CINXE.COM

Updates | CSRC

<!DOCTYPE html> <html lang="en-us" xml:lang="en-us"> <head><script type="text/javascript" src="/_static/js/bundle-playback.js?v=HxkREWBo" charset="utf-8"></script> <script type="text/javascript" src="/_static/js/wombat.js?v=txqj7nKC" charset="utf-8"></script> <script>window.RufflePlayer=window.RufflePlayer||{};window.RufflePlayer.config={"autoplay":"on","unmuteOverlay":"hidden"};</script> <script type="text/javascript" src="/_static/js/ruffle/ruffle.js"></script> <script type="text/javascript"> __wm.init("https://web.archive.org/web"); __wm.wombat("https://csrc.nist.gov/events","20230128001858","https://web.archive.org/","web","/_static/", "1674865138"); </script> <link rel="stylesheet" type="text/css" href="/_static/css/banner-styles.css?v=S1zqJCYt" /> <link rel="stylesheet" type="text/css" href="/_static/css/iconochive.css?v=3PDvdIFv" /> <!-- End Wayback Rewrite JS Include --> <meta charset="utf-8"/> <title>Updates | CSRC</title> <meta http-equiv="content-type" content="text/html; charset=UTF-8"/> <meta http-equiv="content-style-type" content="text/css"/> <meta http-equiv="content-script-type" content="text/javascript"/> <meta name="viewport" content="width=device-width, initial-scale=1.0"/> <meta name="msapplication-config" content="/CSRC/Media/images/favicons/browserconfig.xml"/> <meta name="theme-color" content="#000000"/> <meta name="google-site-verification" content="xbrnrVYDgLD-Bd64xHLCt4XsPXzUhQ-4lGMj4TdUUTA"/> <meta name="description" content="Details of events from NIST's Computer Security and Applied Cybersecurity Divisions."/> <link rel="apple-touch-icon" sizes="180x180" href="/web/20230128001858im_/https://csrc.nist.gov/images/icons/apple-touch-icon.png"/> <link rel="icon" type="image/png" href="/web/20230128001858im_/https://csrc.nist.gov/images/icons/favicon-32x32.png" sizes="32x32"/> <link rel="icon" type="image/png" href="/web/20230128001858im_/https://csrc.nist.gov/images/icons/favicon-16x16.png" sizes="16x16"/> <link rel="manifest" href="/web/20230128001858/https://csrc.nist.gov/images/icons/manifest.json"/> <link rel="mask-icon" href="/web/20230128001858im_/https://csrc.nist.gov/images/icons/safari-pinned-tab.svg" color="#000000"/> <link href="/web/20230128001858im_/https://csrc.nist.gov/CSRC/Media/images/favicons/favicon.ico" type="image/x-icon" rel="shortcut icon"/> <link href="/web/20230128001858im_/https://csrc.nist.gov/CSRC/Media/images/favicons/favicon.ico" type="image/x-icon" rel="icon"/> <!-- <link href="/dist/katex/katex.min.css" rel="stylesheet"/> --> <link href="/web/20230128001858cs_/https://csrc.nist.gov/dist/app.css" rel="stylesheet"/> <!-- reCAPTCHA v3 --> <style> .grecaptcha-badge { visibility: hidden; } </style> <script async type="text/javascript" id="_fed_an_ua_tag" src="https://web.archive.org/web/20230128001858js_/https://dap.digitalgov.gov/Universal-Federated-Analytics-Min.js?agency=nist&amp;subagency=csrc&amp;pua=UA-66610693-15&amp;yt=true&amp;exts=xsd,xml,wav,mpg,mpeg,avi,rtf,webm,ogg,ogv,oga,map,otf,eot,svg,ttf,woff"></script> <style id="antiClickjack"> body > * { display: none !important; } #antiClickjack { display: block !important; } </style> <noscript> <style id="antiClickjackNoScript"> body > * { display: block !important; } #antiClickjack { display: none !important; } </style> </noscript> <script type="text/javascript" id="antiClickjackScript"> if (self === top) { // no clickjacking var antiClickjack = document.getElementById("antiClickjack"); antiClickjack.parentNode.removeChild(antiClickjack); } else { setTimeout(tryForward(), 5000); } function tryForward() { top.location = self.location; } </script> <!-- Google tag (gtag.js) --> <script async src="https://web.archive.org/web/20230128001858js_/https://www.googletagmanager.com/gtag/js?id=G-TSQ0PLGJZP"></script> <script>window.dataLayer = window.dataLayer || []; function gtag() { dataLayer.push(arguments); } gtag('js', new Date()); gtag('config', 'G-TSQ0PLGJZP');</script> </head> <body> <div id="antiClickjack" style="display: none;"> <strong style="font-size: 1.6rem;">You are viewing this page in an unauthorized frame window.</strong> <p>This is a potential security issue, you are being redirected to <a href="https://web.archive.org/web/20230128001858/https://csrc.nist.gov/">https://csrc.nist.gov</a>.</p> </div> <section class="usa-banner" aria-label="Official government website"> <div class="usa-accordion container"> <header class="usa-banner__header"> <noscript> <p style="font-size: 0.85rem; font-weight: bold;">You have JavaScript disabled. This site requires JavaScript to be enabled for complete site functionality.</p> </noscript> <img class="usa-banner__header-flag" src="/web/20230128001858im_/https://csrc.nist.gov/images/usbanner/us_flag_small.png" alt="U.S. flag"> &nbsp; <span class="usa-banner__header-text">An official website of the United States government</span> <button id="gov-banner-button" class="usa-accordion__button usa-banner__button" data-toggle="collapse" data-target="#gov-banner" aria-expanded="true" aria-controls="gov-banner"> <span class="usa-banner__button-text">Here's how you know</span> </button> </header> <div class="usa-banner__content usa-accordion__content collapse in" role="tabpanel" id="gov-banner" aria-expanded="true"> <div class="row"> <div class="col-md-5 col-sm-12"> <div class="row"> <div class="col-sm-2 col-xs-3"> <img class="usa-banner__icon usa-media-block__img" src="/web/20230128001858im_/https://csrc.nist.gov/images/usbanner/icon-dot-gov.svg" alt="Dot gov"> </div> <div class="col-sm-10 col-xs-9"> <p> <strong>Official websites use .gov</strong> <br> A <strong>.gov</strong> website belongs to an official government organization in the United States. </p> </div> </div> </div> <div class="col-md-5 col-sm-12"> <div class="row"> <div class="col-sm-2 col-xs-3"> <img class="usa-banner__icon usa-media-block__img" src="/web/20230128001858im_/https://csrc.nist.gov/images/usbanner/icon-https.svg" alt="Https"> </div> <div class="col-sm-10 col-xs-9"> <p> <strong>Secure .gov websites use HTTPS</strong> <br> A <strong>lock</strong> (<img class="usa-banner__lock" src="/web/20230128001858im_/https://csrc.nist.gov/images/usbanner/lock.svg" alt="Dot gov">) or <strong>https://</strong> means you've safely connected to the .gov website. Share sensitive information only on official, secure websites. </p> </div> </div> </div> </div> </div> </div> </section> <nav id="navbar" class="navbar"> <div id="nist-menu-container" class="container"> <div class="row"> <!-- Brand --> <div class="col-xs-6 col-md-4 navbar-header"> <a class="navbar-brand" href="https://web.archive.org/web/20230128001858/https://www.nist.gov/" target="_blank" id="navbar-brand-image"> <img src="/web/20230128001858im_/https://csrc.nist.gov/CSRC/media/images/svg/nist-logo.svg" alt="National Institute of Standards and Technology" width="110" height="30"> </a> </div> <div class="col-xs-6 col-md-8 navbar-nist-logo"> <div class="form-inline hidden-sm hidden-xs"> <form name="site-search" id="site-search-form" action="/web/20230128001858/https://csrc.nist.gov/search" method="GET"> <label for="search-csrc-query" class="element-invisible">Search</label> <input autocomplete="off" class="form-control" id="search-csrc-query" name="keywords" type="text" size="15" maxlength="128" placeholder="Search CSRC"/> <input type="hidden" name="ipp" value="25"/> <input type="hidden" name="sortBy" value="relevance"/> <input type="hidden" name="showOnly" value="publications,projects,news,events,presentations,glossary,topics"/> <input type="hidden" name="topicsMatch" value="ANY"/> <input type="hidden" name="status" value="Final,Draft"/> <input type="hidden" name="series" value="FIPS,SP,NISTIR,ITL Bulletin,White Paper,Building Block,Use Case,Journal Article,Conference Paper,Book"/> <button type="submit" id="search-csrc-submit-btn" class="form-submit"> <span class="element-invisible">Search</span> <i class="fa fa-search"></i> </button> </form> </div> <span id="nvd-menu-button" class="pull-right"> <a href="#" id="nvd-menu-button-link"> <span class="fa fa-bars"></span> <span id="nvd-menu-full-text">CSRC MENU</span> </a> </span> </div> </div> </div> <div class="form-inline hidden-md hidden-lg"> <form name="site-search-mobile" id="site-search-form-mobile" action="/web/20230128001858/https://csrc.nist.gov/search" method="GET"> <label for="search-csrc-query-mobile" class="element-invisible">Search</label> <input autocomplete="off" class="form-control" id="search-csrc-query-mobile" name="keywords" type="text" size="15" maxlength="128" placeholder="Search CSRC"/> <button type="submit" id="search-csrc-submit-btn-mobile" class="form-submit"> <span class="element-invisible">Search</span> <i class="fa fa-search"></i> </button> </form> </div> <div class="main-menu-row container"> <!-- Collect the nav links, forms, and other content for toggling --> <div id="main-menu-drop" class="col-lg-12" style="display: none;"> <ul> <li><a href="/web/20230128001858/https://csrc.nist.gov/projects">Projects</a></li> <li> <a href="/web/20230128001858/https://csrc.nist.gov/publications"> Publications <span class="expander fa fa-plus" id="main-menu-pubs-expander" data-expander-name="publications" data-expanded="false"> <span class="element-invisible">Expand or Collapse</span> </span> </a> <div style="display: none;" class="sub-menu" data-expander-trigger="publications" id="main-menu-pubs-expanded"> <div class="row"> <div class="col-lg-4"> <p><a href="/web/20230128001858/https://csrc.nist.gov/publications/drafts-open-for-comment">Drafts for Public Comment</a></p> <p><a href="/web/20230128001858/https://csrc.nist.gov/publications/draft-pubs">All Public Drafts</a></p> <p><a href="/web/20230128001858/https://csrc.nist.gov/publications/final-pubs">Final Pubs</a></p> <p><a href="/web/20230128001858/https://csrc.nist.gov/publications/fips">FIPS</a></p> </div> <div class="col-lg-4"> <p><a href="/web/20230128001858/https://csrc.nist.gov/publications/sp">Special Publications (SP<small>s</small>)</a></p> <p><a href="/web/20230128001858/https://csrc.nist.gov/publications/nistir">NISTIR<small>s</small></a></p> <p><a href="/web/20230128001858/https://csrc.nist.gov/publications/itl-bulletin">ITL Bulletins</a></p> <p><a href="/web/20230128001858/https://csrc.nist.gov/publications/white-paper">White Papers</a></p> </div> <div class="col-lg-4"> <p><a href="/web/20230128001858/https://csrc.nist.gov/publications/journal-article">Journal Articles</a></p> <p><a href="/web/20230128001858/https://csrc.nist.gov/publications/conference-paper">Conference Papers</a></p> <p><a href="/web/20230128001858/https://csrc.nist.gov/publications/book">Books</a></p> </div> </div> </div> </li> <li> <a href="/web/20230128001858/https://csrc.nist.gov/topics"> Topics <span class="expander fa fa-plus" id="main-menu-topics-expander" data-expander-name="topics" data-expanded="false"> <span class="element-invisible">Expand or Collapse</span> </span> </a> <div style="display: none;" class="sub-menu" data-expander-trigger="topics" id="main-menu-topics-expanded"> <div class="row"> <div class="col-lg-4"> <p><a href="/web/20230128001858/https://csrc.nist.gov/Topics/Security-and-Privacy">Security &amp; Privacy</a></p> <p><a href="/web/20230128001858/https://csrc.nist.gov/Topics/Applications">Applications</a></p> </div> <div class="col-lg-4"> <p><a href="/web/20230128001858/https://csrc.nist.gov/Topics/Technologies">Technologies</a></p> <p><a href="/web/20230128001858/https://csrc.nist.gov/Topics/Sectors">Sectors</a></p> </div> <div class="col-lg-4"> <p><a href="/web/20230128001858/https://csrc.nist.gov/Topics/Laws-and-Regulations">Laws &amp; Regulations</a></p> <p><a href="/web/20230128001858/https://csrc.nist.gov/Topics/Activities-and-Products">Activities &amp; Products</a></p> </div> </div> </div> </li> <li><a href="/web/20230128001858/https://csrc.nist.gov/news">News &amp; Updates</a></li> <li><a href="/web/20230128001858/https://csrc.nist.gov/events">Events</a></li> <li><a href="/web/20230128001858/https://csrc.nist.gov/glossary">Glossary</a></li> <li> <a href="/web/20230128001858/https://csrc.nist.gov/about"> About CSRC <span class="expander fa fa-plus" id="main-menu-about-expander" data-expander-name="about" data-expanded="false"> <span class="element-invisible">Expand or Collapse</span> </span> </a> <div style="display: none;" class="sub-menu" data-expander-trigger="about" id="main-menu-about-expanded"> <div class="row"> <div class="col-lg-6"> <p> <strong><a href="/web/20230128001858/https://csrc.nist.gov/Groups/Computer-Security-Division">Computer Security Division</a></strong><br/> <ul> <li><a href="/web/20230128001858/https://csrc.nist.gov/Groups/Computer-Security-Division/Cryptographic-Technology">Cryptographic Technology</a></li> <li><a href="/web/20230128001858/https://csrc.nist.gov/Groups/Computer-Security-Division/Secure-Systems-and-Applications">Secure Systems and Applications</a></li> <li><a href="/web/20230128001858/https://csrc.nist.gov/Groups/Computer-Security-Division/Security-Components-and-Mechanisms">Security Components and Mechanisms</a></li> <li><a href="/web/20230128001858/https://csrc.nist.gov/Groups/Computer-Security-Division/Security-Engineering-and-Risk-Management">Security Engineering and Risk Management</a></li> <li><a href="/web/20230128001858/https://csrc.nist.gov/Groups/Computer-Security-Division/Security-Testing-Validation-and-Measurement">Security Testing, Validation, and Measurement</a></li> </ul> </p> </div> <div class="col-lg-6"> <p> <strong><a href="/web/20230128001858/https://csrc.nist.gov/Groups/Applied-Cybersecurity-Division">Applied Cybersecurity Division</a></strong><br/> <ul> <li><a href="/web/20230128001858/https://csrc.nist.gov/Groups/Applied-Cybersecurity-Division/Cybersecurity-and-Privacy-Applications">Cybersecurity and Privacy Applications</a></li> <li><a href="/web/20230128001858/https://csrc.nist.gov/Groups/Applied-Cybersecurity-Division/National-Cybersecurity-Center-of-Excellence">National Cybersecurity Center of Excellence (NCCoE)</a></li> <li><a href="https://web.archive.org/web/20230128001858/https://www.nist.gov/nice/">National Initiative for Cybersecurity Education (NICE)</a></li> </ul> </p> <p> <a href="/web/20230128001858/https://csrc.nist.gov/contact"> Contact Us </a> </p> </div> </div> </div> </li> </ul> </div><!-- /#mobile-nav-container --> </div> </nav> <section id="itl-header" class="has-menu"> <div class="container"> <div class="row"> <div class="col-sm-12 col-md-8"> <div class="hidden-xs hidden-sm" id="itl-header-lg"> <a href="https://web.archive.org/web/20230128001858/https://www.nist.gov/itl" target="_blank" id="itl-header-link">Information Technology Laboratory</a> </div> <div class="hidden-xs hidden-sm" id="csrc-header-lg"> <a href="/web/20230128001858/https://csrc.nist.gov/" id="csrc-header-link-lg">Computer Security Resource Center</a> </div> </div> <div class="col-sm-12 col-md-4"> <div class="hidden-xs hidden-sm hidden-md"> <a id="logo-csrc-lg" href="/web/20230128001858/https://csrc.nist.gov/"><img id="img-logo-csrc-lg" src="/web/20230128001858im_/https://csrc.nist.gov/CSRC/Media/images/nist-logo-csrc-white.svg" alt="CSRC Logo" class="csrc-header-logo"></a> </div> <div class="hidden-lg"> <a id="logo-csrc-sm" href="/web/20230128001858/https://csrc.nist.gov/"><img id="img-logo-csrc-sm" src="/web/20230128001858im_/https://csrc.nist.gov/CSRC/Media/images/nist-logo-csrc-white.svg" alt="CSRC Logo" class="csrc-header-logo"></a> </div> </div> </div> </div> </section> <div id="body-section" class="container"> <div class="home-content"> <div class="row"> <div class="col-lg-3 col-md-4 hidden-sm hidden-xs hidden-xxs"> <ul class="side-nav" id="left-side-navigation"> <li><a href="/web/20230128001858/https://csrc.nist.gov/projects">Projects</a></li> <li> <a href="/web/20230128001858/https://csrc.nist.gov/publications"> Publications <span class="expander fa fa-plus" id="side-menu-pubs-expander" data-expander-name="publicationsSide" data-expanded="false" id="side-menu-pubs-expander"> <span class="element-invisible">Expand or Collapse</span> </span> </a> <div style="display: none;" class="sub-menu" data-expander-trigger="publicationsSide" id="side-menu-pubs-expanded"> <ul> <li><a href="/web/20230128001858/https://csrc.nist.gov/publications/drafts-open-for-comment">Drafts for Public Comment</a></li> <li><a href="/web/20230128001858/https://csrc.nist.gov/publications/draft-pubs">All Public Drafts</a></li> <li><a href="/web/20230128001858/https://csrc.nist.gov/publications/sp">NIST Special Publications (SPs)</a></li> <li><a href="/web/20230128001858/https://csrc.nist.gov/publications/fips">FIPS</a></li> <li><a href="/web/20230128001858/https://csrc.nist.gov/publications/nistir">NIST Internal/Interagency Reports (NISTIRs)</a></li> <li><a href="/web/20230128001858/https://csrc.nist.gov/publications/itl-bulletin">ITL Bulletins</a></li> <li><a href="/web/20230128001858/https://csrc.nist.gov/publications/white-paper">White Papers</a></li> <li><a href="/web/20230128001858/https://csrc.nist.gov/publications/journal-article">Journal Articles</a></li> <li><a href="/web/20230128001858/https://csrc.nist.gov/publications/conference-paper">Conference Papers</a></li> <li><a href="/web/20230128001858/https://csrc.nist.gov/publications/book">Books</a></li> </ul> </div> </li> <li> <a href="/web/20230128001858/https://csrc.nist.gov/topics"> Topics <span class="expander fa fa-plus" id="side-menu-topics-expander" data-expander-name="topicsSide" data-expanded="false"> <span class="element-invisible">Expand or Collapse</span> </span> </a> <div style="display: none;" class="sub-menu" data-expander-trigger="topicsSide" id="side-menu-topics-expanded"> <ul> <li><a href="/web/20230128001858/https://csrc.nist.gov/Topics/Security-and-Privacy">Security &amp; Privacy</a></li> <li><a href="/web/20230128001858/https://csrc.nist.gov/Topics/Applications">Applications</a></li> <li><a href="/web/20230128001858/https://csrc.nist.gov/Topics/Technologies">Technologies</a></li> <li><a href="/web/20230128001858/https://csrc.nist.gov/Topics/Sectors">Sectors</a></li> <li><a href="/web/20230128001858/https://csrc.nist.gov/Topics/Laws-and-Regulations">Laws &amp; Regulations</a></li> <li><a href="/web/20230128001858/https://csrc.nist.gov/Topics/Activities-and-Products">Activities &amp; Products</a></li> </ul> </div> </li> <li><a href="/web/20230128001858/https://csrc.nist.gov/news">News &amp; Updates</a></li> <li><a href="/web/20230128001858/https://csrc.nist.gov/events">Events</a></li> <li><a href="/web/20230128001858/https://csrc.nist.gov/glossary">Glossary</a></li> <li> <a href="/web/20230128001858/https://csrc.nist.gov/about"> About CSRC <span class="expander fa fa-plus" id="side-menu-about-expander" data-expander-name="aboutSide" data-expanded="false"> <span class="element-invisible">Expand or Collapse</span> </span> </a> <div style="display: none;" class="sub-menu" data-expander-trigger="aboutSide" id="side-menu-about-expanded"> <strong><a href="/web/20230128001858/https://csrc.nist.gov/Groups/Computer-Security-Division">Computer Security Division</a></strong><br/> <ul> <li><a href="/web/20230128001858/https://csrc.nist.gov/Groups/Computer-Security-Division/Cryptographic-Technology">Cryptographic Technology</a></li> <li><a href="/web/20230128001858/https://csrc.nist.gov/Groups/Computer-Security-Division/Secure-Systems-and-Applications">Secure Systems and Applications</a></li> <li><a href="/web/20230128001858/https://csrc.nist.gov/Groups/Computer-Security-Division/Security-Components-and-Mechanisms">Security Components and Mechanisms</a></li> <li><a href="/web/20230128001858/https://csrc.nist.gov/Groups/Computer-Security-Division/Security-Engineering-and-Risk-Management">Security Engineering and Risk Management</a></li> <li><a href="/web/20230128001858/https://csrc.nist.gov/Groups/Computer-Security-Division/Security-Testing-Validation-and-Measurement">Security Testing, Validation, and Measurement</a></li> </ul> <strong><a href="/web/20230128001858/https://csrc.nist.gov/Groups/Applied-Cybersecurity-Division">Applied Cybersecurity Division</a></strong><br/> <ul> <li><a href="/web/20230128001858/https://csrc.nist.gov/Groups/Applied-Cybersecurity-Division/Cybersecurity-and-Privacy-Applications">Cybersecurity and Privacy Applications</a></li> <li><a href="/web/20230128001858/https://csrc.nist.gov/Groups/Applied-Cybersecurity-Division/National-Cybersecurity-Center-of-Excellence">National Cybersecurity Center of Excellence (NCCoE)</a></li> <li><a href="https://web.archive.org/web/20230128001858/https://www.nist.gov/nice/">National Initiative for Cybersecurity Education (NICE)</a></li> </ul> <strong><a href="/web/20230128001858/https://csrc.nist.gov/contact-us">Contact Us</a></strong> </div> </li> </ul> <form action="/web/20230128001858/https://csrc.nist.gov/events" class="bs-callout bs-callout-success csrc-search-form" data-csrc-form="true" data-default-query="sortBy-lg=startdatetime+desc" data-form-ignore-default="sortBy" data-form-name="events-search-form" method="get"> <div class="form-group"> <label for="events-search-keywords">Search</label> <input name="keywords-lg" class="form-control" data-val="true" data-val-length="The field Search must be a string with a maximum length of 255." data-val-length-max="255" id="events-search-keywords" name="Form.Keywords" type="text" value=""/> <em class="text-muted">Search Title, Description, Federal Register Number</em> </div> <div class="form-group"> <label for="events-search-sort-by">Sort By</label> <div class="form-inline"> <select name="sortBy-lg" class="form-control form-control-full" id="events-search-sort-by" name="Form.SortBy"><option selected="selected" value="relevance">Relevance (best match)</option> <option value="startdatetime desc">Date (newest first)</option> <option value="startdatetime asc">Date (oldest first)</option> <option value="name asc">Title (A-Z)</option> <option value="name desc">Title (Z-A)</option> </select> </div> </div> <div class="form-group form-inline"> <label for="events-search-ipp" class="form-control-half">Items Per Page</label> <select name="ipp-lg" class="form-control" id="events-search-ipp" name="Form.ItemsPerPage"><option selected="selected" value="25">25</option> <option value="50">50</option> <option value="75">75</option> <option value="100">100</option> <option value="all">All</option> </select> </div> <div class="form-group"> <label for="events-search-date-from">Date</label> <div class="form-inline form-date-inline"> <div class="input-group date" data-date-picker="true"> <input name="dateFrom-lg" class="form-control" data-control-type="date" data-val="true" data-val-date="The field Date must be a date." data-validation="true" data-validation-compare-field="events-search-date-to" data-validation-message="From date must be less than To date" data-validation-type="less-than-date" id="events-search-date-from" name="Form.DateFrom" placeholder=" / / " type="text" value=""/> <span class="input-group-addon"> <span class="fa fa-calendar"> </span> </span> </div> <div class="input-group date" data-date-picker="true"> <input name="dateTo-lg" class="form-control" data-control-type="date" data-val="true" data-val-date="The field DateTo must be a date." id="events-search-date-to" name="Form.DateTo" placeholder=" / / " type="text" value=""/> <span class="input-group-addon"> <span class="fa fa-calendar"> </span> </span> </div> </div> </div> <div class="form-group"> <label for="events-search-topics">Topics</label> <input name="topics-lg" id="topics-lg" name="Form.Topics" type="hidden" value=""/> <div class="form-control topics-selection" id="events-search-topics" contenteditable="true" data-drop-target="events-search-topics-drop" data-field-name="topics-lg" aria-haspopup="true" aria-expanded="false"> </div> <div class="topics-selection-dropdown desktop" id="events-search-topics-drop" style="display: none;" data-topics-selector=""><div class="col-sm-4"><strong>Security and Privacy</strong><br/> <ul><li><i class="fa fa-plus fa-fw" id="topics-expander-24670-27481" data-expander-for="/topics/security-and-privacy/cryptography"></i> <a data-topic-id="27481" data-topic-text="cryptography">cryptography</a><ul style="display: none;"><li><i class="fa fa-fw"></i> <a data-topic-id="27647" data-topic-text="digital signatures">digital signatures</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27648" data-topic-text="encryption">encryption</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27649" data-topic-text="key management">key management</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27650" data-topic-text="message authentication">message authentication</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27651" data-topic-text="post-quantum cryptography">post-quantum cryptography</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27652" data-topic-text="random number generation">random number generation</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27653" data-topic-text="secure hashing">secure hashing</a></li></ul> </li><li><i class="fa fa-fw"></i> <a data-topic-id="27482" data-topic-text="cybersecurity supply chain risk management">cybersecurity supply chain risk management</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27483" data-topic-text="general security &amp; privacy">general security &amp; privacy</a></li><li><i class="fa fa-plus fa-fw" id="topics-expander-24670-27484" data-expander-for="/topics/security-and-privacy/identity-and-access-management"></i> <a data-topic-id="27484" data-topic-text="identity &amp; access management">identity &amp; access management</a><ul style="display: none;"><li><i class="fa fa-fw"></i> <a data-topic-id="27663" data-topic-text="access authorization">access authorization</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27664" data-topic-text="access control">access control</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27665" data-topic-text="authentication">authentication</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27666" data-topic-text="Personal Identity Verification">Personal Identity Verification</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27667" data-topic-text="public key infrastructure">public key infrastructure</a></li></ul> </li><li><i class="fa fa-plus fa-fw" id="topics-expander-24670-27485" data-expander-for="/topics/security-and-privacy/privacy"></i> <a data-topic-id="27485" data-topic-text="privacy">privacy</a><ul style="display: none;"><li><i class="fa fa-fw"></i> <a data-topic-id="27680" data-topic-text="personally identifiable information">personally identifiable information</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27681" data-topic-text="privacy engineering">privacy engineering</a></li></ul> </li><li><i class="fa fa-plus fa-fw" id="topics-expander-24670-27486" data-expander-for="/topics/security-and-privacy/risk-management"></i> <a data-topic-id="27486" data-topic-text="risk management">risk management</a><ul style="display: none;"><li><i class="fa fa-fw"></i> <a data-topic-id="27682" data-topic-text="categorization">categorization</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27683" data-topic-text="continuous monitoring">continuous monitoring</a></li><li><i class="fa fa-plus fa-fw" id="topics-expander-27486-27684" data-expander-for="/topics/security-and-privacy/risk-management/controls"></i> <a data-topic-id="27684" data-topic-text="controls">controls</a><ul style="display: none;"><li><i class="fa fa-fw"></i> <a data-topic-id="27767" data-topic-text="controls assessment">controls assessment</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27768" data-topic-text="privacy controls">privacy controls</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27769" data-topic-text="security controls">security controls</a></li></ul> </li><li><i class="fa fa-fw"></i> <a data-topic-id="27685" data-topic-text="risk assessment">risk assessment</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27686" data-topic-text="roots of trust">roots of trust</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27687" data-topic-text="system authorization">system authorization</a></li><li><i class="fa fa-plus fa-fw" id="topics-expander-27486-27688" data-expander-for="/topics/security-and-privacy/risk-management/threats"></i> <a data-topic-id="27688" data-topic-text="threats">threats</a><ul style="display: none;"><li><i class="fa fa-fw"></i> <a data-topic-id="27770" data-topic-text="advanced persistent threats">advanced persistent threats</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27771" data-topic-text="botnets">botnets</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27772" data-topic-text="information sharing">information sharing</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27773" data-topic-text="intrusion detection &amp; prevention">intrusion detection &amp; prevention</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27774" data-topic-text="malware">malware</a></li></ul> </li><li><i class="fa fa-fw"></i> <a data-topic-id="27689" data-topic-text="vulnerability management">vulnerability management</a></li></ul> </li><li><i class="fa fa-plus fa-fw" id="topics-expander-24670-27487" data-expander-for="/topics/security-and-privacy/security-and-behavior"></i> <a data-topic-id="27487" data-topic-text="security &amp; behavior">security &amp; behavior</a><ul style="display: none;"><li><i class="fa fa-fw"></i> <a data-topic-id="27709" data-topic-text="accessibility">accessibility</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27710" data-topic-text="behavior">behavior</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27711" data-topic-text="usability">usability</a></li></ul> </li><li><i class="fa fa-plus fa-fw" id="topics-expander-24670-27488" data-expander-for="/topics/security-and-privacy/security-measurement"></i> <a data-topic-id="27488" data-topic-text="security measurement">security measurement</a><ul style="display: none;"><li><i class="fa fa-fw"></i> <a data-topic-id="27690" data-topic-text="analytics">analytics</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27691" data-topic-text="assurance">assurance</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27692" data-topic-text="modeling">modeling</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27693" data-topic-text="testing &amp; validation">testing &amp; validation</a></li></ul> </li><li><i class="fa fa-plus fa-fw" id="topics-expander-24670-27489" data-expander-for="/topics/security-and-privacy/security-programs-and-operations"></i> <a data-topic-id="27489" data-topic-text="security programs &amp; operations">security programs &amp; operations</a><ul style="display: none;"><li><i class="fa fa-fw"></i> <a data-topic-id="27694" data-topic-text="acquisition">acquisition</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27695" data-topic-text="asset management">asset management</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27696" data-topic-text="audit &amp; accountability">audit &amp; accountability</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27697" data-topic-text="awareness training &amp; education">awareness training &amp; education</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27698" data-topic-text="configuration management">configuration management</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27699" data-topic-text="contingency planning">contingency planning</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27700" data-topic-text="incident response">incident response</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27701" data-topic-text="maintenance">maintenance</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27702" data-topic-text="media protection">media protection</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27703" data-topic-text="patch management">patch management</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27704" data-topic-text="personnel security">personnel security</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27705" data-topic-text="physical &amp; environmental protection">physical &amp; environmental protection</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27706" data-topic-text="planning">planning</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27707" data-topic-text="program management">program management</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27708" data-topic-text="security automation">security automation</a></li></ul> </li><li><i class="fa fa-plus fa-fw" id="topics-expander-24670-27490" data-expander-for="/topics/security-and-privacy/systems-security-engineering"></i> <a data-topic-id="27490" data-topic-text="systems security engineering">systems security engineering</a><ul style="display: none;"><li><i class="fa fa-plus fa-fw" id="topics-expander-27490-27713" data-expander-for="/topics/security-and-privacy/systems-security-engineering/trustworthiness"></i> <a data-topic-id="27713" data-topic-text="trustworthiness">trustworthiness</a><ul style="display: none;"><li><i class="fa fa-fw"></i> <a data-topic-id="27775" data-topic-text="reliability">reliability</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27776" data-topic-text="resilience">resilience</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27777" data-topic-text="safety">safety</a></li></ul> </li></ul> </li><li><i class="fa fa-fw"></i> <a data-topic-id="36440" data-topic-text="zero trust">zero trust</a></li></ul><strong>Technologies</strong><br/> <ul><li><i class="fa fa-fw"></i> <a data-topic-id="27491" data-topic-text="artificial intelligence">artificial intelligence</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27492" data-topic-text="big data">big data</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27493" data-topic-text="biometrics">biometrics</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27494" data-topic-text="blockchain">blockchain</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27495" data-topic-text="cloud &amp; virtualization">cloud &amp; virtualization</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27496" data-topic-text="combinatorial testing">combinatorial testing</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27497" data-topic-text="complexity">complexity</a></li><li><i class="fa fa-plus fa-fw" id="topics-expander-24671-27499" data-expander-for="/topics/technologies/hardware"></i> <a data-topic-id="27499" data-topic-text="hardware">hardware</a><ul style="display: none;"><li><i class="fa fa-fw"></i> <a data-topic-id="27714" data-topic-text="circuits">circuits</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27715" data-topic-text="personal computers">personal computers</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27716" data-topic-text="sensors">sensors</a></li></ul> </li><li><i class="fa fa-fw"></i> <a data-topic-id="27498" data-topic-text="mobile">mobile</a></li><li><i class="fa fa-plus fa-fw" id="topics-expander-24671-27500" data-expander-for="/topics/technologies/networks"></i> <a data-topic-id="27500" data-topic-text="networks">networks</a><ul style="display: none;"><li><i class="fa fa-fw"></i> <a data-topic-id="27717" data-topic-text="email">email</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27718" data-topic-text="firewalls">firewalls</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27719" data-topic-text="internet">internet</a></li></ul> </li><li><i class="fa fa-fw"></i> <a data-topic-id="27501" data-topic-text="quantum information science">quantum information science</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27502" data-topic-text="servers">servers</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27503" data-topic-text="smart cards">smart cards</a></li><li><i class="fa fa-plus fa-fw" id="topics-expander-24671-27504" data-expander-for="/topics/technologies/software-firmware"></i> <a data-topic-id="27504" data-topic-text="software &amp; firmware">software &amp; firmware</a><ul style="display: none;"><li><i class="fa fa-fw"></i> <a data-topic-id="27720" data-topic-text="BIOS">BIOS</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27721" data-topic-text="databases">databases</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27722" data-topic-text="operating systems">operating systems</a></li></ul> </li><li><i class="fa fa-fw"></i> <a data-topic-id="27505" data-topic-text="storage">storage</a></li></ul></div><div class="col-sm-4"><strong>Applications</strong><br/> <ul><li><i class="fa fa-fw"></i> <a data-topic-id="27456" data-topic-text="communications &amp; wireless">communications &amp; wireless</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27457" data-topic-text="cyber-physical systems">cyber-physical systems</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27458" data-topic-text="cybersecurity education">cybersecurity education</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27459" data-topic-text="cybersecurity framework">cybersecurity framework</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27460" data-topic-text="cybersecurity workforce">cybersecurity workforce</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27461" data-topic-text="enterprise">enterprise</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27462" data-topic-text="forensics">forensics</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27463" data-topic-text="industrial control systems">industrial control systems</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27464" data-topic-text="Internet of Things">Internet of Things</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="28914" data-topic-text="positioning navigation &amp; timing">positioning navigation &amp; timing</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27465" data-topic-text="small &amp; medium business">small &amp; medium business</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27466" data-topic-text="telework">telework</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27467" data-topic-text="voting">voting</a></li></ul><strong>Laws and Regulations</strong><br/> <ul><li><i class="fa fa-plus fa-fw" id="topics-expander-24673-27468" data-expander-for="/topics/laws-and-regulations/executive-documents"></i> <a data-topic-id="27468" data-topic-text="executive documents">executive documents</a><ul style="display: none;"><li><i class="fa fa-fw"></i> <a data-topic-id="27668" data-topic-text="Comprehensive National Cybersecurity Initiative">Comprehensive National Cybersecurity Initiative</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27669" data-topic-text="Cybersecurity Strategy and Implementation Plan">Cybersecurity Strategy and Implementation Plan</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27670" data-topic-text="Cyberspace Policy Review">Cyberspace Policy Review</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27671" data-topic-text="Executive Order 13636">Executive Order 13636</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27672" data-topic-text="Executive Order 13702">Executive Order 13702</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27673" data-topic-text="Executive Order 13718">Executive Order 13718</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27674" data-topic-text="Executive Order 13800">Executive Order 13800</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="28915" data-topic-text="Executive Order 13905">Executive Order 13905</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="36439" data-topic-text="Executive Order 14028">Executive Order 14028</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27675" data-topic-text="Federal Cybersecurity Research and Development Strategic Plan">Federal Cybersecurity Research and Development Strategic Plan</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27676" data-topic-text="Homeland Security Presidential Directive 7">Homeland Security Presidential Directive 7</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27677" data-topic-text="Homeland Security Presidential Directive 12">Homeland Security Presidential Directive 12</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27678" data-topic-text="OMB Circular A-11">OMB Circular A-11</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27679" data-topic-text="OMB Circular A-130">OMB Circular A-130</a></li></ul> </li><li><i class="fa fa-plus fa-fw" id="topics-expander-24673-27469" data-expander-for="/topics/laws-and-regulations/laws"></i> <a data-topic-id="27469" data-topic-text="laws">laws</a><ul style="display: none;"><li><i class="fa fa-fw"></i> <a data-topic-id="27654" data-topic-text="Cyber Security R&amp;D Act">Cyber Security R&D; Act</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27655" data-topic-text="Cybersecurity Enhancement Act">Cybersecurity Enhancement Act</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27656" data-topic-text="E-Government Act">E-Government Act</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27657" data-topic-text="Energy Independence and Security Act">Energy Independence and Security Act</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27658" data-topic-text="Federal Information Security Modernization Act">Federal Information Security Modernization Act</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27659" data-topic-text="First Responder Network Authority">First Responder Network Authority</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27660" data-topic-text="Health Insurance Portability and Accountability Act">Health Insurance Portability and Accountability Act</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27661" data-topic-text="Help America Vote Act">Help America Vote Act</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="36551" data-topic-text="Internet of Things Cybersecurity Improvement Act">Internet of Things Cybersecurity Improvement Act</a></li></ul> </li><li><i class="fa fa-plus fa-fw" id="topics-expander-24673-27470" data-expander-for="/topics/laws-and-regulations/regulations"></i> <a data-topic-id="27470" data-topic-text="regulations">regulations</a><ul style="display: none;"><li><i class="fa fa-fw"></i> <a data-topic-id="27662" data-topic-text="Federal Acquisition Regulation">Federal Acquisition Regulation</a></li></ul> </li></ul></div><div class="col-sm-4"><strong>Activities and Products</strong><br/> <ul><li><i class="fa fa-fw"></i> <a data-topic-id="27452" data-topic-text="annual reports">annual reports</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27453" data-topic-text="conferences &amp; workshops">conferences &amp; workshops</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27454" data-topic-text="reference materials">reference materials</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27455" data-topic-text="standards development">standards development</a></li></ul><strong>Sectors</strong><br/> <ul><li><i class="fa fa-fw"></i> <a data-topic-id="27471" data-topic-text="aerospace">aerospace</a></li><li><i class="fa fa-plus fa-fw" id="topics-expander-24675-27472" data-expander-for="/topics/sectors/energy"></i> <a data-topic-id="27472" data-topic-text="energy">energy</a><ul style="display: none;"><li><i class="fa fa-fw"></i> <a data-topic-id="27712" data-topic-text="smart grid">smart grid</a></li></ul> </li><li><i class="fa fa-fw"></i> <a data-topic-id="27473" data-topic-text="financial services">financial services</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27474" data-topic-text="healthcare">healthcare</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27475" data-topic-text="hospitality">hospitality</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27476" data-topic-text="manufacturing">manufacturing</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27477" data-topic-text="public safety">public safety</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27478" data-topic-text="retail">retail</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27479" data-topic-text="telecommunications">telecommunications</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27480" data-topic-text="transportation">transportation</a></li></ul></div></div> <div class="form-inline topics-type"> <label class="radio-label">Match ANY: <input name="topicsMatch-lg" checked="checked" id="topicsMatch-any-lg" name="Form.TopicsMatch" type="radio" value="ANY"/></label> <label class="radio-label">Match ALL: <input name="topicsMatch-lg" id="topicsMatch-all-lg" name="Form.TopicsMatch" type="radio" value="ALL"/></label> </div> </div> <div style="display: none;" data-form-error-pane="true" class="text-danger"> <strong class="text-danger">Please fix the following:</strong> <ul data-form-error-list="true"> </ul> <div class="validation-summary-valid" data-valmsg-summary="true"><ul><li style="display:none"></li> </ul></div> </div> <div class="form-group"> <button type="submit" id="events-search-submit" name="submit-btn" data-form-button="submit" class="btn">Search</button> <button type="reset" id="events-search-reset" name="reset-btn" data-form-button="reset" class="btn">Reset</button> </div> </form> </div> <div class="col-lg-9 col-md-8 col-sm-12 col-xs-12 col-xxs-12"> <h1>Events</h1> <form action="/web/20230128001858/https://csrc.nist.gov/events" class="bs-callout bs-callout-success csrc-search-form hidden-lg hidden-md mobile-form" data-csrc-form="true" data-default-query="sortBy-lg=startdatetime+desc" data-form-ignore-default="sortBy" data-form-name="events-search-form-mobile" method="get"> <div class="form-group"> <label for="events-search-keywords-sm">Search</label> <input name="keywords-sm" class="form-control" data-val="true" data-val-length="The field Search must be a string with a maximum length of 255." data-val-length-max="255" id="events-search-keywords-sm" name="Form.Keywords" type="text" value=""/> <em class="text-muted">Search Title, Description, Federal Register Number</em> </div> <div class="form-group"> <label for="sortBy-sm">Sort By</label> <div class="form-inline"> <select name="sortBy-sm" class="form-control form-control-full" id="sortBy-sm" name="Form.SortBy"><option selected="selected" value="relevance">Relevance (best match)</option> <option value="startdatetime desc">Date (newest first)</option> <option value="startdatetime asc">Date (oldest first)</option> <option value="name asc">Title (A-Z)</option> <option value="name desc">Title (Z-A)</option> </select> </div> </div> <div class="form-group form-inline"> <label for="events-search-ipp-sm" class="form-control-half">Items Per Page</label> <select name="ipp-sm" class="form-control" id="events-search-ipp-sm" name="Form.ItemsPerPage"><option selected="selected" value="25">25</option> <option value="50">50</option> <option value="75">75</option> <option value="100">100</option> <option value="all">All</option> </select> </div> <div class="form-group"> <p class="text-center"> <a href="#" data-form-show-name="eventsAdvanced" data-form-show-expanded="false"> Advanced Search <i class="fa fa-caret-down" aria-hidden="true" data-form-show-expanded="true" style="display: none;"></i> <i class="fa fa-caret-up" aria-hidden="true" data-form-show-expanded="false" style=""></i> </a> </p> </div> <div data-form-show-trigger="eventsAdvanced" data-form-show="false" style="display: none;"> <div class="form-group"> <label for="events-search-date-from-sm">Date</label> <div class="form-inline form-date-inline"> <div class="input-group date" data-date-picker="true"> <input name="dateFrom-sm" class="form-control" data-control-type="date" data-val="true" data-val-date="The field Date must be a date." data-validation="true" data-validation-compare-field="events-search-date-to-sm" data-validation-message="From date must be less than To date" data-validation-type="less-than-date" id="events-search-date-from-sm" name="Form.DateFrom" placeholder=" / / " type="text" value=""/> <span class="input-group-addon"> <span class="fa fa-calendar"> </span> </span> </div> <div class="input-group date" data-date-picker="true"> <input name="dateTo-sm" class="form-control" data-control-type="date" data-val="true" data-val-date="The field DateTo must be a date." id="events-search-date-to-sm" name="Form.DateTo" placeholder=" / / " type="text" value=""/> <span class="input-group-addon"> <span class="fa fa-calendar"> </span> </span> </div> </div> </div> <div class="form-group"> <label for="events-search-topics">Topics</label> <input name="topics-sm" id="topics-sm" name="Form.Topics" type="hidden" value=""/> <div class="form-control topics-selection" id="events-search-topics-sm" contenteditable="true" data-drop-target="events-search-topics-drop-sm" data-field-name="topics-sm" aria-haspopup="true" aria-expanded="false"> </div> <div class="topics-selection-dropdown desktop" id="events-search-topics-drop-sm" style="display: none;" data-topics-selector=""><div class="col-sm-4"><strong>Security and Privacy</strong><br/> <ul><li><i class="fa fa-plus fa-fw" id="topics-expander-24670-27481" data-expander-for="/topics/security-and-privacy/cryptography"></i> <a data-topic-id="27481" data-topic-text="cryptography">cryptography</a><ul style="display: none;"><li><i class="fa fa-fw"></i> <a data-topic-id="27647" data-topic-text="digital signatures">digital signatures</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27648" data-topic-text="encryption">encryption</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27649" data-topic-text="key management">key management</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27650" data-topic-text="message authentication">message authentication</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27651" data-topic-text="post-quantum cryptography">post-quantum cryptography</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27652" data-topic-text="random number generation">random number generation</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27653" data-topic-text="secure hashing">secure hashing</a></li></ul> </li><li><i class="fa fa-fw"></i> <a data-topic-id="27482" data-topic-text="cybersecurity supply chain risk management">cybersecurity supply chain risk management</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27483" data-topic-text="general security &amp; privacy">general security &amp; privacy</a></li><li><i class="fa fa-plus fa-fw" id="topics-expander-24670-27484" data-expander-for="/topics/security-and-privacy/identity-and-access-management"></i> <a data-topic-id="27484" data-topic-text="identity &amp; access management">identity &amp; access management</a><ul style="display: none;"><li><i class="fa fa-fw"></i> <a data-topic-id="27663" data-topic-text="access authorization">access authorization</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27664" data-topic-text="access control">access control</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27665" data-topic-text="authentication">authentication</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27666" data-topic-text="Personal Identity Verification">Personal Identity Verification</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27667" data-topic-text="public key infrastructure">public key infrastructure</a></li></ul> </li><li><i class="fa fa-plus fa-fw" id="topics-expander-24670-27485" data-expander-for="/topics/security-and-privacy/privacy"></i> <a data-topic-id="27485" data-topic-text="privacy">privacy</a><ul style="display: none;"><li><i class="fa fa-fw"></i> <a data-topic-id="27680" data-topic-text="personally identifiable information">personally identifiable information</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27681" data-topic-text="privacy engineering">privacy engineering</a></li></ul> </li><li><i class="fa fa-plus fa-fw" id="topics-expander-24670-27486" data-expander-for="/topics/security-and-privacy/risk-management"></i> <a data-topic-id="27486" data-topic-text="risk management">risk management</a><ul style="display: none;"><li><i class="fa fa-fw"></i> <a data-topic-id="27682" data-topic-text="categorization">categorization</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27683" data-topic-text="continuous monitoring">continuous monitoring</a></li><li><i class="fa fa-plus fa-fw" id="topics-expander-27486-27684" data-expander-for="/topics/security-and-privacy/risk-management/controls"></i> <a data-topic-id="27684" data-topic-text="controls">controls</a><ul style="display: none;"><li><i class="fa fa-fw"></i> <a data-topic-id="27767" data-topic-text="controls assessment">controls assessment</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27768" data-topic-text="privacy controls">privacy controls</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27769" data-topic-text="security controls">security controls</a></li></ul> </li><li><i class="fa fa-fw"></i> <a data-topic-id="27685" data-topic-text="risk assessment">risk assessment</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27686" data-topic-text="roots of trust">roots of trust</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27687" data-topic-text="system authorization">system authorization</a></li><li><i class="fa fa-plus fa-fw" id="topics-expander-27486-27688" data-expander-for="/topics/security-and-privacy/risk-management/threats"></i> <a data-topic-id="27688" data-topic-text="threats">threats</a><ul style="display: none;"><li><i class="fa fa-fw"></i> <a data-topic-id="27770" data-topic-text="advanced persistent threats">advanced persistent threats</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27771" data-topic-text="botnets">botnets</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27772" data-topic-text="information sharing">information sharing</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27773" data-topic-text="intrusion detection &amp; prevention">intrusion detection &amp; prevention</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27774" data-topic-text="malware">malware</a></li></ul> </li><li><i class="fa fa-fw"></i> <a data-topic-id="27689" data-topic-text="vulnerability management">vulnerability management</a></li></ul> </li><li><i class="fa fa-plus fa-fw" id="topics-expander-24670-27487" data-expander-for="/topics/security-and-privacy/security-and-behavior"></i> <a data-topic-id="27487" data-topic-text="security &amp; behavior">security &amp; behavior</a><ul style="display: none;"><li><i class="fa fa-fw"></i> <a data-topic-id="27709" data-topic-text="accessibility">accessibility</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27710" data-topic-text="behavior">behavior</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27711" data-topic-text="usability">usability</a></li></ul> </li><li><i class="fa fa-plus fa-fw" id="topics-expander-24670-27488" data-expander-for="/topics/security-and-privacy/security-measurement"></i> <a data-topic-id="27488" data-topic-text="security measurement">security measurement</a><ul style="display: none;"><li><i class="fa fa-fw"></i> <a data-topic-id="27690" data-topic-text="analytics">analytics</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27691" data-topic-text="assurance">assurance</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27692" data-topic-text="modeling">modeling</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27693" data-topic-text="testing &amp; validation">testing &amp; validation</a></li></ul> </li><li><i class="fa fa-plus fa-fw" id="topics-expander-24670-27489" data-expander-for="/topics/security-and-privacy/security-programs-and-operations"></i> <a data-topic-id="27489" data-topic-text="security programs &amp; operations">security programs &amp; operations</a><ul style="display: none;"><li><i class="fa fa-fw"></i> <a data-topic-id="27694" data-topic-text="acquisition">acquisition</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27695" data-topic-text="asset management">asset management</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27696" data-topic-text="audit &amp; accountability">audit &amp; accountability</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27697" data-topic-text="awareness training &amp; education">awareness training &amp; education</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27698" data-topic-text="configuration management">configuration management</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27699" data-topic-text="contingency planning">contingency planning</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27700" data-topic-text="incident response">incident response</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27701" data-topic-text="maintenance">maintenance</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27702" data-topic-text="media protection">media protection</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27703" data-topic-text="patch management">patch management</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27704" data-topic-text="personnel security">personnel security</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27705" data-topic-text="physical &amp; environmental protection">physical &amp; environmental protection</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27706" data-topic-text="planning">planning</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27707" data-topic-text="program management">program management</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27708" data-topic-text="security automation">security automation</a></li></ul> </li><li><i class="fa fa-plus fa-fw" id="topics-expander-24670-27490" data-expander-for="/topics/security-and-privacy/systems-security-engineering"></i> <a data-topic-id="27490" data-topic-text="systems security engineering">systems security engineering</a><ul style="display: none;"><li><i class="fa fa-plus fa-fw" id="topics-expander-27490-27713" data-expander-for="/topics/security-and-privacy/systems-security-engineering/trustworthiness"></i> <a data-topic-id="27713" data-topic-text="trustworthiness">trustworthiness</a><ul style="display: none;"><li><i class="fa fa-fw"></i> <a data-topic-id="27775" data-topic-text="reliability">reliability</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27776" data-topic-text="resilience">resilience</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27777" data-topic-text="safety">safety</a></li></ul> </li></ul> </li><li><i class="fa fa-fw"></i> <a data-topic-id="36440" data-topic-text="zero trust">zero trust</a></li></ul><strong>Technologies</strong><br/> <ul><li><i class="fa fa-fw"></i> <a data-topic-id="27491" data-topic-text="artificial intelligence">artificial intelligence</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27492" data-topic-text="big data">big data</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27493" data-topic-text="biometrics">biometrics</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27494" data-topic-text="blockchain">blockchain</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27495" data-topic-text="cloud &amp; virtualization">cloud &amp; virtualization</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27496" data-topic-text="combinatorial testing">combinatorial testing</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27497" data-topic-text="complexity">complexity</a></li><li><i class="fa fa-plus fa-fw" id="topics-expander-24671-27499" data-expander-for="/topics/technologies/hardware"></i> <a data-topic-id="27499" data-topic-text="hardware">hardware</a><ul style="display: none;"><li><i class="fa fa-fw"></i> <a data-topic-id="27714" data-topic-text="circuits">circuits</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27715" data-topic-text="personal computers">personal computers</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27716" data-topic-text="sensors">sensors</a></li></ul> </li><li><i class="fa fa-fw"></i> <a data-topic-id="27498" data-topic-text="mobile">mobile</a></li><li><i class="fa fa-plus fa-fw" id="topics-expander-24671-27500" data-expander-for="/topics/technologies/networks"></i> <a data-topic-id="27500" data-topic-text="networks">networks</a><ul style="display: none;"><li><i class="fa fa-fw"></i> <a data-topic-id="27717" data-topic-text="email">email</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27718" data-topic-text="firewalls">firewalls</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27719" data-topic-text="internet">internet</a></li></ul> </li><li><i class="fa fa-fw"></i> <a data-topic-id="27501" data-topic-text="quantum information science">quantum information science</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27502" data-topic-text="servers">servers</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27503" data-topic-text="smart cards">smart cards</a></li><li><i class="fa fa-plus fa-fw" id="topics-expander-24671-27504" data-expander-for="/topics/technologies/software-firmware"></i> <a data-topic-id="27504" data-topic-text="software &amp; firmware">software &amp; firmware</a><ul style="display: none;"><li><i class="fa fa-fw"></i> <a data-topic-id="27720" data-topic-text="BIOS">BIOS</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27721" data-topic-text="databases">databases</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27722" data-topic-text="operating systems">operating systems</a></li></ul> </li><li><i class="fa fa-fw"></i> <a data-topic-id="27505" data-topic-text="storage">storage</a></li></ul></div><div class="col-sm-4"><strong>Applications</strong><br/> <ul><li><i class="fa fa-fw"></i> <a data-topic-id="27456" data-topic-text="communications &amp; wireless">communications &amp; wireless</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27457" data-topic-text="cyber-physical systems">cyber-physical systems</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27458" data-topic-text="cybersecurity education">cybersecurity education</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27459" data-topic-text="cybersecurity framework">cybersecurity framework</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27460" data-topic-text="cybersecurity workforce">cybersecurity workforce</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27461" data-topic-text="enterprise">enterprise</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27462" data-topic-text="forensics">forensics</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27463" data-topic-text="industrial control systems">industrial control systems</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27464" data-topic-text="Internet of Things">Internet of Things</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="28914" data-topic-text="positioning navigation &amp; timing">positioning navigation &amp; timing</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27465" data-topic-text="small &amp; medium business">small &amp; medium business</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27466" data-topic-text="telework">telework</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27467" data-topic-text="voting">voting</a></li></ul><strong>Laws and Regulations</strong><br/> <ul><li><i class="fa fa-plus fa-fw" id="topics-expander-24673-27468" data-expander-for="/topics/laws-and-regulations/executive-documents"></i> <a data-topic-id="27468" data-topic-text="executive documents">executive documents</a><ul style="display: none;"><li><i class="fa fa-fw"></i> <a data-topic-id="27668" data-topic-text="Comprehensive National Cybersecurity Initiative">Comprehensive National Cybersecurity Initiative</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27669" data-topic-text="Cybersecurity Strategy and Implementation Plan">Cybersecurity Strategy and Implementation Plan</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27670" data-topic-text="Cyberspace Policy Review">Cyberspace Policy Review</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27671" data-topic-text="Executive Order 13636">Executive Order 13636</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27672" data-topic-text="Executive Order 13702">Executive Order 13702</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27673" data-topic-text="Executive Order 13718">Executive Order 13718</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27674" data-topic-text="Executive Order 13800">Executive Order 13800</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="28915" data-topic-text="Executive Order 13905">Executive Order 13905</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="36439" data-topic-text="Executive Order 14028">Executive Order 14028</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27675" data-topic-text="Federal Cybersecurity Research and Development Strategic Plan">Federal Cybersecurity Research and Development Strategic Plan</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27676" data-topic-text="Homeland Security Presidential Directive 7">Homeland Security Presidential Directive 7</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27677" data-topic-text="Homeland Security Presidential Directive 12">Homeland Security Presidential Directive 12</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27678" data-topic-text="OMB Circular A-11">OMB Circular A-11</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27679" data-topic-text="OMB Circular A-130">OMB Circular A-130</a></li></ul> </li><li><i class="fa fa-plus fa-fw" id="topics-expander-24673-27469" data-expander-for="/topics/laws-and-regulations/laws"></i> <a data-topic-id="27469" data-topic-text="laws">laws</a><ul style="display: none;"><li><i class="fa fa-fw"></i> <a data-topic-id="27654" data-topic-text="Cyber Security R&amp;D Act">Cyber Security R&D; Act</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27655" data-topic-text="Cybersecurity Enhancement Act">Cybersecurity Enhancement Act</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27656" data-topic-text="E-Government Act">E-Government Act</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27657" data-topic-text="Energy Independence and Security Act">Energy Independence and Security Act</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27658" data-topic-text="Federal Information Security Modernization Act">Federal Information Security Modernization Act</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27659" data-topic-text="First Responder Network Authority">First Responder Network Authority</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27660" data-topic-text="Health Insurance Portability and Accountability Act">Health Insurance Portability and Accountability Act</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27661" data-topic-text="Help America Vote Act">Help America Vote Act</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="36551" data-topic-text="Internet of Things Cybersecurity Improvement Act">Internet of Things Cybersecurity Improvement Act</a></li></ul> </li><li><i class="fa fa-plus fa-fw" id="topics-expander-24673-27470" data-expander-for="/topics/laws-and-regulations/regulations"></i> <a data-topic-id="27470" data-topic-text="regulations">regulations</a><ul style="display: none;"><li><i class="fa fa-fw"></i> <a data-topic-id="27662" data-topic-text="Federal Acquisition Regulation">Federal Acquisition Regulation</a></li></ul> </li></ul></div><div class="col-sm-4"><strong>Activities and Products</strong><br/> <ul><li><i class="fa fa-fw"></i> <a data-topic-id="27452" data-topic-text="annual reports">annual reports</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27453" data-topic-text="conferences &amp; workshops">conferences &amp; workshops</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27454" data-topic-text="reference materials">reference materials</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27455" data-topic-text="standards development">standards development</a></li></ul><strong>Sectors</strong><br/> <ul><li><i class="fa fa-fw"></i> <a data-topic-id="27471" data-topic-text="aerospace">aerospace</a></li><li><i class="fa fa-plus fa-fw" id="topics-expander-24675-27472" data-expander-for="/topics/sectors/energy"></i> <a data-topic-id="27472" data-topic-text="energy">energy</a><ul style="display: none;"><li><i class="fa fa-fw"></i> <a data-topic-id="27712" data-topic-text="smart grid">smart grid</a></li></ul> </li><li><i class="fa fa-fw"></i> <a data-topic-id="27473" data-topic-text="financial services">financial services</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27474" data-topic-text="healthcare">healthcare</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27475" data-topic-text="hospitality">hospitality</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27476" data-topic-text="manufacturing">manufacturing</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27477" data-topic-text="public safety">public safety</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27478" data-topic-text="retail">retail</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27479" data-topic-text="telecommunications">telecommunications</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27480" data-topic-text="transportation">transportation</a></li></ul></div></div> <div class="form-inline topics-type"> <label class="radio-label">Match ANY: <input name="topicsMatch-sm" checked="checked" id="topicsMatch-any-sm" name="Form.TopicsMatch" type="radio" value="ANY"/></label> <label class="radio-label">Match ALL: <input name="topicsMatch-sm" id="topicsMatch-all-sm" name="Form.TopicsMatch" type="radio" value="ALL"/></label> </div> </div> </div> <div style="display: none;" data-form-error-pane="true" class="text-danger"> <strong class="text-danger">Please fix the following:</strong> <ul data-form-error-list="true"> </ul> <div class="validation-summary-valid" data-valmsg-summary="true"><ul><li style="display:none"></li> </ul></div> </div> <div class="form-group"> <button type="submit" id="events-search-submit-sm" name="submit-btn" data-form-button="submit" class="btn">Search</button> <button type="reset" id="events-search-reset-sm" name="reset-btn" data-form-button="reset" class="btn">Reset</button> </div> </form> <div class="event-list" id="upcoming-events-list" data-total-records="6" data-page="1" data-first-record="1" data-last-record="6" data-ipp="25"> <h3><i class="fa fa-calendar-o"></i> Upcoming Events</h3> <div class="event-list-item" id="upcoming-event-item-1" data-starts="02/01/2023" data-ends="02/01/2023"> <div class="row"> <div class="col-sm-12 event-list-title"> <strong><a href="/web/20230128001858/https://csrc.nist.gov/Events/2023/piv-derived-credentials-and-federation-workshop" id="fe-name-link-1">Derived PIV Credentials and PIV Federation Workshop</a></strong> </div> </div> <div class="row"> <div class="col-sm-4"> <small> <strong> <span id="fe-starts-1">February 1, 2023</span> </strong> </small> </div> <div class="col-sm-8"> <span class="text-center"> <small> </small> </span> </div> </div> <div class="row"> <div class="col-sm-12" id="fe-description-1"> A virtual workshop on February 1, 2023 will introduce the initial public drafts of two NIST Special Publications (SPs): NIST SP 800-157r1 (Revision 1), Guidelines for Derived Personal Identity Verification (PIV)... </div> </div> </div> <div class="event-list-item" id="upcoming-event-item-2" data-starts="02/07/2023" data-ends="02/07/2023"> <div class="row"> <div class="col-sm-12 event-list-title"> <strong><a href="/web/20230128001858/https://csrc.nist.gov/Events/2023/automotive-cybersecurity-community-of-interest-coi" id="fe-name-link-2">Automotive Cybersecurity Community of Interest (COI) Webinar</a></strong> </div> </div> <div class="row"> <div class="col-sm-4"> <small> <strong> <span id="fe-starts-2">February 7, 2023</span> </strong> </small> </div> <div class="col-sm-8"> <span class="text-center"> <small> </small> </span> </div> </div> <div class="row"> <div class="col-sm-12" id="fe-description-2"> The automotive industry is facing significant challenges from increased cybersecurity risk and adoption of AI and opportunities from rapid technological innovations. To provide assistance to the industry, NIST has started a... </div> </div> </div> <div class="event-list-item" id="upcoming-event-item-3" data-starts="02/09/2023" data-ends="02/09/2023"> <div class="row"> <div class="col-sm-12 event-list-title"> <strong><a href="/web/20230128001858/https://csrc.nist.gov/Events/2023/stppa5" id="fe-name-link-3">STPPA (series of talks) Event #5</a></strong> </div> </div> <div class="row"> <div class="col-sm-4"> <small> <strong> <span id="fe-starts-3">February 9, 2023</span> </strong> </small> </div> <div class="col-sm-8"> <span class="text-center"> <small> </small> </span> </div> </div> <div class="row"> <div class="col-sm-12" id="fe-description-3"> Featured topics: identity-based encryption (IBE), attribute-based encryption (ABE) and broadcast encryption Structure: welcome; 3 invited talks; panel conversation. Date and time: February 9th (Thursday), 2023, 12:00–15:50... </div> </div> </div> <div class="event-list-item" id="upcoming-event-item-4" data-starts="02/28/2023" data-ends="02/28/2023"> <div class="row"> <div class="col-sm-12 event-list-title"> <strong><a href="/web/20230128001858/https://csrc.nist.gov/Events/2023/forum-meeting-february-2023" id="fe-name-link-4">Forum Meeting - February 2023</a></strong> </div> </div> <div class="row"> <div class="col-sm-4"> <small> <strong> <span id="fe-starts-4">February 28, 2023</span> </strong> </small> </div> <div class="col-sm-8"> <span class="text-center"> <small> </small> </span> </div> </div> <div class="row"> <div class="col-sm-12" id="fe-description-4"> The Federal Cybersecurity and Privacy Professionals Forum is an informal group sponsored by the National Institute of Standards and Technology (NIST) to promote the sharing of system security and privacy information among... </div> </div> </div> <div class="event-list-item" id="upcoming-event-item-5" data-starts="03/01/2023" data-ends="03/02/2023"> <div class="row"> <div class="col-sm-12 event-list-title"> <strong><a href="/web/20230128001858/https://csrc.nist.gov/Events/2023/ispab-march-2023-meeting" id="fe-name-link-5">ISPAB March 2023 Meeting</a></strong> </div> </div> <div class="row"> <div class="col-sm-4"> <small> <strong> <span id="fe-starts-5">March 1, 2023</span> - <span id="fe-ends-5">March 2, 2023</span> </strong> </small> </div> <div class="col-sm-8"> <span class="text-center"> <small> </small> </span> </div> </div> <div class="row"> <div class="col-sm-12" id="fe-description-5"> The Information Security and Privacy Advisory Board (ISPAB) is authorized by 15 U.S.C. 278g-4, as amended, and advises the National Institute of Standards and Technology (NIST), the Secretary of Homeland Security (DHS), and... </div> </div> </div> <div class="event-list-item" id="upcoming-event-item-6" data-starts="05/30/2023" data-ends="06/01/2023"> <div class="row"> <div class="col-sm-12 event-list-title"> <strong><a href="/web/20230128001858/https://csrc.nist.gov/Events/2023/random-bit-generation-workshop-2023" id="fe-name-link-6">Random Bit Generation Workshop 2023</a></strong> </div> </div> <div class="row"> <div class="col-sm-4"> <small> <strong> <span id="fe-starts-6">May 30, 2023</span> - <span id="fe-ends-6">June 1, 2023</span> </strong> </small> </div> <div class="col-sm-8"> <span class="text-center"> <small> </small> </span> </div> </div> <div class="row"> <div class="col-sm-12" id="fe-description-6"> NIST will be hosting a virtual workshop on Random Bit Generation (RBG) as specified in the SP 800-90 series of publications: SP 800-90A (Deterministic Random Bit Generator Mechanisms), SP 800-90B (Entropy Sources), and SP... </div> </div> </div> </div> <div class="event-list" id="past-events-list" data-total-records="294" data-page="1" data-first-record="1" data-last-record="25" data-ipp="25"> <h3><i class="fa fa-calendar-o"></i> Past Events</h3> <div class="event-list-item" id="past-event-item-1" data-starts="12/06/2022" data-ends="12/06/2022"> <div class="row"> <div class="col-sm-12 event-list-title"> <strong><a href="/web/20230128001858/https://csrc.nist.gov/Events/2022/federal-cybersecurity-privacy-professionals-forum" id="pe-name-link-1">Federal Cybersecurity &amp; Privacy Professionals Forum Meeting - December 2022</a></strong> </div> </div> <div class="row"> <div class="col-sm-4"> <small> <strong> <span id="pe-starts-1">December 6, 2022</span> </strong> </small> </div> <div class="col-sm-8"> <span class="text-center"> <small> </small> </span> </div> </div> <div class="row"> <div class="col-sm-12" id="pe-description-1"> The Federal Cybersecurity and Privacy Professionals Forum is an informal group sponsored by the National Institute of Standards and Technology (NIST) to promote the sharing of system security and privacy information among... </div> </div> </div> <div class="event-list-item" id="past-event-item-2" data-starts="11/29/2022" data-ends="12/01/2022"> <div class="row"> <div class="col-sm-12 event-list-title"> <strong><a href="/web/20230128001858/https://csrc.nist.gov/Events/2022/fourth-pqc-standardization-conference" id="pe-name-link-2">Fourth PQC Standardization Conference</a></strong> </div> </div> <div class="row"> <div class="col-sm-4"> <small> <strong> <span id="pe-starts-2">November 29, 2022</span> - <span id="pe-ends-2">December 1, 2022</span> </strong> </small> </div> <div class="col-sm-8"> <span class="text-center"> <small> </small> </span> </div> </div> <div class="row"> <div class="col-sm-12" id="pe-description-2"> At this conference, we will discuss various aspects of the candidate algorithms and obtain valuable feedback for informing decisions on standardization. NIST will invite the submission teams for both the selected algorithms,... </div> </div> </div> <div class="event-list-item" id="past-event-item-3" data-starts="11/21/2022" data-ends="11/21/2022"> <div class="row"> <div class="col-sm-12 event-list-title"> <strong><a href="/web/20230128001858/https://csrc.nist.gov/Events/2022/stppa4" id="pe-name-link-3">STPPA (series of talks) Event #4</a></strong> </div> </div> <div class="row"> <div class="col-sm-4"> <small> <strong> <span id="pe-starts-3">November 21, 2022</span> </strong> </small> </div> <div class="col-sm-8"> <span class="text-center"> <small> </small> </span> </div> </div> <div class="row"> <div class="col-sm-12" id="pe-description-3"> Featured topics: anonymous credentials, blind signatures, private authentication. Structure: welcome; three invited talks; panel conversation. Date and time: November 21st, 2022, 09:00–12:30 EST [Note: it was postponed to... </div> </div> </div> <div class="event-list-item" id="past-event-item-4" data-starts="10/26/2022" data-ends="10/27/2022"> <div class="row"> <div class="col-sm-12 event-list-title"> <strong><a href="/web/20230128001858/https://csrc.nist.gov/Events/2022/ispab-october-2022-meeting" id="pe-name-link-4">ISPAB October 2022 Meeting</a></strong> </div> </div> <div class="row"> <div class="col-sm-4"> <small> <strong> <span id="pe-starts-4">October 26, 2022</span> - <span id="pe-ends-4">October 27, 2022</span> </strong> </small> </div> <div class="col-sm-8"> <span class="text-center"> <small> </small> </span> </div> </div> <div class="row"> <div class="col-sm-12" id="pe-description-4"> The Information Security and Privacy Advisory Board (ISPAB) is authorized by 15 U.S.C. 278g-4, as amended, and advises the National Institute of Standards and Technology (NIST), the Secretary of Homeland Security (DHS), and... </div> </div> </div> <div class="event-list-item" id="past-event-item-5" data-starts="09/01/2022" data-ends="09/01/2022"> <div class="row"> <div class="col-sm-12 event-list-title"> <strong><a href="/web/20230128001858/https://csrc.nist.gov/Events/2022/forum-meeting-september-01-2022" id="pe-name-link-5">Forum Meeting - September 01, 2022</a></strong> </div> </div> <div class="row"> <div class="col-sm-4"> <small> <strong> <span id="pe-starts-5">September 1, 2022</span> </strong> </small> </div> <div class="col-sm-8"> <span class="text-center"> <small> </small> </span> </div> </div> <div class="row"> <div class="col-sm-12" id="pe-description-5"> Presentations &amp; Speakers at a Glance: Update on NIST SP 800-63, David Temoshok, NIST VA's Cyber NexGen Developmental Program, Clarence Williams and Sharon McPherson, Department of Veterans Affairs Facilitated... </div> </div> </div> <div class="event-list-item" id="past-event-item-6" data-starts="07/13/2022" data-ends="07/14/2022"> <div class="row"> <div class="col-sm-12 event-list-title"> <strong><a href="/web/20230128001858/https://csrc.nist.gov/Events/2022/ispab-july-2022-meeting" id="pe-name-link-6">ISPAB July 2022 Meeting</a></strong> </div> </div> <div class="row"> <div class="col-sm-4"> <small> <strong> <span id="pe-starts-6">July 13, 2022</span> - <span id="pe-ends-6">July 14, 2022</span> </strong> </small> </div> <div class="col-sm-8"> <span class="text-center"> <small> </small> </span> </div> </div> <div class="row"> <div class="col-sm-12" id="pe-description-6"> The Information Security and Privacy Advisory Board (ISPAB) is authorized by 15 U.S.C. 278g-4, as amended, and advises the National Institute of Standards and Technology (NIST), the Secretary of Homeland Security (DHS), and... </div> </div> </div> <div class="event-list-item" id="past-event-item-7" data-starts="05/17/2022" data-ends="05/17/2022"> <div class="row"> <div class="col-sm-12 event-list-title"> <strong><a href="/web/20230128001858/https://csrc.nist.gov/Events/2022/nist-iot-morning-coffee-session-for-forum-members" id="pe-name-link-7">NIST IoT Morning Coffee Session for Forum Members</a></strong> </div> </div> <div class="row"> <div class="col-sm-4"> <small> <strong> <span id="pe-starts-7">May 17, 2022</span> </strong> </small> </div> <div class="col-sm-8"> <span class="text-center"> <small> </small> </span> </div> </div> <div class="row"> <div class="col-sm-12" id="pe-description-7"> The Federal Cybersecurity and Privacy Professionals Forum (formerly the Federal Computer Security Program Managers Forum) is an informal group sponsored by the National Institute of Standards and Technology (NIST) to... </div> </div> </div> <div class="event-list-item" id="past-event-item-8" data-starts="05/09/2022" data-ends="05/11/2022"> <div class="row"> <div class="col-sm-12 event-list-title"> <strong><a href="/web/20230128001858/https://csrc.nist.gov/Events/2022/lightweight-cryptography-workshop-2022" id="pe-name-link-8">Lightweight Cryptography Workshop 2022</a></strong> </div> </div> <div class="row"> <div class="col-sm-4"> <small> <strong> <span id="pe-starts-8">May 9, 2022</span> - <span id="pe-ends-8">May 11, 2022</span> </strong> </small> </div> <div class="col-sm-8"> <span class="text-center"> <small> </small> </span> </div> </div> <div class="row"> <div class="col-sm-12" id="pe-description-8"> NIST hosted the fifth Lightweight Cryptography Workshop (virtual) on May 9-11, 2022, to discuss various aspects of the finalists and to obtain valuable feedback for the standardization of lightweight cryptographic primitives.... </div> </div> </div> <div class="event-list-item" id="past-event-item-9" data-starts="03/24/2022" data-ends="03/24/2022"> <div class="row"> <div class="col-sm-12 event-list-title"> <strong><a href="/web/20230128001858/https://csrc.nist.gov/Events/2022/rfi-feedback-session" id="pe-name-link-9">RFI Feedback Session</a></strong> </div> </div> <div class="row"> <div class="col-sm-4"> <small> <strong> <span id="pe-starts-9">March 24, 2022</span> </strong> </small> </div> <div class="col-sm-8"> <span class="text-center"> <small> </small> </span> </div> </div> <div class="row"> <div class="col-sm-12" id="pe-description-9"> NIST recently issued a Request for Information (RFI) asking for information that would improve the effectiveness of the Cybersecurity Framework (CSF) for a potential update.  As a part of this initiative, NIST wants to... </div> </div> </div> <div class="event-list-item" id="past-event-item-10" data-starts="03/09/2022" data-ends="03/10/2022"> <div class="row"> <div class="col-sm-12 event-list-title"> <strong><a href="/web/20230128001858/https://csrc.nist.gov/Events/2022/ispab-march-2022-meeting" id="pe-name-link-10">ISPAB March 2022 Meeting</a></strong> </div> </div> <div class="row"> <div class="col-sm-4"> <small> <strong> <span id="pe-starts-10">March 9, 2022</span> - <span id="pe-ends-10">March 10, 2022</span> </strong> </small> </div> <div class="col-sm-8"> <span class="text-center"> <small> </small> </span> </div> </div> <div class="row"> <div class="col-sm-12" id="pe-description-10"> The Information Security and Privacy Advisory Board (ISPAB) is authorized by 15 U.S.C. 278g-4, as amended, and advises the National Institute of Standards and Technology (NIST), the Secretary of Homeland Security (DHS), and... </div> </div> </div> <div class="event-list-item" id="past-event-item-11" data-starts="03/01/2022" data-ends="03/02/2022"> <div class="row"> <div class="col-sm-12 event-list-title"> <strong><a href="/web/20230128001858/https://csrc.nist.gov/Events/2022/3rd-oscal-workshop" id="pe-name-link-11">3rd OSCAL Workshop</a></strong> </div> </div> <div class="row"> <div class="col-sm-4"> <small> <strong> <span id="pe-starts-11">March 1, 2022</span> - <span id="pe-ends-11">March 2, 2022</span> </strong> </small> </div> <div class="col-sm-8"> <span class="text-center"> <small> </small> </span> </div> </div> <div class="row"> <div class="col-sm-12" id="pe-description-11"> The National Institute of Standards and Technology hosted on Tuesday, March 1st, and Wednesday, March 2nd, 2022, the third workshop in the series focusing on the Open Security Controls Assessment Language (OSCAL). Setting... </div> </div> </div> <div class="event-list-item" id="past-event-item-12" data-starts="02/15/2022" data-ends="02/15/2022"> <div class="row"> <div class="col-sm-12 event-list-title"> <strong><a href="/web/20230128001858/https://csrc.nist.gov/Events/2022/the-forum-meeting-february-15-2022" id="pe-name-link-12">Forum Meeting - February 15, 2022</a></strong> </div> </div> <div class="row"> <div class="col-sm-4"> <small> <strong> <span id="pe-starts-12">February 15, 2022</span> </strong> </small> </div> <div class="col-sm-8"> <span class="text-center"> <small> </small> </span> </div> </div> <div class="row"> <div class="col-sm-12" id="pe-description-12"> Presentations &amp; Speakers at a Glance: GSA’s Approach to Identifying Requirements: FISMA, FedRAMP or Controlled Unclassified Information,  Pranjali Desai and Bo Berlas, GSA Growth in the NVD: API Keys, Documentation, and... </div> </div> </div> <div class="event-list-item" id="past-event-item-13" data-starts="01/26/2022" data-ends="01/27/2022"> <div class="row"> <div class="col-sm-12 event-list-title"> <strong><a href="/web/20230128001858/https://csrc.nist.gov/Events/2022/3rd-multi-cloud-annual-conference-devsecops-and-zt" id="pe-name-link-13">3rd Multi-cloud Annual Conference - DevSecOps and ZTA</a></strong> </div> </div> <div class="row"> <div class="col-sm-4"> <small> <strong> <span id="pe-starts-13">January 26, 2022</span> - <span id="pe-ends-13">January 27, 2022</span> </strong> </small> </div> <div class="col-sm-8"> <span class="text-center"> <small> </small> </span> </div> </div> <div class="row"> <div class="col-sm-12" id="pe-description-13"> This year’s Multi-Cloud Conference co-hosted by NIST and Tetrate will focus on DevSecOps and ZTA as foundational approaches to development, deployment, and operational phases for achieving high-assurance cloud-native... </div> </div> </div> <div class="event-list-item" id="past-event-item-14" data-starts="01/26/2022" data-ends="01/26/2022"> <div class="row"> <div class="col-sm-12 event-list-title"> <strong><a href="/web/20230128001858/https://csrc.nist.gov/Events/2022/nccoe-virtual-workshop-on-the-cybersecurity-of-gen" id="pe-name-link-14">NCCoE Virtual Workshop on the Cybersecurity of Genomic Data</a></strong> </div> </div> <div class="row"> <div class="col-sm-4"> <small> <strong> <span id="pe-starts-14">January 26, 2022</span> </strong> </small> </div> <div class="col-sm-8"> <span class="text-center"> <small> </small> </span> </div> </div> <div class="row"> <div class="col-sm-12" id="pe-description-14"> Genomic data are central to basic science research, pharmaceutical drug and vaccine development, disease diagnosis and prediction, ancestry tracing, and forensic investigations. These applications require information fidelity... </div> </div> </div> <div class="event-list-item" id="past-event-item-15" data-starts="12/08/2021" data-ends="12/09/2021"> <div class="row"> <div class="col-sm-12 event-list-title"> <strong><a href="/web/20230128001858/https://csrc.nist.gov/Events/2021/ispab-december-2021-meeting" id="pe-name-link-15">ISPAB December 2021 Meeting</a></strong> </div> </div> <div class="row"> <div class="col-sm-4"> <small> <strong> <span id="pe-starts-15">December 8, 2021</span> - <span id="pe-ends-15">December 9, 2021</span> </strong> </small> </div> <div class="col-sm-8"> <span class="text-center"> <small> </small> </span> </div> </div> <div class="row"> <div class="col-sm-12" id="pe-description-15"> The Information Security and Privacy Advisory Board (ISPAB) is authorized by 15 U.S.C. 278g-4, as amended, and advises the National Institute of Standards and Technology (NIST), the Secretary of Homeland Security (DHS), and... </div> </div> </div> <div class="event-list-item" id="past-event-item-16" data-starts="12/02/2021" data-ends="12/02/2021"> <div class="row"> <div class="col-sm-12 event-list-title"> <strong><a href="/web/20230128001858/https://csrc.nist.gov/Events/2021/federal-cybersecurity-privacy-professionals-fo-1" id="pe-name-link-16">Federal Cybersecurity &amp; Privacy Professionals Forum - December 02, 2021</a></strong> </div> </div> <div class="row"> <div class="col-sm-4"> <small> <strong> <span id="pe-starts-16">December 2, 2021</span> </strong> </small> </div> <div class="col-sm-8"> <span class="text-center"> <small> </small> </span> </div> </div> <div class="row"> <div class="col-sm-12" id="pe-description-16"> Presentations &amp; Speakers at a Glance: Update from the Office of the Federal Chief Information Officer, Maria Roat (OMB) Update from GAO on the Cybersecurity &amp; Information Security Audit Manual, Jennifer R. Franks (GAO)... </div> </div> </div> <div class="event-list-item" id="past-event-item-17" data-starts="12/01/2021" data-ends="12/01/2021"> <div class="row"> <div class="col-sm-12 event-list-title"> <strong><a href="/web/20230128001858/https://csrc.nist.gov/Events/2021/2nd-public-draft-sp-800-161-revision-1-workshop" id="pe-name-link-17">2nd Public Draft SP 800-161 Revision 1 Workshop</a></strong> </div> </div> <div class="row"> <div class="col-sm-4"> <small> <strong> <span id="pe-starts-17">December 1, 2021</span> </strong> </small> </div> <div class="col-sm-8"> <span class="text-center"> <small> </small> </span> </div> </div> <div class="row"> <div class="col-sm-12" id="pe-description-17"> Click on the image to access the 2nd public draft of Special Publication (SP) 800-161, Revision 1, Cybersecurity Supply Chain Risk Management Practices for Systems and Organizations (released October 28, 2021).... </div> </div> </div> <div class="event-list-item" id="past-event-item-18" data-starts="09/28/2021" data-ends="09/28/2021"> <div class="row"> <div class="col-sm-12 event-list-title"> <strong><a href="/web/20230128001858/https://csrc.nist.gov/Events/2021/ispab-september-2021-meeting" id="pe-name-link-18">ISPAB September 2021 Meeting</a></strong> </div> </div> <div class="row"> <div class="col-sm-4"> <small> <strong> <span id="pe-starts-18">September 28, 2021</span> </strong> </small> </div> <div class="col-sm-8"> <span class="text-center"> <small> </small> </span> </div> </div> <div class="row"> <div class="col-sm-12" id="pe-description-18"> Meeting Agenda: Welcome and Opening Remarks, Steve Lipner ISPAB Chair, Executive Director, SAFECODE  Information Technology Laboratory (ITL) Update, Jim St. Pierre, Acting Director, ITL, NIST National Security Memo on... </div> </div> </div> <div class="event-list-item" id="past-event-item-19" data-starts="09/14/2021" data-ends="09/14/2021"> <div class="row"> <div class="col-sm-12 event-list-title"> <strong><a href="/web/20230128001858/https://csrc.nist.gov/Events/2021/federal-cybersecurity-privacy-professionals-forum" id="pe-name-link-19">Federal Cybersecurity &amp; Privacy Professionals Forum Meeting</a></strong> </div> </div> <div class="row"> <div class="col-sm-4"> <small> <strong> <span id="pe-starts-19">September 14, 2021</span> </strong> </small> </div> <div class="col-sm-8"> <span class="text-center"> <small> </small> </span> </div> </div> <div class="row"> <div class="col-sm-12" id="pe-description-19"> Presentations &amp; Speakers at a Glance: Updates from the Office of Management and Budget on Executive Order (EO) 14028, Steven McAndrews;  EO 14028, Updates from CISA on Coordination Activities, Harry Mourtos, CISA; and EO... </div> </div> </div> <div class="event-list-item" id="past-event-item-20" data-starts="07/06/2021" data-ends="07/06/2021"> <div class="row"> <div class="col-sm-12 event-list-title"> <strong><a href="/web/20230128001858/https://csrc.nist.gov/Events/2021/stppa3" id="pe-name-link-20">STPPA (series of talks) Event #3</a></strong> </div> </div> <div class="row"> <div class="col-sm-4"> <small> <strong> <span id="pe-starts-20">July 6, 2021</span> </strong> </small> </div> <div class="col-sm-8"> <span class="text-center"> <small> </small> </span> </div> </div> <div class="row"> <div class="col-sm-12" id="pe-description-20"> STPPA Event #3: Featured topics: private information retrieval (PIR); searchable encryption; fully homomorphic encryption (FHE). Structure: welcome; three invited talks; panel conversation. Date, time, location/format:... </div> </div> </div> <div class="event-list-item" id="past-event-item-21" data-starts="06/23/2021" data-ends="06/23/2021"> <div class="row"> <div class="col-sm-12 event-list-title"> <strong><a href="/web/20230128001858/https://csrc.nist.gov/Events/2021/federal-cyber-supply-chain-risk-management-forum-m" id="pe-name-link-21">Federal Cyber Supply Chain Risk Management Forum Meeting – June 23, 2021</a></strong> </div> </div> <div class="row"> <div class="col-sm-4"> <small> <strong> <span id="pe-starts-21">June 23, 2021</span> </strong> </small> </div> <div class="col-sm-8"> <span class="text-center"> <small> </small> </span> </div> </div> <div class="row"> <div class="col-sm-12" id="pe-description-21"> Agenda at a glance: Executive Order 14028 – Section 4 Enhancing Software Supply Chain Security, Matthew Scholl, Computer Security Division Draft SP 800-161 Revision 1, Supply Chain Risk Management Practices for... </div> </div> </div> <div class="event-list-item" id="past-event-item-22" data-starts="06/23/2021" data-ends="06/24/2021"> <div class="row"> <div class="col-sm-12 event-list-title"> <strong><a href="/web/20230128001858/https://csrc.nist.gov/Events/2021/ispab-june-meeting" id="pe-name-link-22">ISPAB June Meeting</a></strong> </div> </div> <div class="row"> <div class="col-sm-4"> <small> <strong> <span id="pe-starts-22">June 23, 2021</span> - <span id="pe-ends-22">June 24, 2021</span> </strong> </small> </div> <div class="col-sm-8"> <span class="text-center"> <small> </small> </span> </div> </div> <div class="row"> <div class="col-sm-12" id="pe-description-22"> The Information Security and Privacy Advisory Board (ISPAB) is authorized by 15 U.S.C. 278g-4, as amended, and advises the National Institute of Standards and Technology (NIST), the Secretary of Homeland Security (DHS), and... </div> </div> </div> <div class="event-list-item" id="past-event-item-23" data-starts="06/17/2021" data-ends="06/17/2021"> <div class="row"> <div class="col-sm-12 event-list-title"> <strong><a href="/web/20230128001858/https://csrc.nist.gov/Events/2021/fissea-forum-june-17-2021" id="pe-name-link-23">FISSEA Forum June</a></strong> </div> </div> <div class="row"> <div class="col-sm-4"> <small> <strong> <span id="pe-starts-23">June 17, 2021</span> </strong> </small> </div> <div class="col-sm-8"> <span class="text-center"> <small> </small> </span> </div> </div> <div class="row"> <div class="col-sm-12" id="pe-description-23"> The FISSEA Forums are quarterly meetings to provide opportunities for policy and programmatic updates, the exchange of best practices, and discussion and engagement among members of the Federal Information Security Educators... </div> </div> </div> <div class="event-list-item" id="past-event-item-24" data-starts="06/07/2021" data-ends="06/09/2021"> <div class="row"> <div class="col-sm-12 event-list-title"> <strong><a href="/web/20230128001858/https://csrc.nist.gov/Events/2021/third-pqc-standardization-conference" id="pe-name-link-24">Third PQC Standardization Conference</a></strong> </div> </div> <div class="row"> <div class="col-sm-4"> <small> <strong> <span id="pe-starts-24">June 7, 2021</span> - <span id="pe-ends-24">June 9, 2021</span> </strong> </small> </div> <div class="col-sm-8"> <span class="text-center"> <small> </small> </span> </div> </div> <div class="row"> <div class="col-sm-12" id="pe-description-24"> The NIST Post-Quantum Cryptography Standardization Process has entered the third phase, in which 7 third round finalists and eight alternate candidates are being considered for standardization. NIST held the third NIST PQC... </div> </div> </div> <div class="event-list-item" id="past-event-item-25" data-starts="06/02/2021" data-ends="06/03/2021"> <div class="row"> <div class="col-sm-12 event-list-title"> <strong><a href="/web/20230128001858/https://csrc.nist.gov/Events/2021/enhancing-software-supply-chain-security-workshop" id="pe-name-link-25">Enhancing Software Supply Chain Security: Workshop</a></strong> </div> </div> <div class="row"> <div class="col-sm-4"> <small> <strong> <span id="pe-starts-25">June 2, 2021</span> - <span id="pe-ends-25">June 3, 2021</span> </strong> </small> </div> <div class="col-sm-8"> <span class="text-center"> <small> </small> </span> </div> </div> <div class="row"> <div class="col-sm-12" id="pe-description-25"> On June 2-3, NIST will host a virtual workshop to enhance the security of the software supply chain and to fulfill the President’s Executive Order (EO) 14028, Improving the Nation’s Cybersecurity, issued May 12, 2021. Among... </div> </div> </div> </div> <div class="row"> <div class="col-sm-12"> <p> <strong> <a href="/web/20230128001858/https://csrc.nist.gov/events?searchType=all&amp;sortBy-lg=startdatetime+desc">View All Events</a> </strong> </p> </div> </div> </div> </div> </div> <div id="footer-pusher"></div> </div> <footer id="footer"> <div class="container"> <div class="row"> <div class="col-sm-6"> <span class="hidden-xs"> <a href="https://web.archive.org/web/20230128001858/https://www.nist.gov/" title="National Institute of Standards and Technology" rel="home" target="_blank" class="footer-nist-logo" id="footer-nist-logo-link"> <img src="/web/20230128001858im_/https://csrc.nist.gov/CSRC/Media/images/nist-logo-brand-white.svg" alt="National Institute of Standards and Technology logo" id="footer-nist-logo"/> </a> </span> <div class="row footer-contact-container"> <div class="col-sm-12" id="footer-address"> <strong>HEADQUARTERS</strong><br> 100 Bureau Drive<br> Gaithersburg, MD 20899 </div> </div> </div> <div class="col-sm-6"> <ul class="social-list text-right" style="display: block;"> <li class="field-item service-twitter list-horiz"> <a href="https://web.archive.org/web/20230128001858/https://twitter.com/NISTCyber" class="social-btn social-btn--large extlink ext" id="footer-social-twitter-link"> <i class="fa fa-twitter fa-fw"><span class="element-invisible">twitter</span></i><span class="ext"><span class="element-invisible"> (link is external)</span></span> </a> </li> <li class="field-item service-facebook list-horiz"> <a href="https://web.archive.org/web/20230128001858/https://www.facebook.com/NIST" class="social-btn social-btn--large extlink ext" id="footer-social-facebook-link"> <i class="fa fa-facebook fa-fw"><span class="element-invisible">facebook</span></i><span class="ext"><span class="element-invisible"> (link is external)</span></span> </a> </li> <li class="field-item service-linkedin list-horiz"> <a href="https://web.archive.org/web/20230128001858/https://www.linkedin.com/company/nist" class="social-btn social-btn--large extlink ext" id="footer-social-linkedin-link"> <i class="fa fa-linkedin fa-fw"><span class="element-invisible">linkedin</span></i><span class="ext"><span class="element-invisible"> (link is external)</span></span> </a> </li> <li class="field-item service-instagram list-horiz"> <a href="https://web.archive.org/web/20230128001858/https://www.instagram.com/usnistgov/" class="social-btn social-btn--large extlink ext" id="footer-social-instagram-link"> <i class="fa fa-instagram fa-fw"><span class="element-invisible">instagram</span></i> <span class="ext"><span class="element-invisible"> (link is external)</span></span> </a> </li> <li class="field-item service-youtube list-horiz"> <a href="https://web.archive.org/web/20230128001858/https://www.youtube.com/user/USNISTGOV" class="social-btn social-btn--large extlink ext" id="footer-social-youtube-link"> <i class="fa fa-youtube fa-fw"><span class="element-invisible">youtube</span></i><span class="ext"><span class="element-invisible"> (link is external)</span></span> </a> </li> <li class="field-item service-rss list-horiz"> <a href="https://web.archive.org/web/20230128001858/https://www.nist.gov/news-events/nist-rss-feeds" class="social-btn social-btn--large extlink" id="footer-social-rss-link"> <i class="fa fa-rss fa-fw"><span class="element-invisible">rss</span></i> </a> </li> <li class="field-item service-govdelivery list-horiz last"> <a href="https://web.archive.org/web/20230128001858/https://public.govdelivery.com/accounts/USNIST/subscriber/new?qsp=USNIST_3" class="social-btn social-btn--large extlink ext" title="Subscribe to CSRC and publication updates, and other NIST cybersecurity news" id="footer-social-govdelivery-link"> <i class="fa fa-envelope fa-fw"><span class="element-invisible">govdelivery</span></i><span class="ext"><span class="element-invisible"> (link is external)</span></span> </a> </li> </ul> <p class="text-right"> Want updates about CSRC and our publications? <a href="https://web.archive.org/web/20230128001858/https://public.govdelivery.com/accounts/USNIST/subscriber/new?qsp=USNIST_3" class="btn btn-lg btn-info" style="background-color: #12659c!important; border-color: #12659c!important;" id="footer-subscribe-link">Subscribe</a> </p> </div> </div> <div class="row hidden-sm hidden-md hidden-lg"> <div class="col-sm-12"> <a href="https://web.archive.org/web/20230128001858/https://www.nist.gov/" title="National Institute of Standards and Technology" rel="home" target="_blank" class="footer-nist-logo" id="footer-bottom-nist-logo-link"> <img src="/web/20230128001858im_/https://csrc.nist.gov/CSRC/Media/images/logo_rev.png" alt="National Institute of Standards and Technology logo" id="footer-bottom-nist-logo"/> </a> </div> </div> <div class="row"> <div class="col-sm-6"> <p> <a href="/web/20230128001858/https://csrc.nist.gov/about/contact" id="footer-contact-us-link">Contact Us</a> | <a href="https://web.archive.org/web/20230128001858/https://www.nist.gov/about-nist/our-organization" style="display: inline-block;" id="footer-org-link">Our Other Offices</a> </p> </div> <div class="col-sm-6"> <span class="pull-right text-right"> Send inquiries to <a href="https://web.archive.org/web/20230128001858/mailto:csrc-inquiry@nist.gov?subject=CSRC Inquiry" style="display: inline-block;" id="footer-inquiries-link">csrc-inquiry@nist.gov</a> </span> </div> </div> <div class="row"> <div class="footer-bottom-links-container" id="footer-bottom-links-container"> <ul> <li><a href="https://web.archive.org/web/20230128001858/https://www.nist.gov/privacy-policy">Site Privacy</a></li> <li><a href="https://web.archive.org/web/20230128001858/https://www.nist.gov/oism/accessibility">Accessibility</a></li> <li><a href="https://web.archive.org/web/20230128001858/https://www.nist.gov/privacy">Privacy Program</a></li> <li><a href="https://web.archive.org/web/20230128001858/https://www.nist.gov/oism/copyrights">Copyrights</a></li> <li><a href="https://web.archive.org/web/20230128001858/https://www.commerce.gov/vulnerability-disclosure-policy">Vulnerability Disclosure</a></li> <li><a href="https://web.archive.org/web/20230128001858/https://www.nist.gov/no-fear-act-policy">No Fear Act Policy</a></li> <li><a href="https://web.archive.org/web/20230128001858/https://www.nist.gov/foia">FOIA</a></li> <li><a href="https://web.archive.org/web/20230128001858/https://www.nist.gov/environmental-policy-statement">Environmental Policy</a></li> <li><a href="https://web.archive.org/web/20230128001858/https://www.nist.gov/summary-report-scientific-integrity">Scientific Integrity</a></li> <li><a href="https://web.archive.org/web/20230128001858/https://www.nist.gov/nist-information-quality-standards">Information Quality Standards</a></li> <li><a href="https://web.archive.org/web/20230128001858/https://www.commerce.gov/">Commerce.gov</a></li> <li><a href="https://web.archive.org/web/20230128001858/https://www.science.gov/">Science.gov</a></li> <li><a href="https://web.archive.org/web/20230128001858/https://www.usa.gov/">USA.gov</a></li> <li><a href="https://web.archive.org/web/20230128001858/https://vote.gov/">Vote.gov</a></li> </ul> </div> </div> </div> </footer> <script type="text/javascript" src="/web/20230128001858js_/https://csrc.nist.gov/dist/js/quick-collapse.js"></script> <script type="text/javascript" src="/web/20230128001858js_/https://csrc.nist.gov/dist/app.bundle.js"></script> <!-- reCAPTCHA v3 --> <script defer src="https://web.archive.org/web/20230128001858js_/https://www.google.com/recaptcha/api.js?render=6LcQo40UAAAAAJpAj4X-i-WfOzdbu6d7j7kKryDS"></script> </body> </html> <!-- FILE ARCHIVED ON 00:18:58 Jan 28, 2023 AND RETRIEVED FROM THE INTERNET ARCHIVE ON 05:28:00 Nov 24, 2024. JAVASCRIPT APPENDED BY WAYBACK MACHINE, COPYRIGHT INTERNET ARCHIVE. ALL OTHER CONTENT MAY ALSO BE PROTECTED BY COPYRIGHT (17 U.S.C. SECTION 108(a)(3)). --> <!-- playback timings (ms): captures_list: 0.718 exclusion.robots: 0.031 exclusion.robots.policy: 0.018 esindex: 0.027 cdx.remote: 44.758 LoadShardBlock: 245.67 (3) PetaboxLoader3.datanode: 128.785 (4) PetaboxLoader3.resolve: 203.294 (2) load_resource: 198.648 -->

Pages: 1 2 3 4 5 6 7 8 9 10