{"475851":{"#nid":"475851","#data":{"type":"event","title":"High-Tech Threats: Addressing Security Risks Across the Energy Supply Chain","body":[{"value":"\u003Cp\u003EThe convergence of information and operations technologies is creating more responsive, efficient energy systems, and is transforming the relationship between major energy-focused companies and their customers. This \u0026nbsp;dynamic integration and connectivity also presents complicated security challenges for the industry. Cyber-intruders now have many more points-of-entry along the energy supply chain to access networks that control critical infrastructure, introducing new risks to information security and privacy, as well as community safety. Learn how the energy industry is identifying potential threats, mitigating risks, and leveraging new opportunities presented by the growing convergence of cyber and physical domains.\u0026nbsp;\u003C\/p\u003E\u003Cp\u003ETo register, visit:\u0026nbsp;\u003Ca title=\u0022January Metro Atlanta Energy Series\u0022 href=\u0022http:\/\/energy.gatech.edu\/clean-energy-series-1\u0022\u003Ehttp:\/\/energy.gatech.edu\/clean-energy-series-1\u003C\/a\u003E\u003C\/p\u003E","summary":null,"format":"limited_html"}],"field_subtitle":"","field_summary":"","field_summary_sentence":[{"value":"Monthly lecture series presented by the Strategic Energy Institute and the Metro Atlanta Chamber of Commerce"}],"uid":"27869","created_gmt":"2015-12-04 10:02:39","changed_gmt":"2017-04-13 21:17:31","author":"Allison Caughey","boilerplate_text":"","field_publication":"","field_article_url":"","field_event_time":{"event_time_start":"2016-01-27T16:00:00-05:00","event_time_end":"2016-01-27T17:30:00-05:00","event_time_end_last":"2016-01-27T17:30:00-05:00","gmt_time_start":"2016-01-27 21:00:00","gmt_time_end":"2016-01-27 22:30:00","gmt_time_end_last":"2016-01-27 22:30:00","rrule":"RRULE:FREQ=WEEKLY;INTERVAL=1;UNTIL=20160128T045959Z;WKST=SU","timezone":"America\/New_York"},"extras":["free_food"],"groups":[{"id":"1280","name":"Strategic Energy Institute"}],"categories":[],"keywords":[{"id":"9641","name":"Cyber Threats"},{"id":"1404","name":"Cybersecurity"},{"id":"213","name":"energy"},{"id":"336","name":"information technology"},{"id":"168132","name":"oil. gas"},{"id":"168133","name":"operations technology"},{"id":"83491","name":"utilities"}],"core_research_areas":[],"news_room_topics":[],"event_categories":[{"id":"1795","name":"Seminar\/Lecture\/Colloquium"}],"invited_audience":[{"id":"78751","name":"Undergraduate students"},{"id":"78761","name":"Faculty\/Staff"},{"id":"78771","name":"Public"},{"id":"174045","name":"Graduate students"}],"affiliations":[],"classification":[],"areas_of_expertise":[],"news_and_recent_appearances":[],"phone":[],"contact":[],"email":[],"slides":[],"orientation":[],"userdata":""}}}