{"484721":{"#nid":"484721","#data":{"type":"event","title":"Cybersecurity Lecture Series - Jan. 29","body":[{"value":"\u003Cp\u003EMeet academic and industry leaders for intimate discussions about new threats, trends and technologies. Preview new cybersecurity research ahead of international conferences. Hear from exceptional Georgia Tech students about their body of work.\u003C\/p\u003E\u003Cp\u003E\u0026nbsp;\u003C\/p\u003E\u003Cp\u003E\u003Cstrong\u003EJan. 29\u0026nbsp; Guest Speaker\u003C\/strong\u003E\u003C\/p\u003E\u003Ch3\u003E\u003Ca href=\u0022http:\/\/www.cc.gatech.edu\/~blee303\/\u0022 target=\u0022_blank\u0022\u003E\u003Cstrong\u003EByoungyoung Lee\u003C\/strong\u003E\u003C\/a\u003E\u003Cbr \/\u003E\u003Cem\u003EPhD Candidate, College of Computing\u003C\/em\u003E\u003C\/h3\u003E\u003Cp\u003E\u003Cem\u003E\u003Cbr \/\u003E\u003C\/em\u003E\u003C\/p\u003E\u003Cp\u003EPhD Candidate Byoungyoung Lee presents a summary of cybersecurity research results and accomplishments while at Georgia Tech.\u003C\/p\u003E\u003Cp\u003E\u003Cstrong\u003E\u003Cem\u003EAbstract:\u003C\/em\u003E\u003C\/strong\u003E Many system components and network applications are written in unsafe programming languages that are prone to memory corruption vulnerabilities. To combat countless catastrophes from these vulnerabilities, there have been many defense research efforts. However, these were largely limited because their techniques focused on certain negative side effects from those vulnerabilities. As a result, there have been many unfortunate cases when security holes in these mitigation solutions are later uncovered, and significantly thwart the security of underlying systems. In this talk, I\u0027ll present a protection system which completely eliminates the root cause of those vulnerabilities. Specifically, I have targeted two popular and emerging vulnerabilities, use-after-free and bad-casting, each of which can be addressed with protection systems that I developed as a student at Georgia Tech: DangNull and CaVer, respectively. Since DangNull and CaVer directly fix the origin of such issues, they do not leave any security holes that attackers could abuse in the future. \u003Cbr \/\u003EDangNull and CaVer have been recognized by both academia and industry for their highly practical impacts: Facebook and USENIX awarded the Internet Defense Prize, and CSAW awarded the \u0022best applied security research paper.\u0022 Meanwhile, Google and Mozilla deployed DangNull and CaVer, respectively, in their development infrastructures.\u003C\/p\u003E\u003Cp\u003ELunch provided. No registration necessary.\u003Cbr \/\u003E\u003Cbr \/\u003E\u003C\/p\u003E\u003Cp\u003E\u003Ca href=\u0022http:\/\/www.iisp.gatech.edu\/cyber-lecture\u0022 target=\u0022_blank\u0022\u003E\u003Cstrong\u003E\u003Cem\u003ESpring 2016 Schedule\u003C\/em\u003E\u003C\/strong\u003E\u003C\/a\u003E\u003Cbr \/\u003E \u003Cstrong\u003EJan. 15\u003C\/strong\u003E \u2014 Opening discussion\u003Cbr \/\u003E \u003Cstrong\u003EJan. 22\u003C\/strong\u003E \u2014 Milos Prvulovic\u003Cbr \/\u003E \u003Cstrong\u003EJan. 29\u003C\/strong\u003E \u2014 PhD Candidate - Byoungyoung Lee\u003Cbr \/\u003E \u003Cstrong\u003EFeb. 5\u003C\/strong\u003E \u2014 TBD \u003Cbr \/\u003E \u003Cstrong\u003EFeb. 12\u003C\/strong\u003E \u2014 TBD \u003Cbr \/\u003E \u003Cstrong\u003EFeb. 19\u003C\/strong\u003E \u2014 NDSS Conference Preview -\u0026nbsp; Chengyu Song, Wei Meng\u003Cbr \/\u003E \u003Cstrong\u003EFeb. 26\u003C\/strong\u003E \u2014 Stephen Pair, co-founder and CEO, \u003Ca href=\u0022https:\/\/bitpay.com\/about\u0022 target=\u0022_blank\u0022\u003EBitPay\u003C\/a\u003E\u003Cbr \/\u003E \u003Cstrong\u003EMar. 4\u003C\/strong\u003E \u2014 Frank Wang, coordinator, \u003Ca href=\u0022http:\/\/cybersecurityfactory.com\/\u0022 target=\u0022_blank\u0022\u003EThe Cybersecurity Factory\u003C\/a\u003E\u003Cbr \/\u003E \u003Cstrong\u003EMar. 11\u003C\/strong\u003E \u2013 David Formby, Xiaojing Liao\u003Cbr \/\u003E \u003Cstrong\u003EMar. 18\u003C\/strong\u003E \u2013 TBD\u003Cbr \/\u003E \u003Cstrong\u003EMar. 25\u003C\/strong\u003E \u2013 Spring Break\u003Cbr \/\u003E \u003Cstrong\u003EApr. 1\u003C\/strong\u003E \u2013 TBD\u003Cbr \/\u003E \u003Cstrong\u003EApr. 8 \u003C\/strong\u003E\u2013 TBD\u003Cbr \/\u003E \u003Cstrong\u003EApr. 15\u003C\/strong\u003E \u2013 TBD\u003Cbr \/\u003E \u003Cstrong\u003EApr. 22 \u003C\/strong\u003E\u2013 Closing session\u003C\/p\u003E\u003Cp\u003ESponsored by MailChimp\u003C\/p\u003E","summary":null,"format":"limited_html"}],"field_subtitle":"","field_summary":"","field_summary_sentence":[{"value":"Anyone interested in cybersecurity intelligence and skill development is invited to a free lecture series, held each Friday at Georgia Tech."}],"uid":"27490","created_gmt":"2016-01-11 21:17:20","changed_gmt":"2017-04-13 21:17:11","author":"Tara La Bouff","boilerplate_text":"","field_publication":"","field_article_url":"","field_event_time":{"event_time_start":"2016-01-29T11:00:00-05:00","event_time_end":"2016-01-29T12:00:00-05:00","event_time_end_last":"2016-01-29T12:00:00-05:00","gmt_time_start":"2016-01-29 16:00:00","gmt_time_end":"2016-01-29 17:00:00","gmt_time_end_last":"2016-01-29 17:00:00","rrule":null,"timezone":"America\/New_York"},"extras":["free_food"],"hg_media":{"451391":{"id":"451391","type":"image","title":"IISP logo","body":null,"created":"1449256280","gmt_created":"2015-12-04 19:11:20","changed":"1475895192","gmt_changed":"2016-10-08 02:53:12","alt":"IISP logo","file":{"fid":"203339","name":"instituteforinformationsecurityprivacy-outline-black874.jpg","image_path":"\/sites\/default\/files\/images\/instituteforinformationsecurityprivacy-outline-black874_0.jpg","image_full_path":"http:\/\/hg.gatech.edu\/\/sites\/default\/files\/images\/instituteforinformationsecurityprivacy-outline-black874_0.jpg","mime":"image\/jpeg","size":88082,"path_740":"http:\/\/hg.gatech.edu\/sites\/default\/files\/styles\/740xx_scale\/public\/images\/instituteforinformationsecurityprivacy-outline-black874_0.jpg?itok=WFxLCVBe"}}},"media_ids":["451391"],"groups":[{"id":"47223","name":"College of Computing"},{"id":"50875","name":"School of Computer Science"},{"id":"322011","name":"College of Computing Events"},{"id":"430601","name":"Institute for Information Security and Privacy"}],"categories":[],"keywords":[{"id":"1404","name":"Cybersecurity"},{"id":"141341","name":"Institute for Information Security \u0026 Privacy"}],"core_research_areas":[],"news_room_topics":[],"event_categories":[{"id":"1795","name":"Seminar\/Lecture\/Colloquium"}],"invited_audience":[{"id":"78751","name":"Undergraduate students"},{"id":"78761","name":"Faculty\/Staff"},{"id":"78771","name":"Public"},{"id":"174045","name":"Graduate students"}],"affiliations":[],"classification":[],"areas_of_expertise":[],"news_and_recent_appearances":[],"phone":[],"contact":[],"email":[],"slides":[],"orientation":[],"userdata":""}},"484761":{"#nid":"484761","#data":{"type":"event","title":"Cybersecurity Lecture Series - Mar. 4","body":[{"value":"\u003Cp\u003EMeet academic and industry leaders for intimate discussions about new threats, trends and technologies. Preview new cybersecurity research ahead of international conferences. Hear from exceptional Georgia Tech students about their body of work.\u003C\/p\u003E\u003Cp\u003E\u0026nbsp;\u003C\/p\u003E\u003Cp\u003E\u003Cstrong\u003EMar. 4\u0026nbsp; Guest Speaker\u003C\/strong\u003E\u003C\/p\u003E\u003Ch3\u003E\u003Cstrong\u003EFrank Wang\u003C\/strong\u003E\u003Cbr \/\u003E\u003Cem\u003ECoordinator, \u003Ca href=\u0022http:\/\/cybersecurityfactory.com\/\u0022 target=\u0022_blank\u0022\u003EThe Cybersecurity Factory\u003C\/a\u003E\u003Cbr \/\u003E\u003C\/em\u003E\u003C\/h3\u003E\u003Cp\u003E\u003Cem\u003E\u003Cbr \/\u003E\u003C\/em\u003E\u003C\/p\u003E\u003Cp\u003EFrank Wang is a PhD student at MIT focusing on building secure systems. He did his undergraduate at Stanford, focusing on cryptography. He runs the MIT security seminar and is a member of the student team at Roughdraft Ventures, which provides small capital to early stage student startups. He has interned at the security teams at Google and Facebook as well as consulted for various security companies, such as Qualys.\u003C\/p\u003E\u003Cp\u003E\u003Cem\u003E\u003Cstrong\u003EAbstract:\u003C\/strong\u003E \u003C\/em\u003ESecurity has become a hot topic given recent hacks of major corporations, like Sony, Home Depot, and Anthem. However, those hacks were easily preventable with the correct technology. The problem is that many times, security research is not being properly commercialized. In this talk, learn about some cutting-edge security research being done in universities, their barriers to adoption, and the need to bridge the gap between academia and industry -- motivating the formation of a cybersecurity accelerator focused on students, \u003Ca href=\u0022http:\/\/cybersecurityfactory.com\/\u0022 target=\u0022_blank\u0022\u003EThe Cybersecurity Factory.\u003C\/a\u003E\u0026nbsp;\u003C\/p\u003E\u003Cp\u003ELunch provided. No registration necessary.\u003C\/p\u003E\u003Cp\u003E\u0026nbsp;\u003C\/p\u003E\u003Cp\u003E\u003Ca href=\u0022http:\/\/www.iisp.gatech.edu\/cyber-lecture\u0022 target=\u0022_blank\u0022\u003E\u003Cstrong\u003E\u003Cem\u003ESpring 2016 Schedule\u003C\/em\u003E\u003C\/strong\u003E\u003C\/a\u003E\u003Cbr \/\u003E \u003Cstrong\u003EJan. 15\u003C\/strong\u003E \u2014 Opening discussion\u003Cbr \/\u003E \u003Cstrong\u003EJan. 22\u003C\/strong\u003E \u2014 Milos Prvulovic\u003Cbr \/\u003E \u003Cstrong\u003EJan. 29\u003C\/strong\u003E \u2014 PhD Candidate - Byoungyoung Lee\u003Cbr \/\u003E \u003Cstrong\u003EFeb. 5\u003C\/strong\u003E \u2014 NDSS Conference Preview\u003Cbr \/\u003E \u003Cstrong\u003EFeb. 12\u003C\/strong\u003E \u2014 NDSS Conference Preview\u003Cbr \/\u003E \u003Cstrong\u003EFeb. 19\u003C\/strong\u003E \u2014 NDSS Conference Preview \u003Cbr \/\u003E \u003Cstrong\u003EFeb. 26\u003C\/strong\u003E \u2014 Stephen Pair, co-founder and CEO, \u003Ca href=\u0022https:\/\/bitpay.com\/about\u0022 target=\u0022_blank\u0022\u003EBitPay\u003C\/a\u003E\u003Cbr \/\u003E \u003Cstrong\u003EMar. 4\u003C\/strong\u003E \u2014 Frank Wang, coordinator, \u003Ca href=\u0022http:\/\/cybersecurityfactory.com\/\u0022 target=\u0022_blank\u0022\u003EThe Cybersecurity Factory\u003C\/a\u003E\u003Cbr \/\u003E \u003Cstrong\u003EMar. 11\u003C\/strong\u003E \u2013 Sivakumar \u0022Siva\u0022 Raghupathy, director, \u003Ca href=\u0022http:\/\/create-x.gatech.edu\/\u0022 target=\u0022_blank\u0022\u003ECREATE-X\u003C\/a\u003E\u003Cbr \/\u003E \u003Cstrong\u003EMar. 18\u003C\/strong\u003E \u2013 David Formby, Xiaojing Liao\u003Cbr \/\u003E \u003Cstrong\u003EMar. 25\u003C\/strong\u003E \u2013 Spring Break\u003Cbr \/\u003E \u003Cstrong\u003EApr. 1\u003C\/strong\u003E \u2013 Capital One\u003Cbr \/\u003E \u003Cstrong\u003EApr. 8 \u003C\/strong\u003E\u2013 TBD\u003Cbr \/\u003E \u003Cstrong\u003EApr. 15\u003C\/strong\u003E \u2013 TBD\u003Cbr \/\u003E \u003Cstrong\u003EApr. 22 \u003C\/strong\u003E\u2013 Closing session\u003C\/p\u003E\u003Cp\u003ESponsored by MailChimp\u003C\/p\u003E","summary":null,"format":"limited_html"}],"field_subtitle":"","field_summary":[{"value":"\u003Cp\u003EPresentation by Frank Wang, PhD student at MIT focused on building secure systems, for a discussion about entrepreneurism and early stage student startups.\u003C\/p\u003E","format":"limited_html"}],"field_summary_sentence":[{"value":"Anyone interested in cybersecurity intelligence and skill development is invited to a free lecture series, held each Friday at Georgia Tech."}],"uid":"27490","created_gmt":"2016-01-11 21:49:28","changed_gmt":"2017-04-13 21:17:11","author":"Tara La Bouff","boilerplate_text":"","field_publication":"","field_article_url":"","field_event_time":{"event_time_start":"2016-03-04T11:00:00-05:00","event_time_end":"2016-03-04T12:00:00-05:00","event_time_end_last":"2016-03-04T12:00:00-05:00","gmt_time_start":"2016-03-04 16:00:00","gmt_time_end":"2016-03-04 17:00:00","gmt_time_end_last":"2016-03-04 17:00:00","rrule":null,"timezone":"America\/New_York"},"extras":["free_food"],"hg_media":{"451391":{"id":"451391","type":"image","title":"IISP logo","body":null,"created":"1449256280","gmt_created":"2015-12-04 19:11:20","changed":"1475895192","gmt_changed":"2016-10-08 02:53:12","alt":"IISP logo","file":{"fid":"203339","name":"instituteforinformationsecurityprivacy-outline-black874.jpg","image_path":"\/sites\/default\/files\/images\/instituteforinformationsecurityprivacy-outline-black874_0.jpg","image_full_path":"http:\/\/hg.gatech.edu\/\/sites\/default\/files\/images\/instituteforinformationsecurityprivacy-outline-black874_0.jpg","mime":"image\/jpeg","size":88082,"path_740":"http:\/\/hg.gatech.edu\/sites\/default\/files\/styles\/740xx_scale\/public\/images\/instituteforinformationsecurityprivacy-outline-black874_0.jpg?itok=WFxLCVBe"}},"490641":{"id":"490641","type":"image","title":"Frank Wang, coordinator, The Cybersecurity Factory","body":null,"created":"1453827600","gmt_created":"2016-01-26 17:00:00","changed":"1475895248","gmt_changed":"2016-10-08 02:54:08","alt":"Frank Wang, coordinator, The Cybersecurity Factory","file":{"fid":"204436","name":"rdv-06_big.jpg","image_path":"\/sites\/default\/files\/images\/rdv-06_big_0.jpg","image_full_path":"http:\/\/hg.gatech.edu\/\/sites\/default\/files\/images\/rdv-06_big_0.jpg","mime":"image\/jpeg","size":375718,"path_740":"http:\/\/hg.gatech.edu\/sites\/default\/files\/styles\/740xx_scale\/public\/images\/rdv-06_big_0.jpg?itok=avpkKxFv"}}},"media_ids":["451391","490641"],"groups":[{"id":"47223","name":"College of Computing"},{"id":"50875","name":"School of Computer Science"},{"id":"322011","name":"College of Computing Events"},{"id":"430601","name":"Institute for Information Security and Privacy"}],"categories":[],"keywords":[{"id":"1404","name":"Cybersecurity"},{"id":"141341","name":"Institute for Information Security \u0026 Privacy"}],"core_research_areas":[],"news_room_topics":[],"event_categories":[{"id":"1795","name":"Seminar\/Lecture\/Colloquium"}],"invited_audience":[{"id":"78751","name":"Undergraduate students"},{"id":"78761","name":"Faculty\/Staff"},{"id":"78771","name":"Public"},{"id":"174045","name":"Graduate students"}],"affiliations":[],"classification":[],"areas_of_expertise":[],"news_and_recent_appearances":[],"phone":[],"contact":[],"email":[],"slides":[],"orientation":[],"userdata":""}},"484481":{"#nid":"484481","#data":{"type":"event","title":"2016 Georgia Tech Cyber Security Summit","body":[{"value":"\u003Cp\u003EThe Georgia Tech Cyber Security Summit gathers government, industry, and academia to discuss the newest threats and trends in cyberspace, critical data, and cyber-connected devices.\u003C\/p\u003E\u003Cp\u003EEvery year, security experts see new evolutions in cyberthreats to people, businesses and governments. Our adversaries know no boundaries. Cybersecurity is everyone\u0027s business.\u003C\/p\u003E\u003Cp\u003EThe annual Summit features breakfast, lunch, keynote speeches, panel discussions, and more. All attendees at this full-day summit receive a copy of the \u003Cem\u003E2017 Cyber Threats, Trends \u0026amp; Technologies Report.\u003C\/em\u003E\u003C\/p\u003E\u003Ch3\u003E\u003Cem\u003ERegistration is closed. \u003Cbr \/\u003E\u003C\/em\u003E\u003C\/h3\u003E\u003Cp\u003E\u003Cem\u003E\u003Cbr \/\u003E\u003C\/em\u003E\u003C\/p\u003E\u003Ch5\u003E\u003Cstrong\u003EMorning \u003C\/strong\u003E\u003C\/h5\u003E\u003Cp\u003E\u003Cem\u003E\u003Cstrong\u003E9:30 a.m.\u003C\/strong\u003E\u003C\/em\u003E\u003Cbr \/\u003E Keynote by Keynote by \u003Cstrong\u003E\u003Ca href=\u0022http:\/\/www.cc.gatech.edu\/people\/annie-anton\u0022 target=\u0022_blank\u0022\u003EAnnie Ant\u00f3n\u003C\/a\u003E\u003C\/strong\u003E, chair, School of Interactive Computing; director, \u003Ca href=\u0022http:\/\/theprivacyplace.org\/\u0022 target=\u0022_blank\u0022\u003EThePrivacyPlace.org\u003C\/a\u003E\u003C\/p\u003E\u003Cp\u003E\u003Cem\u003E\u003Cstrong\u003E10:00 a.m.\u003C\/strong\u003E\u003C\/em\u003E\u003Cbr \/\u003E Meet the Students \/ Fall \u002716 Demo Day\u003C\/p\u003E\u003Cp\u003E\u003Cstrong\u003E\u003Cem\u003E11:00 a.m. - Noon\u003C\/em\u003E\u003C\/strong\u003E\u003Cbr \/\u003E \u003Cstrong\u003E\u003Cem\u003EPanel: \u201cPartners in Crisis? Legislation has yet to improve information sharing\u201d\u003C\/em\u003E\u003C\/strong\u003E\u003Cbr \/\u003E Evan Glover, senior counsel, GE Transportation\u003Cbr \/\u003E Paul Huesken, chief information assurance officer, Coca-Cola\u003Cbr \/\u003E Lee Kirschbaum, special agent, FBI\u003Cbr \/\u003E Jimmy Lummis, associate director, Georgia Tech Cyber Security\u003C\/p\u003E\u003Ch5\u003E\u0026nbsp;\u003C\/h5\u003E\u003Ch5\u003E\u003Cstrong\u003EAfternoon \u003C\/strong\u003E\u003C\/h5\u003E\u003Cp\u003E\u003Cem\u003E\u003Cstrong\u003E1:30 p.m.\u003C\/strong\u003E\u003C\/em\u003E\u003Cbr \/\u003E Keynote by \u003Ca href=\u0022http:\/\/www.southerncompany.com\/about-us\/leadership\/ceo\/pdfs\/Tom-Fanning-biography.pdf\u0022 target=\u0022_blank\u0022\u003E\u003Cstrong\u003ETom Fanning\u003C\/strong\u003E\u003C\/a\u003E, chairman, president \u0026amp; CEO, Southern Company\u003C\/p\u003E\u003Ch6\u003E\u003Cstrong\u003EBreakout Sessions\u003C\/strong\u003E\u003C\/h6\u003E\u003Cp\u003E\u003Cstrong\u003E\u003Cem\u003E2:30 - 3:30 p.m.\u003C\/em\u003E\u003C\/strong\u003E\u003Cbr \/\u003E \u003Cstrong\u003E\u003Cem\u003ETRACK A: \u201cRansomware: How to respond\u201d\u003C\/em\u003E\u003C\/strong\u003E\u003Cbr \/\u003E Chris Smoak, division chief, Cyber Technology \u0026amp; Information Security Lab, GTRI\u003Cbr \/\u003E Evan Downing, Ph.D. student, Georgia Tech\u003C\/p\u003E\u003Cp\u003E\u003Cstrong\u003E\u003Cem\u003ETRACK B: \u201cThe Cyber Policy Landscape at Home \u0026amp; Abroad\u201d\u003C\/em\u003E\u003C\/strong\u003E\u003Cbr \/\u003E Klaus Brisch, partner, DWF Germany\u003Cbr \/\u003E Rick Stewart, director of cyber security services, CGI Federal of Canada\u003Cbr \/\u003E Peter Swire, associate director of policy, Institute for Information Security \u0026amp; Privacy\u003C\/p\u003E\u003Cp\u003E\u003Cstrong\u003E\u003Cem\u003E3:30 - 4:30 p.m.\u003C\/em\u003E\u003C\/strong\u003E\u003Cbr \/\u003E \u003Cstrong\u003E\u003Cem\u003ETRACK A: \u201cCryptocurrency: Current and future state of dark money\u201d\u003C\/em\u003E\u003C\/strong\u003E\u003Cbr \/\u003E Mark Ray, PwC, director, Cyber Investigations and Breach Response\u003Cbr \/\u003E SSA Chad Hunt, FBI Atlanta \u2013 Computer Intrusion Squad\u003Cbr \/\u003E Michael Farrell, chief research scientist, CTISL \u2013 GTRI\u003C\/p\u003E\u003Cp\u003E\u003Cstrong\u003E\u003Cem\u003ETRACK B: \u201cCybersecurity: Not just the IT department\u2019s problem\u201d\u003C\/em\u003E\u003C\/strong\u003E\u003Cbr \/\u003E COL Alprentice Smith, Joint Functional Component Command Headquarters, U.S. Army Cyber Command\u003Cbr \/\u003E Leo Mark, associate dean, Georgia Tech Professional Education\u003Cbr \/\u003E Taesoo Kim, assistant professor, School of Computer Science\u003C\/p\u003E\u003Cp\u003E\u003Cem\u003E\u003Cbr \/\u003E\u003C\/em\u003E\u003C\/p\u003E","summary":null,"format":"limited_html"}],"field_subtitle":"","field_summary":[{"value":"\u003Cp\u003EThe Georgia Tech Cyber Security Summit gathers government, industry, and academia to discuss the newest threats and trends in cyberspace, critical data, and cyber-connected devices.\u003C\/p\u003E","format":"limited_html"}],"field_summary_sentence":[{"value":"Georgia Tech invites the public to a free, full-day seminar hosted by the Institute for Information Security \u0026 Privacy."}],"uid":"27490","created_gmt":"2016-01-11 15:45:00","changed_gmt":"2017-04-13 21:17:13","author":"Tara La Bouff","boilerplate_text":"","field_publication":"","field_article_url":"","field_event_time":{"event_time_start":"2016-09-28T09:30:00-04:00","event_time_end":"2016-09-28T17:30:00-04:00","event_time_end_last":"2016-09-28T17:30:00-04:00","gmt_time_start":"2016-09-28 13:30:00","gmt_time_end":"2016-09-28 21:30:00","gmt_time_end_last":"2016-09-28 21:30:00","rrule":null,"timezone":"America\/New_York"},"extras":["free_food"],"hg_media":{"573901":{"id":"573901","type":"image","title":"GTCSS\u002716","body":null,"created":"1473278783","gmt_created":"2016-09-07 20:06:23","changed":"1475895383","gmt_changed":"2016-10-08 02:56:23","alt":"GTCSS\u002716","file":{"fid":"207153","name":"blue_banner_1140x570_01-01.jpg","image_path":"\/sites\/default\/files\/images\/blue_banner_1140x570_01-01.jpg","image_full_path":"http:\/\/hg.gatech.edu\/\/sites\/default\/files\/images\/blue_banner_1140x570_01-01.jpg","mime":"image\/jpeg","size":1775690,"path_740":"http:\/\/hg.gatech.edu\/sites\/default\/files\/styles\/740xx_scale\/public\/images\/blue_banner_1140x570_01-01.jpg?itok=Uv3b90mF"}},"580761":{"id":"580761","type":"image","title":"2016 Keynote Speakers - GT CSS","body":null,"created":"1474488184","gmt_created":"2016-09-21 20:03:04","changed":"1475895391","gmt_changed":"2016-10-08 02:56:31","alt":"2016 Keynote Speakers - GT CSS","file":{"fid":"207346","name":"gtcss_keynotes_091616_2.jpg","image_path":"\/sites\/default\/files\/images\/gtcss_keynotes_091616_2.jpg","image_full_path":"http:\/\/hg.gatech.edu\/\/sites\/default\/files\/images\/gtcss_keynotes_091616_2.jpg","mime":"image\/jpeg","size":192695,"path_740":"http:\/\/hg.gatech.edu\/sites\/default\/files\/styles\/740xx_scale\/public\/images\/gtcss_keynotes_091616_2.jpg?itok=vN67jfSN"}},"451391":{"id":"451391","type":"image","title":"IISP logo","body":null,"created":"1449256280","gmt_created":"2015-12-04 19:11:20","changed":"1475895192","gmt_changed":"2016-10-08 02:53:12","alt":"IISP logo","file":{"fid":"203339","name":"instituteforinformationsecurityprivacy-outline-black874.jpg","image_path":"\/sites\/default\/files\/images\/instituteforinformationsecurityprivacy-outline-black874_0.jpg","image_full_path":"http:\/\/hg.gatech.edu\/\/sites\/default\/files\/images\/instituteforinformationsecurityprivacy-outline-black874_0.jpg","mime":"image\/jpeg","size":88082,"path_740":"http:\/\/hg.gatech.edu\/sites\/default\/files\/styles\/740xx_scale\/public\/images\/instituteforinformationsecurityprivacy-outline-black874_0.jpg?itok=WFxLCVBe"}}},"media_ids":["573901","580761","451391"],"groups":[{"id":"1304","name":"High Performance Computing (HPC)"},{"id":"47223","name":"College of Computing"},{"id":"50875","name":"School of Computer Science"},{"id":"50876","name":"School of Interactive Computing"},{"id":"50877","name":"School of Computational Science and Engineering"},{"id":"69599","name":"IPaT"},{"id":"322011","name":"College of Computing Events"},{"id":"430601","name":"Institute for Information Security and Privacy"}],"categories":[],"keywords":[{"id":"345","name":"cyber security"},{"id":"2254","name":"gtisc"},{"id":"416","name":"GTRI"},{"id":"2678","name":"information security"},{"id":"141341","name":"Institute for Information Security \u0026 Privacy"}],"core_research_areas":[],"news_room_topics":[],"event_categories":[{"id":"1795","name":"Seminar\/Lecture\/Colloquium"}],"invited_audience":[{"id":"78751","name":"Undergraduate students"},{"id":"78761","name":"Faculty\/Staff"},{"id":"78771","name":"Public"},{"id":"174045","name":"Graduate students"}],"affiliations":[],"classification":[],"areas_of_expertise":[],"news_and_recent_appearances":[],"phone":[],"contact":[{"value":"\u003Cp\u003ETara La Bouff, Marketing Communications Manager\u003C\/p\u003E\u003Cp\u003E\u003Ca href=\u0022mailto:tara.labouff@iisp.gatech.edu\u0022\u003Etara.labouff@iisp.gatech.edu\u003C\/a\u003E, 404.769.5408\u003C\/p\u003E","format":"limited_html"}],"email":[],"slides":[],"orientation":[],"userdata":""}}}