<node id="445201">
  <nid>445201</nid>
  <type>event</type>
  <uid>
    <user id="27490"><![CDATA[27490]]></user>
  </uid>
  <created>1441455616</created>
  <changed>1492118302</changed>
  <title><![CDATA[2015 Cyber Security Summit]]></title>
  <body><![CDATA[<p>Georgia Tech invites the public to a free, full-day seminar about information security and privacy -- hosted by the Institute for Information Security &amp; Privacy, Georgia Tech Research Institute, and College of Computing.</p><p>Researchers will release the <em>2016 Emerging Threats Report</em> and discuss challenges facing national security, fair economic practices, and consumer safety and privacy in an increasingly connected world. The event gives researchers and stakeholders from different spheres an opportunity to come together and prepare for challenges in securing cyberspace, critical data, and cyber-connected devices.</p><p>Featuring Morning Keynote &amp; Imlay Lecture by <strong>Tom Noonan</strong>, founding partner of technology investment firm TechOperators LLC, and Afternoon Keynote by <strong>Dr. Phyllis Schneck</strong>, Deputy Under Secretary for Cybersecurity and Communications for the National Protection and Programs Directorate. The event also includes panel discussions and "birds of a feather" breakout sessions. Includes breakfast and lunch.</p><p><strong>Itinerary</strong>:<br />8:30 a.m. - Registration and Breakfast<br />9:00 a.m. - Welcome<br />9:30 a.m. - Tom Noonan, Morning Keynote / Imlay Lecture<br />10:30 a.m. - Break<br />10:45 a.m. - Panel Discussion<br />11:45 a.m. - Lunch<br />12:30 p.m. - Dr. Phyllis A. Schneck, Afternoon Keynote<br />1:30 p.m. - Announcements<br />1:45 p.m. - Break<br />2:00 p.m. - Birds of Feather Breakout Sessions<br />3:00 p.m. - Student Posters <br />4:30 p.m. - Closing</p><p><a href="https://www.eventbrite.com/e/georgia-tech-cyber-security-summit-2015-tickets-18189756050" target="_blank">RSVP here</a></p>]]></body>
  <field_summary_sentence>
    <item>
      <value><![CDATA[Georgia Tech hosts the 2015 Cyber Security Summit to examine emerging information security threats.]]></value>
    </item>
  </field_summary_sentence>
  <field_summary>
    <item>
      <value><![CDATA[<p>Learn about the latest information security and privacy threats with accomplished leaders from government, business and academia at the 13th annual 2015 Cyber Security Summit at Georgia Tech.</p>]]></value>
    </item>
  </field_summary>
  <field_time>
    <item>
      <value><![CDATA[2015-10-28T09:30:00-04:00]]></value>
      <value2><![CDATA[2015-10-28T17:30:00-04:00]]></value2>
      <rrule><![CDATA[]]></rrule>
      <timezone><![CDATA[America/New_York]]></timezone>
    </item>
  </field_time>
  <field_fee>
    <item>
      <value><![CDATA[$0.00]]></value>
    </item>
  </field_fee>
  <field_extras>
          <item>
        <value><![CDATA[free_food]]></value>
      </item>
      </field_extras>
  <field_audience>
          <item>
        <value><![CDATA[Undergraduate students]]></value>
      </item>
          <item>
        <value><![CDATA[Faculty/Staff]]></value>
      </item>
          <item>
        <value><![CDATA[Public]]></value>
      </item>
          <item>
        <value><![CDATA[Graduate students]]></value>
      </item>
      </field_audience>
  <field_media>
          <item>
        <nid>
          <node id="445241">
            <nid>445241</nid>
            <type>image</type>
            <title><![CDATA[Tom Noonan]]></title>
            <body><![CDATA[]]></body>
                          <field_image>
                <item>
                  <fid>203167</fid>
                  <filename><![CDATA[noonan.jpg]]></filename>
                  <filepath><![CDATA[/sites/default/files/images/noonan_0.jpg]]></filepath>
                  <file_full_path><![CDATA[http://www.tlwarc.hg.gatech.edu//sites/default/files/images/noonan_0.jpg]]></file_full_path>
                  <filemime>image/jpeg</filemime>
                  <image_740><![CDATA[]]></image_740>
                  <image_alt><![CDATA[Tom Noonan]]></image_alt>
                </item>
              </field_image>
            
                      </node>
        </nid>
      </item>
          <item>
        <nid>
          <node id="445231">
            <nid>445231</nid>
            <type>image</type>
            <title><![CDATA[Dr Phyllis Schneck]]></title>
            <body><![CDATA[]]></body>
                          <field_image>
                <item>
                  <fid>203166</fid>
                  <filename><![CDATA[schneck.jpg]]></filename>
                  <filepath><![CDATA[/sites/default/files/images/schneck_0.jpg]]></filepath>
                  <file_full_path><![CDATA[http://www.tlwarc.hg.gatech.edu//sites/default/files/images/schneck_0.jpg]]></file_full_path>
                  <filemime>image/jpeg</filemime>
                  <image_740><![CDATA[]]></image_740>
                  <image_alt><![CDATA[Dr Phyllis Schneck]]></image_alt>
                </item>
              </field_image>
            
                      </node>
        </nid>
      </item>
      </field_media>
  <field_contact>
    <item>
      <value><![CDATA[]]></value>
    </item>
  </field_contact>
  <field_location>
    <item>
      <value><![CDATA[]]></value>
    </item>
  </field_location>
  <field_sidebar>
    <item>
      <value><![CDATA[]]></value>
    </item>
  </field_sidebar>
  <field_phone>
    <item>
      <value><![CDATA[(404) 407-8873]]></value>
    </item>
  </field_phone>
  <field_url>
    <item>
      <url><![CDATA[https://www.eventbrite.com/e/georgia-tech-cyber-security-summit-2015-tickets-18189756050]]></url>
      <title><![CDATA[]]></title>
            <attributes><![CDATA[]]></attributes>
    </item>
  </field_url>
  <field_email>
    <item>
      <email><![CDATA[info@iisp.gatech.edu]]></email>
    </item>
  </field_email>
  <field_boilerplate>
    <item>
      <nid><![CDATA[]]></nid>
    </item>
  </field_boilerplate>
  <links_related>
      </links_related>
  <files>
      </files>
  <og_groups>
          <item>47223</item>
          <item>50875</item>
          <item>50876</item>
          <item>50877</item>
          <item>322011</item>
          <item>430601</item>
      </og_groups>
  <og_groups_both>
          <item><![CDATA[College of Computing]]></item>
          <item><![CDATA[School of Computer Science]]></item>
          <item><![CDATA[School of Interactive Computing]]></item>
          <item><![CDATA[School of Computational Science and Engineering]]></item>
          <item><![CDATA[College of Computing Events]]></item>
          <item><![CDATA[Institute for Information Security and Privacy]]></item>
      </og_groups_both>
  <field_categories>
          <item>
        <tid>1795</tid>
        <value><![CDATA[Seminar/Lecture/Colloquium]]></value>
      </item>
      </field_categories>
  <field_keywords>
          <item>
        <tid>1404</tid>
        <value><![CDATA[Cybersecurity]]></value>
      </item>
          <item>
        <tid>2678</tid>
        <value><![CDATA[information security]]></value>
      </item>
      </field_keywords>
  <userdata><![CDATA[]]></userdata>
</node>
