{"620155":{"#nid":"620155","#data":{"type":"event","title":"Cybersecurity Lecture Series with Terry Nelms","body":[{"value":"\u003Cp\u003EThe\u0026nbsp;\u003Ca href=\u0022https:\/\/iisp.gatech.edu\/cyber-lecture\u0022\u003ECybersecurity Lecture Series at Georgia\u0026nbsp;Tech\u003C\/a\u003E\u0026nbsp;is a free, one-hour lecture from a thought leader who is advancing the field of information security and privacy. Invited speakers include executives and researchers from Fortune 500 companies, federal intelligence agencies, start-ups, and incubators, as well as Georgia Tech faculty and students presenting their research. Lectures are open to all -- students, faculty, industry, government, or simply the curious.\u003C\/p\u003E\r\n\r\n\u003Cp\u003E\u003Ca href=\u0022https:\/\/events.attend.com\/f\/1383787238\u0022\u003ERSVP\u003C\/a\u003E\u003C\/p\u003E\r\n\r\n\u003Ch3\u003EAbstract:\u003C\/h3\u003E\r\n\r\n\u003Cp\u003EVerifying the identity claim of a caller is challenging to both enterprises and individuals. Blindly trusting the caller is not an option; however, building trust is difficult because the caller\u0026rsquo;s phone number is easily spoofed and the answers to knowledge-based questions are often available on the Internet through historical data breaches and social media. Furthermore, mobile apps that prevent incoming spam\/scam calls can fail to protect the user because the enterprise\u0026rsquo;s phone number spoofed by the caller cannot be blacklisted. This talk will focus on the challenges of caller authentication and how to use mobile devices to transfer the trust built in one channel (mobile app) to another (phone call).\u003C\/p\u003E\r\n\r\n\u003Ch3\u003EBio:\u0026nbsp;\u003C\/h3\u003E\r\n\r\n\u003Cp\u003E\u003Ca href=\u0022https:\/\/www.linkedin.com\/in\/terry-nelms-a778b85\/\u0022\u003ETerry Nelms\u003C\/a\u003E\u0026nbsp;is\u0026nbsp;Director of Research at Pindrop where he leads a team of applied researchers solving challenging problems in fraud detection and authentication. Prior to joining Pindrop, he spent over a decade inventing, designing and developing protection technologies at ISS, IBM, and Damballa. His research has produced new security products, patents, and publications in the top industry and academic conferences. He holds a B.S. and M.S. in Information Systems and a Ph.D. in Computer Science from the Georgia Institute of Technology.\u003C\/p\u003E\r\n","summary":null,"format":"limited_html"}],"field_subtitle":"","field_summary":[{"value":"\u003Cp\u003EOn Friday, April 12th\u0026nbsp;guest speaker, and Research Director at Pindrop Security, \u003Ca href=\u0022https:\/\/www.linkedin.com\/in\/terry-nelms-a778b85\/\u0022\u003ETerry Nelms\u003C\/a\u003E\u0026nbsp;will discuss\u0026nbsp;\u003Cstrong\u003E\u003Cem\u003ECaller Authentication Using Mobile Devices.\u003C\/em\u003E\u003C\/strong\u003E\u003C\/p\u003E\r\n","format":"limited_html"}],"field_summary_sentence":[{"value":"Free, open-to-the public discussion about cybersecurity risks, trends, and techniques."}],"uid":"34659","created_gmt":"2019-04-07 14:15:52","changed_gmt":"2019-04-07 14:26:07","author":"lpanetta3","boilerplate_text":"","field_publication":"","field_article_url":"","field_event_time":{"event_time_start":"2019-04-12T13:00:00-04:00","event_time_end":"2019-04-12T14:00:00-04:00","event_time_end_last":"2019-04-12T14:00:00-04:00","gmt_time_start":"2019-04-12 17:00:00","gmt_time_end":"2019-04-12 18:00:00","gmt_time_end_last":"2019-04-12 18:00:00","rrule":null,"timezone":"America\/New_York"},"extras":["free_food"],"hg_media":{"570741":{"id":"570741","type":"image","title":"Terry Nelms","body":null,"created":"1472579954","gmt_created":"2016-08-30 17:59:14","changed":"1475895379","gmt_changed":"2016-10-08 02:56:19","alt":"Terry Nelms","file":{"fid":"207073","name":"terry_nelms.jpg","image_path":"\/sites\/default\/files\/images\/terry_nelms.jpg","image_full_path":"http:\/\/hg.gatech.edu\/\/sites\/default\/files\/images\/terry_nelms.jpg","mime":"image\/jpeg","size":58074,"path_740":"http:\/\/hg.gatech.edu\/sites\/default\/files\/styles\/740xx_scale\/public\/images\/terry_nelms.jpg?itok=NiQfmet9"}},"593723":{"id":"593723","type":"image","title":"Cybersecurity Lecture Series by IISP","body":null,"created":"1500996186","gmt_created":"2017-07-25 15:23:06","changed":"1500996186","gmt_changed":"2017-07-25 15:23:06","alt":"","file":{"fid":"226333","name":"CLS_logo_FY18 w tag.jpg","image_path":"\/sites\/default\/files\/images\/CLS_logo_FY18%20w%20tag.jpg","image_full_path":"http:\/\/hg.gatech.edu\/\/sites\/default\/files\/images\/CLS_logo_FY18%20w%20tag.jpg","mime":"image\/jpeg","size":580256,"path_740":"http:\/\/hg.gatech.edu\/sites\/default\/files\/styles\/740xx_scale\/public\/images\/CLS_logo_FY18%20w%20tag.jpg?itok=S8GXpa-Z"}}},"media_ids":["570741","593723"],"groups":[{"id":"494561","name":"IISP Faculty Directory"},{"id":"430601","name":"Institute for Information Security and Privacy"}],"categories":[],"keywords":[{"id":"180977","name":"Terry Nelms"},{"id":"170586","name":"cybersecurity lecture series"},{"id":"12739","name":"mobile devices"}],"core_research_areas":[],"news_room_topics":[],"event_categories":[{"id":"1795","name":"Seminar\/Lecture\/Colloquium"}],"invited_audience":[{"id":"78761","name":"Faculty\/Staff"},{"id":"177814","name":"Postdoc"},{"id":"78771","name":"Public"},{"id":"174045","name":"Graduate students"},{"id":"78751","name":"Undergraduate students"}],"affiliations":[],"classification":[],"areas_of_expertise":[],"news_and_recent_appearances":[],"phone":[],"contact":[{"value":"\u003Cp\u003E\u003Ca href=\u0022mailto:lindsey.panetta@gtri.gatech.edu\u0022\u003Elindsey.panetta@gtri.gatech.edu\u003C\/a\u003E\u003C\/p\u003E\r\n","format":"limited_html"}],"email":[],"slides":[],"orientation":[],"userdata":""}}}