{"419831":{"#nid":"419831","#data":{"type":"event","title":"Georgia Chamber of Commerce 2015 Cybersecurity Summit","body":[{"value":"Cybersecurity experts often say that there are two types of businesses--those that have been hacked and know it, and those that have been hacked and don\u0027t know it yet. In 2014, the National Institute of Standards and Technology (NIST) released a cybersecurity framework to help businesses start a cybersecurity program or improve an existing one. The framework was developed in collaboration with public and private organizations, including companies, trade associations, and the U.S. Chamber\u0027s Cybersecurity Working Group.\u0026nbsp;The framework features a number of industry-vetted actions that businesses can take to assess and strengthen their state of security over time. It provides organizations--including their customers, partners, and suppliers--with common language for understanding their current cybersecurity posture, setting goals for cybersecurity improvements and much more.\u0026nbsp;Who should attend?\u003Cul\u003E\u003Cli\u003EYou\u0027ve heard something about a cyber framework--you\u0027re not exactly sure what it is--and want to learn more.\u003C\/li\u003E\u003Cli\u003EYou have cybersecurity or risk-management responsibilities for your organization--whether private or public.\u003C\/li\u003E\u003Cli\u003EYou have a cybersecurity program for your business and want to strengthen it.\u003C\/li\u003E\u003Cli\u003EYou\u0027re a large company looking for ways to communicate about cyber with your small and midsize supply chain partners\u003C\/li\u003E\u003C\/ul\u003E\u003Cp\u003EFor more information and to register, visit \u003Ca href=\u0022https:\/\/www.uschamber.com\/event\/georgia-2015-cybersecurity-summit\u0022 title=\u0022https:\/\/www.uschamber.com\/event\/georgia-2015-cybersecurity-summit\u0022\u003Ehttps:\/\/www.uschamber.com\/event\/georgia-2015-cybersecurity-summit\u003C\/a\u003E.\u003C\/p\u003E","summary":null,"format":"limited_html"}],"field_subtitle":"","field_summary":"","field_summary_sentence":[{"value":"Managing Cyber Risks in a Time of Advanced \u0026 Sophisticated Threats to Business"}],"uid":"27987","created_gmt":"2015-07-01 09:40:25","changed_gmt":"2016-10-08 02:12:22","author":"Laura Means","boilerplate_text":"","field_publication":"","field_article_url":"","field_event_time":{"event_time_start":"2015-07-15T09:00:00-04:00","event_time_end":"2015-07-15T14:30:00-04:00","event_time_end_last":"2015-07-15T14:30:00-04:00","gmt_time_start":"2015-07-15 13:00:00","gmt_time_end":"2015-07-15 18:30:00","gmt_time_end_last":"2015-07-15 18:30:00","rrule":null,"timezone":"America\/New_York"},"extras":[],"hg_media":{"419821":{"id":"419821","type":"image","title":"2015 Cybersecurity Summit","body":null,"created":"1449254269","gmt_created":"2015-12-04 18:37:49","changed":"1475895157","gmt_changed":"2016-10-08 02:52:37","alt":"2015 Cybersecurity Summit","file":{"fid":"202609","name":"022222_10_cybersecurityatlanta_gachamber_0.jpg","image_path":"\/sites\/default\/files\/images\/022222_10_cybersecurityatlanta_gachamber_0_0.jpg","image_full_path":"http:\/\/www.tlwarc.hg.gatech.edu\/\/sites\/default\/files\/images\/022222_10_cybersecurityatlanta_gachamber_0_0.jpg","mime":"image\/jpeg","size":32050,"path_740":"http:\/\/www.tlwarc.hg.gatech.edu\/sites\/default\/files\/styles\/740xx_scale\/public\/images\/022222_10_cybersecurityatlanta_gachamber_0_0.jpg?itok=Xw-W7Y60"}}},"media_ids":["419821"],"groups":[{"id":"47398","name":"GCR (Office of Government and Community Relations)"}],"categories":[],"keywords":[],"core_research_areas":[],"news_room_topics":[],"event_categories":[{"id":"1789","name":"Conference\/Symposium"}],"invited_audience":[{"id":"78771","name":"Public"}],"affiliations":[],"classification":[],"areas_of_expertise":[],"news_and_recent_appearances":[],"phone":[],"contact":[],"email":[],"slides":[],"orientation":[],"userdata":""}}}