{"564851":{"#nid":"564851","#data":{"type":"news","title":"Cybersecurity IRI Completes First Year","body":[{"value":"\u003Cp\u003EThe Institute for Information Security \u0026amp; Privacy (IISP) \u2013 Georgia Tech\u2019s eleventh interdisciplinary research institute \u2013 launched in Fall \u201915 and since has leveraged intellectual capital from seven units across Georgia Tech in profound new ways.\u003C\/p\u003E\u003Cblockquote\u003E\u003Ch5\u003E\u003Cem\u003E\u201cWe believe few other universities are tackling cybersecurity research with the breadth and depth of Georgia Tech,\u201d says Wenke Lee, co-director of the IISP and the John P. Imlay Chair II in Software for the School of Computer Science.\u003C\/em\u003E\u003C\/h5\u003E\u003C\/blockquote\u003E\u003Cp\u003EThe inaugural year began by dissecting and defining Georgia Tech\u2019s cybersecurity capacity, then creating new experiences for students, faculty and industry to coalesce around solutions. Astounding truths were revealed: cybersecurity research at Georgia Tech spans six critical thrusts, nine labs, and more than 460 researchers. Cybersecurity no longer is just a computer programmer\u2019s problem; it is an urgent concern for disciplines as diverse as public policy, business, defense and ubiquitous computing.\u003C\/p\u003E\u003Ch5\u003E\u003Cstrong\u003ELegacy in Computer Science\u003C\/strong\u003E\u003C\/h5\u003E\u003Cp\u003EThe IISP builds upon the successful Georgia Tech Information Security Center (GTISC), that was established in 1998 in the School of Computer Science after the \u003Ca title=\u0022Sam Nunn\u0022 href=\u0022https:\/\/en.wikipedia.org\/wiki\/Sam_Nunn\u0022\u003ESam Nunn\u003C\/a\u003E Information Security Forum. Attendees determined that Georgia Tech\u0027s strengths in technology and policy warranted it to take a leading role in improved security research, education and more reliable computing.\u003C\/p\u003E\u003Cp\u003E\u0026nbsp;Ralph Merkle, former director of GTISC, remarked during the early years: \u201cFor the past couple of decades we have put up with buggy code, unreliable computers, insecure computers, and computers that are vulnerable to viruses, worms, spam and other problems. All of this has to change. We need to have reliable computers, systems and networks that we can trust.\u0022\u003C\/p\u003E\u003Cp\u003EThat mission now has evolved beyond the College of Computing to include the Ivan Allen College of Liberal Arts, Scheller College of Business, Georgia Tech Professional Education, Office of Information Technology, and of course the Georgia Tech Research Institute and College of Engineering \u2013 both of which have deep roots in secure information transfer and device design.\u003C\/p\u003E\u003Ch5\u003E\u003Cstrong\u003EMission and Focus\u003C\/strong\u003E\u003C\/h5\u003E\u003Cp\u003EUnder the IISP, Lee says focus is intently on three areas: research, education and commercialization. Objectives include:\u003C\/p\u003E\u003Cul\u003E\u003Cli\u003EIncreasing by 50% the volume of cybersecurity research by 2020\u003C\/li\u003E\u003Cli\u003EExpanding pathways into the Master\u2019s of Information Security degree\u003C\/li\u003E\u003Cli\u003EProducing 60 Ph.D. candidates in the next five years\u003C\/li\u003E\u003Cli\u003EDeveloping at least five commercial start-ups from academic or applied research\u003C\/li\u003E\u003C\/ul\u003E\u003Cp\u003EAffiliated faculty of the IISP conducted research projects conservatively valued at $24 million in the past year alone. More than 1,100 individuals attended new events organized by the IISP. Eighteen industry partners were engaged -- global businesses such as British Petroleum, Intel and IBM; Atlanta-based companies, such as Norfolk Southern Railway and The Home Depot, and information security alumni, such as Ionic Security, and Pindrop Security.\u003C\/p\u003E\u003Cp\u003EOne of the most exciting aspects of the IISP\u2019s first year, Lee says, was the success of graduate \u003Cstrong\u003EMusheer Ahmed\u003C\/strong\u003E (Ph.D. CS \u201916). Ahmed\u2019s graduate research, under the advisement of Prof. \u003Cstrong\u003EMustaque Ahamad\u003C\/strong\u003E, led him to win the IISP\u2019s inaugural Demo Day Finale.\u003C\/p\u003E\u003Cp\u003EAhmed and Ahamad have filed a provisional patent for \u201cFraudScope\u201d to help insurers mine healthcare data and calculate risk among a provider pool. They are continuing translational research to develop a solution that addresses growing healthcare fraud and ensures that more healthcare dollars go to patient care. In addition to keen interest from businesses and entrepreneurs across Atlanta, FraudScope has received $400,000 in funding from the prestigious Wallace H. Coulter Foundation and Georgia Research Alliance.\u003C\/p\u003E\u003Cp\u003E\u201cThis work is an example of how Georgia Tech will and should expand its cybersecurity leadership,\u201d says \u003Cstrong\u003EBo Rotoloni\u003C\/strong\u003E, co-director of the IISP and director of GTRI\u2019s Information \u0026amp; Cyber Science Directorate. \u201cIndustry is hungry for solutions and Georgia Tech has them.\u201d\u003C\/p\u003E\u003Ch5\u003E\u003Cstrong\u003ESecond Steps Begin\u003C\/strong\u003E\u003C\/h5\u003E\u003Cp\u003ELooking ahead, the IISP already has a busy second year in play. It is organizing a two-day cybersecurity symposium in Atlanta with the French Embassy; sending speakers to premier conferences with the Association for Computer Machinery, the Department of Defense and Federal Reserve, and again hosting the popular Georgia Tech Cyber Security Summit. Under Ahamad, who serves as associate director of education and outreach for the IISP, it is assisting development of new professional education offerings, degree expansions, and scholarship opportunities to attract more to the field. Under \u003Cstrong\u003EMichael Farrell\u003C\/strong\u003E, associate director of attribution research for the IISP, the group is preparing large-scale projects that allow Georgia Tech to pioneer new scientific approaches to difficult cybersecurity problems.\u003C\/p\u003E\u003Cp\u003E\u201cAnd that\u2019s just the first quarter of the year,\u201d Lee says. \u201cWe are truly forming into a gateway for faculty, students, scientists, government and industry \u2013 the place for national and international collaboration. It\u2019s exciting.\u201d\u003C\/p\u003E\u003Ch4\u003ESee \u003Ca href=\u0022http:\/\/www.iisp.gatech.edu\/iisp-completes-first-year\u0022 target=\u0022_blank\u0022\u003Ehighlights\u003C\/a\u003E from the IISP\u0027s first annual report.\u003C\/h4\u003E","summary":null,"format":"limited_html"}],"field_subtitle":"","field_summary":[{"value":"\u003Cp\u003EThe Institute for Information Security \u0026amp; Privacy \u2013 Georgia Tech\u2019s eleventh interdisciplinary research institute \u2013 launched in Fall \u201915 and since has leveraged intellectual capital from seven units across Georgia Tech in profound new ways.\u003C\/p\u003E","format":"limited_html"}],"field_summary_sentence":[{"value":"Few other universities are tacking cybersecurity research with the breadth and depth of Georgia Tech."}],"uid":"27490","created_gmt":"2016-08-17 22:58:52","changed_gmt":"2016-10-08 03:22:23","author":"Tara La Bouff","boilerplate_text":"","field_publication":"","field_article_url":"","dateline":{"date":"2016-08-17T00:00:00-04:00","iso_date":"2016-08-17T00:00:00-04:00","tz":"America\/New_York"},"extras":[],"hg_media":{"564861":{"id":"564861","type":"image","title":"IISP Faculty and Students Discuss Current Research","body":null,"created":"1471489547","gmt_created":"2016-08-18 03:05:47","changed":"1475895369","gmt_changed":"2016-10-08 02:56:09","alt":"IISP Faculty and Students Discuss Current Research","file":{"fid":"206881","name":"iisp_cyber_research_team_web.jpg","image_path":"\/sites\/default\/files\/images\/iisp_cyber_research_team_web.jpg","image_full_path":"http:\/\/hg.gatech.edu\/\/sites\/default\/files\/images\/iisp_cyber_research_team_web.jpg","mime":"image\/jpeg","size":423225,"path_740":"http:\/\/hg.gatech.edu\/sites\/default\/files\/styles\/740xx_scale\/public\/images\/iisp_cyber_research_team_web.jpg?itok=m05pcLYa"}},"451391":{"id":"451391","type":"image","title":"IISP logo","body":null,"created":"1449256280","gmt_created":"2015-12-04 19:11:20","changed":"1475895192","gmt_changed":"2016-10-08 02:53:12","alt":"IISP logo","file":{"fid":"203339","name":"instituteforinformationsecurityprivacy-outline-black874.jpg","image_path":"\/sites\/default\/files\/images\/instituteforinformationsecurityprivacy-outline-black874_0.jpg","image_full_path":"http:\/\/hg.gatech.edu\/\/sites\/default\/files\/images\/instituteforinformationsecurityprivacy-outline-black874_0.jpg","mime":"image\/jpeg","size":88082,"path_740":"http:\/\/hg.gatech.edu\/sites\/default\/files\/styles\/740xx_scale\/public\/images\/instituteforinformationsecurityprivacy-outline-black874_0.jpg?itok=WFxLCVBe"}}},"media_ids":["564861","451391"],"groups":[{"id":"47223","name":"College of Computing"}],"categories":[{"id":"153","name":"Computer Science\/Information Technology and Security"}],"keywords":[{"id":"1404","name":"Cybersecurity"},{"id":"10577","name":"Electrical and Computer Engineering; ECE"},{"id":"626","name":"public policy"},{"id":"168019","name":"Scheller"}],"core_research_areas":[{"id":"145171","name":"Cybersecurity"}],"news_room_topics":[],"event_categories":[],"invited_audience":[],"affiliations":[],"classification":[],"areas_of_expertise":[],"news_and_recent_appearances":[],"phone":[],"contact":[{"value":"\u003Cp\u003ETara La Bouff, \u003Ca href=\u0022mailto:tara.labouff@iisp.gatech.edu\u0022\u003Etara.labouff@iisp.gatech.edu\u003C\/a\u003E, 404.769.5408\u003C\/p\u003E","format":"limited_html"}],"email":[],"slides":[],"orientation":[],"userdata":""}}}