National Strategy for Trusted Identities in Cyberspace

Results: 217



#Item
41Risk management / Data privacy / Computer security / Health Insurance Portability and Accountability Act / Privacy law / Health informatics / Information privacy / Risk assessment / National Strategy for Trusted Identities in Cyberspace / Ethics / Risk / Management

October 29, 2013 Jacob Reider, MD Acting National Coordinator for Health Information Technology Department of Health and Human Services 200 Independence Avenue, S.W. Washington, DC 20201

Add to Reading List

Source URL: www.healthit.gov

Language: English - Date: 2014-11-19 07:12:38
42Computer network security / Public safety / Computer crimes / Comprehensive National Cybersecurity Initiative / Howard Schmidt / International Multilateral Partnership Against Cyber Threats / United States Department of Homeland Security / Federal Information Security Management Act / National Strategy for Trusted Identities in Cyberspace / Cyberwarfare / Computer security / Security

Federal Laws Relating to Cybersecurity: Discussion of Proposed Revisions

Add to Reading List

Source URL: fpc.state.gov

Language: English - Date: 2015-01-04 01:24:36
43Security / Identity assurance / National Strategy for Trusted Identities in Cyberspace / Health Insurance Portability and Accountability Act / Authentication / Nationwide Health Information Network / Electronic authentication / Identity management / Computer security / Identity

HIT Privacy and Security Team Recommendations - Transmittal[removed]

Add to Reading List

Source URL: www.healthit.gov

Language: English - Date: 2014-11-19 07:12:44
44Security / Federated identity / Computer network security / National Strategy for Trusted Identities in Cyberspace / OpenID / Security Assertion Markup Language / Authentication / Digital credential / Identity assurance / Identity / Identity management / Computer security

Building Trusted Identity Networks OIX Internet Summit London, UK Oct 10, 2013 © SecureKey Technologies Inc.

Add to Reading List

Source URL: openidentityexchange.org

Language: English - Date: 2014-06-06 18:30:57
45National Institute of Standards and Technology / Identity / Dixie / American songs / Vocal music / Sociology / Standards organizations / Computer network security / National Strategy for Trusted Identities in Cyberspace

HIT Standards Committee Transport & Security Standards Workgroup Transcript November 5, 2014

Add to Reading List

Source URL: www.healthit.gov

Language: English - Date: 2014-11-17 10:55:16
46National Institute of Standards and Technology / Identity / Dixie / American songs / Vocal music / Sociology / Standards organizations / Computer network security / National Strategy for Trusted Identities in Cyberspace

HIT Standards Committee Transport & Security Standards Workgroup Transcript November 5, 2014

Add to Reading List

Source URL: www.healthit.gov

Language: English - Date: 2014-11-17 10:55:16
47Identity / Computer security / Federated identity / OpenID / National Strategy for Trusted Identities in Cyberspace / Phorm / Identity Commons / Kerberos / Online identity / Computing / Computer network security / Internet privacy

OVERVIEW & UPDATE   CROWDED & NOISY LANDSCAPE ISO WC3

Add to Reading List

Source URL: openidentityexchange.org

Language: English - Date: 2014-06-06 18:30:57
48Cyberwarfare / Computer security / Security / National Strategy for Trusted Identities in Cyberspace / Cyber-security regulation / Computer crimes / Congressional Research Service / United States Department of Homeland Security / National Cybersecurity Center / Government / Library of Congress / Computer network security

Cybersecurity: Authoritative Reports and Resources, by Topic

Add to Reading List

Source URL: www.fas.org

Language: English - Date: 2014-10-17 09:40:29
49Social engineering / Phishing / Crimes / Password / Identity theft / National Strategy for Trusted Identities in Cyberspace / Transaction authentication number / Single sign-on / Internet fraud / Spamming / Computer security / Security

Microsoft Word[removed]NSTIC by the numbers FINAL.docx

Add to Reading List

Source URL: assets.fiercemarkets.com

Language: English - Date: 2011-04-15 11:46:08
50Computing / Computer security / Identity / Electronic commerce / National Cybersecurity Center / Computer network security / Security / National Strategy for Trusted Identities in Cyberspace

Microsoft Word[removed]NSTIC Quotes FINAL.docx

Add to Reading List

Source URL: assets.fiercemarkets.com

Language: English - Date: 2011-04-15 11:46:04
UPDATE