<node id="419831">
  <nid>419831</nid>
  <type>event</type>
  <uid>
    <user id="27987"><![CDATA[27987]]></user>
  </uid>
  <created>1435743625</created>
  <changed>1475892742</changed>
  <title><![CDATA[Georgia Chamber of Commerce 2015 Cybersecurity Summit]]></title>
  <body><![CDATA[Cybersecurity experts often say that there are two types of businesses--those that have been hacked and know it, and those that have been hacked and don't know it yet. In 2014, the National Institute of Standards and Technology (NIST) released a cybersecurity framework to help businesses start a cybersecurity program or improve an existing one. The framework was developed in collaboration with public and private organizations, including companies, trade associations, and the U.S. Chamber's Cybersecurity Working Group.&nbsp;The framework features a number of industry-vetted actions that businesses can take to assess and strengthen their state of security over time. It provides organizations--including their customers, partners, and suppliers--with common language for understanding their current cybersecurity posture, setting goals for cybersecurity improvements and much more.&nbsp;Who should attend?<ul><li>You've heard something about a cyber framework--you're not exactly sure what it is--and want to learn more.</li><li>You have cybersecurity or risk-management responsibilities for your organization--whether private or public.</li><li>You have a cybersecurity program for your business and want to strengthen it.</li><li>You're a large company looking for ways to communicate about cyber with your small and midsize supply chain partners</li></ul><p>For more information and to register, visit <a href="https://www.uschamber.com/event/georgia-2015-cybersecurity-summit" title="https://www.uschamber.com/event/georgia-2015-cybersecurity-summit">https://www.uschamber.com/event/georgia-2015-cybersecurity-summit</a>.</p>]]></body>
  <field_summary_sentence>
    <item>
      <value><![CDATA[Managing Cyber Risks in a Time of Advanced & Sophisticated Threats to Business]]></value>
    </item>
  </field_summary_sentence>
  <field_summary>
    <item>
      <value><![CDATA[]]></value>
    </item>
  </field_summary>
  <field_time>
    <item>
      <value><![CDATA[2015-07-15T09:00:00-04:00]]></value>
      <value2><![CDATA[2015-07-15T14:30:00-04:00]]></value2>
      <rrule><![CDATA[]]></rrule>
      <timezone><![CDATA[America/New_York]]></timezone>
    </item>
  </field_time>
  <field_fee>
    <item>
      <value><![CDATA[]]></value>
    </item>
  </field_fee>
  <field_extras>
      </field_extras>
  <field_audience>
          <item>
        <value><![CDATA[Public]]></value>
      </item>
      </field_audience>
  <field_media>
          <item>
        <nid>
          <node id="419821">
            <nid>419821</nid>
            <type>image</type>
            <title><![CDATA[2015 Cybersecurity Summit]]></title>
            <body><![CDATA[]]></body>
                          <field_image>
                <item>
                  <fid>202609</fid>
                  <filename><![CDATA[022222_10_cybersecurityatlanta_gachamber_0.jpg]]></filename>
                  <filepath><![CDATA[/sites/default/files/images/022222_10_cybersecurityatlanta_gachamber_0_0.jpg]]></filepath>
                  <file_full_path><![CDATA[http://www.tlwarc.hg.gatech.edu//sites/default/files/images/022222_10_cybersecurityatlanta_gachamber_0_0.jpg]]></file_full_path>
                  <filemime>image/jpeg</filemime>
                  <image_740><![CDATA[]]></image_740>
                  <image_alt><![CDATA[2015 Cybersecurity Summit]]></image_alt>
                </item>
              </field_image>
            
                      </node>
        </nid>
      </item>
      </field_media>
  <field_contact>
    <item>
      <value><![CDATA[]]></value>
    </item>
  </field_contact>
  <field_location>
    <item>
      <value><![CDATA[]]></value>
    </item>
  </field_location>
  <field_sidebar>
    <item>
      <value><![CDATA[]]></value>
    </item>
  </field_sidebar>
  <field_phone>
    <item>
      <value><![CDATA[]]></value>
    </item>
  </field_phone>
  <field_url>
    <item>
      <url><![CDATA[]]></url>
      <title><![CDATA[]]></title>
            <attributes><![CDATA[]]></attributes>
    </item>
  </field_url>
  <field_email>
    <item>
      <email><![CDATA[]]></email>
    </item>
  </field_email>
  <field_boilerplate>
    <item>
      <nid><![CDATA[]]></nid>
    </item>
  </field_boilerplate>
  <links_related>
      </links_related>
  <files>
      </files>
  <og_groups>
          <item>47398</item>
      </og_groups>
  <og_groups_both>
          <item><![CDATA[GCR (Office of Government and Community Relations)]]></item>
      </og_groups_both>
  <field_categories>
          <item>
        <tid>1789</tid>
        <value><![CDATA[Conference/Symposium]]></value>
      </item>
      </field_categories>
  <field_keywords>
      </field_keywords>
  <userdata><![CDATA[]]></userdata>
</node>
