Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Secure .gov websites use HTTPS
A lock ( ) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.

Search CSRC

Use this form to search content on CSRC pages.

For a phrase search, use " "


Limit results to content tagged with of the following topics:
Showing 1276 through 1300 of 1415 matching records.
Publications Journal Article (Final)

The Future of Cybersecurity Education

August 19, 2014
https://csrc.nist.gov/pubs/journal/2014/08/the-future-of-cybersecurity-education/final

Journal: Computer Abstract: By fostering public–private partnerships in cybersecurity education, the U.S. government is motivating federal agencies, industry, and academia to work more closely together to defend cyberspace.

Events

ISPAB: JUNE 2014 MEETING

June 11, 2014 - June 13, 2014
https://csrc.nist.gov/events/2014/ispab-june-2014-meeting

(All presentations in .pdf format.) Federal Register Notice Announcing Meeting Minutes Personal Identity Verification (PIV) Credentials for Mobile Devices Hildegard, Ferraiolo, NIST The Next Generation (SP 800-73-4) PIV Card and the Purpose of the Pairing Code in the Wireless Environment David Cooper, NIST Big Data and Privacy Marjory S. Blumenthal, Executive Director, President’s Council of Advisors on Science and Technology, Office of Science and Technology Policy FISMA FY13 Report Trevor Rudolph, OMB US CERT Ann Barron-DiCamillo, Director, United States Computer Emergency...

Publications Journal Article (Final)

NIST Cybersecurity Framework Addresses Risks to Critical Infrastructure

June 2, 2014
https://csrc.nist.gov/pubs/journal/2014/06/nist-cybersecurity-framework-addresses-risks-to-cr/final

Journal: ei Magazine Abstract: On February 12, 2014 President Obama issued a statement that, "[c]yber threats pose one the gravest national security dangers that the United States faces. To better defend our nation against this systemic challenge, one year ago I signed an Executive Order directing the Administration to take steps...

Updates

National Cybersecurity Center of Excellence (NCCoE) and Financial Services Sector IT Asset Management Use Case

May 6, 2014
https://csrc.nist.gov/news/2014/nccoe-and-financial-services-sector-it-asset-manag

The National Institute of Standards and Technology (NIST) invites organizations to provide products and technical expertise to support and demonstrate security platforms for IT asset management for the financial services sector.

Updates

Draft Special Publication (SP) 800-160, Systems Security Engineering: An Integrated Approach to Building Trustworthy Resilient Systems

April 23, 2014
https://csrc.nist.gov/news/2014/draft-special-publication-(sp)-800-160-(1)

In support of the Federal Information Security Management Act of 2002 and the 2014 Framework for Improving Critical Infrastructure Cybersecurity, NIST will issue in May 2014, the initial public draft of Special Publication (SP) 800-160, Systems Security Engineering ...

Events

Privacy Engineering Workshop

April 9, 2014 - April 10, 2014
https://csrc.nist.gov/events/2014/privacy-engineering-workshop

Privacy is a challenging subject that spans a number of domains, including law, policy and technology. Notwithstanding numerous sets of principles, including the foundational Fair Information Practice Principles (FIPPs), that seek to address the handling of individuals' personal information, many concerns exist about the future of privacy in the face of rapidly evolving technologies. Process-oriented principles are an important component of an overall privacy framework, but on their own, they do not achieve consistent and measurable results in privacy protection. In the security field, risk...

Publications IR 7991 (Final)

United States Federal Employees' Password Management Behaviors – A Department of Commerce Case Study

April 8, 2014
https://csrc.nist.gov/pubs/ir/7991/final

Abstract: Passwords are the most prevalent method used by the public and private sectors for controlling user access to systems. Organizations establish security policies and password requirements on how users should generate and maintain their passwords, and use the passwords to authenticate and gain access...

Events

FISSEA 27th Annual Conference

March 18, 2014 - March 20, 2014
https://csrc.nist.gov/events/2014/fissea-27th-annual-conference

“Partners in Performance:Shaping the Future of Cybersecurity Awareness, Education, and Training” March 18-20, 2014 NIST, Gaithersburg, Maryland Agenda - March 28, 2014 with Presentations Links Conference Program Webcasts - Day 1 (Dr. Ron Ross) and Day 3 (Ms. Linda Cureton and Mr. Ian Kelly) FISSEA 2014 Thank you for making it a huge success! FISSEA Educator of the Year – Sam Maroon, FITSI Foundation / Wounded Warrior Cyber Combat Academy Nomination letters FISSEA 2014 Security Contest Winners Winners Announced at March 2014 Conference (selected by judges): Poster...

Updates

National Cybersecurity Center of Excellence (NCCoE) and Electric Power Sector Identity and Access Management Use Case

March 18, 2014
https://csrc.nist.gov/news/2014/nccoe-and-electric-power-sector-identity-and-acces

The National Institute of Standards and Technology (NIST) invites organizations to provide products and technical expertise to support and demonstrate security platforms for identity and access management for the electric power sector.

Events

ISPAB: March 2014 Meeting

March 12, 2014 - March 14, 2014
https://csrc.nist.gov/events/2014/ispab-march-2014-meeting

(All presentations in .pdf format.) Federal Register NoticAnnouncing Meeting Minutes Updates on FedRAMP Sarbari Gupta, President & CEO, Electrosoft, Cybersecurity-Focused Strategy Quantum World and how NIST is preparing for future crypto Dustin Moody, Computer Scientist, Computer Security Division, NIST Andrew Regenscheid, Computer Scientist, Computer Security Division, NIST If you have any questions or need information please e-mail Annie Sokol .

Publications Other (Final)

NISTIR 7628 User's Guide

February 26, 2014
https://csrc.nist.gov/pubs/other/2014/02/26/nistir-7628-user-guide/final

Abstract: This NISTIR 7628 User's Guide is intended to provide an easy-to-understand approach that you can use to navigate the NISTIR 7628. While NISTIR 7628 covers many significant cybersecurity topics, this User's Guide is focused primarily on the application of NISTIR 7628 Volume 1 in the context of an org...

Publications ITL Bulletin (Final)

Framework for Improving Critical Infrastructure Cybersecurity

February 19, 2014
https://csrc.nist.gov/pubs/itlb/2014/02/framework-for-improving-critical-infrastructure-cy/final

Abstract: Recognizing that the national and economic security of the United States depends on the resilience of critical infrastructure, President Obama issued Executive Order (EO) 13636, Improving Critical Infrastructure Cybersecurity, in February 2013. It directed NIST to work with stakeholders to develop a...

Updates

Cybersecurity Framework

February 18, 2014
https://csrc.nist.gov/news/2014/cybersecurity-framework

This notice announces the issuance of the Cybersecurity Framework (the “Cybersecurity Framework” or “Framework”).

Publications CSWP 1 (Final)

Framework for Improving Critical Infrastructure Cybersecurity, Version 1.0

February 12, 2014
https://csrc.nist.gov/pubs/cswp/1/cybersecurity-framework-v10/final

Abstract: The national and economic security of the United States depends on the reliable functioning of critical infrastructure. Cybersecurity threats take advantage of the increased complexity and connectivity of critical infrastructure systems, placing the Nation's security at risk. To better protect these...

Events

2014 Cybersecurity Innovation Forum

January 28, 2014 - January 30, 2014
https://csrc.nist.gov/events/2014/2014-cybersecurity-innovation-forum

The 2014 Cybersecurity Innovation Forum, to be held January 28-30, 2014, at the Baltimore Convention Center in Baltimore, Md., will focus on the existing threat landscape and provide presentations and keynotes on current and emerging practices, technologies and standards to protect the nation’s infrastructure, citizens and economic interests from cyber-attack. The goal of the forum—sponsored by the National Institute of Standards and Technology’s (NIST) National Cybersecurity Center of Excellence—is to identify a roadmap for cyber defense through integrating trusted computing, information...

Publications SP 800-162 (Final) (Withdrawn)

Guide to Attribute Based Access Control (ABAC) Definition and Considerations

January 16, 2014

https://csrc.nist.gov/pubs/sp/800/162/final

Abstract: This document provides Federal agencies with a definition of attribute based access control (ABAC). ABAC is a logical access control methodology where authorization to perform a set of operations is determined by evaluating attributes associated with the subject, object, requested operations, and, i...

Updates

Proposed Establishment of a Federally Funded Research and Development Center

January 10, 2014
https://csrc.nist.gov/news/2014/proposed-establishment-of-a-federally-funded-r-d-c

The National Institute of Standards and Technology (NIST), Department of Commerce, intends to sponsor a FRDC G36to facilitate public-private collaboration for accelerating the widespread adoption of integrated cybersecurity tools and technologies.

Events

ISPAB: DECEMBER 2013 MEETING

December 19, 2013 - December 20, 2013
https://csrc.nist.gov/events/2013/ispab-december-2013-meeting

(All presentations in .pdf format.) Federal Register Notice Announcing Meeting Minutes Enhance Shared Situational Awareness (ESSA): Information Sharing Architecture (ISA) - Framework & Requirements Brief - Information Security Greg Garcia, (Moderator), Principal, Garcia Cyber Partners Antonio “T” Scurlock, Enhance Shared Situational Awareness (ESSA) Portfolio Management Team (PMT), DHS Co-Lead Robin K. DeStefano, Enhance Shared Situational Awareness (ESSA) Portfolio Management Team (PMT), NSA Co-Lead William “Bill’ Jones, Enhance Shared Situational Awareness (ESSA) Portfolio Management...

<< first   < previous   33     34     35     36     37     38     39     40     41     42     43     44     45     46     47     48     49     50     51     52     53     54     55     56     57  next >  last >>