{"616440":{"#nid":"616440","#data":{"type":"event","title":"Cybersecurity Lecture Series with Sam King Ph.D.","body":[{"value":"\u003Cp\u003EThe\u0026nbsp;\u003Ca href=\u0022https:\/\/iisp.gatech.edu\/cyber-lecture\u0022\u003ECybersecurity Lecture Series at Georgia\u0026nbsp;Tech\u003C\/a\u003Eisa free, one-hour lecture from a thought leader who is advancing the field of information security and privacy. Invited speakers include executives and researchers from Fortune 500 companies, federal intelligence agencies, start-ups, and incubators, as well as Georgia Tech faculty and students presenting their research. Lectures are open to all -- students, faculty, industry, government, or simply the curious.\u003C\/p\u003E\r\n\r\n\u003Cp\u003E\u003Ca href=\u0022http:\/\/attend.com\/cyberlecture-king\u0022\u003ERSVP\u003C\/a\u003E\u003C\/p\u003E\r\n\r\n\u003Ch3\u003EAbstract:\u003C\/h3\u003E\r\n\r\n\u003Cp\u003ELyft\u0026rsquo;s whole app experience is geared towards getting new users from the App Store or the Play Store to their first ride as quickly as possible. This streamlined process is great for users, but presents an ever-present problem \u0026mdash; how do we prevent bad actors from abusing the lightweight onboarding process? In this talk, Dr. King will discuss how the best way to protect accounts is by changing products. He will describe the systems and techniques used at Twitter and Lyft to secure user\u0026#39;s accounts, as well as extract general principles on how one should go about changing products to improve security. He\u0026nbsp;will also discuss his research lab\u0026#39;s recent work on preventing card-not-present - credit card fraud, where deep learning is used to create and detect fake credit cards.\u003C\/p\u003E\r\n\r\n\u003Ch3\u003EBio:\u0026nbsp;\u003C\/h3\u003E\r\n\r\n\u003Cp\u003E\u003Ca href=\u0022https:\/\/www.linkedin.com\/in\/sam-king-093613\/\u0022\u003EDr. Sam King\u003C\/a\u003E\u0026nbsp;was a professor for eight years at\u0026nbsp;\u003Ca href=\u0022https:\/\/illinois.edu\/\u0022\u003EUniversity Illinois Urbana-Champaign\u003C\/a\u003E; however, five years ago he left his tenured position at UIUC to push himself intellectually and professionally in the industry.\u0026nbsp;During these years, he started a company, sold his company to\u0026nbsp;\u003Ca href=\u0022https:\/\/twitter.com\/?lang=en\u0022\u003ETwitter\u003C\/a\u003E, worked as a code committing software engineer, fought fake accounts, managed a small team, managed a big team, secured\u0026nbsp;\u003Ca href=\u0022https:\/\/www.lyft.com\/\u0022\u003ELyft\u0026rsquo;s\u003C\/a\u003E\u0026nbsp;phone-based accounts, battled fraudsters, and led a massive nine-month\u0026nbsp;project (which is an eternity in industry) that ended up being the largest growth initiative in the history of Twitter. Now he\u0026#39;s back in academia in the CS Department at UC Davis. He plans to continue to research topics in the computer security area and is especially interested in building systems for fighting fraud and rethinking our notion of digital identity. Dr. King received his\u0026nbsp;Ph.D.\u0026nbsp;from\u0026nbsp;\u003Ca href=\u0022https:\/\/umich.edu\/\u0022\u003EThe University of\u0026nbsp;\u003C\/a\u003E\u003Ca href=\u0022https:\/\/umich.edu\/\u0022\u003EMichigan\u003C\/a\u003E, his Masters from\u0026nbsp;\u003Ca href=\u0022https:\/\/www.stanford.edu\/\u0022\u003EStanford\u003C\/a\u003E, and his Bachelor\u0026rsquo;s degree from\u0026nbsp;\u003Ca href=\u0022http:\/\/www.ucla.edu\/\u0022\u003EUCLA\u003C\/a\u003E.\u003C\/p\u003E\r\n","summary":null,"format":"limited_html"}],"field_subtitle":"","field_summary":[{"value":"\u003Cp\u003EOn Friday, January 25th guest speaker, industry expert, and Associate Professor at \u003Ca href=\u0022https:\/\/www.ucdavis.edu\u0022\u003EUC Davis\u003C\/a\u003E, \u003Ca href=\u0022https:\/\/www.linkedin.com\/in\/sam-king-093613\/\u0022\u003EDr. Sam King\u003C\/a\u003E\u0026nbsp;will describe the systems and techniques used at Twitter and Lyft to secure user\u0026#39;s accounts and how individuals can improve their\u0026nbsp;own security.\u0026nbsp;\u003C\/p\u003E\r\n","format":"limited_html"}],"field_summary_sentence":[{"value":"Free, open-to-the public discussion about cybersecurity risks, trends, and techniques."}],"uid":"34659","created_gmt":"2019-01-15 17:55:43","changed_gmt":"2019-01-15 18:21:48","author":"lpanetta3","boilerplate_text":"","field_publication":"","field_article_url":"","field_event_time":{"event_time_start":"2019-01-25T12:00:00-05:00","event_time_end":"2019-01-25T13:00:00-05:00","event_time_end_last":"2019-01-25T13:00:00-05:00","gmt_time_start":"2019-01-25 17:00:00","gmt_time_end":"2019-01-25 18:00:00","gmt_time_end_last":"2019-01-25 18:00:00","rrule":null,"timezone":"America\/New_York"},"extras":[],"hg_media":{"616430":{"id":"616430","type":"image","title":"Sam King ","body":null,"created":"1547573160","gmt_created":"2019-01-15 17:26:00","changed":"1547573160","gmt_changed":"2019-01-15 17:26:00","alt":"","file":{"fid":"234635","name":"Sam King.jpg","image_path":"\/sites\/default\/files\/images\/Sam%20King.jpg","image_full_path":"http:\/\/hg.gatech.edu\/\/sites\/default\/files\/images\/Sam%20King.jpg","mime":"image\/jpeg","size":109314,"path_740":"http:\/\/hg.gatech.edu\/sites\/default\/files\/styles\/740xx_scale\/public\/images\/Sam%20King.jpg?itok=2LSYE5N6"}},"593723":{"id":"593723","type":"image","title":"Cybersecurity Lecture Series by IISP","body":null,"created":"1500996186","gmt_created":"2017-07-25 15:23:06","changed":"1500996186","gmt_changed":"2017-07-25 15:23:06","alt":"","file":{"fid":"226333","name":"CLS_logo_FY18 w tag.jpg","image_path":"\/sites\/default\/files\/images\/CLS_logo_FY18%20w%20tag.jpg","image_full_path":"http:\/\/hg.gatech.edu\/\/sites\/default\/files\/images\/CLS_logo_FY18%20w%20tag.jpg","mime":"image\/jpeg","size":580256,"path_740":"http:\/\/hg.gatech.edu\/sites\/default\/files\/styles\/740xx_scale\/public\/images\/CLS_logo_FY18%20w%20tag.jpg?itok=S8GXpa-Z"}}},"media_ids":["616430","593723"],"groups":[{"id":"494561","name":"IISP Faculty Directory"},{"id":"430601","name":"Institute for Information Security and Privacy"}],"categories":[],"keywords":[{"id":"180216","name":"Sam King"},{"id":"1404","name":"Cybersecurity"},{"id":"5165","name":"UC Davis"}],"core_research_areas":[],"news_room_topics":[],"event_categories":[{"id":"10377","name":"Career\/Professional development"},{"id":"1789","name":"Conference\/Symposium"},{"id":"1788","name":"Other\/Miscellaneous"},{"id":"1795","name":"Seminar\/Lecture\/Colloquium"}],"invited_audience":[{"id":"78761","name":"Faculty\/Staff"},{"id":"177814","name":"Postdoc"},{"id":"78771","name":"Public"},{"id":"174045","name":"Graduate students"},{"id":"78751","name":"Undergraduate students"}],"affiliations":[],"classification":[],"areas_of_expertise":[],"news_and_recent_appearances":[],"phone":[],"contact":[{"value":"\u003Cp\u003E\u003Ca href=\u0022mailto:lindsey.panetta@gtri.gatech.edu\u0022\u003Elindsey.panetta@gtri.gatech.edu\u003C\/a\u003E\u003C\/p\u003E\r\n","format":"limited_html"}],"email":[],"slides":[],"orientation":[],"userdata":""}}}