{"576731":{"#nid":"576731","#data":{"type":"event","title":"Dept of Homeland Security Cyber Careers Info Session","body":[{"value":"\u003Cp\u003EAs technology becomes increasingly more sophisticated, the demand for an experienced and qualified workforce to protect our Nation\u2019s networks and information systems has never been higher.\u003C\/p\u003E\u003Cp\u003ECome hear more from Tech alum Dr. Phyllis Schneck who currently serves as the Deputy Under Secretary for Cybersecurity and Communications for the National Protection and Programs Directorate and chief cybersecurity official for the Department of Homeland Security.\u003C\/p\u003E","summary":null,"format":"limited_html"}],"field_subtitle":"","field_summary":"","field_summary_sentence":[{"value":"Learn about DHS Cyber Careers"}],"uid":"27987","created_gmt":"2016-09-14 15:02:11","changed_gmt":"2017-04-13 21:14:42","author":"Laura Means","boilerplate_text":"","field_publication":"","field_article_url":"","field_event_time":{"event_time_start":"2016-09-27T12:00:00-04:00","event_time_end":"2016-09-27T12:00:00-04:00","event_time_end_last":"2016-09-27T12:00:00-04:00","gmt_time_start":"2016-09-27 16:00:00","gmt_time_end":"2016-09-27 16:00:00","gmt_time_end_last":"2016-09-27 16:00:00","rrule":null,"timezone":"America\/New_York"},"extras":[],"hg_media":{"576721":{"id":"576721","type":"image","title":"DHS logo","body":null,"created":"1473879628","gmt_created":"2016-09-14 19:00:28","changed":"1475895386","gmt_changed":"2016-10-08 02:56:26","alt":"DHS logo","file":{"fid":"218366","name":"130314dhs.jpg","image_path":"\/sites\/default\/files\/images\/130314dhs.jpg","image_full_path":"http:\/\/www.tlwarc.hg.gatech.edu\/\/sites\/default\/files\/images\/130314dhs.jpg","mime":"image\/jpeg","size":57018,"path_740":"http:\/\/www.tlwarc.hg.gatech.edu\/sites\/default\/files\/styles\/740xx_scale\/public\/images\/130314dhs.jpg?itok=YeoFedur"}}},"media_ids":["576721"],"groups":[{"id":"47398","name":"GCR (Office of Government and Community Relations)"}],"categories":[],"keywords":[{"id":"8563","name":"careers"},{"id":"1404","name":"Cybersecurity"},{"id":"13167","name":"DHS"},{"id":"8833","name":"Info Session"}],"core_research_areas":[],"news_room_topics":[],"event_categories":[{"id":"10377","name":"Career\/Professional development"}],"invited_audience":[{"id":"78751","name":"Undergraduate students"},{"id":"174045","name":"Graduate students"}],"affiliations":[],"classification":[],"areas_of_expertise":[],"news_and_recent_appearances":[],"phone":[],"contact":[{"value":"\u003Cp\u003E\u003Cstrong\u003EJeff Cullen\u003C\/strong\u003E\u003Cbr \/\u003E\u003Cem\u003EAssistant Director of Federal Relations\u003C\/em\u003E\u003Cbr \/\u003EOffice of Government and Community Relations\u003Cbr \/\u003EGeorgia Institute of Technology\u003Cbr \/\u003E\u003Ca href=\u0022mailto:jeff.cullen@gatech.edu\u0022\u003Ejeff.cullen@gatech.edu\u003C\/a\u003E\u003Cbr \/\u003E(404) 385-0017\u003C\/p\u003E","format":"limited_html"}],"email":[],"slides":[],"orientation":[],"userdata":""}},"563901":{"#nid":"563901","#data":{"type":"event","title":"Turing Award Winner Visits Georgia Tech","body":[{"value":"\u003Ch3\u003EThe Institute for Information Security \u0026amp; Privacy hosts Turing Award winner Butler Lampson for the Capital One Fall \u002716 Distinguished Lecture.\u003C\/h3\u003E\u003Cp\u003E\u0026nbsp;\u003C\/p\u003E\u003Cp\u003EButler Lampson is a renowned computer scientist and the 1992 Turing Award winner for pioneering contributions that laid much of the foundation for today\u2019s local area networks, client-server systems, laser printers, and WYSIWYG editors, such as Microsoft Word. He is a Technical Fellow at Microsoft Corporation and an Adjunct Professor of Computer Science and Electrical Engineering at MIT, actively working on security, privacy, and fault-tolerance, and kibitzing in systems, networking, and other areas.\u003C\/p\u003E\u003Cp\u003ELampson was part of the faculty at University of California Berkeley, at the Computer Science Laboratory at Xerox PARC, and subsequently at Digital\u2019s Systems Research Center before joining Microsoft. He has worked on computer architecture, local area networks, raster printers, page description languages, operating systems, remote procedure call, programming languages and their semantics, programming in the large, fault-tolerant computing, transaction processing, computer security, editors, and tablet computers.\u0026nbsp; He was one of the designers of the SDS 940 time-sharing system, the Alto personal distributed computing system, the Xerox 9700 laser printer, two-phase commit protocols, the Autonet LAN, the SDSI\/SPKI system for network security, the Microsoft Tablet PC software, the Microsoft Palladium high-assurance stack, and several programming languages.\u003C\/p\u003E\u003Cp\u003EHe received an AB from Harvard University, a Ph.D. in EECS from the University of California at Berkeley, and honorary ScD\u2019s from the Eidgen\u00f6ssische Technische Hochschule, Zurich and the University of Bologna.\u0026nbsp; He holds a number of patents on networks, security, raster printing, and transaction processing.\u0026nbsp; He is a member of the National Academy of Sciences and the National Academy of Engineering and a Fellow of the Association for Computing Machinery (ACM) and the American Academy of Arts and Sciences. He received the ACM Software Systems Award in 1984 for his work on the Alto, the IEEE Computer Pioneer award in 1996, the National Computer Systems Security Award in 1998, the IEEE von Neumann Medal in 2001, the Turing Award in 1992, and the National Academy of Engineering\u2019s Draper Prize in 2004.\u003C\/p\u003E\u003Cp\u003E\u003Cstrong\u003E\u003Cbr \/\u003E\u003C\/strong\u003E\u003C\/p\u003E\u003Cp\u003E\u003Cstrong\u003EABSTRACT\u003C\/strong\u003E\u003C\/p\u003E\u003Ch5\u003E\u003Cstrong\u003E\u003Cem\u003E\u0022Retroactive Security\u0022\u003C\/em\u003E\u003Cbr \/\u003E\u003C\/strong\u003E\u003C\/h5\u003E\u003Cp\u003EIt\u2019s time to change the way we think about computer security: instead of trying to prevent security breaches, we should focus on dealing with them after they happen. Today computer security depends on access control, and it\u2019s been a failure. Real world security, by contrast, is mainly retroactive: the reason burglars don\u2019t break into my house is that they are afraid of going to jail, and the financial system is secure mainly because almost any transaction can be undone.\u003C\/p\u003E\u003Cp\u003EThere are many ways to make security retroactive:\u003C\/p\u003E\u003Cul\u003E\u003Cli\u003ETrack down and punish offenders.\u003C\/li\u003E\u003Cli\u003ESelectively undo data corruption caused by malware.\u003C\/li\u003E\u003Cli\u003ERequire applications and online services to respect people\u2019s ownership of their personal data.\u003C\/li\u003E\u003C\/ul\u003E\u003Cp\u003EAccess control is still needed, but it can be much more coarse-grained, and therefore both more reliable and less intrusive. Authentication and auditing are the most important features. Retroactive security will not be perfect, but perfect security is not to be had, and it will be much better than what we have now.\u003Cbr \/\u003E\u003Cbr \/\u003E\u003C\/p\u003E\u003Ch4\u003E\u003Ca href=\u0022http:\/\/www.iisp.gatech.edu\/capital-one-fall-16-distinguished-lecture\u0022 target=\u0022_blank\u0022\u003ERSVP\u003C\/a\u003E for this event, which features an hors d\u0027oeuvres reception with Dr. Lampson.\u003C\/h4\u003E\u003Cp\u003E\u0026nbsp;\u003C\/p\u003E","summary":null,"format":"limited_html"}],"field_subtitle":"","field_summary":[{"value":"\u003Cp\u003EThe Institute for Information Security \u0026amp; Privacy hosts Turing Award winner Butler Lampson for the Capital One Fall \u002716 Distinguished Lecture.\u0026nbsp;\u003C\/p\u003E","format":"limited_html"}],"field_summary_sentence":[{"value":"Turing Award winner Butler Lampson visits Georgia Tech for the Capital One Fall \u002716 Distinguished Lecture."}],"uid":"27490","created_gmt":"2016-08-16 21:32:17","changed_gmt":"2017-04-13 21:15:05","author":"Tara La Bouff","boilerplate_text":"","field_publication":"","field_article_url":"","field_event_time":{"event_time_start":"2016-09-27T17:30:00-04:00","event_time_end":"2016-09-27T19:00:00-04:00","event_time_end_last":"2016-09-27T19:00:00-04:00","gmt_time_start":"2016-09-27 21:30:00","gmt_time_end":"2016-09-27 23:00:00","gmt_time_end_last":"2016-09-27 23:00:00","rrule":null,"timezone":"America\/New_York"},"extras":[],"hg_media":{"564661":{"id":"564661","type":"image","title":"Butler Lampson","body":null,"created":"1471461240","gmt_created":"2016-08-17 19:14:00","changed":"1475895369","gmt_changed":"2016-10-08 02:56:09","alt":"Butler Lampson","file":{"fid":"218293","name":"bwl2011_web.jpg","image_path":"\/sites\/default\/files\/images\/bwl2011_web.jpg","image_full_path":"http:\/\/www.tlwarc.hg.gatech.edu\/\/sites\/default\/files\/images\/bwl2011_web.jpg","mime":"image\/jpeg","size":302468,"path_740":"http:\/\/www.tlwarc.hg.gatech.edu\/sites\/default\/files\/styles\/740xx_scale\/public\/images\/bwl2011_web.jpg?itok=uoUjcVb9"}},"451391":{"id":"451391","type":"image","title":"IISP logo","body":null,"created":"1449256280","gmt_created":"2015-12-04 19:11:20","changed":"1475895192","gmt_changed":"2016-10-08 02:53:12","alt":"IISP logo","file":{"fid":"203339","name":"instituteforinformationsecurityprivacy-outline-black874.jpg","image_path":"\/sites\/default\/files\/images\/instituteforinformationsecurityprivacy-outline-black874_0.jpg","image_full_path":"http:\/\/www.tlwarc.hg.gatech.edu\/\/sites\/default\/files\/images\/instituteforinformationsecurityprivacy-outline-black874_0.jpg","mime":"image\/jpeg","size":88082,"path_740":"http:\/\/www.tlwarc.hg.gatech.edu\/sites\/default\/files\/styles\/740xx_scale\/public\/images\/instituteforinformationsecurityprivacy-outline-black874_0.jpg?itok=JGV2BzFy"}}},"media_ids":["564661","451391"],"groups":[{"id":"47223","name":"College of Computing"},{"id":"50875","name":"School of Computer Science"},{"id":"50876","name":"School of Interactive Computing"},{"id":"50877","name":"School of Computational Science and Engineering"},{"id":"69599","name":"IPaT"},{"id":"322011","name":"College of Computing Events"},{"id":"430601","name":"Institute for Information Security and Privacy"}],"categories":[],"keywords":[{"id":"1404","name":"Cybersecurity"},{"id":"5699","name":"Turing Award"}],"core_research_areas":[],"news_room_topics":[],"event_categories":[{"id":"1795","name":"Seminar\/Lecture\/Colloquium"}],"invited_audience":[{"id":"78751","name":"Undergraduate students"},{"id":"78761","name":"Faculty\/Staff"},{"id":"78771","name":"Public"},{"id":"174045","name":"Graduate students"}],"affiliations":[],"classification":[],"areas_of_expertise":[],"news_and_recent_appearances":[],"phone":[],"contact":[{"value":"\u003Cp\u003ETara La Bouff, \u003Ca href=\u0022mailto:tara.labouff@iisp.gatech.edu\u0022\u003Etara.labouff@iisp.gatech.edu\u003C\/a\u003E, 404.769.5408\u003C\/p\u003E","format":"limited_html"}],"email":[],"slides":[],"orientation":[],"userdata":""}},"484481":{"#nid":"484481","#data":{"type":"event","title":"2016 Georgia Tech Cyber Security Summit","body":[{"value":"\u003Cp\u003EThe Georgia Tech Cyber Security Summit gathers government, industry, and academia to discuss the newest threats and trends in cyberspace, critical data, and cyber-connected devices.\u003C\/p\u003E\u003Cp\u003EEvery year, security experts see new evolutions in cyberthreats to people, businesses and governments. Our adversaries know no boundaries. Cybersecurity is everyone\u0027s business.\u003C\/p\u003E\u003Cp\u003EThe annual Summit features breakfast, lunch, keynote speeches, panel discussions, and more. All attendees at this full-day summit receive a copy of the \u003Cem\u003E2017 Cyber Threats, Trends \u0026amp; Technologies Report.\u003C\/em\u003E\u003C\/p\u003E\u003Ch3\u003E\u003Cem\u003ERegistration is closed. \u003Cbr \/\u003E\u003C\/em\u003E\u003C\/h3\u003E\u003Cp\u003E\u003Cem\u003E\u003Cbr \/\u003E\u003C\/em\u003E\u003C\/p\u003E\u003Ch5\u003E\u003Cstrong\u003EMorning \u003C\/strong\u003E\u003C\/h5\u003E\u003Cp\u003E\u003Cem\u003E\u003Cstrong\u003E9:30 a.m.\u003C\/strong\u003E\u003C\/em\u003E\u003Cbr \/\u003E Keynote by Keynote by \u003Cstrong\u003E\u003Ca href=\u0022http:\/\/www.cc.gatech.edu\/people\/annie-anton\u0022 target=\u0022_blank\u0022\u003EAnnie Ant\u00f3n\u003C\/a\u003E\u003C\/strong\u003E, chair, School of Interactive Computing; director, \u003Ca href=\u0022http:\/\/theprivacyplace.org\/\u0022 target=\u0022_blank\u0022\u003EThePrivacyPlace.org\u003C\/a\u003E\u003C\/p\u003E\u003Cp\u003E\u003Cem\u003E\u003Cstrong\u003E10:00 a.m.\u003C\/strong\u003E\u003C\/em\u003E\u003Cbr \/\u003E Meet the Students \/ Fall \u002716 Demo Day\u003C\/p\u003E\u003Cp\u003E\u003Cstrong\u003E\u003Cem\u003E11:00 a.m. - Noon\u003C\/em\u003E\u003C\/strong\u003E\u003Cbr \/\u003E \u003Cstrong\u003E\u003Cem\u003EPanel: \u201cPartners in Crisis? Legislation has yet to improve information sharing\u201d\u003C\/em\u003E\u003C\/strong\u003E\u003Cbr \/\u003E Evan Glover, senior counsel, GE Transportation\u003Cbr \/\u003E Paul Huesken, chief information assurance officer, Coca-Cola\u003Cbr \/\u003E Lee Kirschbaum, special agent, FBI\u003Cbr \/\u003E Jimmy Lummis, associate director, Georgia Tech Cyber Security\u003C\/p\u003E\u003Ch5\u003E\u0026nbsp;\u003C\/h5\u003E\u003Ch5\u003E\u003Cstrong\u003EAfternoon \u003C\/strong\u003E\u003C\/h5\u003E\u003Cp\u003E\u003Cem\u003E\u003Cstrong\u003E1:30 p.m.\u003C\/strong\u003E\u003C\/em\u003E\u003Cbr \/\u003E Keynote by \u003Ca href=\u0022http:\/\/www.southerncompany.com\/about-us\/leadership\/ceo\/pdfs\/Tom-Fanning-biography.pdf\u0022 target=\u0022_blank\u0022\u003E\u003Cstrong\u003ETom Fanning\u003C\/strong\u003E\u003C\/a\u003E, chairman, president \u0026amp; CEO, Southern Company\u003C\/p\u003E\u003Ch6\u003E\u003Cstrong\u003EBreakout Sessions\u003C\/strong\u003E\u003C\/h6\u003E\u003Cp\u003E\u003Cstrong\u003E\u003Cem\u003E2:30 - 3:30 p.m.\u003C\/em\u003E\u003C\/strong\u003E\u003Cbr \/\u003E \u003Cstrong\u003E\u003Cem\u003ETRACK A: \u201cRansomware: How to respond\u201d\u003C\/em\u003E\u003C\/strong\u003E\u003Cbr \/\u003E Chris Smoak, division chief, Cyber Technology \u0026amp; Information Security Lab, GTRI\u003Cbr \/\u003E Evan Downing, Ph.D. student, Georgia Tech\u003C\/p\u003E\u003Cp\u003E\u003Cstrong\u003E\u003Cem\u003ETRACK B: \u201cThe Cyber Policy Landscape at Home \u0026amp; Abroad\u201d\u003C\/em\u003E\u003C\/strong\u003E\u003Cbr \/\u003E Klaus Brisch, partner, DWF Germany\u003Cbr \/\u003E Rick Stewart, director of cyber security services, CGI Federal of Canada\u003Cbr \/\u003E Peter Swire, associate director of policy, Institute for Information Security \u0026amp; Privacy\u003C\/p\u003E\u003Cp\u003E\u003Cstrong\u003E\u003Cem\u003E3:30 - 4:30 p.m.\u003C\/em\u003E\u003C\/strong\u003E\u003Cbr \/\u003E \u003Cstrong\u003E\u003Cem\u003ETRACK A: \u201cCryptocurrency: Current and future state of dark money\u201d\u003C\/em\u003E\u003C\/strong\u003E\u003Cbr \/\u003E Mark Ray, PwC, director, Cyber Investigations and Breach Response\u003Cbr \/\u003E SSA Chad Hunt, FBI Atlanta \u2013 Computer Intrusion Squad\u003Cbr \/\u003E Michael Farrell, chief research scientist, CTISL \u2013 GTRI\u003C\/p\u003E\u003Cp\u003E\u003Cstrong\u003E\u003Cem\u003ETRACK B: \u201cCybersecurity: Not just the IT department\u2019s problem\u201d\u003C\/em\u003E\u003C\/strong\u003E\u003Cbr \/\u003E COL Alprentice Smith, Joint Functional Component Command Headquarters, U.S. Army Cyber Command\u003Cbr \/\u003E Leo Mark, associate dean, Georgia Tech Professional Education\u003Cbr \/\u003E Taesoo Kim, assistant professor, School of Computer Science\u003C\/p\u003E\u003Cp\u003E\u003Cem\u003E\u003Cbr \/\u003E\u003C\/em\u003E\u003C\/p\u003E","summary":null,"format":"limited_html"}],"field_subtitle":"","field_summary":[{"value":"\u003Cp\u003EThe Georgia Tech Cyber Security Summit gathers government, industry, and academia to discuss the newest threats and trends in cyberspace, critical data, and cyber-connected devices.\u003C\/p\u003E","format":"limited_html"}],"field_summary_sentence":[{"value":"Georgia Tech invites the public to a free, full-day seminar hosted by the Institute for Information Security \u0026 Privacy."}],"uid":"27490","created_gmt":"2016-01-11 15:45:00","changed_gmt":"2017-04-13 21:17:13","author":"Tara La Bouff","boilerplate_text":"","field_publication":"","field_article_url":"","field_event_time":{"event_time_start":"2016-09-28T09:30:00-04:00","event_time_end":"2016-09-28T17:30:00-04:00","event_time_end_last":"2016-09-28T17:30:00-04:00","gmt_time_start":"2016-09-28 13:30:00","gmt_time_end":"2016-09-28 21:30:00","gmt_time_end_last":"2016-09-28 21:30:00","rrule":null,"timezone":"America\/New_York"},"extras":["free_food"],"hg_media":{"573901":{"id":"573901","type":"image","title":"GTCSS\u002716","body":null,"created":"1473278783","gmt_created":"2016-09-07 20:06:23","changed":"1475895383","gmt_changed":"2016-10-08 02:56:23","alt":"GTCSS\u002716","file":{"fid":"207153","name":"blue_banner_1140x570_01-01.jpg","image_path":"\/sites\/default\/files\/images\/blue_banner_1140x570_01-01.jpg","image_full_path":"http:\/\/www.tlwarc.hg.gatech.edu\/\/sites\/default\/files\/images\/blue_banner_1140x570_01-01.jpg","mime":"image\/jpeg","size":1775690,"path_740":"http:\/\/www.tlwarc.hg.gatech.edu\/sites\/default\/files\/styles\/740xx_scale\/public\/images\/blue_banner_1140x570_01-01.jpg?itok=2dtO2X0S"}},"580761":{"id":"580761","type":"image","title":"2016 Keynote Speakers - GT CSS","body":null,"created":"1474488184","gmt_created":"2016-09-21 20:03:04","changed":"1475895391","gmt_changed":"2016-10-08 02:56:31","alt":"2016 Keynote Speakers - GT CSS","file":{"fid":"207346","name":"gtcss_keynotes_091616_2.jpg","image_path":"\/sites\/default\/files\/images\/gtcss_keynotes_091616_2.jpg","image_full_path":"http:\/\/www.tlwarc.hg.gatech.edu\/\/sites\/default\/files\/images\/gtcss_keynotes_091616_2.jpg","mime":"image\/jpeg","size":192695,"path_740":"http:\/\/www.tlwarc.hg.gatech.edu\/sites\/default\/files\/styles\/740xx_scale\/public\/images\/gtcss_keynotes_091616_2.jpg?itok=bXYOnmSp"}},"451391":{"id":"451391","type":"image","title":"IISP logo","body":null,"created":"1449256280","gmt_created":"2015-12-04 19:11:20","changed":"1475895192","gmt_changed":"2016-10-08 02:53:12","alt":"IISP logo","file":{"fid":"203339","name":"instituteforinformationsecurityprivacy-outline-black874.jpg","image_path":"\/sites\/default\/files\/images\/instituteforinformationsecurityprivacy-outline-black874_0.jpg","image_full_path":"http:\/\/www.tlwarc.hg.gatech.edu\/\/sites\/default\/files\/images\/instituteforinformationsecurityprivacy-outline-black874_0.jpg","mime":"image\/jpeg","size":88082,"path_740":"http:\/\/www.tlwarc.hg.gatech.edu\/sites\/default\/files\/styles\/740xx_scale\/public\/images\/instituteforinformationsecurityprivacy-outline-black874_0.jpg?itok=JGV2BzFy"}}},"media_ids":["573901","580761","451391"],"groups":[{"id":"1304","name":"High Performance Computing (HPC)"},{"id":"47223","name":"College of Computing"},{"id":"50875","name":"School of Computer Science"},{"id":"50876","name":"School of Interactive Computing"},{"id":"50877","name":"School of Computational Science and Engineering"},{"id":"69599","name":"IPaT"},{"id":"322011","name":"College of Computing Events"},{"id":"430601","name":"Institute for Information Security and Privacy"}],"categories":[],"keywords":[{"id":"345","name":"cyber security"},{"id":"2254","name":"gtisc"},{"id":"416","name":"GTRI"},{"id":"2678","name":"information security"},{"id":"141341","name":"Institute for Information Security \u0026 Privacy"}],"core_research_areas":[],"news_room_topics":[],"event_categories":[{"id":"1795","name":"Seminar\/Lecture\/Colloquium"}],"invited_audience":[{"id":"78751","name":"Undergraduate students"},{"id":"78761","name":"Faculty\/Staff"},{"id":"78771","name":"Public"},{"id":"174045","name":"Graduate students"}],"affiliations":[],"classification":[],"areas_of_expertise":[],"news_and_recent_appearances":[],"phone":[],"contact":[{"value":"\u003Cp\u003ETara La Bouff, Marketing Communications Manager\u003C\/p\u003E\u003Cp\u003E\u003Ca href=\u0022mailto:tara.labouff@iisp.gatech.edu\u0022\u003Etara.labouff@iisp.gatech.edu\u003C\/a\u003E, 404.769.5408\u003C\/p\u003E","format":"limited_html"}],"email":[],"slides":[],"orientation":[],"userdata":""}},"563551":{"#nid":"563551","#data":{"type":"event","title":"Cybersecurity Lecture Series - Sept. 30","body":[{"value":"\u003Ch4\u003EMeet academic and industry leaders for intimate discussions about new cyber threats, trends and technologies.\u003Cem\u003E \u003Cbr \/\u003E\u003C\/em\u003E\u003C\/h4\u003E\u003Cp\u003EThe weekly \u003Cstrong\u003ECybersecurity Lecture Series\u003C\/strong\u003E is a free, open-to-the-public lecture from a thought leader who is advancing the field of information security and privacy. Invited speakers include executives and researchers from private companies, government agencies, start-up incubators as well as Georgia Tech faculty and students presenting their research.\u003C\/p\u003E\u003Cp\u003EHeld \u003Cstrong\u003Eweekly each Friday at Noon\u003C\/strong\u003E \u003Cstrong\u003Ethrough Dec. 2\u003C\/strong\u003E, lectures are open to all -- students, faculty, industry, government, or simply the curious. Students may register for credit under seminar course CS-8001-INF.\u003C\/p\u003E\u003Cp\u003E\u003Cem\u003E\u003Ca href=\u0022http:\/\/www.iisp.gatech.edu\/register-cybersecurity-lecture-series-sept-30\u0022 target=\u0022_blank\u0022\u003EComplimentary lunch provided for registered guests\u003C\/a\u003E. Please bring your own beverage.\u003C\/em\u003E\u003C\/p\u003E\u003Cp\u003E\u003Cem\u003E\u003Ca href=\u0022http:\/\/www.iisp.gatech.edu\/cyber-lecture\u0022 target=\u0022_blank\u0022\u003ESign up to receive future lecture announcements.\u003C\/a\u003E\u003Cbr \/\u003E\u003C\/em\u003E\u003C\/p\u003E\u003Ch4\u003E\u003Cem\u003E\u0026nbsp;\u003Cbr \/\u003E\u003C\/em\u003E\u003C\/h4\u003E\u003Ch4\u003EFeaturing Frank Wang on Sept. 30\u003Cem\u003E\u003Cbr \/\u003E\u003C\/em\u003E\u003C\/h4\u003E\u003Ch5\u003E\u0022Cryptographically Enforced Access Control for User Data in Untrusted Clouds\u0022\u003C\/h5\u003E\u003Cp\u003EModern web services rob users of low-level control over cloud storage\u2014a user\u2019s single logical data set is scattered across multiple storage silos whose access controls are set by web services, not users. The consequence is that users lack the ultimate authority to determine how their data is shared with other web services.\u003Cbr \/\u003EIn this talk, we introduce Sieve, a new platform which selectively (and securely) exposes user data to web services. Sieve has a user-centric storage model: each user uploads encrypted data to a single cloud store, and by default, only the user knows the decryption keys. Given this storage model, Sieve defines an infrastructure to support rich, legacy web applications. Using attribute-based encryption, Sieve allows users to define intuitively understandable access policies that are cryptographically enforceable. Using key homomorphism, Sieve can reencrypt user data on storage providers in situ, revoking decryption keys from web services without revealing new keys to the storage provider. Using secret sharing and two-factor authentication, Sieve protects cryptographic secrets against the loss of user devices like smartphones and laptops. The result is that users can enjoy rich, legacy web applications, while benefiting from cryptographically strong controls over which data a web service can access.\u003C\/p\u003E\u003Cp\u003E\u003Cstrong\u003EBIO\u003C\/strong\u003E\u003C\/p\u003E\u003Cp\u003E\u003Cstrong\u003EFrank Wang\u003C\/strong\u003E is a Ph.D. student at the Massachusetts Institute of Technology focusing on building secure systems. He is advised by Nickolai Zeldovich and James Mickens. He completed his undergraduate studies at Stanford University, focusing on applied cryptography. He runs the MIT security seminar, and he is also a member of Roughdraft Ventures, which provides small amounts of capital to early stage student startups. He is currently running a summer program for early stage security companies called Cybersecurity Factory. He has interned at the security teams at Google and Facebook as well as consulted for security companies, such as Qualys. When he is not busy worrying about your security, he enjoys going to art museums and being outdoors.\u003C\/p\u003E\u003Cp\u003E\u0026nbsp;\u003C\/p\u003E","summary":null,"format":"limited_html"}],"field_subtitle":"","field_summary":[{"value":"\u003Cp\u003EFrank Wang from The Cybersecurity Factory at the Massachusetts Institute of Technology delivers a technical talk about \u0022Sieve\u0022 for cloud storage security.\u003Cem\u003E\u003Cbr \/\u003E\u003C\/em\u003E\u003C\/p\u003E","format":"limited_html"}],"field_summary_sentence":[{"value":"Meet students, academic and industry leaders for intimate discussions about new cyber threats, trends and technologies."}],"uid":"27490","created_gmt":"2016-08-16 14:28:56","changed_gmt":"2017-04-13 21:15:06","author":"Tara La Bouff","boilerplate_text":"","field_publication":"","field_article_url":"","field_event_time":{"event_time_start":"2016-09-30T13:00:00-04:00","event_time_end":"2016-09-30T14:00:00-04:00","event_time_end_last":"2016-09-30T14:00:00-04:00","gmt_time_start":"2016-09-30 17:00:00","gmt_time_end":"2016-09-30 18:00:00","gmt_time_end_last":"2016-09-30 18:00:00","rrule":null,"timezone":"America\/New_York"},"extras":[],"hg_media":{"538461":{"id":"538461","type":"image","title":"Cybersecurity Lecture Series","body":null,"created":"1464703200","gmt_created":"2016-05-31 14:00:00","changed":"1475895326","gmt_changed":"2016-10-08 02:55:26","alt":"Cybersecurity Lecture Series","file":{"fid":"89506","name":"cls_email_header.jpg","image_path":"\/sites\/default\/files\/images\/cls_email_header.jpg","image_full_path":"http:\/\/www.tlwarc.hg.gatech.edu\/\/sites\/default\/files\/images\/cls_email_header.jpg","mime":"image\/jpeg","size":461835,"path_740":"http:\/\/www.tlwarc.hg.gatech.edu\/sites\/default\/files\/styles\/740xx_scale\/public\/images\/cls_email_header.jpg?itok=NPA_x_rn"}},"451391":{"id":"451391","type":"image","title":"IISP logo","body":null,"created":"1449256280","gmt_created":"2015-12-04 19:11:20","changed":"1475895192","gmt_changed":"2016-10-08 02:53:12","alt":"IISP logo","file":{"fid":"203339","name":"instituteforinformationsecurityprivacy-outline-black874.jpg","image_path":"\/sites\/default\/files\/images\/instituteforinformationsecurityprivacy-outline-black874_0.jpg","image_full_path":"http:\/\/www.tlwarc.hg.gatech.edu\/\/sites\/default\/files\/images\/instituteforinformationsecurityprivacy-outline-black874_0.jpg","mime":"image\/jpeg","size":88082,"path_740":"http:\/\/www.tlwarc.hg.gatech.edu\/sites\/default\/files\/styles\/740xx_scale\/public\/images\/instituteforinformationsecurityprivacy-outline-black874_0.jpg?itok=JGV2BzFy"}},"490641":{"id":"490641","type":"image","title":"Frank Wang, coordinator, The Cybersecurity Factory","body":null,"created":"1453827600","gmt_created":"2016-01-26 17:00:00","changed":"1475895248","gmt_changed":"2016-10-08 02:54:08","alt":"Frank Wang, coordinator, The Cybersecurity Factory","file":{"fid":"204436","name":"rdv-06_big.jpg","image_path":"\/sites\/default\/files\/images\/rdv-06_big_0.jpg","image_full_path":"http:\/\/www.tlwarc.hg.gatech.edu\/\/sites\/default\/files\/images\/rdv-06_big_0.jpg","mime":"image\/jpeg","size":375718,"path_740":"http:\/\/www.tlwarc.hg.gatech.edu\/sites\/default\/files\/styles\/740xx_scale\/public\/images\/rdv-06_big_0.jpg?itok=dD43r3Su"}}},"media_ids":["538461","451391","490641"],"groups":[{"id":"47223","name":"College of Computing"},{"id":"50875","name":"School of Computer Science"},{"id":"50876","name":"School of Interactive Computing"},{"id":"50877","name":"School of Computational Science and Engineering"},{"id":"322011","name":"College of Computing Events"},{"id":"430601","name":"Institute for Information Security and Privacy"}],"categories":[],"keywords":[{"id":"10807","name":"cloud computing"},{"id":"1404","name":"Cybersecurity"}],"core_research_areas":[],"news_room_topics":[],"event_categories":[{"id":"1795","name":"Seminar\/Lecture\/Colloquium"}],"invited_audience":[{"id":"78751","name":"Undergraduate students"},{"id":"78761","name":"Faculty\/Staff"},{"id":"78771","name":"Public"},{"id":"174045","name":"Graduate students"}],"affiliations":[],"classification":[],"areas_of_expertise":[],"news_and_recent_appearances":[],"phone":[],"contact":[{"value":"\u003Cp\u003ETara La Bouff, \u003Ca href=\u0022mailto:tara.labouff@iisp.gatech.edu\u0022\u003Etara.labouff@iisp.gatech.edu\u003C\/a\u003E, 404.769.5408\u003C\/p\u003E","format":"limited_html"}],"email":[],"slides":[],"orientation":[],"userdata":""}},"565881":{"#nid":"565881","#data":{"type":"event","title":"France-Atlanta 2016: Cybersecurity: Transatlantic Innovation \u0026 Strategies","body":[{"value":"\u003Cblockquote\u003E\u003Cp\u003E\u003Cem\u003EThe Consulate General of France in Atlanta and the Georgia Institute of Technology will co-present the 7th Annual France-Atlanta, a series of French-American events centered on innovation, from October 12-22, 2016 in Atlanta, Georgia. Activities include a two-day scientific symposium about cybersecurity, co-hosted by the Institute for Information Security \u0026amp; Privacy and Georgia Tech Lorraine.\u003C\/em\u003E\u003C\/p\u003E\u003C\/blockquote\u003E\u003Ch4\u003E\u003Cstrong\u003ECybersecurity: Transatlantic Innovation and Strategies\u003C\/strong\u003E \u003C\/h4\u003E\u003Cp\u003EVulnerability to cyberattacks, theft, and other threats is as much a personal concern as it is one of national and global security. Ensuring the secure and reliable exchange of information is a critical task and one that the scientific community has been engaged in since the rise of new technologies.\u003C\/p\u003E\u003Cp\u003E\u003Cstrong\u003ECybersecurity: Transatlantic Innovation and Strategies\u003C\/strong\u003E is a free, two-day symposium that will enable leading scientists in this field to identify current challenges and to share the results of their research. French and American cybersecurity experts will have the opportunity to come together and discuss the development of new scientific partnerships between the United States and France.\u003C\/p\u003E\u003Cp\u003EDiscussions will focus on privacy and data protection, cryptology and system security, formal methods for security, and the education and training of tomorrow\u2019s cybersecurity scientists. In addition, industry leaders, representatives from innovative start-ups and policy researchers from both sides of the Atlantic will tackle current technology transfer and innovation challenges in this field during a roundtable discussion.\u003C\/p\u003E\u003Cp\u003EPre-registration required. To register, \u003Ca href=\u0022https:\/\/www.eventbrite.com\/e\/cybersecurity-transatlantic-innovation-strategies-tickets-27215380937\u0022\u003Eclick here\u003C\/a\u003E. \u003Cbr \/\u003E\u003C\/p\u003E","summary":null,"format":"limited_html"}],"field_subtitle":"","field_summary":[{"value":"\u003Cp\u003EThe Consulate General of France in Atlanta and the Georgia Institute of Technology will co-present the 7th Annual France-Atlanta, a series of French-American events centered on innovation, from October 12-22, 2016 in Atlanta, Georgia.\u003C\/p\u003E","format":"limited_html"}],"field_summary_sentence":[{"value":"The Consulate General of France in Atlanta and Georgia Tech partner to hold a two-day symposium about cybersecurity."}],"uid":"27490","created_gmt":"2016-08-22 09:10:56","changed_gmt":"2017-04-13 21:15:02","author":"Tara La Bouff","boilerplate_text":"","field_publication":"","field_article_url":"","field_event_time":{"event_time_start":"2016-10-13T09:30:00-04:00","event_time_end":"2016-10-14T09:30:00-04:00","event_time_end_last":"2016-10-14T09:30:00-04:00","gmt_time_start":"2016-10-13 13:30:00","gmt_time_end":"2016-10-14 13:30:00","gmt_time_end_last":"2016-10-14 13:30:00","rrule":null,"timezone":"America\/New_York"},"extras":[],"hg_media":{"565871":{"id":"565871","type":"image","title":"France-Atlanta 2016 logo","body":null,"created":"1471870643","gmt_created":"2016-08-22 12:57:23","changed":"1475895371","gmt_changed":"2016-10-08 02:56:11","alt":"France-Atlanta 2016 logo","file":{"fid":"206915","name":"france-atl-2016-logo_date_tag.jpg","image_path":"\/sites\/default\/files\/images\/france-atl-2016-logo_date_tag.jpg","image_full_path":"http:\/\/www.tlwarc.hg.gatech.edu\/\/sites\/default\/files\/images\/france-atl-2016-logo_date_tag.jpg","mime":"image\/jpeg","size":310543,"path_740":"http:\/\/www.tlwarc.hg.gatech.edu\/sites\/default\/files\/styles\/740xx_scale\/public\/images\/france-atl-2016-logo_date_tag.jpg?itok=Oiv9Sf9Z"}},"565861":{"id":"565861","type":"image","title":"Cybersecurity: Transatlantic Innovation \u0026 Strategies","body":null,"created":"1471870413","gmt_created":"2016-08-22 12:53:33","changed":"1475895371","gmt_changed":"2016-10-08 02:56:11","alt":"Cybersecurity: Transatlantic Innovation \u0026 Strategies","file":{"fid":"206914","name":"france-atlanta_event_web.jpg","image_path":"\/sites\/default\/files\/images\/france-atlanta_event_web.jpg","image_full_path":"http:\/\/www.tlwarc.hg.gatech.edu\/\/sites\/default\/files\/images\/france-atlanta_event_web.jpg","mime":"image\/jpeg","size":649407,"path_740":"http:\/\/www.tlwarc.hg.gatech.edu\/sites\/default\/files\/styles\/740xx_scale\/public\/images\/france-atlanta_event_web.jpg?itok=FrYvMC8X"}}},"media_ids":["565871","565861"],"groups":[{"id":"47223","name":"College of Computing"},{"id":"50875","name":"School of Computer Science"},{"id":"50876","name":"School of Interactive Computing"},{"id":"50877","name":"School of Computational Science and Engineering"},{"id":"322011","name":"College of Computing Events"},{"id":"430601","name":"Institute for Information Security and Privacy"},{"id":"54809","name":"Georgia Tech-Europe (GTE)"}],"categories":[],"keywords":[{"id":"1404","name":"Cybersecurity"}],"core_research_areas":[],"news_room_topics":[],"event_categories":[{"id":"1789","name":"Conference\/Symposium"}],"invited_audience":[{"id":"78751","name":"Undergraduate students"},{"id":"78761","name":"Faculty\/Staff"},{"id":"78771","name":"Public"},{"id":"174045","name":"Graduate students"}],"affiliations":[],"classification":[],"areas_of_expertise":[],"news_and_recent_appearances":[],"phone":[],"contact":[],"email":[],"slides":[],"orientation":[],"userdata":""}}}