{"170751":{"#nid":"170751","#data":{"type":"news","title":"The International Cyber-Security Ecosystem","body":[{"value":"\u003Cp\u003EOn November 6, 2012\u0026nbsp;\u003Ca href=\u0022http:\/\/www.ngi.org\/\u0022\u003ETony Rutkowski\u003C\/a\u003E,\u0026nbsp;Distiguished Senior Research Fellow in the Sam Nunn School\u0026nbsp;\u003Ca href=\u0022http:\/\/www.cistp.gatech.edu\/\u0022\u003ECenter for International Strategy, Technology, and Policy\u003C\/a\u003E\u0026nbsp;(CISTP) provided an overview of the various fora\/communities and methodologies that comprise the security assurance ecosystem \u2013 often also referred to as the Information Assurance. \u0026nbsp;This ensemble has over the past ten years produced an expanding array of standardized platforms that are being used today to enhance the trust and lower the risks inherent in all computer based networked systems \u2013 also referred to as \u201chardening.\u201d \u0026nbsp;Mantras among these entities include \u201cmaking security measureable\u201d and \u201cknow your weaknesses; know their attacks.\u201d \u0026nbsp;Unrealistic notions of absolute security are becoming transformed into more pragmatic approaches that place the emphasis on risk assessment and automated security systems.\u003C\/p\u003E\u003Cp\u003EThis ecosystem has grown dramatically in scale, activity and globalization over the past several years. \u0026nbsp;The expansions include not only important new platforms such for Continuous Monitoring (CM) and Threat Intelligence Exchange (STIX), but also public mobile infrastructures and services, as these systems and their users become exposed to a rapidly expanding array of exploits.\u003C\/p\u003E\u003Cp\u003E\u003Ca href=\u0022http:\/\/smartech.gatech.edu\/handle\/1853\/45450\u0022\u003EView Video \u0026gt;\u003C\/a\u003E\u0026nbsp;(Runtime: 70:35 minutes)\u003C\/p\u003E","summary":null,"format":"limited_html"}],"field_subtitle":"","field_summary":[{"value":"\u003Cp\u003EOn November 6, 2012\u0026nbsp;\u003Ca href=\u0022http:\/\/www.ngi.org\/\u0022\u003ETony Rutkowski\u003C\/a\u003E,\u0026nbsp;Distiguished Senior Research Fellow in the Sam Nunn School\u0026nbsp;\u003Ca href=\u0022http:\/\/www.cistp.gatech.edu\/\u0022\u003ECenter for International Strategy, Technology, and Policy\u003C\/a\u003E\u0026nbsp;(CISTP) provided an overview of the various fora\/communities and methodologies that comprise the security assurance ecosystem \u2013 often also referred to as the Information Assurance. \u0026nbsp;\u003C\/p\u003E\u003Cp\u003E\u003Ca href=\u0022http:\/\/smartech.gatech.edu\/handle\/1853\/45450\u0022\u003EView Video \u0026gt;\u003C\/a\u003E\u0026nbsp;(Runtime: 70:35 minutes)\u003C\/p\u003E","format":"limited_html"}],"field_summary_sentence":"","uid":"27694","created_gmt":"2012-11-12 23:12:37","changed_gmt":"2016-10-08 03:13:10","author":"Debbie Mobley","boilerplate_text":"","field_publication":"","field_article_url":"","dateline":{"date":"2012-11-12T00:00:00-05:00","iso_date":"2012-11-12T00:00:00-05:00","tz":"America\/New_York"},"extras":[],"hg_media":{"57374":{"id":"57374","type":"image","title":"Tony Rutkowski","body":null,"created":"1449175327","gmt_created":"2015-12-03 20:42:07","changed":"1475894342","gmt_changed":"2016-10-08 02:39:02","alt":"Tony Rutkowski","file":{"fid":"190607","name":"trp17576.jpg","image_path":"\/sites\/default\/files\/images\/trp17576.jpg","image_full_path":"http:\/\/www.tlwarc.hg.gatech.edu\/\/sites\/default\/files\/images\/trp17576.jpg","mime":"image\/jpeg","size":43817,"path_740":"http:\/\/www.tlwarc.hg.gatech.edu\/sites\/default\/files\/styles\/740xx_scale\/public\/images\/trp17576.jpg?itok=T6_MSRrQ"}}},"media_ids":["57374"],"related_links":[{"url":"http:\/\/www.cistp.gatech.edu\/sites\/devcistp.gatech.edu\/files\/internationalcyber-securityecosystem.pptx","title":"PowerPoint Presentation"}],"groups":[{"id":"1286","name":"Center for International Strategy, Technology, and Policy (CISTP)"}],"categories":[{"id":"42911","name":"Education"}],"keywords":[{"id":"48931","name":"Information Assurance"},{"id":"167729","name":"security assurance ecosystem"},{"id":"1402","name":"Tony Rutkowski"}],"core_research_areas":[],"news_room_topics":[],"event_categories":[],"invited_audience":[],"affiliations":[],"classification":[],"areas_of_expertise":[],"news_and_recent_appearances":[],"phone":[],"contact":[{"value":"\u003Cp class=\u0022p1\u0022\u003E\u003Cstrong\u003EWill Foster\u003C\/strong\u003E\u003Cbr \/\u003ESenior Research Associate\u003Cbr \/\u003ECenter for International Strategy, Technology, and Policy (CISTP)\u003Cbr \/\u003ESam Nunn School of International Affairs\u003Cbr \/\u003E\u003Ca href=\u0022mailto:William.Foster@inta.gatech.edu\u0022\u003EWilliam.Foster@inta.gatech.edu\u003C\/a\u003E\u003C\/p\u003E","format":"limited_html"}],"email":["william.foster@inta.gatech.edu"],"slides":[],"orientation":[],"userdata":""}}}