NCCoE Senior Cybersecurity Engineer Harry Perper will participate in a panel session entitled "Evolving Complex Attack Surfaces" on Thursday, April 4.
Samuel Visner, Director of MITRE's National Cybersecurity Federally Funded Research Center, will speak at the session entitled "How-to: Industry and NIST Collaboration. Cybersecurity Maturity and Risk Reduction Frameworks."
Harry Perper, chief engineer of Mitre will discuss how the Cybersecurity Framework (CSF) and NCCoE how-to guidance help organizations make the changes need to improve their security.
Learn more about the NCCoE's presentation on multi-factor authentication to help protect against fraudulent online purchases at MRC Vegas 2019.
Harry Perper, Senior Cybersecurity Engineer for the National Cybersecurity Center of Excellence at NIST will discuss practical recommendations to help improve your cybersecurity.
The NCCoE will present and provide project demonstrations at the RSA Conference 2019 in San Francisco. Click for additional information. This page will be updated as presentations are confirmed.
In this two-hour webinar hosted by The Knowledge Group, NCCoE Cybersecurity Engineer Harry Perper joins a panel of experts to provide the audience with an in-depth analysis of insider threats in companies and organizations. Speakers will also present tips as well as strategic approaches when detecting and preventing threats to avoid possible risks and pitfalls.
Engage with the NCCoE and NIST at the Healthcare Information and Management Systems Society (HIMSS) Annual Conference and Exhibition to learn how we are accelerating the deployment and use of secure, standards-based technologies to enhance cybersecurity. Click fore more information on our presentations and kiosk location.
The government workplace is already using tablets and/or smartphones to access secure data, but the existing technology available to reach this data securely can be unwieldy and somewhat outdated. In this webinar, scheduled for December 12 at 11:00 am, Intercede and the NCCoE will share how your organization can leverage derived PIV credentials to access important information securely and without it being a hassle.