<node id="170751">
  <nid>170751</nid>
  <type>news</type>
  <uid>
    <user id="27694"><![CDATA[27694]]></user>
  </uid>
  <created>1352761957</created>
  <changed>1475896390</changed>
  <title><![CDATA[The International Cyber-Security Ecosystem]]></title>
  <body><![CDATA[<p>On November 6, 2012&nbsp;<a href="http://www.ngi.org/">Tony Rutkowski</a>,&nbsp;Distiguished Senior Research Fellow in the Sam Nunn School&nbsp;<a href="http://www.cistp.gatech.edu/">Center for International Strategy, Technology, and Policy</a>&nbsp;(CISTP) provided an overview of the various fora/communities and methodologies that comprise the security assurance ecosystem – often also referred to as the Information Assurance. &nbsp;This ensemble has over the past ten years produced an expanding array of standardized platforms that are being used today to enhance the trust and lower the risks inherent in all computer based networked systems – also referred to as “hardening.” &nbsp;Mantras among these entities include “making security measureable” and “know your weaknesses; know their attacks.” &nbsp;Unrealistic notions of absolute security are becoming transformed into more pragmatic approaches that place the emphasis on risk assessment and automated security systems.</p><p>This ecosystem has grown dramatically in scale, activity and globalization over the past several years. &nbsp;The expansions include not only important new platforms such for Continuous Monitoring (CM) and Threat Intelligence Exchange (STIX), but also public mobile infrastructures and services, as these systems and their users become exposed to a rapidly expanding array of exploits.</p><p><a href="http://smartech.gatech.edu/handle/1853/45450">View Video &gt;</a>&nbsp;(Runtime: 70:35 minutes)</p>]]></body>
  <field_subtitle>
    <item>
      <value><![CDATA[]]></value>
    </item>
  </field_subtitle>
  <field_dateline>
    <item>
      <value>2012-11-12T00:00:00-05:00</value>
      <timezone><![CDATA[America/New_York]]></timezone>
    </item>
  </field_dateline>
  <field_summary_sentence>
    <item>
      <value><![CDATA[]]></value>
    </item>
  </field_summary_sentence>
  <field_summary>
    <item>
      <value><![CDATA[<p>On November 6, 2012&nbsp;<a href="http://www.ngi.org/">Tony Rutkowski</a>,&nbsp;Distiguished Senior Research Fellow in the Sam Nunn School&nbsp;<a href="http://www.cistp.gatech.edu/">Center for International Strategy, Technology, and Policy</a>&nbsp;(CISTP) provided an overview of the various fora/communities and methodologies that comprise the security assurance ecosystem – often also referred to as the Information Assurance. &nbsp;</p><p><a href="http://smartech.gatech.edu/handle/1853/45450">View Video &gt;</a>&nbsp;(Runtime: 70:35 minutes)</p>]]></value>
    </item>
  </field_summary>
  <field_media>
          <item>
        <nid>
          <node id="57374">
            <nid>57374</nid>
            <type>image</type>
            <title><![CDATA[Tony Rutkowski]]></title>
            <body><![CDATA[]]></body>
                          <field_image>
                <item>
                  <fid>190607</fid>
                  <filename><![CDATA[trp17576.jpg]]></filename>
                  <filepath><![CDATA[/sites/default/files/images/trp17576.jpg]]></filepath>
                  <file_full_path><![CDATA[http://www.tlwarc.hg.gatech.edu//sites/default/files/images/trp17576.jpg]]></file_full_path>
                  <filemime>image/jpeg</filemime>
                  <image_740><![CDATA[]]></image_740>
                  <image_alt><![CDATA[Tony Rutkowski]]></image_alt>
                </item>
              </field_image>
            
                      </node>
        </nid>
      </item>
      </field_media>
  <field_contact_email>
    <item>
      <email><![CDATA[william.foster@inta.gatech.edu]]></email>
    </item>
  </field_contact_email>
  <field_location>
    <item>
      <value><![CDATA[]]></value>
    </item>
  </field_location>
  <field_contact>
    <item>
      <value><![CDATA[<p class="p1"><strong>Will Foster</strong><br />Senior Research Associate<br />Center for International Strategy, Technology, and Policy (CISTP)<br />Sam Nunn School of International Affairs<br /><a href="mailto:William.Foster@inta.gatech.edu">William.Foster@inta.gatech.edu</a></p>]]></value>
    </item>
  </field_contact>
  <field_sidebar>
    <item>
      <value><![CDATA[]]></value>
    </item>
  </field_sidebar>
  <field_boilerplate>
    <item>
      <nid><![CDATA[]]></nid>
    </item>
  </field_boilerplate>
  <!--  TO DO: correct to not conflate categories and news room topics  -->
  <!--  Disquisition: it's funny how I write these TODOs and then never
         revisit them. It's as though the act of writing the thing down frees me
         from the responsibility to actually solve the problem. But what can I
         say? There are more problems than there's time to solve.  -->
  <links_related> </links_related>
  <files> </files>
  <og_groups>
          <item>1286</item>
      </og_groups>
  <og_groups_both>
          <item>
        <![CDATA[Education]]>
      </item>
      </og_groups_both>
  <field_categories>
          <item>
        <tid>42911</tid>
        <value><![CDATA[Education]]></value>
      </item>
      </field_categories>
  <core_research_areas>
      </core_research_areas>
  <field_news_room_topics>
      </field_news_room_topics>
  <links_related>
          <link>
      <url>http://www.cistp.gatech.edu/sites/devcistp.gatech.edu/files/internationalcyber-securityecosystem.pptx</url>
      <title></title>
      </link>
      </links_related>
  <files>
      </files>
  <og_groups>
          <item>1286</item>
      </og_groups>
  <og_groups_both>
          <item><![CDATA[Center for International Strategy, Technology, and Policy (CISTP)]]></item>
      </og_groups_both>
  <field_keywords>
          <item>
        <tid>48931</tid>
        <value><![CDATA[Information Assurance]]></value>
      </item>
          <item>
        <tid>167729</tid>
        <value><![CDATA[security assurance ecosystem]]></value>
      </item>
          <item>
        <tid>1402</tid>
        <value><![CDATA[Tony Rutkowski]]></value>
      </item>
      </field_keywords>
  <field_userdata>
      <![CDATA[]]>
  </field_userdata>
</node>
