{"484741":{"#nid":"484741","#data":{"type":"event","title":"Cybersecurity Lecture Series - Feb. 12","body":[{"value":"\u003Cp\u003EMeet academic and industry leaders for intimate discussions about new threats, trends and technologies. Preview new cybersecurity research ahead of international conferences. Hear from exceptional Georgia Tech students about their body of work.\u003C\/p\u003E\u003Cp\u003E\u0026nbsp;\u003C\/p\u003E\u003Ch3\u003E\u003Cstrong\u003ENDSS Conference Preview\u003C\/strong\u003E\u003C\/h3\u003E\u003Cp\u003E\u003Cem\u003E\u003Cstrong\u003EKangjie Lu,\u003C\/strong\u003E\u003Cem\u003E PhD candidate\u003C\/em\u003E\u003C\/em\u003E\u003C\/p\u003E\u003Cp\u003EPhD candidate delivers a preview of cybersecurity research from Georgia Tech that will be presented at the Network and Distributed System Security Symposium (NDSS 2016). Lunch provided. No registration necessary.\u003C\/p\u003E\u003Cp\u003E\u0026nbsp;\u003C\/p\u003E\u003Cp\u003E\u0026nbsp;\u003C\/p\u003E\u003Cp\u003E\u003Ca href=\u0022http:\/\/www.iisp.gatech.edu\/cyber-lecture\u0022 target=\u0022_blank\u0022\u003E\u003Cstrong\u003E\u003Cem\u003ESpring 2016 Schedule\u003C\/em\u003E\u003C\/strong\u003E\u003C\/a\u003E\u003Cbr \/\u003E \u003Cstrong\u003EJan. 15\u003C\/strong\u003E \u2014 Opening discussion\u003Cbr \/\u003E \u003Cstrong\u003EJan. 22\u003C\/strong\u003E \u2014 Milos Prvulovic\u003Cbr \/\u003E \u003Cstrong\u003EJan. 29\u003C\/strong\u003E \u2014 PhD Candidate - Byoungyoung Lee\u003Cbr \/\u003E \u003Cstrong\u003EFeb. 5\u003C\/strong\u003E \u2014 NDSS Conference Preview\u003Cbr \/\u003E \u003Cstrong\u003EFeb. 12\u003C\/strong\u003E \u2014 NDSS Conference Preview\u003Cbr \/\u003E \u003Cstrong\u003EFeb. 19\u003C\/strong\u003E \u2014 NDSS Conference Preview\u003Cbr \/\u003E \u003Cstrong\u003EFeb. 26\u003C\/strong\u003E \u2014 Stephen Pair, co-founder and CEO, \u003Ca href=\u0022https:\/\/bitpay.com\/about\u0022 target=\u0022_blank\u0022\u003EBitPay\u003C\/a\u003E\u003Cbr \/\u003E \u003Cstrong\u003EMar. 4\u003C\/strong\u003E \u2014 Frank Wang, coordinator, \u003Ca href=\u0022http:\/\/cybersecurityfactory.com\/\u0022 target=\u0022_blank\u0022\u003EThe Cybersecurity Factory\u003C\/a\u003E\u003Cbr \/\u003E \u003Cstrong\u003EMar. 11\u003C\/strong\u003E \u2013 David Formby, Xiaojing Liao\u003Cbr \/\u003E \u003Cstrong\u003EMar. 18\u003C\/strong\u003E \u2013 TBD\u003Cbr \/\u003E \u003Cstrong\u003EMar. 25\u003C\/strong\u003E \u2013 Spring Break\u003Cbr \/\u003E \u003Cstrong\u003EApr. 1\u003C\/strong\u003E \u2013 TBD\u003Cbr \/\u003E \u003Cstrong\u003EApr. 8 \u003C\/strong\u003E\u2013 TBD\u003Cbr \/\u003E \u003Cstrong\u003EApr. 15\u003C\/strong\u003E \u2013 TBD\u003Cbr \/\u003E \u003Cstrong\u003EApr. 22 \u003C\/strong\u003E\u2013 Closing session\u003C\/p\u003E\u003Cp\u003ESponsored by MailChimp\u003Cbr \/\u003E\u003C\/p\u003E","summary":null,"format":"limited_html"}],"field_subtitle":"","field_summary":"","field_summary_sentence":[{"value":"Anyone interested in cybersecurity intelligence and skill development is invited to a free lecture series, held each Friday at Georgia Tech."}],"uid":"27490","created_gmt":"2016-01-11 21:30:37","changed_gmt":"2017-04-13 21:17:11","author":"Tara La Bouff","boilerplate_text":"","field_publication":"","field_article_url":"","field_event_time":{"event_time_start":"2016-02-12T11:00:00-05:00","event_time_end":"2016-02-12T12:00:00-05:00","event_time_end_last":"2016-02-12T12:00:00-05:00","gmt_time_start":"2016-02-12 16:00:00","gmt_time_end":"2016-02-12 17:00:00","gmt_time_end_last":"2016-02-12 17:00:00","rrule":null,"timezone":"America\/New_York"},"extras":["free_food"],"hg_media":{"451391":{"id":"451391","type":"image","title":"IISP logo","body":null,"created":"1449256280","gmt_created":"2015-12-04 19:11:20","changed":"1475895192","gmt_changed":"2016-10-08 02:53:12","alt":"IISP logo","file":{"fid":"203339","name":"instituteforinformationsecurityprivacy-outline-black874.jpg","image_path":"\/sites\/default\/files\/images\/instituteforinformationsecurityprivacy-outline-black874_0.jpg","image_full_path":"http:\/\/hg.gatech.edu\/\/sites\/default\/files\/images\/instituteforinformationsecurityprivacy-outline-black874_0.jpg","mime":"image\/jpeg","size":88082,"path_740":"http:\/\/hg.gatech.edu\/sites\/default\/files\/styles\/740xx_scale\/public\/images\/instituteforinformationsecurityprivacy-outline-black874_0.jpg?itok=WFxLCVBe"}}},"media_ids":["451391"],"groups":[{"id":"47223","name":"College of Computing"},{"id":"50875","name":"School of Computer Science"},{"id":"322011","name":"College of Computing Events"},{"id":"430601","name":"Institute for Information Security and Privacy"}],"categories":[],"keywords":[{"id":"1404","name":"Cybersecurity"},{"id":"141341","name":"Institute for Information Security \u0026 Privacy"}],"core_research_areas":[],"news_room_topics":[],"event_categories":[{"id":"1795","name":"Seminar\/Lecture\/Colloquium"}],"invited_audience":[{"id":"78751","name":"Undergraduate students"},{"id":"78761","name":"Faculty\/Staff"},{"id":"78771","name":"Public"},{"id":"174045","name":"Graduate students"}],"affiliations":[],"classification":[],"areas_of_expertise":[],"news_and_recent_appearances":[],"phone":[],"contact":[],"email":[],"slides":[],"orientation":[],"userdata":""}}}