You are viewing this page in an unauthorized frame window.
This is a potential security issue, you are being redirected to https://csrc.nist.gov.
An official website of the United States government
Here’s how you know
Official websites use .gov A
.gov website belongs to an official government
organization in the United States.
Secure .gov websites use HTTPS A
lock (
) or https:// means you’ve safely connected to
the .gov website. Share sensitive information only on official,
secure websites.
NIST and the National Security Agency (NSA) co-hosted the Privilege Management Workshop at NIST in Gaithersburg, Maryland, on September 1-3, 2009. Workshop Results NISTIR 7665, Proceedings of the Privilege Management...
(All presentations in .pdf format.) Federal Register Notice Announcing Meeting Minutes Wednesday, July 29 TIC External Connections Sean Donelan, Program Manager, Network and Infrastructure Security, DHS Data.Gov Panel...
A CKM Workshop was held at NIST on June 8-9, 2009. Approximately 100 people participated in the Workshop at NIST on-site and approximately 90 people participated via a Webcast service. The program consisted of five keynote...
To discuss challenges, tips, and techniques for implementing the requirements of the HIPAA Security Rule, with particular focus on strategies for assessing the effectiveness of implemented security controls to support...
(All presentations in .pdf format.) Federal Register Notice Announcing Meeting Minutes Wednesday, April 1 Consensus Audit Guidelines John Gilligan, Gilligan Group, Inc. DNS Sec Report Fiona Alexander, NTIA Tim Polk, NIST...
The purpose of the SHA-3 Conference was to allow the submitters of the first round candidates to present their algorithms, and for NIST to discuss the way forward with the competition. Selected NIST Presentations: System...
(All presentations in .pdf format.) Federal Register Notice Announcing Meeting Minutes DHS Cyber Security Center Activities Brief -- Cyber History, Future and Questions Rod Beckstrom, Director, Department of Homeland...
(All presentations in .pdf format.) Federal Register Notice Announcing Meeting Minutes VA Data Breach Follow-Up Adair Martinez, Deputy Assistant Secretary for Information Protection and Risk Management, Department of...
This workshop explores innovative and practical applications of pairing-based cryptography. Pairings have been used to create identity-based encryption schemes, but are also a useful tool for solving other cryptographic...
To discuss challenges, tips, techniques and issues surrounding implementing, adhering to and auditing HIPAA Security Rule requirements. Hear directly from CMS OESS leadership and discuss update to NIST SP 800-66. HIPAA...
(All presentations in .pdf format.) Federal Register Notice Announcing Meeting Minutes NIST Briefing: NIST Overview Briefing Dr. James M. Turner, NIST Deputy Director Computer Security Activities William Curt...
(All presentations in .pdf format.) Federal Register Notice Announcing Meeting Minutes The National Finance Center and Hurricane Katrina Gilbert Hawk, USDA SSA OIG's Use of Contractors to Comply with FISMA Gale...
The Second Cryptographic Hash Workshop was held on Aug. 24-25, 2006, at University of California, Santa Barbara, in conjunction with Crypto 2006. 210 members of the global cryptographic community attended the workshop. The...
(All presentations in .pdf format.) Federal Register Notice Announcing Meeting Minutes The State of the Privacy Act Ari Schwartz, Center for Democracy and Technology Geospatial Line of Business Overview –Security and...
(All presentations in .pdf format.) Federal Register Notice Announcing Meeting Minutes Background and Current Status: Use of Hashing Algorithms in the U.S. Federal Personal Identity Verification Program Biometrics Storage...