National Strategy for Trusted Identities in Cyberspace

Results: 217



#Item
121Internet privacy / Consumer privacy / Medical privacy / Political privacy / Privacy policy / Electronic Privacy Information Center / Privacy / Ethics / National Strategy for Trusted Identities in Cyberspace

July 22, 2011 Annie Sokol National Institute of Standards and Technology 100 Bureau Drive, Mailstop 8930, Gaithersburg, MD 20899

Add to Reading List

Source URL: www.nist.gov

Language: English - Date: 2011-07-22 21:25:20
122Technology / Identity management / Computer network security / National Strategy for Trusted Identities in Cyberspace / Web development / Ethology / World Wide Web Consortium / Open standard / AccountAbility / Ethics / International nongovernmental organizations / Standards

W3C NSTIC Governance NOI Response http://www.w3.org[removed]nsticnoi.html W3C NSTIC Governance NOI Response Introduction

Add to Reading List

Source URL: www.nist.gov

Language: English - Date: 2011-07-22 15:09:12
123Structure / Corporations law / Accountability / Governance / Political geography / Political philosophy / Stakeholder / Corporation / Business / Social responsibility / Social philosophy

Response by Jim Fournier Co-Founder & President, Planetwork NGO, Inc. To [Docket No[removed]02] Notice of Inquiry Models for a Governance Structure for the National Strategy for Trusted Identities in Cyberspace i

Add to Reading List

Source URL: www.nist.gov

Language: English - Date: 2011-07-23 01:25:52
124Security / Identity assurance / National Strategy for Trusted Identities in Cyberspace / Health Insurance Portability and Accountability Act / Authentication / Nationwide Health Information Network / Electronic authentication / Identity management / Computer security / Identity

HIT Privacy and Security Team Recommendations - Transmittal[removed]

Add to Reading List

Source URL: www.healthit.gov

Language: English - Date: 2013-08-15 17:18:12
125Risk management / Data privacy / Computer security / Health Insurance Portability and Accountability Act / Privacy law / Health informatics / Information privacy / Risk assessment / National Strategy for Trusted Identities in Cyberspace / Ethics / Risk / Management

October 29, 2013 Jacob Reider, MD Acting National Coordinator for Health Information Technology Department of Health and Human Services 200 Independence Avenue, S.W. Washington, DC 20201

Add to Reading List

Source URL: www.healthit.gov

Language: English - Date: 2013-11-05 09:56:00
126Risk management / Data privacy / Computer security / Health Insurance Portability and Accountability Act / Privacy law / Health informatics / Information privacy / Risk assessment / National Strategy for Trusted Identities in Cyberspace / Ethics / Risk / Management

October 29, 2013 HIT Policy Committee Privacy and Security Tiger Team Transmittal Letter

Add to Reading List

Source URL: www.healthit.gov

Language: English - Date: 2014-04-03 11:08:11
127Security / Federated identity / Security Assertion Markup Language / SAML 2.0 / National Strategy for Trusted Identities in Cyberspace / OpenID / Authentication / Credential / Computer security / Identity / Identity management

Federal CIO Council Information Security and Identity Management Committee IDManagement.gov Spring 2014 ICAM Information

Add to Reading List

Source URL: idmanagement.gov

Language: English - Date: 2014-05-07 16:31:50
128Crime / Password / Computer security / Online identity / Phishing / Identity theft / Internet privacy / Internet / Computer network security / Security / National Strategy for Trusted Identities in Cyberspace

July 29, 2014 The Honorable Barbara Mikulski Chair Committee on Appropriations United States Senate Washington, DC 20510

Add to Reading List

Source URL: www.nascio.org

Language: English - Date: 2014-07-29 18:19:47
129Computer network security / Computer security / Security / National Strategy for Trusted Identities in Cyberspace / Cyber-security regulation / Congressional Research Service / United States Department of Homeland Security / National Cybersecurity Center / International Cybercrime / Government / Library of Congress / Cyberwarfare

Cybersecurity: Authoritative Reports and Resources, by Topic

Add to Reading List

Source URL: ipmall.info

Language: English - Date: 2014-05-22 19:59:59
130Military technology / Cyberwarfare / Howard Schmidt / War / International Multilateral Partnership Against Cyber Threats / National Strategy for Trusted Identities in Cyberspace / Gopal Khanna / Computer security / Cyber-security regulation / Computer crimes / Hacking / Electronic warfare

AGENDA PRE-SUMMIT VIP RECEPTION The Honorable Howard A. Schmidt, CISSP, CSSLP Former Special Assistant to the President and Cyber Security Coordinator Cyber Security Summit 2012 commenced with the Honorable Howard Schmid

Add to Reading List

Source URL: www.cybersecuritysummit.org

Language: English - Date: 2013-06-06 16:40:03
UPDATE