Connect with the NCCoE at the 2018 Federal Identity Forum and Exposition on September 25-27, 2018 in Tampa, Florida. Drop by the NIST booth (#212), or join the NCCoE’s Chris Brown on Wednesday, September 26 at 10am ET (in Ballroom CD) for a tabletop discussion and Q&A on the Derived Personal Identity Verification (PIV) Credentials project.
On Thursday, September 20, join members of NIST's NCCoE Leadership team. Georgetown University Security and Software Engineering Research Center (S2ERC) invites you to attend the State of Cyber Conference in Washington, DC. Learn about the real challenges in cybersecurity as well as how technologists and policy makers plan to tackle them. As the saying goes, it takes a village. Thus, this event brings together speakers from academia, industry, and government to create awareness of efforts to address cybersecurity risks across the ecosystem.
NIST Senior Computer Scientist Hildegard Ferraiolo will discuss "Derived credentials into a mobile identity" at this year's EID Forum. The talk takes place as part of the New Challenges for Securing Trust on Internet session on Wednesday, September 19.
NCCoE engineer Harry Perper along with project collaborator Remediant to be featured on the Risky Business podcast discussing the Privileged Account Management project. The podcast will premiere on September 18, 2018.
NIST Senior Computer Scientist Hildegard Ferraiolo will give a “TED-type talk” at the American Council for Technology and Industry Advisory Council (ACT-IAC) 2018 Identity and Access Management Forum where she will discuss NIST SP 800-63, Digital Identity Guidelines and the NCCoE’s successful proof-of-concept implementation of derived PIV credentials using COTS technology. Her talk is scheduled for Tuesday, September 11, 2018 at 9:15am EST.
With fraudulent online purchases on the rise, organizations need to protect their customers without overburdening the shopping experience. In this webinar, engineers from the National Cybersecurity Center of Excellence (NCCoE) will discuss the recently released NIST Cybersecurity Practice Guide SP 1800-17, Multifactor Authentication for E-Commerce, which demonstrates how an organization can use standards-based technologies to help prevent account takeovers and reduce online fraudulent purchases.
Join us for a new webinar on Thursday, August 30 featuring Harry Perper, Chief Engineer on the project, to learn how the National Cybersecurity Center of Excellence (NCCoE) addressed these challenges and discover the role Radiant Logic played in the resulting reference architecture. Under the auspices of the National Institute of Standards and Technology (NIST), NCCoE, worked with experts from the financial services sector and technology partners to develop an ARM reference architecture.
Join the NCCoE at the ATARC Federal Mobile Technology Summit in Washington, DC on August 30. NCCoE Engineer Bill Newhouse will participate in the Visionary Panel "Mobile Outlook for 2019" led by at 9am. At 10:45am, NCCoE Engineer Gema Howell will speak at the Visionary Keynote Briefing on NIST Mobile Standards. Later in the afternoon, NCCoE Engineer Bill Fisher will lead a collaborative session on "Innovative Methods of Mobile Authentication" at 1:45pm.
NCCoE Engineer Bill Fisher will participate in a lightning round discussion on security as part of the Office of the National Coordinator (ONC) for Health IT 2nd Interoperability Forum on Tuesday, August 7, 2018 at 3:15 pm. This event is bringing people together from ONC, federal partners, the healthcare industry, and the technology sector to learn about recent efforts to advance interoperability nationwide and identify concrete actions in response to current interoperability barriers.
The National Cybersecurity Center of Excellence (NCCoE) invites you to join us on Wednesday, June 27, 2018 from 9 a.m. - 12 p.m. for a CXO Roundtable to share your thoughts on the challenges and potential solutions around malware and industrial IoT (IIoT) for sectors that depend on ICS for their core operations. This roundtable will consist of a dozen stakeholders across industry, government, and academia to encourage highly interactive dialogues–giving each individual an opportunity to share his or her thoughts on ICS cybersecurity challenges and to showcase his or her expertise in helping solve those challenges.