{"513731":{"#nid":"513731","#data":{"type":"event","title":"Cybersecurity Lecture Series - Apr. 1","body":[{"value":"\u003Cp\u003EMeet academic and industry leaders for intimate discussions about new threats, trends and technologies. Preview new cybersecurity research ahead of international conferences. Hear from exceptional Georgia Tech students about their body of work.\u003C\/p\u003E\u003Cp\u003E\u0026nbsp;\u003C\/p\u003E\u003Cp\u003E\u003Cstrong\u003EApr. 1\u0026nbsp; Guest Speaker\u003C\/strong\u003E\u003C\/p\u003E\u003Ch3\u003E\u003Cem\u003EAdam Wenchel, vice president for security and technology analytics, \u003Ca href=\u0022https:\/\/www.capitalone.com\/about\/?Log=1\u0026amp;EventType=Link\u0026amp;ComponentType=T\u0026amp;LOB=MTS%3A%3ALVFX4215\u0026amp;PageName=Small+Business+Bank+Homepage\u0026amp;PortletLocation=5\u0026amp;ComponentName=footer\u0026amp;ContentElement=12%3BAbout+Capital+One\u0026amp;TargetLob=MTS%3A%3ALCTMJBE8Z\u0026amp;TargetPageName=About+Capital+One\u0026amp;referer=https%3A%2F%2Fwww.capitalone.com%2Fsmall-business-bank\u0022 target=\u0022_blank\u0022\u003ECapital One\u003C\/a\u003E\u003Cbr \/\u003E\u003C\/em\u003E\u003C\/h3\u003E\u003Cp\u003E\u0026nbsp;\u003C\/p\u003E\u003Cp\u003EAdam Wenchel from Capital One leads a discussion about information security in the financial sector -- specifically \u0022cyber data lakes\u0022 and the use of machine learning to advance cybersecurity analytics capabilities.\u003C\/p\u003E\u003Cp\u003EWenchel has served as Capital One\u0027s vice president for security and technology analytics since 2015. Prior to that he led a cybersecurity startup named Anax Security and focused on malware detection technology. He also has led the technology teams at several well-funded startups, including serving as the executive vice president for engineering at Endgame, a well known cybersecurity company. Wenchel has been involved in a number of successful D.C.-area startups, including serving as the CTO of EverFi and heading up the engineering team at Govolution. While at EverFi, Wenchel chaired the White House working group on universal authentication.\u003C\/p\u003E\u003Cp\u003ELunch provided. No registration necessary.\u003C\/p\u003E\u003Cp\u003E\u0026nbsp;\u003C\/p\u003E\u003Cp\u003E\u003Ca href=\u0022http:\/\/www.iisp.gatech.edu\/cyber-lecture\u0022 target=\u0022_blank\u0022\u003E\u003Cstrong\u003E\u003Cem\u003ESpring 2016 Schedule\u003C\/em\u003E\u003C\/strong\u003E\u003C\/a\u003E\u003Cbr \/\u003E \u003Cstrong\u003EJan. 15\u003C\/strong\u003E \u2014 Opening discussion\u003Cbr \/\u003E \u003Cstrong\u003EJan. 22\u003C\/strong\u003E \u2014 Milos Prvulovic\u003Cbr \/\u003E \u003Cstrong\u003EJan. 29\u003C\/strong\u003E \u2014 PhD Candidate - Byoungyoung Lee\u003Cbr \/\u003E \u003Cstrong\u003EFeb. 5\u003C\/strong\u003E \u2014 NDSS Conference Preview\u003Cbr \/\u003E \u003Cstrong\u003EFeb. 12\u003C\/strong\u003E \u2014 NDSS Conference Preview\u003Cbr \/\u003E \u003Cstrong\u003EFeb. 19\u003C\/strong\u003E \u2014 NDSS Conference Preview \u003Cbr \/\u003E \u003Cstrong\u003EFeb. 26\u003C\/strong\u003E \u2014 Stephen Pair, co-founder and CEO, \u003Ca href=\u0022https:\/\/bitpay.com\/about\u0022 target=\u0022_blank\u0022\u003EBitPay\u003C\/a\u003E\u003Cbr \/\u003E \u003Cstrong\u003EMar. 4\u003C\/strong\u003E \u2014 Frank Wang, coordinator, \u003Ca href=\u0022http:\/\/cybersecurityfactory.com\/\u0022 target=\u0022_blank\u0022\u003EThe Cybersecurity Factory\u003C\/a\u003E\u003Cbr \/\u003E \u003Cstrong\u003EMar. 11\u003C\/strong\u003E \u2013 Raghupathy \u0022Siva\u0022 Sivakumar, director,\u003Ca href=\u0022http:\/\/create-x.gatech.edu\/\u0022 target=\u0022_blank\u0022\u003E CREATE-X\u003C\/a\u003E\u003C\/p\u003E\u003Cp\u003E\u003Cstrong\u003EMar. 18\u003C\/strong\u003E \u2013 PhD Candidates - David Formby, Xiaojing Liao\u003Cbr \/\u003E \u003Cstrong\u003EMar. 25\u003C\/strong\u003E \u2013 Spring Break\u003Cbr \/\u003E \u003Cstrong\u003EApr. 1\u003C\/strong\u003E \u2013 Adam Wenchel, vice president, \u003Ca href=\u0022https:\/\/www.capitalone.com\/about\/?Log=1\u0026amp;EventType=Link\u0026amp;ComponentType=T\u0026amp;LOB=MTS%3A%3ALVFX4215\u0026amp;PageName=Small+Business+Bank+Homepage\u0026amp;PortletLocation=5\u0026amp;ComponentName=footer\u0026amp;ContentElement=12%3BAbout+Capital+One\u0026amp;TargetLob=MTS%3A%3ALCTMJBE8Z\u0026amp;TargetPageName=About+Capital+One\u0026amp;referer=https%3A%2F%2Fwww.capitalone.com%2Fsmall-business-bank\u0022 target=\u0022_blank\u0022\u003ECapital One\u003C\/a\u003E\u003Cbr \/\u003E \u003Cstrong\u003EApr. 8 \u003C\/strong\u003E\u2013 Kyle Grossman and Jim Schwoebel, co-founders, \u003Ca href=\u0022http:\/\/www.cyberlaunch.vc\/\u0022 target=\u0022_blank\u0022\u003ECyberLaunch\u003C\/a\u003E\u003Cbr \/\u003E \u003Cstrong\u003EApr. 15\u003C\/strong\u003E \u2013 John Corliss, sr. computer scientist, \u003Ca href=\u0022https:\/\/www.dhs.gov\/\u0022 target=\u0022_blank\u0022\u003EU.S. Department of Homeland Security\u003C\/a\u003E\u003Cbr \/\u003E \u003Cstrong\u003EApr. 22 \u003C\/strong\u003E\u2013 Tim Junio\u003Cem\u003E,\u003C\/em\u003E co-founder and CEO, \u003Ca href=\u0022https:\/\/qadium.com\/\u0022 target=\u0022_blank\u0022\u003EQadium Inc.\u003C\/a\u003E\u003C\/p\u003E\u003Cp\u003ESponsored by MailChimp\u003C\/p\u003E","summary":null,"format":"limited_html"}],"field_subtitle":"","field_summary":[{"value":"\u003Cp\u003EExecutive leadership from Capital One leads a discussion about information security in the financial sector. Lunch provided. No registration necessary.\u003C\/p\u003E","format":"limited_html"}],"field_summary_sentence":[{"value":"Meet students, academic and industry leaders for intimate discussions about new threats, trends and technologies."}],"uid":"27490","created_gmt":"2016-03-15 16:57:12","changed_gmt":"2017-04-13 21:16:19","author":"Tara La Bouff","boilerplate_text":"","field_publication":"","field_article_url":"","field_event_time":{"event_time_start":"2016-04-01T13:00:00-04:00","event_time_end":"2016-04-01T14:00:00-04:00","event_time_end_last":"2016-04-01T14:00:00-04:00","gmt_time_start":"2016-04-01 17:00:00","gmt_time_end":"2016-04-01 18:00:00","gmt_time_end_last":"2016-04-01 18:00:00","rrule":null,"timezone":"America\/New_York"},"extras":["free_food"],"hg_media":{"451391":{"id":"451391","type":"image","title":"IISP logo","body":null,"created":"1449256280","gmt_created":"2015-12-04 19:11:20","changed":"1475895192","gmt_changed":"2016-10-08 02:53:12","alt":"IISP logo","file":{"fid":"203339","name":"instituteforinformationsecurityprivacy-outline-black874.jpg","image_path":"\/sites\/default\/files\/images\/instituteforinformationsecurityprivacy-outline-black874_0.jpg","image_full_path":"http:\/\/hg.gatech.edu\/\/sites\/default\/files\/images\/instituteforinformationsecurityprivacy-outline-black874_0.jpg","mime":"image\/jpeg","size":88082,"path_740":"http:\/\/hg.gatech.edu\/sites\/default\/files\/styles\/740xx_scale\/public\/images\/instituteforinformationsecurityprivacy-outline-black874_0.jpg?itok=WFxLCVBe"}},"515411":{"id":"515411","type":"image","title":"Adam Wenchel","body":null,"created":"1458923790","gmt_created":"2016-03-25 16:36:30","changed":"1475895280","gmt_changed":"2016-10-08 02:54:40","alt":"Adam Wenchel","file":{"fid":"205103","name":"adam_wenchel.png","image_path":"\/sites\/default\/files\/images\/adam_wenchel_0.png","image_full_path":"http:\/\/hg.gatech.edu\/\/sites\/default\/files\/images\/adam_wenchel_0.png","mime":"image\/png","size":424932,"path_740":"http:\/\/hg.gatech.edu\/sites\/default\/files\/styles\/740xx_scale\/public\/images\/adam_wenchel_0.png?itok=utEG33Ip"}},"445261":{"id":"445261","type":"image","title":"Capital One","body":null,"created":"1449256205","gmt_created":"2015-12-04 19:10:05","changed":"1475895184","gmt_changed":"2016-10-08 02:53:04","alt":"Capital One","file":{"fid":"203169","name":"capital-one-logo.png","image_path":"\/sites\/default\/files\/images\/capital-one-logo_0.png","image_full_path":"http:\/\/hg.gatech.edu\/\/sites\/default\/files\/images\/capital-one-logo_0.png","mime":"image\/png","size":32868,"path_740":"http:\/\/hg.gatech.edu\/sites\/default\/files\/styles\/740xx_scale\/public\/images\/capital-one-logo_0.png?itok=l_6xw_Wc"}}},"media_ids":["451391","515411","445261"],"groups":[{"id":"47223","name":"College of Computing"},{"id":"50875","name":"School of Computer Science"},{"id":"322011","name":"College of Computing Events"},{"id":"430601","name":"Institute for Information Security and Privacy"},{"id":"50877","name":"School of Computational Science and Engineering"}],"categories":[],"keywords":[{"id":"1404","name":"Cybersecurity"}],"core_research_areas":[],"news_room_topics":[],"event_categories":[{"id":"1795","name":"Seminar\/Lecture\/Colloquium"}],"invited_audience":[{"id":"78751","name":"Undergraduate students"},{"id":"78761","name":"Faculty\/Staff"},{"id":"78771","name":"Public"},{"id":"174045","name":"Graduate students"}],"affiliations":[],"classification":[],"areas_of_expertise":[],"news_and_recent_appearances":[],"phone":[],"contact":[],"email":[],"slides":[],"orientation":[],"userdata":""}}}