NIST Launches New Trustworthy and Responsible AI Resource Center: Includes First Version of AI Risk Management Framework Playbook The National Institute of Standards and Technology (NIST) announces the launch of the NIST Trustworthy and Responsible AI Resource Center (AIRC), a one-stop-shop for foundational content, technical documents, and toolkits to enable responsible use of Artificial Intelligence (AI). The AIRC offers industry, government, and academic stakeholders knowledge of AI standards, measurement methods and metrics, datasets, and other resources. The launch of the AI Resource Center was announced during the White House Summit for Democracy held this week. The AIRC is part of NIST’s continued effort to promote a shared understanding and improve communication among those seeking to operationalize trustworthy and responsible AI. The Resource Center will facilitate implementation of trustworthy and responsible approaches such as those described in NIST’s AI Risk Management Framework (AI RMF). That voluntary Framework articulates and offers guidance for addressing the key building blocks of trustworthy AI in order to better manage risks to individuals, organizations, and society associated with AI. The initial version of the AIRC, which will be expanded over time based on contributions from NIST and others, includes the AI RMF 1.0 and the first complete version of the companion playbook. Content in the AI RMF Playbook can now be filtered by AI RMF function, topic, and AI actor role so that users can quickly isolate relevant information most useful to them. The AIRC includes access to a standards tracker about AI standards around the globe, along with a metrics hub to assist in test, evaluation, verification, and validation of AI. A trustworthy and responsible AI Glossary in the AIRC is being released in beta format as a spreadsheet as approaches to visualize the relationships between and among these terms continue to advance. A final glossary will be produced at a later date based on input from the community. In addition, the new resource center will be a repository for NIST technical and policy documents related to the AI RMF, the NIST AI publication series, as well as NIST-funded external resources in the area of trustworthy and responsible AI. The AIRC Engagements and Events page will include updates on how to engage with NIST on the topic of trustworthy and responsible AI. Sign up to receive email notifications about NIST’s AI activities here.
NCCoE Seeks Collaborators for New Healthcare Sector Project
Become a Collaborator on the Mitigating Cybersecurity Risk in Telehealth Smart Home Integration Project The National Cybersecurity Center of Excellence (NCCoE) has issued a Federal Register Notice (FRN) inviting industry participants and other interested collaborators to participate in the Mitigating Cybersecurity Risk in Telehealth Smart Home Integration Project. The NCCoE Healthcare project team will build an environment that will model patients’ use of smart speakers in a telehealth ecosystem. The goal of this project is to identify and mitigate cybersecurity and privacy risks associated with these ecosystems. This project will result in a publicly available NIST Cybersecurity Practice Guide. There are two ways to join the NCCoE for this project: Become an NCCoE Collaborator – Collaborators are members of the project team that work alongside the NCCoE staff to build the demonstration by contributing products, services, and technical expertise. Get Started Today – If you are interested in becoming an NCCoE collaborator for the Mitigating Cybersecurity Risk in Telehealth Smart Home Integration project, first review the requirements identified in the Federal Register Notice. To become a collaborator, visit the project page to see the final project description and request a Letter of Interest (LOI) template--you will then receive a link to download the LOI template. Go to the project page here Complete the LOI template and send it to the NCCoE Healthcare team at hit_nccoe@nist.gov. Join our Community of Interest – By joining the NCCoE Healthcare Community of Interest (COI), you will receive project updates and the opportunity to share your expertise to help guide this project. Request to join our Healthcare COI by visiting our project page. If you have any questions, please contact our project team at hit_nccoe@nist.gov.
NIST Cybersecurity White Paper: Security Segmentation in a Small Manufacturing Environment
What is this paper about?
As manufacturers are increasingly targeted in cyberattacks, any
gaps in cybersecurity leave small manufacturers vulnerable to attacks. Small
manufacturers tend to operate facilities with limited staff and resources,
often causing cybersecurity to fall by the wayside as something that costs too
much time and money. Additionally, bringing together various cybersecurity
standards, frameworks, and guides to derive a coherent action plan is a
challenge even for those experienced in cybersecurity.
Security segmentation is a cost effective and efficient security
design approach for protecting cyber assets by grouping them based on their
communication and security requirements. This paper outlines a practical
six-step approach, incorporating the NIST
Cybersecurity Framework (CSF) and NIST IR 8183 Cybersecurity Framework: Manufacturing Profile
(“CSF Manufacturing Profile”), that manufacturers can follow to implement
security segmentation and mitigate cyber vulnerabilities in their manufacturing
environments.
The NIST Cybersecurity White Paper: Security Segmentation in a Small
Manufacturing Environment is now available free of charge.
Let us know what you think!
Questions? Email our team at manufacturing_nccoe@nist.gov with your
feedback and let us know if you would like to join the Manufacturing community
of interest. We value and welcome your input.
Project Page
Auto Theift issue Attention Kia & Hyundai Owners
Attention Kia & Hyundai Owners
Criminals are using a vulnerability to bypass some car ignitions using a USB cable.
Both Kia & Hyundai have upgraded their security software to combat this issue. The updates are free. Please contact Kia or Hyundai to schedule an appointment

NIST has extended the deadlines to submit comments
There’s Now Extra Time to Comment…Please Share Your Feedback on
our Three NIST Identity Guidance Items!
NIST has extended the deadlines to submit comments to drafts of
three key pieces of guidance related to digital identity:
- Digital Identity Guidelines
(NIST SP 800-63-4) | Extended until April 14, 2023 NIST
SP 800-63 intends to respond to the changing digital landscape that has
emerged since the last major revision of this suite was
published in 2017—including the real-world implications of online risks.
The guidelines present the process and technical requirements for meeting
digital identity management assurance levels for identity proofing,
authentication, and federation, including requirements for security and
privacy as well as considerations for fostering equity and the usability
of digital identity solutions and technology. - Guidelines for Derived Personal Identity
Verification (PIV) Credentials (NIST SP 800-157r1) | Extended until April 21,
2023 NIST SP 800-157 has been
revised to feature an expanded set of derived PIV credentials to include
public key infrastructure (PKI) and non-PKI-based phishing-resistant
multi-factor authenticators. - Guidelines for Personal Identity Verification (PIV)
Federation
(NIST SP 800-217) | Extended
until April 21, 2023 NIST SP 800-217 details
technical requirements on the use of federated PIV identity and the
interagency use of assertions to implement PIV federations backed by PIV
identity accounts and PIV credentials.
Read More
You’re invited to attend Microsoft Secure
|
Plan your day at Microsoft Secure
Plan your day at Microsoft
Secure
Start your day with a keynote from Charlie
Bell, Executive Vice President, Microsoft Security, and Vasu Jakkal, Corporate
Vice President, Security, Compliance & Identity on what an AI-powered
future means for cybersecurity. Stay tuned shortly after for more product
announcements across security, compliance and identity.
Sessions will continue on topics including:
- How do executive leaders make
big security bets for their businesses?: A discussion with CISOs from industry leading
organizations. - How XDR defends against
ransomware across the entire kill chain: A deep dive into our eXtended Detection and
Response (XDR) solution - Balancing privacy and security
in the cloud: A breakout session on
privacy’s crucial role in maintaining trust
Plus, our team will provide real-time answers
to your most pressing questions in chat throughout the day. Click here to
save sessions to your schedule and plan your day.
Check
out what’s coming up at Microsoft Secure
|
|
|
|
Brad Smith, Vice Chair and President |
View highlighted sessions |
|
Brad Smith joins Vasu Jakkal to discuss |
Curious about our content across breakouts, |
Ways
to engage now
|
Session schedule is now live |
New! Microsoft Intune Suite |
Narrow your focus with themes |
|
|
|
|
|
Save sessions you’re interested in to your |
On March 1, we launched a unified solution, |
Microsoft Secure presents dozens of |
New Microsoft Feature: What are Azure Active Directory recommendations.
Keeping track of all the settings and resources in your tenant can be overwhelming. The Azure Active Directory (Azure AD) recommendations feature helps monitor the status of your tenant so you don’t have to. The Azure AD recommendations feature helps ensure your tenant is in a secure and healthy state while also helping you maximize the value of the features available in Azure AD.
The Azure AD recommendations feature provides you with personalized insights with actionable guidance to:
- Help you identify opportunities to implement best practices for Azure AD-related features.
- Improve the state of your Azure AD tenant.
- Optimize the configurations for your scenarios.
This article gives you an overview of how you can use Azure AD recommendations. As an administrator, you should review your tenant’s Azure AD recommendations, and their associated resources periodically.
This article gives you an overview of how you can use Azure AD recommendations. As an administrator, you should review your tenant’s Azure AD recommendations, and their associated resources periodically
Read more here
Free ebook From Microsoft Help build a hybrid work culture of safeguarding company data
In
today’s increasingly hybrid workplace, having a strong data protection and
security program requires a more comprehensive approach than implementing
individual technologies. The e-book Keeping
Your Data Secure in a Hybrid Work Environment discusses how
considering all factors—including the people, processes, means of
communication, and technologies—helps you create the strongest strategy to keep
pace with evolving business and security trends. The e-book also covers:
·
How organization-wide
collaboration is essential for streamlining processes and helping secure data.
·
Why insider threats,
both intentional and unintentional, remain the leading cause of data breaches
for organizations of all sizes.
Why you should delegate some responsibility for
more powerful data protection to your cloud vendor.
macOS Configuration Guidance from the mSCP: Draft NIST SP 800-219r1 Available for Comment
macOS Configuration Guidance from the mSCP: Draft NIST SP
800-219r1 Available for Comment
NIST requests comments on the initial public draft of Special
Publication (SP) 800-219r1, Automated Secure Configuration
Guidance from the macOS Security Compliance Project (mSCP). It
provides resources that system administrators, security professionals, security
policy authors, information security officers, and auditors can leverage to
secure and assess macOS desktop and laptop system security in an automated way.
This publication introduces the mSCP, describes use cases for
leveraging the mSCP content, and introduces a new feature of the mSCP that
allows organizations to customize security rules more easily. The draft also
gives an overview of the resources available on the project’s GitHub site,
which provides practical, actionable recommendations in the form of secure baselines
and associated rules and is continuously updated to support each new release of
macOS.
The public comment period is open
through April 27, 2023. See the publication
details for a copy of the draft and instructions for submitting
comments.
NOTE:
A call for patent claims is included on page ii of this draft. For
additional information, see the Information Technology Laboratory
(ITL) Patent Policy–Inclusion of Patents in ITL Publications.




