chief for Cybersecurity Performance Management in Federal Network...
June 4, 2013 - June 5, 2013
Presentations & Speakers at a Glance: Updates from GAO and FedRAMP; Presentations on Executive Order 13636, Cryptographic Technology, Continuous Monitoring, National Vulnerability Database, Industrial Control System...
May 21, 2013 - May 22, 2013
The National Institute of Standards and Technology (NIST) and the Department of Health and Human Services (HHS), Office for Civil Rights (OCR) co-hosted the 6th annual conference Safeguarding Health Information: Building...
April 11, 2013
Presentations & Speakers at a Glance: National Cybersecurity Center of Excellence, NIST; Policy Machine - Enabling an Enterprise-wide, Data Centric Computing Environment, David Ferraiolo & Serban Gavrila, NIST; and...
April 10, 2013 - April 11, 2013
Full Workshop Details NIST hosted this workshop to focus on technical and administrative efforts to increase trust online by improving the Public Key Infrastructure (PKI) certificate marketplace supporting Secure Socket...
April 4, 2013 - April 5, 2013
The Cyber Security Research Alliance (CSRA) and National Institute of Standards and Technology (NIST) are sponsoring a two day workshop to explore emerging research needs for cybersecurity in cyber-physical systems with the...
March 19, 2013 - March 21, 2013
Save the Date for the 26th Annual Conference “Making Connections in Cybersecurity and Information Security Education” March 19-21, 2013 Gaithersburg, Maryland FINAL Agenda with Presentations Call for Participation Now...
February 26, 2013 - February 28, 2013
Full Workshop Details The Election Assistance Commission (EAC) and NIST sponsored a two-and-a-half day symposium to explore emerging trends in voting system technology with the diverse election community at large. The...
February 13, 2013 - February 15, 2013
(All presentations in .pdf format.) Federal Register Notice Announcing Meeting Minutes Update on Administrative Priorities for Cybersecurity Policy - 2 handouts (PDF files) Handout #1     Handout #2 Agency IG Audit and...
February 1, 2013
This meeting was not held due to closure of federal government.   
December 6, 2012
Presentations & Speakers at a Glance: Census Risk Management Program Implementation, Jaime Noble, Department of Justice; and Use of Cybersecurity Function Codes, Harold Welch, OPM.  NOTE:  FORUM MEETINGS ARE OPEN TO...
December 5, 2012 - December 6, 2012
Full Workshop Details Cryptography and security applications make extensive use of random numbers and random bits, particularly for the generation of cryptographic keying material. A key to initiate a cryptographic algorithm...
October 15, 2012 - October 16, 2012
There is a great demand from federal departments and agencies for supply chain risk management (SCRM) guidance. However, the ICT supply chain discipline is in an early stage of development with diverse perspectives on...
October 11, 2012
Presentations & Speakers at a Glance: Preparing for and Responding to Certification Authority Compromise and Fraudulent Certificate Issuance, Paul Turner & Joe Jarzombek, DHS; and Software Assurance: Enabling Security and...
October 10, 2012 - October 12, 2012
(All presentations in .pdf format.) Federal Register Notice Announcing Meeting Minutes SP 800-53 Rev. 4, Security and Privacy Controls for Federal Information Systems and Organizations Ron Ross, NIST Fellow, Computer...
September 10, 2012 - September 11, 2012
NIST conducted a two-day Key Management Workshop on September 10-11. The subject of the workshop concerned the technical and administrative aspects of Cryptographic Key Management Systems (CKMSs) that existed at the time and...

<< first   < previous   4     5     6     7     8     9     10     11     12     13  next >  last >>