{"598043":{"#nid":"598043","#data":{"type":"event","title":"Cybersecurity Lecture Series with Holly Dragoo","body":[{"value":"\u003Ch5\u003E\u003Cstrong\u003E\u003Cem\u003E\u0026quot;What Constitutes War in Cyberspace?\u0026rdquo;\u003C\/em\u003E\u003C\/strong\u003E\u003C\/h5\u003E\r\n\r\n\u003Cp\u003E\u003Cbr \/\u003E\r\nIs cyberspace merely another domain for 21st Century kinetic battles to operate in, or does it merit special consideration and unique rules of engagement? In this talk, Holly Dragoo will explore the challenges of distinguishing intelligence gathering activities from acts of aggression and why it\u0026rsquo;s so hard for military doctrine to address this issue.\u003C\/p\u003E\r\n\r\n\u003Cp\u003E\u003Cbr \/\u003E\r\n\u003Cbr \/\u003E\r\n\u003Cstrong\u003EHolly Dragoo\u003C\/strong\u003E is a research associate with the\u0026nbsp;\u003Ca href=\u0022https:\/\/gtri.gatech.edu\/laboratories\/cybersecurity-information-protection-and-hardware-evaluation-research\u0022\u003ECybersecurity, Information Protection, and Hardware Evaluation Research (CIPHER) Laboratory\u003C\/a\u003E at the Georgia Tech Research Institute. Her previous work with the U.S. Department of Defense and Federal Bureau of Investigation give her a unique understanding of intelligence community requirements. Dragoo\u0026rsquo;s research interests include cybersecurity policy issues, threat attribution, metadata analysis, and adversarial network reconstruction.\u003C\/p\u003E\r\n\r\n\u003Cp\u003E\u0026nbsp;\u003C\/p\u003E\r\n\r\n\u003Cp\u003EThe \u003Ca href=\u0022http:\/\/www.iisp.gatech.edu\/cyber-lecture\u0022\u003ECybersecurity Lecture Series at Georgia Tech\u003C\/a\u003E is a free, one-hour lecture from a thought leader who is advancing the field of information security and privacy. Invited speakers include executives and researchers from Fortune 500 companies, federal intelligence agencies, start-ups and incubators, as well as Georgia Tech faculty and students presenting their research. Lectures are open to all -- students, faculty, industry, government, or simply the curious.\u003C\/p\u003E\r\n\r\n\u003Ch6\u003E\u003Cem\u003E\u003Cstrong\u003EPresented by the \u003Ca href=\u0022http:\/\/cyber.gatech.edu\/\u0022\u003EInstitute for Information Security \u0026amp; Privacy\u003C\/a\u003E\u003C\/strong\u003E\u003C\/em\u003E\u003C\/h6\u003E\r\n","summary":null,"format":"limited_html"}],"field_subtitle":"","field_summary":[{"value":"\u003Cp\u003EResearch Associate Holly Dragoo will explore the challenges of distinguishing intelligence gathering activities from acts of aggression and why it\u0026rsquo;s so hard for military doctrine to address this issue under new methods of cyberwarfare.\u003C\/p\u003E\r\n","format":"limited_html"}],"field_summary_sentence":[{"value":"Research Associate Holly Dragoo explains why it\u2019s so hard for military doctrine to address new cyberwarfare."}],"uid":"27490","created_gmt":"2017-10-30 13:15:24","changed_gmt":"2017-10-30 13:33:52","author":"Tara La Bouff","boilerplate_text":"","field_publication":"","field_article_url":"","field_event_time":{"event_time_start":"2017-11-17T12:00:00-05:00","event_time_end":"2017-11-17T13:00:00-05:00","event_time_end_last":"2017-11-17T13:00:00-05:00","gmt_time_start":"2017-11-17 17:00:00","gmt_time_end":"2017-11-17 18:00:00","gmt_time_end_last":"2017-11-17 18:00:00","rrule":null,"timezone":"America\/New_York"},"extras":[],"hg_media":{"598044":{"id":"598044","type":"image","title":"Holly Dragoo","body":null,"created":"1509369438","gmt_created":"2017-10-30 13:17:18","changed":"1509369438","gmt_changed":"2017-10-30 13:17:18","alt":"","file":{"fid":"227990","name":"Cybersecurity commentator_Holly Dragoo_FY18.jpg","image_path":"\/sites\/default\/files\/images\/Cybersecurity%20commentator_Holly%20Dragoo_FY18.jpg","image_full_path":"http:\/\/hg.gatech.edu\/\/sites\/default\/files\/images\/Cybersecurity%20commentator_Holly%20Dragoo_FY18.jpg","mime":"image\/jpeg","size":119835,"path_740":"http:\/\/hg.gatech.edu\/sites\/default\/files\/styles\/740xx_scale\/public\/images\/Cybersecurity%20commentator_Holly%20Dragoo_FY18.jpg?itok=AFKSHPHc"}},"593723":{"id":"593723","type":"image","title":"Cybersecurity Lecture Series by IISP","body":null,"created":"1500996186","gmt_created":"2017-07-25 15:23:06","changed":"1500996186","gmt_changed":"2017-07-25 15:23:06","alt":"","file":{"fid":"226333","name":"CLS_logo_FY18 w tag.jpg","image_path":"\/sites\/default\/files\/images\/CLS_logo_FY18%20w%20tag.jpg","image_full_path":"http:\/\/hg.gatech.edu\/\/sites\/default\/files\/images\/CLS_logo_FY18%20w%20tag.jpg","mime":"image\/jpeg","size":580256,"path_740":"http:\/\/hg.gatech.edu\/sites\/default\/files\/styles\/740xx_scale\/public\/images\/CLS_logo_FY18%20w%20tag.jpg?itok=S8GXpa-Z"}}},"media_ids":["598044","593723"],"groups":[{"id":"47223","name":"College of Computing"},{"id":"322011","name":"College of Computing Events"},{"id":"430601","name":"Institute for Information Security and Privacy"},{"id":"1281","name":"Ivan Allen College of Liberal Arts"},{"id":"50875","name":"School of Computer Science"}],"categories":[],"keywords":[{"id":"174439","name":"cybersecurity policy"}],"core_research_areas":[],"news_room_topics":[],"event_categories":[{"id":"1795","name":"Seminar\/Lecture\/Colloquium"}],"invited_audience":[{"id":"78761","name":"Faculty\/Staff"},{"id":"78771","name":"Public"},{"id":"174045","name":"Graduate students"},{"id":"78751","name":"Undergraduate students"}],"affiliations":[],"classification":[],"areas_of_expertise":[],"news_and_recent_appearances":[],"phone":[],"contact":[{"value":"\u003Cp\u003E\u003Ca href=\u0022mailto:lindsey.panetta@gtri.gatech.edu\u0022\u003Elindsey.panetta@gtri.gatech.edu\u003C\/a\u003E\u003C\/p\u003E\r\n","format":"limited_html"}],"email":[],"slides":[],"orientation":[],"userdata":""}}}