<node id="616440">
  <nid>616440</nid>
  <type>event</type>
  <uid>
    <user id="34659"><![CDATA[34659]]></user>
  </uid>
  <created>1547574943</created>
  <changed>1547576508</changed>
  <title><![CDATA[Cybersecurity Lecture Series with Sam King Ph.D.]]></title>
  <body><![CDATA[<p>The&nbsp;<a href="https://iisp.gatech.edu/cyber-lecture">Cybersecurity Lecture Series at Georgia&nbsp;Tech</a>isa free, one-hour lecture from a thought leader who is advancing the field of information security and privacy. Invited speakers include executives and researchers from Fortune 500 companies, federal intelligence agencies, start-ups, and incubators, as well as Georgia Tech faculty and students presenting their research. Lectures are open to all -- students, faculty, industry, government, or simply the curious.</p>

<p><a href="http://attend.com/cyberlecture-king">RSVP</a></p>

<h3>Abstract:</h3>

<p>Lyft&rsquo;s whole app experience is geared towards getting new users from the App Store or the Play Store to their first ride as quickly as possible. This streamlined process is great for users, but presents an ever-present problem &mdash; how do we prevent bad actors from abusing the lightweight onboarding process? In this talk, Dr. King will discuss how the best way to protect accounts is by changing products. He will describe the systems and techniques used at Twitter and Lyft to secure user&#39;s accounts, as well as extract general principles on how one should go about changing products to improve security. He&nbsp;will also discuss his research lab&#39;s recent work on preventing card-not-present - credit card fraud, where deep learning is used to create and detect fake credit cards.</p>

<h3>Bio:&nbsp;</h3>

<p><a href="https://www.linkedin.com/in/sam-king-093613/">Dr. Sam King</a>&nbsp;was a professor for eight years at&nbsp;<a href="https://illinois.edu/">University Illinois Urbana-Champaign</a>; however, five years ago he left his tenured position at UIUC to push himself intellectually and professionally in the industry.&nbsp;During these years, he started a company, sold his company to&nbsp;<a href="https://twitter.com/?lang=en">Twitter</a>, worked as a code committing software engineer, fought fake accounts, managed a small team, managed a big team, secured&nbsp;<a href="https://www.lyft.com/">Lyft&rsquo;s</a>&nbsp;phone-based accounts, battled fraudsters, and led a massive nine-month&nbsp;project (which is an eternity in industry) that ended up being the largest growth initiative in the history of Twitter. Now he&#39;s back in academia in the CS Department at UC Davis. He plans to continue to research topics in the computer security area and is especially interested in building systems for fighting fraud and rethinking our notion of digital identity. Dr. King received his&nbsp;Ph.D.&nbsp;from&nbsp;<a href="https://umich.edu/">The University of&nbsp;</a><a href="https://umich.edu/">Michigan</a>, his Masters from&nbsp;<a href="https://www.stanford.edu/">Stanford</a>, and his Bachelor&rsquo;s degree from&nbsp;<a href="http://www.ucla.edu/">UCLA</a>.</p>
]]></body>
  <field_summary_sentence>
    <item>
      <value><![CDATA[Free, open-to-the public discussion about cybersecurity risks, trends, and techniques.]]></value>
    </item>
  </field_summary_sentence>
  <field_summary>
    <item>
      <value><![CDATA[<p>On Friday, January 25th guest speaker, industry expert, and Associate Professor at <a href="https://www.ucdavis.edu">UC Davis</a>, <a href="https://www.linkedin.com/in/sam-king-093613/">Dr. Sam King</a>&nbsp;will describe the systems and techniques used at Twitter and Lyft to secure user&#39;s accounts and how individuals can improve their&nbsp;own security.&nbsp;</p>
]]></value>
    </item>
  </field_summary>
  <field_time>
    <item>
      <value><![CDATA[2019-01-25T12:00:00-05:00]]></value>
      <value2><![CDATA[2019-01-25T13:00:00-05:00]]></value2>
      <rrule><![CDATA[]]></rrule>
      <timezone><![CDATA[America/New_York]]></timezone>
    </item>
  </field_time>
  <field_fee>
    <item>
      <value><![CDATA[]]></value>
    </item>
  </field_fee>
  <field_extras>
      </field_extras>
  <field_audience>
          <item>
        <value><![CDATA[Faculty/Staff]]></value>
      </item>
          <item>
        <value><![CDATA[Postdoc]]></value>
      </item>
          <item>
        <value><![CDATA[Public]]></value>
      </item>
          <item>
        <value><![CDATA[Graduate students]]></value>
      </item>
          <item>
        <value><![CDATA[Undergraduate students]]></value>
      </item>
      </field_audience>
  <field_media>
          <item>
        <nid>
          <node id="616430">
            <nid>616430</nid>
            <type>image</type>
            <title><![CDATA[Sam King ]]></title>
            <body><![CDATA[]]></body>
                          <field_image>
                <item>
                  <fid>234635</fid>
                  <filename><![CDATA[Sam King.jpg]]></filename>
                  <filepath><![CDATA[/sites/default/files/images/Sam%20King.jpg]]></filepath>
                  <file_full_path><![CDATA[http://hg.gatech.edu//sites/default/files/images/Sam%20King.jpg]]></file_full_path>
                  <filemime>image/jpeg</filemime>
                  <image_740><![CDATA[]]></image_740>
                  <image_alt><![CDATA[]]></image_alt>
                </item>
              </field_image>
            
                      </node>
        </nid>
      </item>
          <item>
        <nid>
          <node id="593723">
            <nid>593723</nid>
            <type>image</type>
            <title><![CDATA[Cybersecurity Lecture Series by IISP]]></title>
            <body><![CDATA[]]></body>
                          <field_image>
                <item>
                  <fid>226333</fid>
                  <filename><![CDATA[CLS_logo_FY18 w tag.jpg]]></filename>
                  <filepath><![CDATA[/sites/default/files/images/CLS_logo_FY18%20w%20tag.jpg]]></filepath>
                  <file_full_path><![CDATA[http://hg.gatech.edu//sites/default/files/images/CLS_logo_FY18%20w%20tag.jpg]]></file_full_path>
                  <filemime>image/jpeg</filemime>
                  <image_740><![CDATA[]]></image_740>
                  <image_alt><![CDATA[]]></image_alt>
                </item>
              </field_image>
            
                      </node>
        </nid>
      </item>
      </field_media>
  <field_contact>
    <item>
      <value><![CDATA[<p><a href="mailto:lindsey.panetta@gtri.gatech.edu">lindsey.panetta@gtri.gatech.edu</a></p>
]]></value>
    </item>
  </field_contact>
  <field_location>
    <item>
      <value><![CDATA[]]></value>
    </item>
  </field_location>
  <field_sidebar>
    <item>
      <value><![CDATA[]]></value>
    </item>
  </field_sidebar>
  <field_phone>
    <item>
      <value><![CDATA[]]></value>
    </item>
  </field_phone>
  <field_url>
    <item>
      <url><![CDATA[]]></url>
      <title><![CDATA[]]></title>
            <attributes><![CDATA[]]></attributes>
    </item>
  </field_url>
  <field_email>
    <item>
      <email><![CDATA[]]></email>
    </item>
  </field_email>
  <field_boilerplate>
    <item>
      <nid><![CDATA[]]></nid>
    </item>
  </field_boilerplate>
  <links_related>
      </links_related>
  <files>
      </files>
  <og_groups>
          <item>494561</item>
          <item>430601</item>
      </og_groups>
  <og_groups_both>
          <item><![CDATA[IISP Faculty Directory]]></item>
          <item><![CDATA[Institute for Information Security and Privacy]]></item>
      </og_groups_both>
  <field_categories>
          <item>
        <tid>10377</tid>
        <value><![CDATA[Career/Professional development]]></value>
      </item>
          <item>
        <tid>1789</tid>
        <value><![CDATA[Conference/Symposium]]></value>
      </item>
          <item>
        <tid>1788</tid>
        <value><![CDATA[Other/Miscellaneous]]></value>
      </item>
          <item>
        <tid>1795</tid>
        <value><![CDATA[Seminar/Lecture/Colloquium]]></value>
      </item>
      </field_categories>
  <field_keywords>
          <item>
        <tid>180216</tid>
        <value><![CDATA[Sam King]]></value>
      </item>
          <item>
        <tid>1404</tid>
        <value><![CDATA[Cybersecurity]]></value>
      </item>
          <item>
        <tid>5165</tid>
        <value><![CDATA[UC Davis]]></value>
      </item>
      </field_keywords>
  <field_userdata><![CDATA[]]></field_userdata>
</node>
