Conference

HIMSS 2021 Global Health Conference & Exhibition

Wednesday, August 11, 2021

MITRE’s Sue Wang and NIST’s Nakia Grayson will be providing the presentation Telehealth Cybersecurity: Secure Remote Patient Monitoring Ecosystem during the 2021 HIMMS Global Health Conference and Exhibition on Wednesday, August 11th from 7pm-8pm EST. The presentation will discuss the challenges associated with remote patient monitoring, as well as the complexities associated with deploying remote patient monitoring solutions. Additionally, the presentation will discuss thoughts on privacy and cybersecurity risk, approaches needed to understand those risks, and a means to mitigate risk in serving their remote patient community.

AAMI Exchange 2021

Monday, June 7, 2021

Join MITRE’s Sue Wang and NIST’s Nakia Grayson, alongside UMMC’s Steven Waite and Medcrypt’s Axel Wirth as they give a presentation during the 2021 AAMI Exchange on the current telehealth environment. The presentation will provide insights and lessons learned in applying cybersecurity and privacy controls to the telehealth environment.

HIPAA Summit 2021

Tuesday, March 23, 2021

MITRE’s Julie Snyder and Kevin Littlefield will provide an overview of the NIST SP 1800-30, Securing Telehealth Remote Patient Monitoring Ecosystem during The Thirtieth National HIPAA Summit on Tuesday, March 23rd at 10am EST. Kevin and Julie will discuss the risks associated with remote patient monitoring and an example solution to mitigate those risks.

Making Sense of Zero Trust: Perspectives from Inside and Outside Government Organizations

Wednesday, August 11, 2021

Making Sense of Zero Trust

LinkedIn Live Webinar
Wednesday, August 11, 2021
1:00 p.m. – 3:00 p.m. ET
 

The NIST National Cybersecurity Center of Excellence, the Identity Defined Security Alliance, and the National Cyber Security Alliance are joining forces to supply insights into real-world zero trust deployments in both the public and private sectors and to share resources available to help organizations implement zero trust architectures.

Adopting zero trust, whether driven by a government mandate or the shift to a modern security strategy to support remote work, can be challenging. Migrating an existing information technology ecosystem, particularly one with legacy applications and systems, requires investments in people, process, and technology to retool it to adhere to zero trust principles.

Join us and learn from organizations such as the U.S. Departments of Homeland Security and Education; Adobe; and Cisco, which are well down the path of implementing zero trust strategies as they reveal tactics, opportunities, and lessons learned. NIST's Scott Rose and Alper Kerman, along with the Defense Information Systems Agency and others will share resources that you can use to help guide your zero trust reference architecture designs and strategies.

Billington Cybersecurity Defense Summit

Thursday, April 22, 2021

NIST's  Alper Kerman will highlight the work of the NCCoE in zero trust architectures as part of a panel discussion at the inaugural Billington Cybersecurity Defense Summit from 10:00 a.m. ET until 2:30 p.m. ET on April 22. The event convenes senior industry and government decision-makers from the civilian, intelligence, and defense agencies as well as new cyber leaders in the Administration to chart the acute need for a paradigm shift toward data security and zero trust in the new normal. 

RSA Conference 2021

Monday, May 17, 2021 to Thursday, May 20, 2021

RSA Conference 2021 Goes Fully Virtual

Virtual Presentations

Monday, May 17

Making Sense of the Landscape of Attacks and Defenses Against AI

Monday, May 17, 2021, 1:15 - 1:55 p.m. PST

AI-enabled technology is increasingly finding its way into our trusted systems, and new attacks and defenses for machine learning models are growing. As a result, it can be hard to know how resilient these systems are. Join us as we show how the NCCoE’s Securing AI lab can help make sense of the relationships between attacks and defenses, moving us toward useful metrics for trustworthiness. Learn more about this session and view the agenda.

 

Tuesday, May 18

Is Your Organization’s Confidential Data Really Confidential?

Tuesday, May 18, 2021, 11:35 - 12:15 p.m. PST

Data breaches can have far-reaching operational, financial, and reputational impacts. Join cybersecurity engineers who will discuss high-level architectures, data breach demos, and practical solutions to identify and protect the confidentiality of an enterprise’s data, as well as detect, respond to, and recover from incidents that affect data confidentiality. Learn more about this session and view the agenda.

 

Wednesday, May 19

Telehealth Cybersecurity: Secure Remote Patient Monitoring Ecosystem (panel discussion)

Wednesday, May 19, 2021, 11:35 - 12:15 p.m. PST

Remote patient monitoring (RPM) is a subset of telehealth that allows healthcare providers to monitor patients’ health data from home. RPM may rely on third-party systems and patient home networks, which may increase cybersecurity and privacy risks. This session will feature a panel of security and healthcare experts offering practical guidance on how to mitigate these risks. Learn more about this session and view the agenda.

 

Strengthening Resilience of Positioning, Navigation and Timing Services

Wednesday, May 19, 2021, 11:35 a.m. - 12:15 p.m. PST

Our nation’s critical infrastructure relies on PNT data from GPS and other systems. Disruptions to PNT data could have significant economic and national security implications. This session will discuss how industry can leverage NIST’s PNT cybersecurity profile to assess risks of PNT degradation or loss to their organization and take appropriate mitigation measures. Learn more about this session and view the agenda.

 

Trusted Internet of Things Device Onboarding and Lifecycle Management

Wednesday, May 19, 2021, 3:00 - 3:40 p.m. PST

Current methods for provisioning IoT device credentials can leave networks vulnerable to unauthorized devices and devices vulnerable to being taken over by unauthorized networks. This session will discuss how trusted network-layer onboarding can improve the security of IoT devices and integrate with attestation, application-layer onboarding, and MUD to protect devices throughout their lifecycles. Learn more about this session and view the agenda.

 

Check back for more programming updates! 

 

*More information will be added to this page as it is announced.

ICS Cyber Security Conference

Monday, October 19, 2020 to Thursday, October 22, 2020

The NCCoE’s Jim McCarthy will speak at the Industrial Control Systems (ICS) Cyber Security Conference on Monday, October 19, 2020, beginning at 11:00 a.m. (Eastern). Jim is part of a panel discussion, Stories from the Edge, on challenges to securing grid edge devices, and the cybersecurity solutions available today and in the near-future to address potential threats to a modern grid. He will be joined by representatives from NREL, CPS Energy, and partners in the NCCoE’s latest project on distributed energy resource cybersecurity.

Global Security Exchange (GSX+) Conference

Wednesday, September 23, 2020

The NCCoE’s Sallie Edwards will present at this year’s all-virtual GSX+ conference on Wednesday, September 23 at 11:20 AM EDT. Learn what “good cybersecurity” looks like at the NCCoE and catch a glimpse of how this national resource is bringing people and organizations together to share their collective knowledge and experience to operationalize and elevate the state of cybersecurity. 

2020 Federal Identity (FedID) Forum & Expo

Tuesday, September 8, 2020 to Friday, September 11, 2020

Connect with the NCCoE online at FedID on September 8-11, 2020. Drop by the NIST virtual booth or join the NCCoE’s Alper Kerman on Wednesday, September 9, 2020 at the Zero Trust in ICAM panel discussion at 1:00pm EDT. On this panel, leaders in government and industry identity speak to how the U.S. government can adopt and implement digital identity best practices in a zero trust environment.