{"503121":{"#nid":"503121","#data":{"type":"event","title":"TAG Information Security Joint Event: Cyber Security in Manufacturing","body":[{"value":"\u003Cp\u003EThe increasing interconnectivity of manufacturing control and information systems provides many benefits, but also introduces risks and threats to industrial operations. Join Atlanta\u0027s business community on Tuesday, March 8th as we discuss how to protect assets, machinery, and information in today\u2019s connected manufacturing operations.\u003Cbr \/\u003E \u003C\/p\u003E\u003Cp\u003E\u003Cbr \/\u003E\u003C\/p\u003E\u003Ch6\u003EKeynote\u003C\/h6\u003E\u003Ctable id=\u0022BoxMainTable\u0022 summary=\u0022\u0022 width=\u0022100%\u0022 border=\u00220\u0022 cellspacing=\u00220\u0022 cellpadding=\u00220\u0022\u003E\u003Ctbody\u003E\u003Ctr\u003E\u003Ctd\u003E\u003Ctable summary=\u0022\u0022 width=\u0022100%\u0022 border=\u00220\u0022 cellspacing=\u00220\u0022 cellpadding=\u00220\u0022\u003E\u003Ctbody\u003E\u003Ctr\u003E\u003Ctd class=\u0022linkbox\u0022 valign=\u0022middle\u0022 height=\u002220\u0022\u003E\u003Ctable summary=\u0022\u0022 border=\u00220\u0022 cellspacing=\u00220\u0022 cellpadding=\u00223\u0022\u003E\u003Ctbody\u003E\u003Ctr\u003E\u003Ctd\u003E\u003Ctable summary=\u0022\u0022 border=\u00220\u0022 cellspacing=\u00220\u0022 cellpadding=\u00223\u0022\u003E\u003Ctbody\u003E\u003Ctr\u003E\u003Ctd class=\u0022featuretext\u0022\u003E\u003Cp\u003E\u003Cstrong\u003EAndrew Howard\u003C\/strong\u003E, Director, Cyber Technology \u0026amp; Information Security Laboratory, Georgia Tech Research Institute \u003Cbr \/\u003E \u003Cbr \/\u003E Andrew Howard is the Director of the Cyber Technology \u0026amp; Information Security Laboratory (CTISL) based out of Georgia Tech\u0027s applied research arm, the Georgia Tech Research Institute (GTRI). CTISL conducts applied research focused on cyber threats and countermeasures, secure information sharing, resilient command and control network architectures, and vulnerability identification. \u003C\/p\u003E\u003C\/td\u003E\u003C\/tr\u003E\u003C\/tbody\u003E\u003C\/table\u003E\u003C\/td\u003E\u003C\/tr\u003E\u003C\/tbody\u003E\u003C\/table\u003E\u003C\/td\u003E\u003C\/tr\u003E\u003Ctr\u003E\u003Ctd\u003E\u003C\/td\u003E\u003C\/tr\u003E\u003C\/tbody\u003E\u003C\/table\u003E\u003C\/td\u003E\u003Ctd class=\u0022rightend\u0022 valign=\u0022top\u0022\u003E\u003C\/td\u003E\u003C\/tr\u003E\u003Ctr\u003E\u003Ctd class=\u0022butend\u0022 align=\u0022left\u0022 width=\u0022100%\u0022\u003E\u0026nbsp;\u003C\/td\u003E\u003C\/tr\u003E\u003C\/tbody\u003E\u003C\/table\u003E\u003Ch6\u003EPanelists\u003C\/h6\u003E\u003Cp\u003E\u003Cstrong\u003EDoug Wylie\u003C\/strong\u003E, VP Product Marketing and Strategy, NexDefense, Inc.\u003C\/p\u003E\u003Cp\u003E\u003Cstrong\u003ES\u003C\/strong\u003E\u003Cstrong\u003Ecott Johnston\u003C\/strong\u003E, Network \u0026amp; Security Services Consultant, Rockwell Automation\u003Cbr \/\u003E\u003Cbr \/\u003E \u003C\/p\u003E\u003Ch6\u003E\u003Ca href=\u0022https:\/\/s01.123signup.com\/servlet\/SignUp;jsessionid=991A139758D1ED5626FC0B03CBFD3F59?PG=1521974182300\u0026amp;P=152197400\u0022 target=\u0022_blank\u0022\u003ERegistration Required\u003C\/a\u003E\u003C\/h6\u003E\u003Cp\u003E3:00 - 3:30 p.m. Check-in\u003C\/p\u003E\u003Cp\u003E3:30 - 5:00 p.m. Keynote Speaker \u0026amp; Panel Discussion\u003C\/p\u003E\u003Cp\u003E5:00 - 6:00 p.m. Networking Reception\u003C\/p\u003E\u003Cp\u003E\u003Cem\u003E Hors d\u2019 oeuvres \u0026amp; cocktails served\u003C\/em\u003E\u003C\/p\u003E","summary":null,"format":"limited_html"}],"field_subtitle":"","field_summary":[{"value":"\u003Cp\u003EThe Technology Association of Georgia welcomes Andrew Howard of Georgia Tech Research Institute as keynote speaker at the \u0022Cyber Security in Manufacturing\u0022 event, hosted by TAG Manufacturing and TAG Information Security.\u003C\/p\u003E","format":"limited_html"}],"field_summary_sentence":[{"value":"The Technology Association of Georgia welcomes Andrew Howard of Georgia Tech as keynote speaker."}],"uid":"27490","created_gmt":"2016-02-18 16:47:49","changed_gmt":"2017-04-13 21:16:35","author":"Tara La Bouff","boilerplate_text":"","field_publication":"","field_article_url":"","field_event_time":{"event_time_start":"2016-03-08T14:00:00-05:00","event_time_end":"2016-03-08T17:00:00-05:00","event_time_end_last":"2016-03-08T17:00:00-05:00","gmt_time_start":"2016-03-08 19:00:00","gmt_time_end":"2016-03-08 22:00:00","gmt_time_end_last":"2016-03-08 22:00:00","rrule":null,"timezone":"America\/New_York"},"extras":[],"hg_media":{"503141":{"id":"503141","type":"image","title":"Andrew Howard","body":null,"created":"1456167600","gmt_created":"2016-02-22 19:00:00","changed":"1475895258","gmt_changed":"2016-10-08 02:54:18","alt":"Andrew Howard","file":{"fid":"204671","name":"img_6830.jpg","image_path":"\/sites\/default\/files\/images\/img_6830_0.jpg","image_full_path":"http:\/\/hg.gatech.edu\/\/sites\/default\/files\/images\/img_6830_0.jpg","mime":"image\/jpeg","size":90030,"path_740":"http:\/\/hg.gatech.edu\/sites\/default\/files\/styles\/740xx_scale\/public\/images\/img_6830_0.jpg?itok=1d9qLwcp"}}},"media_ids":["503141"],"groups":[{"id":"430601","name":"Institute for Information Security and Privacy"}],"categories":[],"keywords":[{"id":"1404","name":"Cybersecurity"}],"core_research_areas":[],"news_room_topics":[],"event_categories":[{"id":"1789","name":"Conference\/Symposium"}],"invited_audience":[{"id":"78751","name":"Undergraduate students"},{"id":"78761","name":"Faculty\/Staff"},{"id":"78771","name":"Public"},{"id":"174045","name":"Graduate students"}],"affiliations":[],"classification":[],"areas_of_expertise":[],"news_and_recent_appearances":[],"phone":[],"contact":[],"email":[],"slides":[],"orientation":[],"userdata":""}}}