Virtual Workshop on Preventing and Recovering from Ransomware and Other Destructive Cyber Events

Wednesday, July 14, 2021

Workshop Overview

The National Cybersecurity Center of Excellence (NCCoE) at the National Institute of Standards and Technology (NIST) hosted a virtual workshop on July 14, 2021. The purpose of the workshop was to seek comments and feedback  from government and industry subject matter experts on challenges and the practical approaches preventing and recovering from ransomware and other destructive cyber events. 


Workshop Recording

Coming Soon! 


Post-Workshop Materials 

 NIST and NCCoE Overview
 Kevin Stine - NIST Chief Cybersecurity Advisor
 Keynote: Deputy Secretary (TENTATIVE)
 Don Graves - Deputy Secretary, US Department of Commerce

 Presentation #1 

 Workshop Overview and Background
 Kevin Stine - NIST Chief Cybersecurity Advisor

 Presentation #2 

 Status of NIST Ransomware Activity
 Bill Fisher – NIST
 Bill Fisher is a security engineer at the National Cybersecurity Center of Excellence (NCCoE). In this role, he is responsible for leading a team of engineers that work collaboratively with industry partners to address cybersecurity business challenges facing the nation. He leads the center’s Attribute Based Access Control (ABAC) project, Mobile Application Single Sign On (SSO) for the Public Safety and First Responder Sector, and is part of the ITL Cybersecurity for IoT program.

 Moderated Q & A
 Mat Heyman - Impresa Management

 Mat Heyman focuses on advancing policy and programmatic solutions to science- and technology-related societal issues. With an emphasis on strategic planning, program management, and stakeholder engagement, his work includes assisting federal agencies in cybersecurity, artificial intelligence, community resilience, and national security. Most recently that includes working with the National Institute of Standards and Technology (NIST) and the Defense Advanced Research Projects   Agency (DARPA). 


Challenges Session

 Presentation #3


 Joshua Corman is a Founder of I am The Cavalry (dot org), and serves as Chief Strategist for CISA regarding COVID, healthcare, and public safety. He previously served as CSO for PTC, Director of the Cyber Statecraft Initiative for the Atlantic Council, CTO for Sonatype, and other senior roles. He co-founded RuggedSoftware and IamTheCavalry to encourage new security approaches in response to the world’s increasing dependence on digital infrastructure. His unique approach to security in the context of human factors, adversary motivations, and social impact has helped position him as one of the most trusted names in security. He also serves as an Adjunct Faculty for Carnegie Mellon’s Heinz College, and was a member of the Congressional Task Force for Healthcare Industry Cybersecurity.

 Presentation #4

Institute for Security and Technology

 Philip Reiner is the Chief Executive Officer and Co-Founder of the Institute for Security and Technology, a global non-profit that serves as the bridge between technologists and national security policy makers. Philip also serves as the Executive Director of the Ransomware Task Force. The mission of IST is to develop solutions to the world's most challenging emerging security threats with a technology nexus. He holds positions as an Advisory Board Member for the Artificial Intelligence Security Initiative at UC Berkeley’s Center for Long Term Cybersecurity, is an Affiliate at Stanford’s Center for International Security and Cooperation, and is also a Member of the IST Board of Directors.

 Presentation #5

 Carmichael Patton - Microsoft

 Presentation #6

 Sridhar Muppidi – IBM

 Presentation #7

 Pranshu Bajpai - Motorola Solutions

Industry Lightning Talks

 Presentation #8

 Maria Vachino - Cyntegra

 Presentation #9


 Travis Rosiek, Chief Technology and Strategy Officer - With 20 years of experience in the security industry, Travis is a highly accomplished cyber defense leader having led several commercial and U.S. government programs.  

 He is known for developing and executing strategic plans to build the technical capacity across product development, quality assurance, technical marketing, professional services and sales engineering.  

 Prior to his role at BluVector, Travis held several leadership roles including CTO at Tychon and Federal CTO at FireEye as well as senior roles at CloudHASH Security, McAfee, and Defense Information Systems Agency (DISA). 


 Presentation #10


 Guido Grillenmeier, Chief Technologist with Semperis, spent 20+ years at HP/HPE as Chief Engineer. A frequent presenter at technology conferences and contributor to technical journals, Guido is the co-author of Microsoft Windows Security Fundamentals. He’s helped various customers secure their Active Directory environments, and supported their transition to Windows 10/m365 and Azure cloud services. Guido was an Microsoft MVP for Directory Services for 12 years.


 Presentation #11

 Brian Hymer - Quest

 Presentation #12

 Temi Adebambo - Amazon Web Services

 Presentation #13

 Next Steps/Wrap-up (NCCoE)
 Curt Barker - NIST
 Mr. Barker provides planning and implementation support to the National Institute of Standards and Technology’s Chief Cybersecurity Advisor. He previously served as Associate Director and Cybersecurity Advisor for ITL, directly responsible for planning, directing, and implementing the policies and programs of NIST’s cybersecurity program. He was the first manager for multiple national-level initiatives, including the National Initiative For Cybersecurity Education, the National Strategy for Trusted Identities in Cyberspace, and the National Cybersecurity Center of Excellence.
Engage with us

Receive updates about the project and email any questions to

Satellite Ground Segment Cybersecurity Workshop

Thursday, June 24, 2021

Date/Time: Thursday, June 24, 2021 | 1 p.m. - 4 p.m. EDT
Duration: 3 hours

The National Institute of Standard and Technology's (NIST's) National Cybersecurity Center of Excellence (NCCoE), a non-regulatory entity, is looking to improve the cybersecurity of the ground segment component of satellite operations, particularly with regard to global positioning system (GPS) functions. To that end, the NCCoE is engaging the satellite community and other key stakeholders to understand the cybersecurity challenges they face and the leading practices currently employed.  From this workshop, the NCCoE will publish non-binding cybersecurity recommendations out to the community.

The NCCoE is holding a workshop on June 24, 2021 which will consist of an industry keynote speaker and a panel discussion to elicit pertinent cybersecurity information and encourage discussion around this topic of ground segment cybersecurity.  Statements of inquiry are being published ahead of time to stimulate discussion and provide scope. Out of this the NCCoE will analyze the information gathered and publish recommendations.



1:00 - 1:15 p.m.

Welcome -

Ms. Suzanne Lightman, NIST Principal Investigator

1:15 - 2:00 p.m.

Keynote Speaker -

Mr. Charlie Brown, Chief, Production Corps Cybersecurity

Space Missile Command (SMC) Ground Segment Overview

2:00 - 2:30 p.m.

NIST Methodology and Processes

Ms. Suzanne Lightman, NIST Principal Investigator 

Cybersecurity Framework and Cybersecurity Framework Profile Overview

2:30 - 3:30 p.m.

Panel Discussion and Facilitated Q&A

Our panel will consist of Major Rosalva Franco, USSF (SMC), Andrew D’Uva (Providence Access Company), Joe DeHaven (DeHaven Consulting Group), and JT Thompson (MITRE)

  • What are the ground segment cybersecurity challenges operators face today?
  • What are the leading practices used today to mitigate those challenges?
  • What cybersecurity challenges do operators see coming over the horizon?
  • Where do the operators think cybersecurity for the ground segment is going? (i.e. What’s the next “big thing”?)

3:30 - 4:00 p.m. 

Next Steps and Closing


Post-Workshop Materials

Workshop Slide Deck

Keynote Speaker Slide Deck


Zero Trust: Beyond the Moat

Wednesday, April 7, 2021

Federal Computer Week’s Zero Trust Workshop on April 7th will feature NIST’s Scott Rose discussing last year’s publication of the NIST SP 800-207, Zero Trust Architecture and the current state of the National Cybersecurity Center of Excellence (NCCoE) project, Implementing a Zero Trust Architecture. This project will result in a new NIST 1800-series Special Publication that describes how to build a zero trust enterprise using commercially-available technology.

Virtual Workshop on Improving the Security of DevOps Practices

Thursday, January 21, 2021

Workshop Overview

During this workshop, we discussed the National Institute of Standards and Technology’s (NIST’s) proposed approach for helping industry and government improve the security of their DevOps practices. NIST solicited proposed approaches from participating organizations and heard from the community about DevSecOps-related topics that NIST could tackle. The findings from the workshop will inform NIST in the creation of new applied guidance to fill any gaps, updates to existing guidance, and potential development of a National Cybersecurity Center of Excellence project to demonstrate the practices.

Workshop Recording

Watch the webcast from this event. 


Related Materials

- Read about NIST's plans to advance current and emerging secure software development and operations practices


Post-Workshop Materials

Presentation #1

NIST Introduction and Workshop Overview

Kevin Stine – NIST

Presentation #2

Why Frameworks Matter for Modern Software Developers: Rooting DevSecOps Practice in Security Frameworks

Aaron Cooper – BSA

Presentation #3

6 Pillars of DevSecOps 

John Martin – SAFECode

Presentation #4

DevSecOps Pipeline for Complex Software-Intensive Systems: Addressing Cybersecurity Challenges

Carol Woody – SEI

Presentation #5

92 years to DevOps: A Motorola Solutions Case Study

Adam Lewis – Motorola Solutions

Question Summary

Moderated Q&A

Karen Scarfone – Scarfone Cybersecurity

Presentation #6

Lessons Learned and Open Problems Delivering Companywide DevSecOps Solutions at Microsoft

Michael Fanning – Microsoft

Presentation #7

How Leaders Set the Stage – Successfully Scaling DevSecOps

Tim Anderson – AWS

Presentation #8

Shift-Left Compliance & Security

Jim  Doran – IBM

Presentation #9

Securing and Protecting DevSecOps with Cloud-Enabled Technologies

Lisa Lorenzin – Zscaler

Question Summary

Moderated Q & A

Mike Bartock – NIST

Presentation #10

Full Stack DevSecOps

John Morello - Palo Alto Networks

Presentation #11

Using Balanced Development Automation to Address Security in a DevOps Environment

Ehsan Foroughi - Security Compass

Presentation #12

Journey to DevSecOps

James Barr – TechTrend

Presentation #13

Enhancing DevSecOps Capabilities with Observability and Automation

Michael Polisky – Splunk

Wrap Up/Next Steps

Moderated Q & A

Curt Barker – Dakota Consulting

To receive future updates about this project, send an email to to join the DevOps Community of Interest.


Manufacturing Supply Chain Traceability with Blockchain

Monday, October 26, 2020 to Tuesday, October 27, 2020

Workshop Objectives

The National Institute of Standards and Technology’s (NIST) Engineering Laboratory (EL) and the NIST National Cybersecurity Center of Excellence (NCCoE)  will host a virtual workshop on October 26-27, 2020. The purpose of the workshop is to discuss the challenges, opportunities and use cases of various blockchain technologies to improve traceability across manufacturing supply and logistics chains.



Our nation’s supply chain continues to grow in complexity with a variety of stakeholders, processes, and intermediaries, constantly working together to deliver products that we all rely on. As this complexity increases, so does the need to secure our nation’s manufacturing supply chains, especially those supporting critical infrastructure.

The National Institute of Standards and Technology’s (NIST) Engineering Laboratory (EL) and the NIST National Cybersecurity Center of Excellence (NCCoE) are organizing this workshop organizing this workshop to inform a subsequent whitepaper that will provide guidance on the challenges and benefits of using various blockchain technologies for manufacturing supply chain traceability. This whitepaper will cover the role of blockchain technologies to improve traceability across manufacturing supply and logistics chains, to assure the provenance of parts, and to identify participants and organizations in the overall manufacturing supply chain. The whitepaper will build upon prior NIST guidance on Blockchain Technology, and Securing Manufacturing Industrial Control Systems.



NIST invites industry subject matter experts and stakeholders to join this conversation.  

The workshop provides an opportunity for participants to provide feedback on relevant standards, guidelines, recommended practices, and use cases as they relate to supply chain traceability.



October 26 - Day 1


10:00 – 10:15

Welcome and Overview of NIST and the NCCoE

10:15 – 10:35

Manufacturing Supply Chain Issues: Government Perspective

10:35 - 11:35

Manufacturing Supply Chain Challenges: Industry Perspective

11:35 – 11:50


11:50 – 12:20

Blockchain Adoption

12:20 – 12:50

Agriculture Food Tracking

12:50 – 1:20

Successful Implementation Stories

1:20 – 2:00

End of Virtual Day Wrap-up Discussion


Click here to register for Day 1 of this workshop.


October 27 - Day 2


10:00 – 10:15

Welcome and Recap of Day 1

10:15 – 11:00

Blockchain and Standards-Today and Tomorrow

11:00 - 11:45

On and Off the Chain: Physical Anchors and Linking Objects

11:45 – 12:00


12:00 – 12:45

Digital Thread/IoT/ Quantifiable Assurance

12:45 – 1:15

Practicalities of Adoption: Small & Medium Sized Businesses

1:15 – 2:00

End of Virtual Day 2 Wrap-up Discussion


Click here to register for Day 2 of this workshop.


Confirmed Speakers

  • Ron Ross, NIST
  • Kraig Adams, VP Blockchain GS1
  • Susanne Somerville, CEO Chronicled
  • Jeff Denton, VP AmerisourceBergen
  • Ophir Gaathon, CEO Dust Identity
  • Joel Neidig, CEO Simba Chain
  • Donald Davidson, Director Cyber-SCRM Synopsys
  • Mr. Christopher Peters, The Lucrum Group, CEO


Registration for the workshop will close on October 23. The workshop will be limited to 500 participants.

The workshop will not be recorded and attendees may request presentations from each presenter after the event. Please join the community of interest by sending an email to to get the latest updates on the activities related to Manufacturing Supply Chain Traceability.


Virtual Workshop on Trusted IoT Device Network-Layer Onboarding and Lifecycle Management

Monday, October 26, 2020

Workshop Overview 

The National Institute of Standards and Technology (NIST) hosted a virtual workshop on October 26, 2020. The purpose of the workshop was to discuss the challenges and investigate the practical and implementable approaches to enhance the security of IoT devices through trusted network-layer onboarding and re-onboarding of those devices throughout the device lifecycle. 

Workshop Recording 

Post-Workshop Materials

 Presentation #1   

  NIST and NCCoE Overview 

 Jeff Greene, Director, NCCoE

Presentation #2

  Workshop Introduction

 Tim Polk, NCCoE 

 Presentation #3

  Workshop Overview, Background, and Challenges

 Susan Symington, NCCoE

 Presentation #4

  NIST IoT Baseline with Respect to IoT Device Onboarding

 Michael Fagan, NCCoE 



 Presentation #5

 Standards, Technical, and Operational Considerations for IoT Device Onboarding and Lifecycle Management

 Eliot Lear, Cisco

 Presentation #6

 An Approach to IoT Device Onboarding and Lifecycle Management

 Darshak Thakore/Craig Pratt, CableLabs

 Presentation #7

 Enhancing IoT Device Security Through Trusted Network-Layer Onboarding

 Steve Clark, WISeKey


 Presentation #8

 Application Onboarding with Intel SDO and FIDO IoT

 Geoffrey Cooper, Intel

 Presentation #9

 IoT Device Onboarding with DPP

 Dan Harkins, HPE

 Presentation #10 

 Trusted IoT Device Onboarding and Lifecycle Management

 Alon Shamir, Arm



 Presentation #11

 Next Steps/Wrap-Up

 Curt Barker, NCCoE



The National Cybersecurity Center of Excellence (NCCoE) is investigating the development of a project to demonstrate implementations for trusted network-layer onboarding of IoT devices. We define network-layer onboarding of an IoT device as provisioning  network credentials to that device at the time of the device’s deployment on a network. The trusted aspect of network-layer onboarding indicates that the device is provided with unique network credentials after the device and the network have had the opportunity to authenticate each other and establish an encrypted channel without user knowledge of the credentials, thereby mitigating unauthorized credential disclosure. Trusted IoT device onboarding processes are needed to mitigate the risk of unauthorized devices connecting to networks. Trusted onboarding processes are also needed to mitigate the risk of devices being taken over by networks that are not authorized to onboard them. 

The project’s goal is to enhance the overall security posture of IoT devices and, by extension, the security of the networks to which they connect. The project will be based on the initial concepts described in the draft NIST cybersecurity paper Trusted Internet of Things (IoT) Device Network-Layer Onboarding and Lifecycle Management. The objective of the project is to design, build, demonstrate, and document example trusted solutions that onboard IoT devices to networks and that support trusted re-onboarding of those devices throughout the device lifecycle to support operations such as device credential maintenance and eventual reuse of the device on other networks. In addition, the project seeks to further enhance IoT device and network security by integrating additional, optional related capabilities with the secure onboarding solutions, such as:  

  • use of attestation mechanisms to establish trust in the authenticity and integrity of the IoT device platform  

  • secure transmission of the device’s Manufacturer Usage Description (MUD) to the network to enable device intent enforcement 

  • secure application-layer onboarding (i.e., automatic, secure downloading of the device’s application from a trusted application server) 

  • secure establishment of an automated lifecycle management application/service for the device 

  • ongoing mutual attestation to ensure the trustworthiness of both the IoT device and the application/service that is managing it 

  • integration with a centralized asset management system to support cross-checking of discovered devices with onboarded devices 

To receive updates about this project, click here.  


Please send an email to

FCW’s Zero Trust Workshop

Tuesday, May 19, 2020

The NCCoE’s Alper Kerman will participate in Federal Computer Week’s virtual half-day Zero Trust Workshop where he will provide updates on the NCCoE’s latest project, Implementing a Zero Trust Architecture. This event will feature cyber leaders from government and industry who will describe their moves toward zero trust, the challenges of adapting existing systems and operations, and the benefits early adopters are seeing as attacks continue to multiply.

Zero Trust Architecture Technical Exchange Meeting

Wednesday, November 13, 2019 to Thursday, November 14, 2019

The NIST National Cybersecurity Center of Excellence (NCCoE) and the Federal CIO Council hosted a two-day Technical Exchange Meeting on Zero Trust Architectures on November 13-14, 2019.

Over the past year, NIST NCCoE cybersecurity researchers have had the opportunity to work closely with the Federal CIO Council, federal agencies, and industry to address the challenges and opportunities for implementing zero trust architectures across U.S. government networks. This work has resulted in publication of draft NIST Special Publication (SP) 800-207, Zero Trust Architecture. Through this event, we built on previous work and took steps to further strengthen relationships among industry and government to address gaps and advance the state of readiness of zero trust architectures.

Meeting Goals

Through collaboration with this community, the NCCoE and the Federal CIO Council:

  • provided a forum for critical decision makers and stakeholders to enumerate zero trust cybersecurity requirements and challenges for federal networks/systems
  • shared current successes, best practices, and lessons learned in implementing zero trust in the federal government and the commercial sector
  • provided a setting for government and industry to connect, network, and share big-picture federal needs and ideas around zero trust in a “no sales pitch” environment
  • gathered feedback from key zero trust stakeholders on current NIST efforts in NIST SP 800-207, Zero Trust Architecture, and areas where NIST and the Federal CIO Council are best suited to support zero trust efforts moving forward


The following presentations were given during the two-day event:

Workshop on Cybersecurity Online Informative References

Tuesday, December 3, 2019

The National Institute of Standards and Technology (NIST) invites you to attend a Cybersecurity Online Informative Reference (OLIR) workshop which will be held on December 3rd, 2019, at the National Cybersecurity Center of Excellence.

NIST invites industry subject matter experts and early adopters to share their views of the OLIR program, discuss potential opportunities and challenges affecting authoritative cybersecurity data-mapping, and offer industry-recommended practices for correlating cybersecurity-related data.


The purpose of this NIST OLIR cybersecurity workshop is to present the NIST Cybersecurity Online Informative References Program, the reference data currently and potentially generated for the repository, highlight the work of early adopters, identify existing industry recommended practices for correlating cybersecurity-related data, and understand potential opportunities and challenge areas affecting authoritative cybersecurity data-mapping. The findings from the workshop will inform the development of the OLIR reference repository and NIST guidance for the use and adoption of these data resources.

The three main drivers for the OLIR program are also its primary objectives: 1) to apply greater scientific and mathematical rigor to cybersecurity guidance, 2) to create an integrated and actionable NIST guidance reference resource inclusive of maintained data sources, and 3) integrate NIST-supported United States Government (USG) legislative and administrative project responsibilities. By achieving these main drivers, the program creates a more standards-based, consumable reference set of NIST guidance as related to itself and other government, industry, and academia-produced cybersecurity products, guidance, services, and education.


At its core, the OLIR program provides a forum and format for cybersecurity subject matter experts to make mathematics and logic-based relationship assertions between their framework, document, or product and the Cybersecurity Framework (CSF) in a simple format defined by NIST Interagency Report (IR) 8204, Cybersecurity Framework Online Informative References (OLIR): Specification for Completing the OLIR Template, which was established to provide guidance to Informative Reference developers for completing and submitting Informative References for inclusion within the OLIR catalog.

At the workshop, NIST will introduce the OLIR program and the associated processes and procedures documented within NISTIR 8204 as well as highlight existing Informative Reference data within the OLIR catalog from early adopters. NIST will gather feedback regarding the current instructions and definitions detailed within the NISTIR and use this information to mature the evolution of the OLIR catalog and current and future guidance. 

Questions about the workshop should be sent to:

Registration is Open

To register for this free workshop, please complete this short form by November 26th, 2019.  The workshop will be limited to 100 registrants.

For our international visitors, registration is suggested as soon as possible to allow for the registration process. Please download the file and fax the hard copy to (301-975-8670). Once the form has been faxed, email to confirm receipt.



Date: Tuesday, December 3rd, 2019

Time: 9:30 a.m. – 12:00 p.m.

Location: National Cybersecurity Center of Excellence, 9700 Great Seneca Hwy, Rockville, MD 20850


8:30am – 9:00am

Check-in, NCCoE Lobby

9:00am – 9:10am

Welcome & Introduction to NIST

9:10am – 9:50am

Online Informative Reference (OLIR) Program Briefing & Website Demonstration

9:50am – 10:10am

Program Briefing Q & A

10:10am – 10:25am


10:25am – 11:15am

Technical Panel - Perspective from OLIR Program Early Adopters Panelists

11:15am – 12:05pm

Industry Panel - Perspective from Industry Partners Panelists

12:05pm – 12:30pm

 Closing Remarks and Q&A


End of Workshop

Information Protection and Data-Centric Security Management: Data Classification Workshop

Thursday, October 24, 2019

The purpose of this workshop is to discuss the challenges and opportunities with data classification in the context of data management and information protection to support various business use cases. The outcome of the workshop will help the National Institute of Standards and Technology (NIST) develop a National Cybersecurity Center of Excellence (NCCoE) demonstration project that may be divided into multiple phases to support the full life cycle of managing information security at the data level and demonstrating compliance. We recognize that policies and controls are necessary to secure the data, but the initial scope of this project will focus on classification.


Data Classification

There are a few NIST guidelines and practices for data security, but data classification—a key foundational element—is not well defined. Data classification is a mechanism to help organizations determine the type of data, its criticality with respect to a categorization schema, the adequate access level, and the level of protection.

Data classification is an activity that is often overlooked. And, there is limited guidance available covering taxonomy, methodology, and practical approaches to help organizations discover, classify, and label data. Several challenges related to data discovery and classification are driven by the fact that:

  • Data is everywhere—on devices (e.g., laptops, desktops, mobile) and in applications running in an on-premise and/or outsourced environment, and/or in the cloud.
  • Relying on end users to identify and classify is error prone and often incomplete.
  • There is a lack of common definitions and understanding of classifiers, which results in the same information potentially being classified and labeled in a contradictory manner.
  • Lack of persistence of the label in the Information that are interoperable across various vendor technology clients and tamper detectable.
  • There are inconsistent global standards across technologies and industries.

About the Workshop

During the workshop, NIST will present a summary of existing and ongoing work related to data classification, data security, data-centric threat modeling, and zero-trust architecture. Next, industry and other parties will present their views of the challenges in data discovery and classification, and recommended approaches and practices to address the challenges with managing the security of the data throughout its lifecycle driven by the business use cases to support the organizations’ mission. NIST welcomes input from workshop participants on all aspects of the planned NCCoE demonstration project, including the proposed scope, use cases, technologies to be considered, and sources of specifications and guidance. NIST will use the findings and feedback received from the workshop to develop a project description that will be released for public review. Then, NIST will solicit organizations to directly collaborate on the technical project and development of its outputs.

A final agenda is coming soon.

Register Today!

The workshop is free and open to the public; however, advance registration is required. Please complete this short form by October 21, 2019.

For our international visitors, registration is suggested no later than October 17, 2019, to allow for the registration process. Please download this file and fax the hard copy to 301-975-0321. Once the form has been faxed, email to confirm receipt.


Date/Time: Thursday, October 24, 2019. Check-in begins at 8:30 a.m. The formal program begins at 9 a.m. and concludes at 1 p.m.

Location: NCCoE, 9700 Great Seneca Highway, Rockville, Maryland 20850

Dress: Business Casual

Note: This is not a virtual event. You must join us in person at the NCCoE to attend this event.

Questions? Please email your questions to