{"484481":{"#nid":"484481","#data":{"type":"event","title":"2016 Georgia Tech Cyber Security Summit","body":[{"value":"\u003Cp\u003EThe Georgia Tech Cyber Security Summit gathers government, industry, and academia to discuss the newest threats and trends in cyberspace, critical data, and cyber-connected devices.\u003C\/p\u003E\u003Cp\u003EEvery year, security experts see new evolutions in cyberthreats to people, businesses and governments. Our adversaries know no boundaries. Cybersecurity is everyone\u0027s business.\u003C\/p\u003E\u003Cp\u003EThe annual Summit features breakfast, lunch, keynote speeches, panel discussions, and more. All attendees at this full-day summit receive a copy of the \u003Cem\u003E2017 Cyber Threats, Trends \u0026amp; Technologies Report.\u003C\/em\u003E\u003C\/p\u003E\u003Ch3\u003E\u003Cem\u003ERegistration is closed. \u003Cbr \/\u003E\u003C\/em\u003E\u003C\/h3\u003E\u003Cp\u003E\u003Cem\u003E\u003Cbr \/\u003E\u003C\/em\u003E\u003C\/p\u003E\u003Ch5\u003E\u003Cstrong\u003EMorning \u003C\/strong\u003E\u003C\/h5\u003E\u003Cp\u003E\u003Cem\u003E\u003Cstrong\u003E9:30 a.m.\u003C\/strong\u003E\u003C\/em\u003E\u003Cbr \/\u003E Keynote by Keynote by \u003Cstrong\u003E\u003Ca href=\u0022http:\/\/www.cc.gatech.edu\/people\/annie-anton\u0022 target=\u0022_blank\u0022\u003EAnnie Ant\u00f3n\u003C\/a\u003E\u003C\/strong\u003E, chair, School of Interactive Computing; director, \u003Ca href=\u0022http:\/\/theprivacyplace.org\/\u0022 target=\u0022_blank\u0022\u003EThePrivacyPlace.org\u003C\/a\u003E\u003C\/p\u003E\u003Cp\u003E\u003Cem\u003E\u003Cstrong\u003E10:00 a.m.\u003C\/strong\u003E\u003C\/em\u003E\u003Cbr \/\u003E Meet the Students \/ Fall \u002716 Demo Day\u003C\/p\u003E\u003Cp\u003E\u003Cstrong\u003E\u003Cem\u003E11:00 a.m. - Noon\u003C\/em\u003E\u003C\/strong\u003E\u003Cbr \/\u003E \u003Cstrong\u003E\u003Cem\u003EPanel: \u201cPartners in Crisis? Legislation has yet to improve information sharing\u201d\u003C\/em\u003E\u003C\/strong\u003E\u003Cbr \/\u003E Evan Glover, senior counsel, GE Transportation\u003Cbr \/\u003E Paul Huesken, chief information assurance officer, Coca-Cola\u003Cbr \/\u003E Lee Kirschbaum, special agent, FBI\u003Cbr \/\u003E Jimmy Lummis, associate director, Georgia Tech Cyber Security\u003C\/p\u003E\u003Ch5\u003E\u0026nbsp;\u003C\/h5\u003E\u003Ch5\u003E\u003Cstrong\u003EAfternoon \u003C\/strong\u003E\u003C\/h5\u003E\u003Cp\u003E\u003Cem\u003E\u003Cstrong\u003E1:30 p.m.\u003C\/strong\u003E\u003C\/em\u003E\u003Cbr \/\u003E Keynote by \u003Ca href=\u0022http:\/\/www.southerncompany.com\/about-us\/leadership\/ceo\/pdfs\/Tom-Fanning-biography.pdf\u0022 target=\u0022_blank\u0022\u003E\u003Cstrong\u003ETom Fanning\u003C\/strong\u003E\u003C\/a\u003E, chairman, president \u0026amp; CEO, Southern Company\u003C\/p\u003E\u003Ch6\u003E\u003Cstrong\u003EBreakout Sessions\u003C\/strong\u003E\u003C\/h6\u003E\u003Cp\u003E\u003Cstrong\u003E\u003Cem\u003E2:30 - 3:30 p.m.\u003C\/em\u003E\u003C\/strong\u003E\u003Cbr \/\u003E \u003Cstrong\u003E\u003Cem\u003ETRACK A: \u201cRansomware: How to respond\u201d\u003C\/em\u003E\u003C\/strong\u003E\u003Cbr \/\u003E Chris Smoak, division chief, Cyber Technology \u0026amp; Information Security Lab, GTRI\u003Cbr \/\u003E Evan Downing, Ph.D. student, Georgia Tech\u003C\/p\u003E\u003Cp\u003E\u003Cstrong\u003E\u003Cem\u003ETRACK B: \u201cThe Cyber Policy Landscape at Home \u0026amp; Abroad\u201d\u003C\/em\u003E\u003C\/strong\u003E\u003Cbr \/\u003E Klaus Brisch, partner, DWF Germany\u003Cbr \/\u003E Rick Stewart, director of cyber security services, CGI Federal of Canada\u003Cbr \/\u003E Peter Swire, associate director of policy, Institute for Information Security \u0026amp; Privacy\u003C\/p\u003E\u003Cp\u003E\u003Cstrong\u003E\u003Cem\u003E3:30 - 4:30 p.m.\u003C\/em\u003E\u003C\/strong\u003E\u003Cbr \/\u003E \u003Cstrong\u003E\u003Cem\u003ETRACK A: \u201cCryptocurrency: Current and future state of dark money\u201d\u003C\/em\u003E\u003C\/strong\u003E\u003Cbr \/\u003E Mark Ray, PwC, director, Cyber Investigations and Breach Response\u003Cbr \/\u003E SSA Chad Hunt, FBI Atlanta \u2013 Computer Intrusion Squad\u003Cbr \/\u003E Michael Farrell, chief research scientist, CTISL \u2013 GTRI\u003C\/p\u003E\u003Cp\u003E\u003Cstrong\u003E\u003Cem\u003ETRACK B: \u201cCybersecurity: Not just the IT department\u2019s problem\u201d\u003C\/em\u003E\u003C\/strong\u003E\u003Cbr \/\u003E COL Alprentice Smith, Joint Functional Component Command Headquarters, U.S. Army Cyber Command\u003Cbr \/\u003E Leo Mark, associate dean, Georgia Tech Professional Education\u003Cbr \/\u003E Taesoo Kim, assistant professor, School of Computer Science\u003C\/p\u003E\u003Cp\u003E\u003Cem\u003E\u003Cbr \/\u003E\u003C\/em\u003E\u003C\/p\u003E","summary":null,"format":"limited_html"}],"field_subtitle":"","field_summary":[{"value":"\u003Cp\u003EThe Georgia Tech Cyber Security Summit gathers government, industry, and academia to discuss the newest threats and trends in cyberspace, critical data, and cyber-connected devices.\u003C\/p\u003E","format":"limited_html"}],"field_summary_sentence":[{"value":"Georgia Tech invites the public to a free, full-day seminar hosted by the Institute for Information Security \u0026 Privacy."}],"uid":"27490","created_gmt":"2016-01-11 15:45:00","changed_gmt":"2017-04-13 21:17:13","author":"Tara La Bouff","boilerplate_text":"","field_publication":"","field_article_url":"","field_event_time":{"event_time_start":"2016-09-28T09:30:00-04:00","event_time_end":"2016-09-28T17:30:00-04:00","event_time_end_last":"2016-09-28T17:30:00-04:00","gmt_time_start":"2016-09-28 13:30:00","gmt_time_end":"2016-09-28 21:30:00","gmt_time_end_last":"2016-09-28 21:30:00","rrule":null,"timezone":"America\/New_York"},"extras":["free_food"],"hg_media":{"573901":{"id":"573901","type":"image","title":"GTCSS\u002716","body":null,"created":"1473278783","gmt_created":"2016-09-07 20:06:23","changed":"1475895383","gmt_changed":"2016-10-08 02:56:23","alt":"GTCSS\u002716","file":{"fid":"207153","name":"blue_banner_1140x570_01-01.jpg","image_path":"\/sites\/default\/files\/images\/blue_banner_1140x570_01-01.jpg","image_full_path":"http:\/\/hg.gatech.edu\/\/sites\/default\/files\/images\/blue_banner_1140x570_01-01.jpg","mime":"image\/jpeg","size":1775690,"path_740":"http:\/\/hg.gatech.edu\/sites\/default\/files\/styles\/740xx_scale\/public\/images\/blue_banner_1140x570_01-01.jpg?itok=Uv3b90mF"}},"580761":{"id":"580761","type":"image","title":"2016 Keynote Speakers - GT CSS","body":null,"created":"1474488184","gmt_created":"2016-09-21 20:03:04","changed":"1475895391","gmt_changed":"2016-10-08 02:56:31","alt":"2016 Keynote Speakers - GT CSS","file":{"fid":"207346","name":"gtcss_keynotes_091616_2.jpg","image_path":"\/sites\/default\/files\/images\/gtcss_keynotes_091616_2.jpg","image_full_path":"http:\/\/hg.gatech.edu\/\/sites\/default\/files\/images\/gtcss_keynotes_091616_2.jpg","mime":"image\/jpeg","size":192695,"path_740":"http:\/\/hg.gatech.edu\/sites\/default\/files\/styles\/740xx_scale\/public\/images\/gtcss_keynotes_091616_2.jpg?itok=vN67jfSN"}},"451391":{"id":"451391","type":"image","title":"IISP logo","body":null,"created":"1449256280","gmt_created":"2015-12-04 19:11:20","changed":"1475895192","gmt_changed":"2016-10-08 02:53:12","alt":"IISP logo","file":{"fid":"203339","name":"instituteforinformationsecurityprivacy-outline-black874.jpg","image_path":"\/sites\/default\/files\/images\/instituteforinformationsecurityprivacy-outline-black874_0.jpg","image_full_path":"http:\/\/hg.gatech.edu\/\/sites\/default\/files\/images\/instituteforinformationsecurityprivacy-outline-black874_0.jpg","mime":"image\/jpeg","size":88082,"path_740":"http:\/\/hg.gatech.edu\/sites\/default\/files\/styles\/740xx_scale\/public\/images\/instituteforinformationsecurityprivacy-outline-black874_0.jpg?itok=WFxLCVBe"}}},"media_ids":["573901","580761","451391"],"groups":[{"id":"1304","name":"High Performance Computing (HPC)"},{"id":"47223","name":"College of Computing"},{"id":"50875","name":"School of Computer Science"},{"id":"50876","name":"School of Interactive Computing"},{"id":"50877","name":"School of Computational Science and Engineering"},{"id":"69599","name":"IPaT"},{"id":"322011","name":"College of Computing Events"},{"id":"430601","name":"Institute for Information Security and Privacy"}],"categories":[],"keywords":[{"id":"345","name":"cyber security"},{"id":"2254","name":"gtisc"},{"id":"416","name":"GTRI"},{"id":"2678","name":"information security"},{"id":"141341","name":"Institute for Information Security \u0026 Privacy"}],"core_research_areas":[],"news_room_topics":[],"event_categories":[{"id":"1795","name":"Seminar\/Lecture\/Colloquium"}],"invited_audience":[{"id":"78751","name":"Undergraduate students"},{"id":"78761","name":"Faculty\/Staff"},{"id":"78771","name":"Public"},{"id":"174045","name":"Graduate students"}],"affiliations":[],"classification":[],"areas_of_expertise":[],"news_and_recent_appearances":[],"phone":[],"contact":[{"value":"\u003Cp\u003ETara La Bouff, Marketing Communications Manager\u003C\/p\u003E\u003Cp\u003E\u003Ca href=\u0022mailto:tara.labouff@iisp.gatech.edu\u0022\u003Etara.labouff@iisp.gatech.edu\u003C\/a\u003E, 404.769.5408\u003C\/p\u003E","format":"limited_html"}],"email":[],"slides":[],"orientation":[],"userdata":""}}}