NCCOE Engineer Harry Perper, will present "Increasing the Adoption of Standards-based Cybersecurity Technologies on Monday, March 19 from 10:35am to 11:20am at the Insider Threat 2018 Summit. Identity and access management is one of the pillars of cybersecurity that directly address the issues of insider threats. The NCCoE will discuss its identity and access management projects. The projects are based on standards based cybersecurity technologies. The goal of this presentation is to convey the concepts the center has developed to integrate available technologies to address current identity and access management challenges.
Karen Waltermire, Senior Cybersecurity Engineer at the National Institute of Standards and Technology (NIST) will be participating in a panel discussion on Demystifying Cyber Security: The Need to Leverage Industry Recognized Standards at Skytop Strategies' Cyber Risk Governance Conference.
The NCCoE’s Bill Newhouse and Jeff Finke will be presenting about cybersecurity in the hospitality industry at this year's HT-NEXT conference in San Diego.
Engage with the NCCoE and NIST at the Healthcare Information and Management Systems Society (HIMSS) Annual Conference and Exhibition to learn how we are accelerating the deployment and use of secure, standards-based technologies to enhance cybersecurity. Click fore more information on our presentations and kiosk location.
IWCE will be taking place on March 5-9 this year at the Orange County Convention Center in Orlando, Florida and the NCCoE's Bill Fisher will be participating in two panels.
This workshop at the NCCoE will discuss substantive public comments, including open issues, on a draft report about actions to address automated and distributed threats to the digital ecosystem as part of the activity directed by Executive Order 13800, “Strengthening the Cybersecurity of Federal Networks and Critical Infrastructure.”
GDPR compliance requires a holistic approach across the entire enterprise because the PII data resides across many organizational silos, including IT & Physical Access Control Systems. Attend this webinar to learn how many fortune 500s, including global customers in financial / banking / telecommunication sectors are proactively addressing GDPR compliance with a high degree of automation.
In 2017, the total cost of a data breach averaged $3.62 million. Companies who experienced a data breach have a 27.7% likelihood of a recurring material data breach over the next two years. These staggering statistics from a 2017 Ponemon Study highlights the need for a strong cybersecurity strategy going into this year. On this webinar, NCCoE Director Donna Dodson will share observations and accomplishments from 2017 NIST initiatives, NIST’s 2018 cybersecurity focus areas, such as cloud security, internet infrastructure, and industry-aligned (healthcare, financial services) cybersecurity projects, and opportunities for industry engagement.
The Industrial Internet of Things (IIoT) is one of the main technology drivers behind new applications in the Energy Industry. However, integration of different technologies, processes, business, social, and regulation realms presents complicated security, privacy & interoperability challenges which must be addressed as IIoT technologies develop. The Industrial Internet Consortium is bringing together global energy leaders to discuss requirements, gaps and opportunities for leveraging the data that is building up within and around our energy systems, and to use that data to increase production and decrease costs. The IIoT Energy Forum will highlight the Industrial Internet Consortium (IIC) and NIST’s activities in the Energy sector – shining a spotlight on smart grids, industrial analytics, security, and other emerging technologies and applications in energy.
The NCCoE's Zach Furness will participate on the panel “The Emerging Cyber Security Risk in Private Equity Investing" at the 2018 Texas Private Equity Conference in Austin, Texas on February 9 at 1:40pm. This session will examine the growing cyber security threat, strategies to identify risks, how the risks are changing, and the costs of securing corporate assets.