Past Events

February, 2019

IoTSSA Podcast

Join Brian (of IoTSSA) in a discussion on the NIST Cybersecurity Framework with Karen Waltermire, Cybersecurity Engineer with NIST and Harry Perper Dept Chief Engineer with The MITRE Corporation.

February, 2019


Engage with the NCCoE and NIST at the Healthcare Information and Management Systems Society (HIMSS) Annual Conference and Exhibition to learn how we are accelerating the deployment and use of secure, standards-based technologies to enhance cybersecurity. Click fore more information on our presentations and kiosk location.

December, 2018

Making Mobile Access Secure and Convenient Using Derived PIV Credentials

The government workplace is already using tablets and/or smartphones to access secure data, but the existing technology available to reach this data securely can be unwieldy and somewhat outdated. In this webinar, scheduled for December 12 at 11:00 am, Intercede and the NCCoE will share how your organization can leverage derived PIV credentials to access important information securely and without it being a hassle.

December, 2018

Gartner Identity and Access Management Summit 2018

Join NCCoE staff at the Gartner Identity and Access Management Summit 2018 in Las Vegas, NV where Security Engineer Chris Brown will participate in a panel discussion "Viva Identity: Put IAM Fear and Loathing to Rest” led by Entrust Datacard on Tuesday, December 4 at 3:30 p.m.

November, 2018

FS-ISAC Fall Summit

Join NCCoE staff at the 2018 FS-ISAC Fall Summit in Chicago, IL where featured topics include Transport Layer Security (TLS) and Privileged Account Management Techniques.

November, 2018

National Cybersecurity Center of Excellence: Practical Guidance for Cybersecurity

In this presentation, Harry Perper, Chief Engineer at The MITRE Corporation and Senior Cybersecurity Engineer at National Cybersecurity Center of Excellence at NIST, will provide insight into practical guidance for cybersecurity strategy. He’ll be discussing the NIST Cybersecurity Framework (CSF), providing an overview of the NIST NCCoE, as well as a review of one of the many cybersecurity solutions published by the NCCoE: Data Integrity - Recovering from Ransomware. Be prepared to leave an expert in protecting your business, and your clients’ businesses, from malware and other vulnerabilities.

November, 2018

IWCE's Critical LTE Communications Forum 2018

The NCCoE's Bill Fisher will be speaking on a panel entitled Cybersecurity is Vital at IWCE's Critical LTE Communications Forum in Chicago on Tuesday at 2:45pm.

October, 2018

National Cybersecurity Awareness Month Webinar: Energy Sector

In support of National Cybersecurity Awareness Month, The National Cybersecurity Center of Excellence (NCCoE) invites you to join us on Wednesday, October 23, 2018 from 3-4 p.m. (ET). This webinar will provide an overview of NCCoE Energy Sector projects as well as a discussion lead by BlackRidge Technology on the Industrial Internet of Things (IIoT).

October, 2018

NIST Lunch, Learn, and Listen!

Join us at the NCCoE on October 16 at 11am for collaborative discussions with industry experts, informative presentations, and networking opportunities. Come get a quick overview of what the NCCoE does, see some live demos, hear from our experts, and enjoy lunch alongside subject matter experts from NIST. You’ll hear about the NCCoE’s work in areas such as: data integrity, IoT, identity and access management, privacy, and health IT cybersecurity topics. You will also have an opportunity to inspire discussion, learn, shape the future direction of NIST publications, and share your feedback directly with cybersecurity influencers. Students, in particular, are encouraged to attend!

October, 2018

2018 Technology Exchange

The NCCoE's Douglas Montgomery will present lessons learned from the NIST NCCoE Secure Inter-Domain Routing collaborative project at the 2018 Technology Exchange hosted by Internet2. This project is a collaboration between NIST, vendors, and network operators (both commercial and from the R&E community) to evaluate the current state of RPKI-based technologies for BGP origin validation and to develop guidance for their use in both enterprise and service provider networks.