-
Research
and PublicationsStay -
Conferences
and EventsAnnual Conference
October 15–18, 2013
Register now!Events for all Levels and Interests
Whether you're looking for a conference to attend face-to-face to connect with peers, or for an online event for team professional development, see what's upcoming.
Stay -
Career
DevelopmentEDUCAUSE Institute
Leadership/Management Programs
Explore MoreCareer Center
Leadership and Management Programs
EDUCAUSE Institute
Advanced Programs
Project Management
Jump Start Your Career Growth
Explore EDUCAUSE professional development opportunities that match your career aspirations and desired level of time investment through our interactive online guide.
Stay -
Focus Areas
and InitiativesLatest Topics
EDUCAUSE organizes its efforts around three IT Focus Areas
Join These Programs If Your Focus Is
Stay -
Connect
and ContributeFind Others
Get on the Higher Ed IT Map
Employees of EDUCAUSE member institutions and organizations are invited to create individual profiles.
Stay -
About
EDUCAUSEUncommon Thinking for the Common Good™
EDUCAUSE is the foremost community of higher education IT leaders and professionals.
Stay
Your Selections Under:
- National Strategy for Trusted Identities in Cyberspace (NSTIC) [x]
Filter by type
Filter by Publications
Filter by Presentations
Filter by Library Taxonomy
- National Strategy for Trusted Identities in Cyberspace (NSTIC) [x]
- Cybersecurity (15)
- Identity Management Policy (15)
- Identity and Access Management (15)
- Federated Identity Management (9)
- Security Management (6)
- Privacy (5)
- Federal Policy and Law (3)
- Policy and Law (3)
- Cybersecurity Policy (2)
- Data Security (2)
- Cloud Computing (1)
- Cloud Security (1)
- Federal Privacy Law (1)
- High-Performance Computing (HPC) (1)
- IT Governance (1)
- Identity Theft (1)
- Information Technology Management and Leadership (1)
- Institutional Management (1)
- Networking and Emerging Technologies (1)
EDUCAUSE Library Items for National Strategy for Trusted Identities in Cyberspace (NSTIC)
-
Cloud Security Debate: Cloud Now or Cloud How?
-
December 10, 2012
During the often-fiery 2012 presidential debate season, a lively debate of a different sort held at Indiana University (IU) featured passionate arguments on the natur…
-
NSTIC Pilots at RSA Features Internet2 Scalable Privacy Project
-
February 27, 2013
The following announcement from the National Institute of Standards and Technology (NIST) concerns the pilots funded as part of the President's National Strategy for Trusted Identities in Cy…
-
Response to the Department of Commerce Notice of Inquiry for Models for a Governance Structure for NSTIC (July 22, 2011)
-
July 22, 2011
Response to the Department of Commerce Notice of Inquiry for Models for a Governance Structure for the National Strategy for Trusted Identities in Cyberspace (NSTIC). Prepared by EDUCAUSE, Inter…
-
Higher Education's Role in the Identity Ecosystem
-
October 19, 2011
|
A session at the EDUCAUSE 2011 Annual Conference
The federal government has announced a National Strategy for Trusted Identities in Cyberspace (NSTIC), which seeks to better protect against fraud and identity theft, enhance individuals' priv…
-
Request for Comments on Multistakeholder Process To Develop Consumer Data Privacy Codes of Conduct
-
March 12, 2012
The National Telecommunications and Information Administration (NTIA) in the U.S. Department of Commerce has issued a Request for Public Comments in response to the report on consumer da…
-
NSTIC to Establish a Steering Group that is Private Sector Led
-
February 21, 2012
The National Strategy for Trusted Identities in Cyberspace (NSTIC) National Program Office has issued its “Recommendations For Establishing An Identity Ecosystem Governance Structure.” …
-
NSTIC Unveils $10 Million Program for Online Identity Pilot Programs
-
February 6, 2012
The National Strategy for Trusted Identities in Cyberspace (NSTIC) took a big step forward to gain confidence that there is more than just talk to the strategy by announcing a new Feder…
-
OMB Memo Urges Government to Leverage Externally-Issued Identity Credentials
-
January 4, 2012
A recent memo from the Federal CIO to the CIO's of Executive Departments and Agencies is welcome news to the advocates for federated identity management. The memo with the subject line…
-
ED FSA Software Developer’s Conference Focuses on Theme of Cybersecurity
-
November 28, 2011
The U.S. Department of Education (ED) Federal Student Aid (FSA) Software Developers Conference kicked off today with sessions on cybersecurity, identity management, and related topics of tru…
-
Responses to NSTIC Governance Notice of Inquiry
-
August 17, 2011
The national program office for the National Strategy for Trusted Identities in Cyberspace (NSTIC) received more than 50 responses in July to the NSTIC Notice of Inquiry (NOI) which sought i…

















