Working Together for Cybersecurity
At the NCCoE, we bring together experts from industry, government, and academia to address the real-world needs of securing complex IT systems and protecting the nation’s critical infrastructure.
View Our Work Join a Community of Interest Subscribe to UpdatesA Look Inside the NCCoE
We collaborate with the public to serve the public. At the National Cybersecurity Center of Excellence, our mission is to solve organizations’ most pressing cybersecurity challenges. Explore our guidance, engage with our teams, and learn more about how you can get involved today.
Welcome to the National Cybersecurity Center of Excellence (NCCoE)

Featured Projects
-
Addressing Visibility Challenges with TLS 1.3
Addresses challenges to compliance, operations, and security with modern encrypted protocols, and TLS 1.3 in particularSoliciting Comments -
Data Classification
Defining technology-agnostic recommended practices for defining data classifications and data handling rulesets and communicating them to othersSoliciting Comments -
Manufacturing Supply Chain Traceability Using Blockchain Related Technologies
This project is implementing supply chain component traceability across industry blockchain enabled ecosystems of manufacturers and will inform supply chain visibility for critical infrastructures.Soliciting Comments -
Migration to Post-Quantum Cryptography
Brings awareness to the issues involved in migrating to post-quantum algorithms and develops practices to ease migration from current public-key algorithms to replacement algorithms that are resistant to quantum computer-based attacksSoliciting Comments -
Mitigating Cybersecurity Risk in Telehealth Smart Home Integration
Identifies and mitigates cybersecurity and privacy risks based on patient use of smart home devices interfacing with patient information systemsSeeking Collaborators -
Responding to and Recovering from a Cyber Attack: Cybersecurity for the Manufacturing Sector
An approach for cybersecurity incident response and recovery in a manufacturing environmentSeeking Collaborators -
Software Supply Chain and DevOps Security Practices
Demonstrating an applied risk-based approach and recommendations for secure DevOps and software supply chain practicesSeeking Collaborators -
Trusted IoT Device Network-Layer Onboarding and Lifecycle Management
Demonstrates approaches for securely onboarding IoT devices with network credentialsSoliciting Comments