{"445201":{"#nid":"445201","#data":{"type":"event","title":"2015 Cyber Security Summit","body":[{"value":"\u003Cp\u003EGeorgia Tech invites the public to a free, full-day seminar about information security and privacy -- hosted by the Institute for Information Security \u0026amp; Privacy, Georgia Tech Research Institute, and College of Computing.\u003C\/p\u003E\u003Cp\u003EResearchers will release the \u003Cem\u003E2016 Emerging Threats Report\u003C\/em\u003E and discuss challenges facing national security, fair economic practices, and consumer safety and privacy in an increasingly connected world. The event gives researchers and stakeholders from different spheres an opportunity to come together and prepare for challenges in securing cyberspace, critical data, and cyber-connected devices.\u003C\/p\u003E\u003Cp\u003EFeaturing Morning Keynote \u0026amp; Imlay Lecture by \u003Cstrong\u003ETom Noonan\u003C\/strong\u003E, founding partner of technology investment firm TechOperators LLC, and Afternoon Keynote by \u003Cstrong\u003EDr. Phyllis Schneck\u003C\/strong\u003E, Deputy Under Secretary for Cybersecurity and Communications for the National Protection and Programs Directorate. The event also includes panel discussions and \u0022birds of a feather\u0022 breakout sessions. Includes breakfast and lunch.\u003C\/p\u003E\u003Cp\u003E\u003Cstrong\u003EItinerary\u003C\/strong\u003E:\u003Cbr \/\u003E8:30 a.m. - Registration and Breakfast\u003Cbr \/\u003E9:00 a.m. - Welcome\u003Cbr \/\u003E9:30 a.m. - Tom Noonan, Morning Keynote \/ Imlay Lecture\u003Cbr \/\u003E10:30 a.m. - Break\u003Cbr \/\u003E10:45 a.m. - Panel Discussion\u003Cbr \/\u003E11:45 a.m. - Lunch\u003Cbr \/\u003E12:30 p.m. - Dr. Phyllis A. Schneck, Afternoon Keynote\u003Cbr \/\u003E1:30 p.m. - Announcements\u003Cbr \/\u003E1:45 p.m. - Break\u003Cbr \/\u003E2:00 p.m. - Birds of Feather Breakout Sessions\u003Cbr \/\u003E3:00 p.m. - Student Posters \u003Cbr \/\u003E4:30 p.m. - Closing\u003C\/p\u003E\u003Cp\u003E\u003Ca href=\u0022https:\/\/www.eventbrite.com\/e\/georgia-tech-cyber-security-summit-2015-tickets-18189756050\u0022 target=\u0022_blank\u0022\u003ERSVP here\u003C\/a\u003E\u003C\/p\u003E","summary":null,"format":"limited_html"}],"field_subtitle":"","field_summary":[{"value":"\u003Cp\u003ELearn about the latest information security and privacy threats with accomplished leaders from government, business and academia at the 13th annual 2015 Cyber Security Summit at Georgia Tech.\u003C\/p\u003E","format":"limited_html"}],"field_summary_sentence":[{"value":"Georgia Tech hosts the 2015 Cyber Security Summit to examine emerging information security threats."}],"uid":"27490","created_gmt":"2015-09-05 12:20:16","changed_gmt":"2017-04-13 21:18:22","author":"Tara La Bouff","boilerplate_text":"","field_publication":"","field_article_url":"","field_event_time":{"event_time_start":"2015-10-28T09:30:00-04:00","event_time_end":"2015-10-28T17:30:00-04:00","event_time_end_last":"2015-10-28T17:30:00-04:00","gmt_time_start":"2015-10-28 13:30:00","gmt_time_end":"2015-10-28 21:30:00","gmt_time_end_last":"2015-10-28 21:30:00","rrule":null,"timezone":"America\/New_York"},"extras":["free_food"],"hg_media":{"445241":{"id":"445241","type":"image","title":"Tom Noonan","body":null,"created":"1449256205","gmt_created":"2015-12-04 19:10:05","changed":"1475895184","gmt_changed":"2016-10-08 02:53:04","alt":"Tom Noonan","file":{"fid":"203167","name":"noonan.jpg","image_path":"\/sites\/default\/files\/images\/noonan_0.jpg","image_full_path":"http:\/\/www.tlwarc.hg.gatech.edu\/\/sites\/default\/files\/images\/noonan_0.jpg","mime":"image\/jpeg","size":9023,"path_740":"http:\/\/www.tlwarc.hg.gatech.edu\/sites\/default\/files\/styles\/740xx_scale\/public\/images\/noonan_0.jpg?itok=aD4UVse-"}},"445231":{"id":"445231","type":"image","title":"Dr Phyllis Schneck","body":null,"created":"1449256205","gmt_created":"2015-12-04 19:10:05","changed":"1475895184","gmt_changed":"2016-10-08 02:53:04","alt":"Dr Phyllis Schneck","file":{"fid":"203166","name":"schneck.jpg","image_path":"\/sites\/default\/files\/images\/schneck_0.jpg","image_full_path":"http:\/\/www.tlwarc.hg.gatech.edu\/\/sites\/default\/files\/images\/schneck_0.jpg","mime":"image\/jpeg","size":12483,"path_740":"http:\/\/www.tlwarc.hg.gatech.edu\/sites\/default\/files\/styles\/740xx_scale\/public\/images\/schneck_0.jpg?itok=Sdh_lHNn"}}},"media_ids":["445241","445231"],"groups":[{"id":"47223","name":"College of Computing"},{"id":"50875","name":"School of Computer Science"},{"id":"50876","name":"School of Interactive Computing"},{"id":"50877","name":"School of Computational Science and Engineering"},{"id":"322011","name":"College of Computing Events"},{"id":"430601","name":"Institute for Information Security and Privacy"}],"categories":[],"keywords":[{"id":"1404","name":"Cybersecurity"},{"id":"2678","name":"information security"}],"core_research_areas":[],"news_room_topics":[],"event_categories":[{"id":"1795","name":"Seminar\/Lecture\/Colloquium"}],"invited_audience":[{"id":"78751","name":"Undergraduate students"},{"id":"78761","name":"Faculty\/Staff"},{"id":"78771","name":"Public"},{"id":"174045","name":"Graduate students"}],"affiliations":[],"classification":[],"areas_of_expertise":[],"news_and_recent_appearances":[],"phone":[],"contact":[],"email":[],"slides":[],"orientation":[],"userdata":""}},"445191":{"#nid":"445191","#data":{"type":"event","title":"Capital One Distinguished Lecture","body":[{"value":"\u003Cp\u003EThe first of a bi-annual lectures series, organized by the Institute for Information Security \u0026amp; Privacy and sponsored by Capital One, brings renowned cryptographer Professor Ron Rivest to Georgia Tech for a free, open-to-the public lecture. Students, faculty, and those interested in information security are encouraged to attend.\u003C\/p\u003E\u003Cp\u003E\u003Cstrong\u003E3:30 - 4:30 p.m. Reception\u003C\/strong\u003E\u003C\/p\u003E\u003Cp\u003E\u003Cstrong\u003E4:30 - 5:30 p.m. Lecture - \u0022Auditability and Verification of Elections\u0022\u003C\/strong\u003E\u003C\/p\u003E\u003Cp\u003E\u003Cem\u003E\u003Cstrong\u003EAbstract\u003C\/strong\u003E\u003C\/em\u003E\u003C\/p\u003E\u003Cp\u003EDemocracy requires that elections have credible results---otherwise the winner lacks a political mandate and the supporters of losing candidates react with anything from protests to revolution.\u003C\/p\u003E\u003Cp\u003EYet (U.S.) elections have become larger and increasingly complex, and politics seem more polarized.\u0026nbsp; Software-based voting systems inspire little trust.\u0026nbsp; Voting systems purchased with funds allocated after the 2000 U.S. presidential election fiasco are rapidly becoming obsolete.\u003C\/p\u003E\u003Cp\u003EHow can good definitions, statistics, and cryptography help?\u003C\/p\u003E\u003Cp\u003ERivest will present the notion of software independence, describe several methods for effective auditing of paper ballots, and give an overview of \u0022end-to-end\u0022 cryptographic voting systems that allow voters to confirm that their votes were counted exactly as intended, without violating voter privacy or enabling vote-selling. We close with a (pessimistic) assessment of the prospects for \u0022voting over the Internet.\u0022\u003C\/p\u003E\u003Cp\u003E\u003Cstrong\u003E\u003Cem\u003EAbout Ron Rivest\u003C\/em\u003E\u003C\/strong\u003E\u003C\/p\u003E\u003Cp\u003EProfessor Rivest is an Institute Professor at MIT, a member of its Department of Electrical Engineering and Computer Science, a member of MIT\u0027s Computer Science and Artificial Intelligence Laboratory (CSAIL), a member of that lab\u0027s Theory of Computation Group and a leader of its Cryptography and Information Security Group.\u003Cbr \/\u003E\u003Cbr \/\u003EHe received a B.A. in Mathematics from Yale University in 1969, and a Ph.D. in Computer Science from Stanford University in 1974. His research interests include cryptography, computer and network security, algorithms, and voting system security.\u003Cbr \/\u003E\u003Cbr \/\u003ERivest is a co-inventor of the RSA public-key cryptosystem, has extensive experience in cryptographic design and cryptanalysis.\u0026nbsp; He is also a founder of RSA Data Security and of Verisign.\u0026nbsp; Together with Adi Shamir and Len Adleman, he has received the 2002 ACM Turing Award and the 2009 NEC C\u0026amp;C Award.\u003Cbr \/\u003E\u003Cbr \/\u003EHe is also well-known as a co-author of the text, \u0022Introduction to Algorithms\u0022 (with Cormen, Leiseron, and Stein).\u003Cbr \/\u003E\u003Cbr \/\u003EHe is a member of the National Academy of Engineering and the National Academy of Sciences, and is a Fellow of the Association for Computing Machinery, the International Association for Cryptographic Research, and the American Academy of Arts and Sciences.\u0026nbsp; He is on the Advisory Board for the Electronic Privacy Information Center and on the board of Verified Voting.\u003C\/p\u003E\u003Cp\u003E\u0026nbsp;\u003C\/p\u003E","summary":null,"format":"limited_html"}],"field_subtitle":"","field_summary":[{"value":"\u003Cp\u003EThe first of a bi-annual lectures series, organized by the Institute for Information Security \u0026amp; Privacy and sponsored by Capital One, brings renowned cryptographer Ron Rivest to Georgia Tech for a free, open-to-the public lecture. Students, faculty, and those interested in information security are encouraged to attend.\u003C\/p\u003E","format":"limited_html"}],"field_summary_sentence":[{"value":"The Institute for Information Security \u0026 Privacy presents Ron Rivest, renowned cryptographer."}],"uid":"27490","created_gmt":"2015-09-05 11:59:40","changed_gmt":"2017-04-13 21:18:22","author":"Tara La Bouff","boilerplate_text":"","field_publication":"","field_article_url":"","field_event_time":{"event_time_start":"2015-10-27T16:30:00-04:00","event_time_end":"2015-10-27T18:30:00-04:00","event_time_end_last":"2015-10-27T18:30:00-04:00","gmt_time_start":"2015-10-27 20:30:00","gmt_time_end":"2015-10-27 22:30:00","gmt_time_end_last":"2015-10-27 22:30:00","rrule":null,"timezone":"America\/New_York"},"extras":["free_food"],"hg_media":{"445251":{"id":"445251","type":"image","title":"Ron Rivest","body":null,"created":"1449256205","gmt_created":"2015-12-04 19:10:05","changed":"1475895184","gmt_changed":"2016-10-08 02:53:04","alt":"Ron Rivest","file":{"fid":"203168","name":"rivest_photo.jpg","image_path":"\/sites\/default\/files\/images\/rivest_photo_0.jpg","image_full_path":"http:\/\/www.tlwarc.hg.gatech.edu\/\/sites\/default\/files\/images\/rivest_photo_0.jpg","mime":"image\/jpeg","size":62235,"path_740":"http:\/\/www.tlwarc.hg.gatech.edu\/sites\/default\/files\/styles\/740xx_scale\/public\/images\/rivest_photo_0.jpg?itok=JiJpfADQ"}},"445261":{"id":"445261","type":"image","title":"Capital One","body":null,"created":"1449256205","gmt_created":"2015-12-04 19:10:05","changed":"1475895184","gmt_changed":"2016-10-08 02:53:04","alt":"Capital One","file":{"fid":"203169","name":"capital-one-logo.png","image_path":"\/sites\/default\/files\/images\/capital-one-logo_0.png","image_full_path":"http:\/\/www.tlwarc.hg.gatech.edu\/\/sites\/default\/files\/images\/capital-one-logo_0.png","mime":"image\/png","size":32868,"path_740":"http:\/\/www.tlwarc.hg.gatech.edu\/sites\/default\/files\/styles\/740xx_scale\/public\/images\/capital-one-logo_0.png?itok=at9f4OIE"}}},"media_ids":["445251","445261"],"groups":[{"id":"50875","name":"School of Computer Science"},{"id":"50876","name":"School of Interactive Computing"},{"id":"50877","name":"School of Computational Science and Engineering"},{"id":"322011","name":"College of Computing Events"},{"id":"430601","name":"Institute for Information Security and Privacy"}],"categories":[],"keywords":[{"id":"1404","name":"Cybersecurity"},{"id":"2678","name":"information security"},{"id":"626","name":"public policy"}],"core_research_areas":[],"news_room_topics":[],"event_categories":[{"id":"1795","name":"Seminar\/Lecture\/Colloquium"}],"invited_audience":[{"id":"78751","name":"Undergraduate students"},{"id":"78761","name":"Faculty\/Staff"},{"id":"78771","name":"Public"},{"id":"174045","name":"Graduate students"}],"affiliations":[],"classification":[],"areas_of_expertise":[],"news_and_recent_appearances":[],"phone":[],"contact":[{"value":"\u003Cp\u003ETrina Brennan, 404.407.8873\u003C\/p\u003E","format":"limited_html"}],"email":[],"slides":[],"orientation":[],"userdata":""}},"439321":{"#nid":"439321","#data":{"type":"event","title":"Sunbird: A Symposium on the Future of Computing","body":[{"value":"\u003Cp\u003EIn Fall 2015, as the capping event of the Georgia Tech College of Computing\u2019s yearlong 25\u003Csup\u003Eth\u003C\/sup\u003E anniversary celebration, we will convene a major public event intended to \u003Cstrong\u003Epeer into the digital future\u003C\/strong\u003E. Pulling together thought leaders and other major figures not just from computing but the broader world beyond, we will offer a two-day exploration of \u003Cstrong\u003Ehow computing will continue to help shape the world. \u003C\/strong\u003EOur goal is not just to have a conversation but to make a statement, and it is a fitting one for the College that pioneered the idea of teaching computer science with one eye on the vast and turbulent \u201creal world\u201d beyond the code and hardware.\u003C\/p\u003E\u003Cp\u003EWe invite you to help us connect computing to the world, via:\u003C\/p\u003E\u003Cul\u003E\u003Cli\u003E\u003Cstrong\u003EBusiness \u0026amp; economics.\u003C\/strong\u003E How will computing affect the way people work?\u003C\/li\u003E\u003Cli\u003E\u003Cstrong\u003EWellbeing \u0026amp; autonomy.\u003C\/strong\u003E How will computing affect the way people live?\u003C\/li\u003E\u003Cli\u003E\u003Cstrong\u003EArts \u0026amp; entertainment.\u003C\/strong\u003E How will computing affect the way people play?\u003C\/li\u003E\u003Cli\u003E\u003Cstrong\u003ETomorrow\u2019s computing leaders.\u003C\/strong\u003E We know computing will shape the world, but who will shape computing?\u003C\/li\u003E\u003C\/ul\u003E\u003Cp\u003EThis event will demonstrate that, if the challenge is to determine how computing will continue to permeate more deeply into the fabric of human existence, then the natural question is: \u003Cstrong\u003EWhat does Georgia Tech think?\u003C\/strong\u003E\u003C\/p\u003E\u003Cp\u003EOur speakers include:\u003C\/p\u003E\u003Cul\u003E\u003Cli\u003E\u003Cstrong\u003EPhil Alvelda\u003C\/strong\u003E, program manager, Defense Advanced Research Projects Agency\u003C\/li\u003E\u003Cli\u003E\u003Cstrong\u003EEmily Bazelon\u003C\/strong\u003E, journalist, \u003Cem\u003EThe New York Times Magazine\u003C\/em\u003E\u003C\/li\u003E\u003Cli\u003E\u003Cstrong\u003EMelissa Gregg\u003C\/strong\u003E, principal engineer, Intel\u003Cstrong\u003E\u003Cbr \/\u003E\u003C\/strong\u003E\u003C\/li\u003E\u003Cli\u003E\u003Cstrong\u003EDavid Harvey\u003C\/strong\u003E, former VP of product strategy, athenahealth\u003C\/li\u003E\u003Cli\u003E\u003Cstrong\u003EChris Klaus\u003C\/strong\u003E, CEO, Kaneva\u003C\/li\u003E\u003Cli\u003E\u003Cstrong\u003EJames Kurose\u003C\/strong\u003E, assistant director, National Science Foundation Directorate for Computer \u0026amp; Information Science \u0026amp; Engineering\u003C\/li\u003E\u003Cli\u003E\u003Cstrong\u003EFrank Lantz\u003C\/strong\u003E, director, NYU Game Center\u003C\/li\u003E\u003Cli\u003E\u003Cstrong\u003EEd Lazowska\u003C\/strong\u003E, professor of computer science, University of Washington\u003C\/li\u003E\u003Cli\u003E\u003Cstrong\u003EAndy Ozment\u003C\/strong\u003E, assistant secretary for cybersecurity \u0026amp; communications, U.S. Department of Homeland Security\u003C\/li\u003E\u003Cli\u003E\u003Cstrong\u003EAnouk Wipprecht\u003C\/strong\u003E, wearable technology fashion designer\u003C\/li\u003E\u003Cli\u003E\u003Cstrong\u003EAvis Yates-Rivers\u003C\/strong\u003E, president \u0026amp; CEO of Technology Concepts Group International; member, National Center for Women \u0026amp; Information Technology Board of Directors\u003C\/li\u003E\u003C\/ul\u003E\u003Cp\u003EGeorgia Tech Provost Rafael Bras will open the symposium on Thursday, Oct. 22, at 2:30 p.m. in the Klaus Advanced Computing Building on the Georgia Tech campus. The event is free and open to the public.\u003C\/p\u003E\u003Cul\u003E\u003Cli\u003ESunbird full agenda at \u003Ca href=\u0022http:\/\/www.cc.gatech.edu\/sunbird\u0022\u003Ecc.gatech.edu\/sunbird\u003C\/a\u003E.\u003C\/li\u003E\u003Cli\u003ERSVP online at\u0026nbsp;\u003Ca href=\u0022https:\/\/www.surveymonkey.com\/r\/Sunbird\u0022\u003Ehttps:\/\/www.surveymonkey.com\/r\/Sunbird\u003C\/a\u003E.\u003C\/li\u003E\u003Cli\u003EWatch online at\u0026nbsp;\u003Ca href=\u0022http:\/\/www.cc.gatech.edu\/event-webcast\u0022\u003Ecc.gatech.edu\/event-webcast\u003C\/a\u003E (webcast will begin immediately prior to event).\u003Cbr \/\u003E\u003C\/li\u003E\u003Cli\u003EFor more information on the College of Computing\u2019s 25\u003Csup\u003Eth\u003C\/sup\u003E Anniversary, please visit \u003Ca href=\u0022http:\/\/gtcomputing25-50.gatech.edu\u0022\u003Ehttp:\/\/gtcomputing25-50.gatech.edu\u003C\/a\u003E.\u003C\/li\u003E\u003C\/ul\u003E","summary":null,"format":"limited_html"}],"field_subtitle":"","field_summary":"","field_summary_sentence":[{"value":"This two-day event will convene thought leaders from the computing world and beyond to explore how computation will continue to help shape human society."}],"uid":"27174","created_gmt":"2015-08-24 13:57:08","changed_gmt":"2017-04-13 21:18:36","author":"Mike Terrazas","boilerplate_text":"","field_publication":"","field_article_url":"","field_event_time":{"event_time_start":"2015-10-22T15:30:00-04:00","event_time_end":"2015-10-23T16:30:00-04:00","event_time_end_last":"2015-10-23T16:30:00-04:00","gmt_time_start":"2015-10-22 19:30:00","gmt_time_end":"2015-10-23 20:30:00","gmt_time_end_last":"2015-10-23 20:30:00","rrule":null,"timezone":"America\/New_York"},"extras":["free_food"],"hg_media":{"364551":{"id":"364551","type":"image","title":"25\/50 Anniversary Badge","body":null,"created":"1449245805","gmt_created":"2015-12-04 16:16:45","changed":"1475895100","gmt_changed":"2016-10-08 02:51:40","alt":"25\/50 Anniversary Badge","file":{"fid":"201650","name":"coc-25-anniv-mark.jpg","image_path":"\/sites\/default\/files\/images\/coc-25-anniv-mark_0.jpg","image_full_path":"http:\/\/www.tlwarc.hg.gatech.edu\/\/sites\/default\/files\/images\/coc-25-anniv-mark_0.jpg","mime":"image\/jpeg","size":47546,"path_740":"http:\/\/www.tlwarc.hg.gatech.edu\/sites\/default\/files\/styles\/740xx_scale\/public\/images\/coc-25-anniv-mark_0.jpg?itok=9qydnK-f"}}},"media_ids":["364551"],"groups":[{"id":"47223","name":"College of Computing"},{"id":"50875","name":"School of Computer Science"},{"id":"50876","name":"School of Interactive Computing"},{"id":"50877","name":"School of Computational Science and Engineering"},{"id":"66244","name":"C21U"}],"categories":[],"keywords":[{"id":"114811","name":"25\/50 Anniversary College of Computing"},{"id":"654","name":"College of Computing"}],"core_research_areas":[],"news_room_topics":[],"event_categories":[{"id":"1789","name":"Conference\/Symposium"}],"invited_audience":[{"id":"78751","name":"Undergraduate students"},{"id":"78761","name":"Faculty\/Staff"},{"id":"78771","name":"Public"},{"id":"174045","name":"Graduate students"}],"affiliations":[],"classification":[],"areas_of_expertise":[],"news_and_recent_appearances":[],"phone":[],"contact":[{"value":"\u003Cp\u003EBirney Robert\u003C\/p\u003E\u003Cp\u003E\u003Ca href=\u0022mailto:brobert@cc.gatech.edu\u0022\u003Ebrobert@cc.gatech.edu\u003C\/a\u003E\u003C\/p\u003E","format":"limited_html"}],"email":[],"slides":[],"orientation":[],"userdata":""}}}