Teamwork

NIST seeks partners for cybersecurity challenges

Maryland Lt. Gov. Anthony Brown

Maryland Lt. Gov. Anthony Brown, shown speaking at the signing of a Memorandum of Understanding between NIST and Maryland to create NIST's Cybersecurity Center of Excellence. (Photo: NIST)

The federal agency tasked with developing measurements and standards is looking for companies to help solve pressing cybersecurity challenges in a new effort: the National Cybersecurity Excellence Partnerships.

In an Oct. 12 Federal Register notice,  the National Institute of Standards and Technology’s Information Technology Laboratory calls on private-sector firms to submit letters of interest in collaborating in the National Cybersecurity Excellence Partnerships.

The Federal Register notice appeared just days after a new report outlined how cyberattacks against U.S businesses and government have grown 42 percent in the past year. That research, released by the Ponemon Institute,  also showed a lack of proactive security as being a major cause for the spike in attacks.

NCEP collaborators will be housed at the National Cybersecurity Center of Excellence in Rockville, Md., which opened its doors in June 2012 and acts as a hub for NIST researchers to collaborate with users and vendors from government, industry and academia on holistic cybersecurity approaches.

Collaborators will work on developing the intellectual and physical infrastructure needed to support collaborative efforts on approaches to resolve cybersecurity challenges. Individual “use cases” will be used to cybersecurity challenges and will incorporate the IT security needs of specific communities or sectors, such as health care, finance and utilities.

NIST will choose the topic for the use cases through workshops and input from stakeholders and the feedback provided via collaborative online participation.

The idea is that the NCCoE will support several use cases in various stages. Collaborators are neither required to partake in any given use cases nor guaranteed participation. However, they will be given priority for participation in each use case if their resources are already onsite at the NCCoE.

Those who participate in a use case also are not required to contribute their own resources, but may choose to. Any resources will be made available to all use case participants, including NIST, NCEP collaborators and others.

NCEP agreements are expected to be last for three years, with renewal subject to the requirements and interests of the collaborator and NIST/ITL.

About the Author

Camille Tuutti is a former FCW staff writer who covered federal oversight and the workforce.

The Fed 100

Save the date for 28th annual Federal 100 Awards Gala.

Featured

  • Social network, census

    5 predictions for federal IT in 2017

    As the Trump team takes control, here's what the tech community can expect.

  • Rep. Gerald Connolly

    Connolly warns on workforce changes

    The ranking member of the House Oversight Committee's Government Operations panel warns that Congress will look to legislate changes to the federal workforce.

  • President Donald J. Trump delivers his inaugural address

    How will Trump lead on tech?

    The businessman turned reality star turned U.S. president clearly has mastered Twitter, but what will his administration mean for broader technology issues?

  • Login.gov moving ahead

    The bid to establish a single login for accessing government services is moving again on the last full day of the Obama presidency.

  • Shutterstock image (by Jirsak): customer care, relationship management, and leadership concept.

    Obama wraps up security clearance reforms

    In a last-minute executive order, President Obama institutes structural reforms to the security clearance process designed to create a more unified system across government agencies.

  • Shutterstock image: breached lock.

    What cyber can learn from counterterrorism

    The U.S. has to look at its experience in developing post-9/11 counterterrorism policies to inform efforts to formalize cybersecurity policies, says a senior official.

Reader comments

Please post your comments here. Comments are moderated, so they may not appear immediately after submitting. We will not post comments that we consider abusive or off-topic.

Please type the letters/numbers you see above

More from 1105 Public Sector Media Group