<nodes> <node id="484721">  <title><![CDATA[Cybersecurity Lecture Series - Jan. 29]]></title>  <uid>27490</uid>  <body><![CDATA[<p>Meet academic and industry leaders for intimate discussions about new threats, trends and technologies. Preview new cybersecurity research ahead of international conferences. Hear from exceptional Georgia Tech students about their body of work.</p><p>&nbsp;</p><p><strong>Jan. 29&nbsp; Guest Speaker</strong></p><h3><a href="http://www.cc.gatech.edu/~blee303/" target="_blank"><strong>Byoungyoung Lee</strong></a><br /><em>PhD Candidate, College of Computing</em></h3><p><em><br /></em></p><p>PhD Candidate Byoungyoung Lee presents a summary of cybersecurity research results and accomplishments while at Georgia Tech.</p><p><strong><em>Abstract:</em></strong> Many system components and network applications are written in unsafe programming languages that are prone to memory corruption vulnerabilities. To combat countless catastrophes from these vulnerabilities, there have been many defense research efforts. However, these were largely limited because their techniques focused on certain negative side effects from those vulnerabilities. As a result, there have been many unfortunate cases when security holes in these mitigation solutions are later uncovered, and significantly thwart the security of underlying systems. In this talk, I'll present a protection system which completely eliminates the root cause of those vulnerabilities. Specifically, I have targeted two popular and emerging vulnerabilities, use-after-free and bad-casting, each of which can be addressed with protection systems that I developed as a student at Georgia Tech: DangNull and CaVer, respectively. Since DangNull and CaVer directly fix the origin of such issues, they do not leave any security holes that attackers could abuse in the future. <br />DangNull and CaVer have been recognized by both academia and industry for their highly practical impacts: Facebook and USENIX awarded the Internet Defense Prize, and CSAW awarded the "best applied security research paper." Meanwhile, Google and Mozilla deployed DangNull and CaVer, respectively, in their development infrastructures.</p><p>Lunch provided. No registration necessary.<br /><br /></p><p><a href="http://www.iisp.gatech.edu/cyber-lecture" target="_blank"><strong><em>Spring 2016 Schedule</em></strong></a><br /> <strong>Jan. 15</strong> — Opening discussion<br /> <strong>Jan. 22</strong> — Milos Prvulovic<br /> <strong>Jan. 29</strong> — PhD Candidate - Byoungyoung Lee<br /> <strong>Feb. 5</strong> — TBD <br /> <strong>Feb. 12</strong> — TBD <br /> <strong>Feb. 19</strong> — NDSS Conference Preview -&nbsp; Chengyu Song, Wei Meng<br /> <strong>Feb. 26</strong> — Stephen Pair, co-founder and CEO, <a href="https://bitpay.com/about" target="_blank">BitPay</a><br /> <strong>Mar. 4</strong> — Frank Wang, coordinator, <a href="http://cybersecurityfactory.com/" target="_blank">The Cybersecurity Factory</a><br /> <strong>Mar. 11</strong> – David Formby, Xiaojing Liao<br /> <strong>Mar. 18</strong> – TBD<br /> <strong>Mar. 25</strong> – Spring Break<br /> <strong>Apr. 1</strong> – TBD<br /> <strong>Apr. 8 </strong>– TBD<br /> <strong>Apr. 15</strong> – TBD<br /> <strong>Apr. 22 </strong>– Closing session</p><p>Sponsored by MailChimp</p>]]></body>  <author>Tara La Bouff</author>  <status>1</status>  <created>1452547040</created>  <gmt_created>2016-01-11 21:17:20</gmt_created>  <changed>1492118231</changed>  <gmt_changed>2017-04-13 21:17:11</gmt_changed>  <promote>0</promote>  <sticky>0</sticky>  <teaser><![CDATA[Anyone interested in cybersecurity intelligence and skill development is invited to a free lecture series, held each Friday at Georgia Tech.]]></teaser>  <type>event</type>  <sentence><![CDATA[Anyone interested in cybersecurity intelligence and skill development is invited to a free lecture series, held each Friday at Georgia Tech.]]></sentence>  <summary><![CDATA[]]></summary>  <start>2016-01-29T11:00:00-05:00</start>  <end>2016-01-29T12:00:00-05:00</end>  <end_last>2016-01-29T12:00:00-05:00</end_last>  <gmt_start>2016-01-29 16:00:00</gmt_start>  <gmt_end>2016-01-29 17:00:00</gmt_end>  <gmt_end_last>2016-01-29 17:00:00</gmt_end_last>  <times>    <item>      <value>2016-01-29T11:00:00-05:00</value>      <value2>2016-01-29T12:00:00-05:00</value2>      <rrule><![CDATA[  ]]></rrule>      <timezone>America/New_York</timezone>      <timezone_db>America/New_York</timezone_db>      <date_type>datetime</date_type>    </item>  </times>  <gmt_times>    <item>      <value>2016-01-29 11:00:00</value>      <value2>2016-01-29 12:00:00</value2>      <rrule><![CDATA[  ]]></rrule>      <timezone>America/New_York</timezone>      <timezone_db>America/New_York</timezone_db>      <date_type>datetime</date_type>    </item>  </gmt_times>  <phone><![CDATA[]]></phone>  <url><![CDATA[http://map.gatech.edu/]]></url>  <location_url>    <url><![CDATA[http://map.gatech.edu/]]></url>    <title><![CDATA[]]></title>  </location_url>  <email><![CDATA[info@iisp.gatech.edu]]></email>  <contact><![CDATA[]]></contact>  <fee><![CDATA[$0.00]]></fee>  <extras>          <extra><![CDATA[free_food]]></extra>      </extras>  <location><![CDATA[]]></location>  <media>          <item>451391</item>      </media>  <hg_media>          <item>          <nid>451391</nid>          <type>image</type>          <title><![CDATA[IISP logo]]></title>          <body><![CDATA[]]></body>                      <image_name><![CDATA[instituteforinformationsecurityprivacy-outline-black874.jpg]]></image_name>            <image_path><![CDATA[/sites/default/files/images/instituteforinformationsecurityprivacy-outline-black874_0.jpg]]></image_path>            <image_full_path><![CDATA[http://hg.gatech.edu//sites/default/files/images/instituteforinformationsecurityprivacy-outline-black874_0.jpg]]></image_full_path>            <image_740><![CDATA[http://hg.gatech.edu/sites/default/files/styles/740xx_scale/public/sites/default/files/images/instituteforinformationsecurityprivacy-outline-black874_0.jpg?itok=DRliGWLr]]></image_740>            <image_mime>image/jpeg</image_mime>            <image_alt><![CDATA[IISP logo]]></image_alt>                              <created>1449256280</created>          <gmt_created>2015-12-04 19:11:20</gmt_created>          <changed>1475895192</changed>          <gmt_changed>2016-10-08 02:53:12</gmt_changed>      </item>      </hg_media>  <boilerplate></boilerplate>  <boilerplate_text><![CDATA[]]></boilerplate_text>  <sidebar><![CDATA[]]></sidebar>  <related>      </related>  <files>      </files>  <groups>          <group id="47223"><![CDATA[College of Computing]]></group>          <group id="50875"><![CDATA[School of Computer Science]]></group>          <group id="322011"><![CDATA[College of Computing Events]]></group>          <group id="430601"><![CDATA[Institute for Information Security and Privacy]]></group>      </groups>  <categories>          <category tid="1795"><![CDATA[Seminar/Lecture/Colloquium]]></category>      </categories>  <event_terms>          <term tid="1795"><![CDATA[Seminar/Lecture/Colloquium]]></term>      </event_terms>  <event_audience>          <term tid="78751"><![CDATA[Undergraduate students]]></term>          <term tid="78761"><![CDATA[Faculty/Staff]]></term>          <term tid="78771"><![CDATA[Public]]></term>          <term tid="174045"><![CDATA[Graduate students]]></term>      </event_audience>  <keywords>          <keyword tid="1404"><![CDATA[Cybersecurity]]></keyword>          <keyword tid="141341"><![CDATA[Institute for Information Security &amp; Privacy]]></keyword>      </keywords>  <userdata><![CDATA[]]></userdata></node><node id="484761">  <title><![CDATA[Cybersecurity Lecture Series - Mar. 4]]></title>  <uid>27490</uid>  <body><![CDATA[<p>Meet academic and industry leaders for intimate discussions about new threats, trends and technologies. Preview new cybersecurity research ahead of international conferences. Hear from exceptional Georgia Tech students about their body of work.</p><p>&nbsp;</p><p><strong>Mar. 4&nbsp; Guest Speaker</strong></p><h3><strong>Frank Wang</strong><br /><em>Coordinator, <a href="http://cybersecurityfactory.com/" target="_blank">The Cybersecurity Factory</a><br /></em></h3><p><em><br /></em></p><p>Frank Wang is a PhD student at MIT focusing on building secure systems. He did his undergraduate at Stanford, focusing on cryptography. He runs the MIT security seminar and is a member of the student team at Roughdraft Ventures, which provides small capital to early stage student startups. He has interned at the security teams at Google and Facebook as well as consulted for various security companies, such as Qualys.</p><p><em><strong>Abstract:</strong> </em>Security has become a hot topic given recent hacks of major corporations, like Sony, Home Depot, and Anthem. However, those hacks were easily preventable with the correct technology. The problem is that many times, security research is not being properly commercialized. In this talk, learn about some cutting-edge security research being done in universities, their barriers to adoption, and the need to bridge the gap between academia and industry -- motivating the formation of a cybersecurity accelerator focused on students, <a href="http://cybersecurityfactory.com/" target="_blank">The Cybersecurity Factory.</a>&nbsp;</p><p>Lunch provided. No registration necessary.</p><p>&nbsp;</p><p><a href="http://www.iisp.gatech.edu/cyber-lecture" target="_blank"><strong><em>Spring 2016 Schedule</em></strong></a><br /> <strong>Jan. 15</strong> — Opening discussion<br /> <strong>Jan. 22</strong> — Milos Prvulovic<br /> <strong>Jan. 29</strong> — PhD Candidate - Byoungyoung Lee<br /> <strong>Feb. 5</strong> — NDSS Conference Preview<br /> <strong>Feb. 12</strong> — NDSS Conference Preview<br /> <strong>Feb. 19</strong> — NDSS Conference Preview <br /> <strong>Feb. 26</strong> — Stephen Pair, co-founder and CEO, <a href="https://bitpay.com/about" target="_blank">BitPay</a><br /> <strong>Mar. 4</strong> — Frank Wang, coordinator, <a href="http://cybersecurityfactory.com/" target="_blank">The Cybersecurity Factory</a><br /> <strong>Mar. 11</strong> – Sivakumar "Siva" Raghupathy, director, <a href="http://create-x.gatech.edu/" target="_blank">CREATE-X</a><br /> <strong>Mar. 18</strong> – David Formby, Xiaojing Liao<br /> <strong>Mar. 25</strong> – Spring Break<br /> <strong>Apr. 1</strong> – Capital One<br /> <strong>Apr. 8 </strong>– TBD<br /> <strong>Apr. 15</strong> – TBD<br /> <strong>Apr. 22 </strong>– Closing session</p><p>Sponsored by MailChimp</p>]]></body>  <author>Tara La Bouff</author>  <status>1</status>  <created>1452548968</created>  <gmt_created>2016-01-11 21:49:28</gmt_created>  <changed>1492118231</changed>  <gmt_changed>2017-04-13 21:17:11</gmt_changed>  <promote>0</promote>  <sticky>0</sticky>  <teaser><![CDATA[Anyone interested in cybersecurity intelligence and skill development is invited to a free lecture series, held each Friday at Georgia Tech.]]></teaser>  <type>event</type>  <sentence><![CDATA[Anyone interested in cybersecurity intelligence and skill development is invited to a free lecture series, held each Friday at Georgia Tech.]]></sentence>  <summary><![CDATA[<p>Presentation by Frank Wang, PhD student at MIT focused on building secure systems, for a discussion about entrepreneurism and early stage student startups.</p>]]></summary>  <start>2016-03-04T11:00:00-05:00</start>  <end>2016-03-04T12:00:00-05:00</end>  <end_last>2016-03-04T12:00:00-05:00</end_last>  <gmt_start>2016-03-04 16:00:00</gmt_start>  <gmt_end>2016-03-04 17:00:00</gmt_end>  <gmt_end_last>2016-03-04 17:00:00</gmt_end_last>  <times>    <item>      <value>2016-03-04T11:00:00-05:00</value>      <value2>2016-03-04T12:00:00-05:00</value2>      <rrule><![CDATA[  ]]></rrule>      <timezone>America/New_York</timezone>      <timezone_db>America/New_York</timezone_db>      <date_type>datetime</date_type>    </item>  </times>  <gmt_times>    <item>      <value>2016-03-04 11:00:00</value>      <value2>2016-03-04 12:00:00</value2>      <rrule><![CDATA[  ]]></rrule>      <timezone>America/New_York</timezone>      <timezone_db>America/New_York</timezone_db>      <date_type>datetime</date_type>    </item>  </gmt_times>  <phone><![CDATA[]]></phone>  <url><![CDATA[http://map.gatech.edu/]]></url>  <location_url>    <url><![CDATA[http://map.gatech.edu/]]></url>    <title><![CDATA[]]></title>  </location_url>  <email><![CDATA[info@iisp.gatech.edu]]></email>  <contact><![CDATA[]]></contact>  <fee><![CDATA[$0.00]]></fee>  <extras>          <extra><![CDATA[free_food]]></extra>      </extras>  <location><![CDATA[]]></location>  <media>          <item>451391</item>          <item>490641</item>      </media>  <hg_media>          <item>          <nid>451391</nid>          <type>image</type>          <title><![CDATA[IISP logo]]></title>          <body><![CDATA[]]></body>                      <image_name><![CDATA[instituteforinformationsecurityprivacy-outline-black874.jpg]]></image_name>            <image_path><![CDATA[/sites/default/files/images/instituteforinformationsecurityprivacy-outline-black874_0.jpg]]></image_path>            <image_full_path><![CDATA[http://hg.gatech.edu//sites/default/files/images/instituteforinformationsecurityprivacy-outline-black874_0.jpg]]></image_full_path>            <image_740><![CDATA[http://hg.gatech.edu/sites/default/files/styles/740xx_scale/public/sites/default/files/images/instituteforinformationsecurityprivacy-outline-black874_0.jpg?itok=DRliGWLr]]></image_740>            <image_mime>image/jpeg</image_mime>            <image_alt><![CDATA[IISP logo]]></image_alt>                              <created>1449256280</created>          <gmt_created>2015-12-04 19:11:20</gmt_created>          <changed>1475895192</changed>          <gmt_changed>2016-10-08 02:53:12</gmt_changed>      </item>          <item>          <nid>490641</nid>          <type>image</type>          <title><![CDATA[Frank Wang, coordinator, The Cybersecurity Factory]]></title>          <body><![CDATA[]]></body>                      <image_name><![CDATA[rdv-06_big.jpg]]></image_name>            <image_path><![CDATA[/sites/default/files/images/rdv-06_big_0.jpg]]></image_path>            <image_full_path><![CDATA[http://hg.gatech.edu//sites/default/files/images/rdv-06_big_0.jpg]]></image_full_path>            <image_740><![CDATA[http://hg.gatech.edu/sites/default/files/styles/740xx_scale/public/sites/default/files/images/rdv-06_big_0.jpg?itok=t2tXJZN_]]></image_740>            <image_mime>image/jpeg</image_mime>            <image_alt><![CDATA[Frank Wang, coordinator, The Cybersecurity Factory]]></image_alt>                              <created>1453827600</created>          <gmt_created>2016-01-26 17:00:00</gmt_created>          <changed>1475895248</changed>          <gmt_changed>2016-10-08 02:54:08</gmt_changed>      </item>      </hg_media>  <boilerplate></boilerplate>  <boilerplate_text><![CDATA[]]></boilerplate_text>  <sidebar><![CDATA[]]></sidebar>  <related>      </related>  <files>      </files>  <groups>          <group id="47223"><![CDATA[College of Computing]]></group>          <group id="50875"><![CDATA[School of Computer Science]]></group>          <group id="322011"><![CDATA[College of Computing Events]]></group>          <group id="430601"><![CDATA[Institute for Information Security and Privacy]]></group>      </groups>  <categories>          <category tid="1795"><![CDATA[Seminar/Lecture/Colloquium]]></category>      </categories>  <event_terms>          <term tid="1795"><![CDATA[Seminar/Lecture/Colloquium]]></term>      </event_terms>  <event_audience>          <term tid="78751"><![CDATA[Undergraduate students]]></term>          <term tid="78761"><![CDATA[Faculty/Staff]]></term>          <term tid="78771"><![CDATA[Public]]></term>          <term tid="174045"><![CDATA[Graduate students]]></term>      </event_audience>  <keywords>          <keyword tid="1404"><![CDATA[Cybersecurity]]></keyword>          <keyword tid="141341"><![CDATA[Institute for Information Security &amp; Privacy]]></keyword>      </keywords>  <userdata><![CDATA[]]></userdata></node><node id="484481">  <title><![CDATA[2016 Georgia Tech Cyber Security Summit]]></title>  <uid>27490</uid>  <body><![CDATA[<p>The Georgia Tech Cyber Security Summit gathers government, industry, and academia to discuss the newest threats and trends in cyberspace, critical data, and cyber-connected devices.</p><p>Every year, security experts see new evolutions in cyberthreats to people, businesses and governments. Our adversaries know no boundaries. Cybersecurity is everyone's business.</p><p>The annual Summit features breakfast, lunch, keynote speeches, panel discussions, and more. All attendees at this full-day summit receive a copy of the <em>2017 Cyber Threats, Trends &amp; Technologies Report.</em></p><h3><em>Registration is closed. <br /></em></h3><p><em><br /></em></p><h5><strong>Morning </strong></h5><p><em><strong>9:30 a.m.</strong></em><br /> Keynote by Keynote by <strong><a href="http://www.cc.gatech.edu/people/annie-anton" target="_blank">Annie Antón</a></strong>, chair, School of Interactive Computing; director, <a href="http://theprivacyplace.org/" target="_blank">ThePrivacyPlace.org</a></p><p><em><strong>10:00 a.m.</strong></em><br /> Meet the Students / Fall '16 Demo Day</p><p><strong><em>11:00 a.m. - Noon</em></strong><br /> <strong><em>Panel: “Partners in Crisis? Legislation has yet to improve information sharing”</em></strong><br /> Evan Glover, senior counsel, GE Transportation<br /> Paul Huesken, chief information assurance officer, Coca-Cola<br /> Lee Kirschbaum, special agent, FBI<br /> Jimmy Lummis, associate director, Georgia Tech Cyber Security</p><h5>&nbsp;</h5><h5><strong>Afternoon </strong></h5><p><em><strong>1:30 p.m.</strong></em><br /> Keynote by <a href="http://www.southerncompany.com/about-us/leadership/ceo/pdfs/Tom-Fanning-biography.pdf" target="_blank"><strong>Tom Fanning</strong></a>, chairman, president &amp; CEO, Southern Company</p><h6><strong>Breakout Sessions</strong></h6><p><strong><em>2:30 - 3:30 p.m.</em></strong><br /> <strong><em>TRACK A: “Ransomware: How to respond”</em></strong><br /> Chris Smoak, division chief, Cyber Technology &amp; Information Security Lab, GTRI<br /> Evan Downing, Ph.D. student, Georgia Tech</p><p><strong><em>TRACK B: “The Cyber Policy Landscape at Home &amp; Abroad”</em></strong><br /> Klaus Brisch, partner, DWF Germany<br /> Rick Stewart, director of cyber security services, CGI Federal of Canada<br /> Peter Swire, associate director of policy, Institute for Information Security &amp; Privacy</p><p><strong><em>3:30 - 4:30 p.m.</em></strong><br /> <strong><em>TRACK A: “Cryptocurrency: Current and future state of dark money”</em></strong><br /> Mark Ray, PwC, director, Cyber Investigations and Breach Response<br /> SSA Chad Hunt, FBI Atlanta – Computer Intrusion Squad<br /> Michael Farrell, chief research scientist, CTISL – GTRI</p><p><strong><em>TRACK B: “Cybersecurity: Not just the IT department’s problem”</em></strong><br /> COL Alprentice Smith, Joint Functional Component Command Headquarters, U.S. Army Cyber Command<br /> Leo Mark, associate dean, Georgia Tech Professional Education<br /> Taesoo Kim, assistant professor, School of Computer Science</p><p><em><br /></em></p>]]></body>  <author>Tara La Bouff</author>  <status>1</status>  <created>1452527100</created>  <gmt_created>2016-01-11 15:45:00</gmt_created>  <changed>1492118233</changed>  <gmt_changed>2017-04-13 21:17:13</gmt_changed>  <promote>0</promote>  <sticky>0</sticky>  <teaser><![CDATA[Georgia Tech invites the public to a free, full-day seminar hosted by the Institute for Information Security & Privacy.]]></teaser>  <type>event</type>  <sentence><![CDATA[Georgia Tech invites the public to a free, full-day seminar hosted by the Institute for Information Security & Privacy.]]></sentence>  <summary><![CDATA[<p>The Georgia Tech Cyber Security Summit gathers government, industry, and academia to discuss the newest threats and trends in cyberspace, critical data, and cyber-connected devices.</p>]]></summary>  <start>2016-09-28T09:30:00-04:00</start>  <end>2016-09-28T17:30:00-04:00</end>  <end_last>2016-09-28T17:30:00-04:00</end_last>  <gmt_start>2016-09-28 13:30:00</gmt_start>  <gmt_end>2016-09-28 21:30:00</gmt_end>  <gmt_end_last>2016-09-28 21:30:00</gmt_end_last>  <times>    <item>      <value>2016-09-28T09:30:00-04:00</value>      <value2>2016-09-28T17:30:00-04:00</value2>      <rrule><![CDATA[  ]]></rrule>      <timezone>America/New_York</timezone>      <timezone_db>America/New_York</timezone_db>      <date_type>datetime</date_type>    </item>  </times>  <gmt_times>    <item>      <value>2016-09-28 09:30:00</value>      <value2>2016-09-28 05:30:00</value2>      <rrule><![CDATA[  ]]></rrule>      <timezone>America/New_York</timezone>      <timezone_db>America/New_York</timezone_db>      <date_type>datetime</date_type>    </item>  </gmt_times>  <phone><![CDATA[]]></phone>  <url><![CDATA[http://www.iisp.gatech.edu/2016-cyber-security-summit]]></url>  <location_url>    <url><![CDATA[http://www.iisp.gatech.edu/2016-cyber-security-summit]]></url>    <title><![CDATA[]]></title>  </location_url>  <email><![CDATA[]]></email>  <contact><![CDATA[<p>Tara La Bouff, Marketing Communications Manager</p><p><a href="mailto:tara.labouff@iisp.gatech.edu">tara.labouff@iisp.gatech.edu</a>, 404.769.5408</p>]]></contact>  <fee><![CDATA[$0.00]]></fee>  <extras>          <extra><![CDATA[free_food]]></extra>      </extras>  <location><![CDATA[]]></location>  <media>          <item>573901</item>          <item>580761</item>          <item>451391</item>      </media>  <hg_media>          <item>          <nid>573901</nid>          <type>image</type>          <title><![CDATA[GTCSS'16]]></title>          <body><![CDATA[]]></body>                      <image_name><![CDATA[blue_banner_1140x570_01-01.jpg]]></image_name>            <image_path><![CDATA[/sites/default/files/images/blue_banner_1140x570_01-01.jpg]]></image_path>            <image_full_path><![CDATA[http://hg.gatech.edu//sites/default/files/images/blue_banner_1140x570_01-01.jpg]]></image_full_path>            <image_740><![CDATA[http://hg.gatech.edu/sites/default/files/styles/740xx_scale/public/sites/default/files/images/blue_banner_1140x570_01-01.jpg?itok=GBc4wVA0]]></image_740>            <image_mime>image/jpeg</image_mime>            <image_alt><![CDATA[GTCSS&#039;16]]></image_alt>                              <created>1473278783</created>          <gmt_created>2016-09-07 20:06:23</gmt_created>          <changed>1475895383</changed>          <gmt_changed>2016-10-08 02:56:23</gmt_changed>      </item>          <item>          <nid>580761</nid>          <type>image</type>          <title><![CDATA[2016 Keynote Speakers - GT CSS]]></title>          <body><![CDATA[]]></body>                      <image_name><![CDATA[gtcss_keynotes_091616_2.jpg]]></image_name>            <image_path><![CDATA[/sites/default/files/images/gtcss_keynotes_091616_2.jpg]]></image_path>            <image_full_path><![CDATA[http://hg.gatech.edu//sites/default/files/images/gtcss_keynotes_091616_2.jpg]]></image_full_path>            <image_740><![CDATA[http://hg.gatech.edu/sites/default/files/styles/740xx_scale/public/sites/default/files/images/gtcss_keynotes_091616_2.jpg?itok=0WvLLfT3]]></image_740>            <image_mime>image/jpeg</image_mime>            <image_alt><![CDATA[2016 Keynote Speakers - GT CSS]]></image_alt>                              <created>1474488184</created>          <gmt_created>2016-09-21 20:03:04</gmt_created>          <changed>1475895391</changed>          <gmt_changed>2016-10-08 02:56:31</gmt_changed>      </item>          <item>          <nid>451391</nid>          <type>image</type>          <title><![CDATA[IISP logo]]></title>          <body><![CDATA[]]></body>                      <image_name><![CDATA[instituteforinformationsecurityprivacy-outline-black874.jpg]]></image_name>            <image_path><![CDATA[/sites/default/files/images/instituteforinformationsecurityprivacy-outline-black874_0.jpg]]></image_path>            <image_full_path><![CDATA[http://hg.gatech.edu//sites/default/files/images/instituteforinformationsecurityprivacy-outline-black874_0.jpg]]></image_full_path>            <image_740><![CDATA[http://hg.gatech.edu/sites/default/files/styles/740xx_scale/public/sites/default/files/images/instituteforinformationsecurityprivacy-outline-black874_0.jpg?itok=DRliGWLr]]></image_740>            <image_mime>image/jpeg</image_mime>            <image_alt><![CDATA[IISP logo]]></image_alt>                              <created>1449256280</created>          <gmt_created>2015-12-04 19:11:20</gmt_created>          <changed>1475895192</changed>          <gmt_changed>2016-10-08 02:53:12</gmt_changed>      </item>      </hg_media>  <boilerplate></boilerplate>  <boilerplate_text><![CDATA[]]></boilerplate_text>  <sidebar><![CDATA[]]></sidebar>  <related>      </related>  <files>      </files>  <groups>          <group id="1304"><![CDATA[High Performance Computing (HPC)]]></group>          <group id="47223"><![CDATA[College of Computing]]></group>          <group id="50875"><![CDATA[School of Computer Science]]></group>          <group id="50876"><![CDATA[School of Interactive Computing]]></group>          <group id="50877"><![CDATA[School of Computational Science and Engineering]]></group>          <group id="69599"><![CDATA[IPaT]]></group>          <group id="322011"><![CDATA[College of Computing Events]]></group>          <group id="430601"><![CDATA[Institute for Information Security and Privacy]]></group>      </groups>  <categories>          <category tid="1795"><![CDATA[Seminar/Lecture/Colloquium]]></category>      </categories>  <event_terms>          <term tid="1795"><![CDATA[Seminar/Lecture/Colloquium]]></term>      </event_terms>  <event_audience>          <term tid="78751"><![CDATA[Undergraduate students]]></term>          <term tid="78761"><![CDATA[Faculty/Staff]]></term>          <term tid="78771"><![CDATA[Public]]></term>          <term tid="174045"><![CDATA[Graduate students]]></term>      </event_audience>  <keywords>          <keyword tid="345"><![CDATA[cyber security]]></keyword>          <keyword tid="2254"><![CDATA[gtisc]]></keyword>          <keyword tid="416"><![CDATA[GTRI]]></keyword>          <keyword tid="2678"><![CDATA[information security]]></keyword>          <keyword tid="141341"><![CDATA[Institute for Information Security &amp; Privacy]]></keyword>      </keywords>  <userdata><![CDATA[]]></userdata></node></nodes>