<nodes> <node id="576731">  <title><![CDATA[Dept of Homeland Security Cyber Careers Info Session]]></title>  <uid>27987</uid>  <body><![CDATA[<p>As technology becomes increasingly more sophisticated, the demand for an experienced and qualified workforce to protect our Nation’s networks and information systems has never been higher.</p><p>Come hear more from Tech alum Dr. Phyllis Schneck who currently serves as the Deputy Under Secretary for Cybersecurity and Communications for the National Protection and Programs Directorate and chief cybersecurity official for the Department of Homeland Security.</p>]]></body>  <author>Laura Means</author>  <status>0</status>  <created>1473865331</created>  <gmt_created>2016-09-14 15:02:11</gmt_created>  <changed>1492118082</changed>  <gmt_changed>2017-04-13 21:14:42</gmt_changed>  <promote>0</promote>  <sticky>0</sticky>  <teaser><![CDATA[Learn about DHS Cyber Careers]]></teaser>  <type>event</type>  <sentence><![CDATA[Learn about DHS Cyber Careers]]></sentence>  <summary><![CDATA[]]></summary>  <start>2016-09-27T12:00:00-04:00</start>  <end>2016-09-27T12:00:00-04:00</end>  <end_last>2016-09-27T12:00:00-04:00</end_last>  <gmt_start>2016-09-27 16:00:00</gmt_start>  <gmt_end>2016-09-27 16:00:00</gmt_end>  <gmt_end_last>2016-09-27 16:00:00</gmt_end_last>  <times>    <item>      <value>2016-09-27T12:00:00-04:00</value>      <value2>2016-09-27T12:00:00-04:00</value2>      <rrule><![CDATA[  ]]></rrule>      <timezone>America/New_York</timezone>      <timezone_db>America/New_York</timezone_db>      <date_type>datetime</date_type>    </item>  </times>  <gmt_times>    <item>      <value>2016-09-27 12:00:00</value>      <value2>2016-09-27 12:00:00</value2>      <rrule><![CDATA[  ]]></rrule>      <timezone>America/New_York</timezone>      <timezone_db>America/New_York</timezone_db>      <date_type>datetime</date_type>    </item>  </gmt_times>  <phone><![CDATA[]]></phone>  <url><![CDATA[https://www.dhs.gov/homeland-security-careers/dhs-cybersecurity]]></url>  <location_url>    <url><![CDATA[https://www.dhs.gov/homeland-security-careers/dhs-cybersecurity]]></url>    <title><![CDATA[]]></title>  </location_url>  <email><![CDATA[]]></email>  <contact><![CDATA[<p><strong>Jeff Cullen</strong><br /><em>Assistant Director of Federal Relations</em><br />Office of Government and Community Relations<br />Georgia Institute of Technology<br /><a href="mailto:jeff.cullen@gatech.edu">jeff.cullen@gatech.edu</a><br />(404) 385-0017</p>]]></contact>  <fee><![CDATA[]]></fee>  <extras>      </extras>  <location><![CDATA[]]></location>  <media>          <item>576721</item>      </media>  <hg_media>          <item>          <nid>576721</nid>          <type>image</type>          <title><![CDATA[DHS logo]]></title>          <body><![CDATA[]]></body>                      <image_name><![CDATA[130314dhs.jpg]]></image_name>            <image_path><![CDATA[/sites/default/files/images/130314dhs.jpg]]></image_path>            <image_full_path><![CDATA[http://www.tlwarc.hg.gatech.edu//sites/default/files/images/130314dhs.jpg]]></image_full_path>            <image_740><![CDATA[http://www.tlwarc.hg.gatech.edu/sites/default/files/styles/740xx_scale/public/sites/default/files/images/130314dhs.jpg?itok=FST5nnuM]]></image_740>            <image_mime>image/jpeg</image_mime>            <image_alt><![CDATA[DHS logo]]></image_alt>                              <created>1473879628</created>          <gmt_created>2016-09-14 19:00:28</gmt_created>          <changed>1475895386</changed>          <gmt_changed>2016-10-08 02:56:26</gmt_changed>      </item>      </hg_media>  <boilerplate></boilerplate>  <boilerplate_text><![CDATA[]]></boilerplate_text>  <sidebar><![CDATA[]]></sidebar>  <related>      </related>  <files>      </files>  <groups>          <group id="47398"><![CDATA[GCR (Office of Government and Community Relations)]]></group>      </groups>  <categories>          <category tid="10377"><![CDATA[Career/Professional development]]></category>      </categories>  <event_terms>          <term tid="10377"><![CDATA[Career/Professional development]]></term>      </event_terms>  <event_audience>          <term tid="78751"><![CDATA[Undergraduate students]]></term>          <term tid="174045"><![CDATA[Graduate students]]></term>      </event_audience>  <keywords>          <keyword tid="8563"><![CDATA[careers]]></keyword>          <keyword tid="1404"><![CDATA[Cybersecurity]]></keyword>          <keyword tid="13167"><![CDATA[DHS]]></keyword>          <keyword tid="8833"><![CDATA[Info Session]]></keyword>      </keywords>  <userdata>      <![CDATA[]]>  </userdata></node><node id="563901">  <title><![CDATA[Turing Award Winner Visits Georgia Tech]]></title>  <uid>27490</uid>  <body><![CDATA[<h3>The Institute for Information Security &amp; Privacy hosts Turing Award winner Butler Lampson for the Capital One Fall '16 Distinguished Lecture.</h3><p>&nbsp;</p><p>Butler Lampson is a renowned computer scientist and the 1992 Turing Award winner for pioneering contributions that laid much of the foundation for today’s local area networks, client-server systems, laser printers, and WYSIWYG editors, such as Microsoft Word. He is a Technical Fellow at Microsoft Corporation and an Adjunct Professor of Computer Science and Electrical Engineering at MIT, actively working on security, privacy, and fault-tolerance, and kibitzing in systems, networking, and other areas.</p><p>Lampson was part of the faculty at University of California Berkeley, at the Computer Science Laboratory at Xerox PARC, and subsequently at Digital’s Systems Research Center before joining Microsoft. He has worked on computer architecture, local area networks, raster printers, page description languages, operating systems, remote procedure call, programming languages and their semantics, programming in the large, fault-tolerant computing, transaction processing, computer security, editors, and tablet computers.&nbsp; He was one of the designers of the SDS 940 time-sharing system, the Alto personal distributed computing system, the Xerox 9700 laser printer, two-phase commit protocols, the Autonet LAN, the SDSI/SPKI system for network security, the Microsoft Tablet PC software, the Microsoft Palladium high-assurance stack, and several programming languages.</p><p>He received an AB from Harvard University, a Ph.D. in EECS from the University of California at Berkeley, and honorary ScD’s from the Eidgenössische Technische Hochschule, Zurich and the University of Bologna.&nbsp; He holds a number of patents on networks, security, raster printing, and transaction processing.&nbsp; He is a member of the National Academy of Sciences and the National Academy of Engineering and a Fellow of the Association for Computing Machinery (ACM) and the American Academy of Arts and Sciences. He received the ACM Software Systems Award in 1984 for his work on the Alto, the IEEE Computer Pioneer award in 1996, the National Computer Systems Security Award in 1998, the IEEE von Neumann Medal in 2001, the Turing Award in 1992, and the National Academy of Engineering’s Draper Prize in 2004.</p><p><strong><br /></strong></p><p><strong>ABSTRACT</strong></p><h5><strong><em>"Retroactive Security"</em><br /></strong></h5><p>It’s time to change the way we think about computer security: instead of trying to prevent security breaches, we should focus on dealing with them after they happen. Today computer security depends on access control, and it’s been a failure. Real world security, by contrast, is mainly retroactive: the reason burglars don’t break into my house is that they are afraid of going to jail, and the financial system is secure mainly because almost any transaction can be undone.</p><p>There are many ways to make security retroactive:</p><ul><li>Track down and punish offenders.</li><li>Selectively undo data corruption caused by malware.</li><li>Require applications and online services to respect people’s ownership of their personal data.</li></ul><p>Access control is still needed, but it can be much more coarse-grained, and therefore both more reliable and less intrusive. Authentication and auditing are the most important features. Retroactive security will not be perfect, but perfect security is not to be had, and it will be much better than what we have now.<br /><br /></p><h4><a href="http://www.iisp.gatech.edu/capital-one-fall-16-distinguished-lecture" target="_blank">RSVP</a> for this event, which features an hors d'oeuvres reception with Dr. Lampson.</h4><p>&nbsp;</p>]]></body>  <author>Tara La Bouff</author>  <status>1</status>  <created>1471383137</created>  <gmt_created>2016-08-16 21:32:17</gmt_created>  <changed>1492118105</changed>  <gmt_changed>2017-04-13 21:15:05</gmt_changed>  <promote>0</promote>  <sticky>0</sticky>  <teaser><![CDATA[Turing Award winner Butler Lampson visits Georgia Tech for the Capital One Fall '16 Distinguished Lecture.]]></teaser>  <type>event</type>  <sentence><![CDATA[Turing Award winner Butler Lampson visits Georgia Tech for the Capital One Fall '16 Distinguished Lecture.]]></sentence>  <summary><![CDATA[<p>The Institute for Information Security &amp; Privacy hosts Turing Award winner Butler Lampson for the Capital One Fall '16 Distinguished Lecture.&nbsp;</p>]]></summary>  <start>2016-09-27T17:30:00-04:00</start>  <end>2016-09-27T19:00:00-04:00</end>  <end_last>2016-09-27T19:00:00-04:00</end_last>  <gmt_start>2016-09-27 21:30:00</gmt_start>  <gmt_end>2016-09-27 23:00:00</gmt_end>  <gmt_end_last>2016-09-27 23:00:00</gmt_end_last>  <times>    <item>      <value>2016-09-27T17:30:00-04:00</value>      <value2>2016-09-27T19:00:00-04:00</value2>      <rrule><![CDATA[  ]]></rrule>      <timezone>America/New_York</timezone>      <timezone_db>America/New_York</timezone_db>      <date_type>datetime</date_type>    </item>  </times>  <gmt_times>    <item>      <value>2016-09-27 05:30:00</value>      <value2>2016-09-27 07:00:00</value2>      <rrule><![CDATA[  ]]></rrule>      <timezone>America/New_York</timezone>      <timezone_db>America/New_York</timezone_db>      <date_type>datetime</date_type>    </item>  </gmt_times>  <phone><![CDATA[]]></phone>  <url><![CDATA[http://www.iisp.gatech.edu/contact-institute]]></url>  <location_url>    <url><![CDATA[http://www.iisp.gatech.edu/contact-institute]]></url>    <title><![CDATA[]]></title>  </location_url>  <email><![CDATA[]]></email>  <contact><![CDATA[<p>Tara La Bouff, <a href="mailto:tara.labouff@iisp.gatech.edu">tara.labouff@iisp.gatech.edu</a>, 404.769.5408</p>]]></contact>  <fee><![CDATA[]]></fee>  <extras>      </extras>  <location><![CDATA[]]></location>  <media>          <item>564661</item>          <item>451391</item>      </media>  <hg_media>          <item>          <nid>564661</nid>          <type>image</type>          <title><![CDATA[Butler Lampson]]></title>          <body><![CDATA[]]></body>                      <image_name><![CDATA[bwl2011_web.jpg]]></image_name>            <image_path><![CDATA[/sites/default/files/images/bwl2011_web.jpg]]></image_path>            <image_full_path><![CDATA[http://www.tlwarc.hg.gatech.edu//sites/default/files/images/bwl2011_web.jpg]]></image_full_path>            <image_740><![CDATA[http://www.tlwarc.hg.gatech.edu/sites/default/files/styles/740xx_scale/public/sites/default/files/images/bwl2011_web.jpg?itok=TXmAodDX]]></image_740>            <image_mime>image/jpeg</image_mime>            <image_alt><![CDATA[Butler Lampson]]></image_alt>                              <created>1471461240</created>          <gmt_created>2016-08-17 19:14:00</gmt_created>          <changed>1475895369</changed>          <gmt_changed>2016-10-08 02:56:09</gmt_changed>      </item>          <item>          <nid>451391</nid>          <type>image</type>          <title><![CDATA[IISP logo]]></title>          <body><![CDATA[]]></body>                      <image_name><![CDATA[instituteforinformationsecurityprivacy-outline-black874.jpg]]></image_name>            <image_path><![CDATA[/sites/default/files/images/instituteforinformationsecurityprivacy-outline-black874_0.jpg]]></image_path>            <image_full_path><![CDATA[http://www.tlwarc.hg.gatech.edu//sites/default/files/images/instituteforinformationsecurityprivacy-outline-black874_0.jpg]]></image_full_path>            <image_740><![CDATA[http://www.tlwarc.hg.gatech.edu/sites/default/files/styles/740xx_scale/public/sites/default/files/images/instituteforinformationsecurityprivacy-outline-black874_0.jpg?itok=1zeF6pZR]]></image_740>            <image_mime>image/jpeg</image_mime>            <image_alt><![CDATA[IISP logo]]></image_alt>                              <created>1449256280</created>          <gmt_created>2015-12-04 19:11:20</gmt_created>          <changed>1475895192</changed>          <gmt_changed>2016-10-08 02:53:12</gmt_changed>      </item>      </hg_media>  <boilerplate></boilerplate>  <boilerplate_text><![CDATA[]]></boilerplate_text>  <sidebar><![CDATA[]]></sidebar>  <related>      </related>  <files>      </files>  <groups>          <group id="47223"><![CDATA[College of Computing]]></group>          <group id="50875"><![CDATA[School of Computer Science]]></group>          <group id="50876"><![CDATA[School of Interactive Computing]]></group>          <group id="50877"><![CDATA[School of Computational Science and Engineering]]></group>          <group id="69599"><![CDATA[IPaT]]></group>          <group id="322011"><![CDATA[College of Computing Events]]></group>          <group id="430601"><![CDATA[Institute for Information Security and Privacy]]></group>      </groups>  <categories>          <category tid="1795"><![CDATA[Seminar/Lecture/Colloquium]]></category>      </categories>  <event_terms>          <term tid="1795"><![CDATA[Seminar/Lecture/Colloquium]]></term>      </event_terms>  <event_audience>          <term tid="78751"><![CDATA[Undergraduate students]]></term>          <term tid="78761"><![CDATA[Faculty/Staff]]></term>          <term tid="78771"><![CDATA[Public]]></term>          <term tid="174045"><![CDATA[Graduate students]]></term>      </event_audience>  <keywords>          <keyword tid="1404"><![CDATA[Cybersecurity]]></keyword>          <keyword tid="5699"><![CDATA[Turing Award]]></keyword>      </keywords>  <userdata>      <![CDATA[]]>  </userdata></node><node id="484481">  <title><![CDATA[2016 Georgia Tech Cyber Security Summit]]></title>  <uid>27490</uid>  <body><![CDATA[<p>The Georgia Tech Cyber Security Summit gathers government, industry, and academia to discuss the newest threats and trends in cyberspace, critical data, and cyber-connected devices.</p><p>Every year, security experts see new evolutions in cyberthreats to people, businesses and governments. Our adversaries know no boundaries. Cybersecurity is everyone's business.</p><p>The annual Summit features breakfast, lunch, keynote speeches, panel discussions, and more. All attendees at this full-day summit receive a copy of the <em>2017 Cyber Threats, Trends &amp; Technologies Report.</em></p><h3><em>Registration is closed. <br /></em></h3><p><em><br /></em></p><h5><strong>Morning </strong></h5><p><em><strong>9:30 a.m.</strong></em><br /> Keynote by Keynote by <strong><a href="http://www.cc.gatech.edu/people/annie-anton" target="_blank">Annie Antón</a></strong>, chair, School of Interactive Computing; director, <a href="http://theprivacyplace.org/" target="_blank">ThePrivacyPlace.org</a></p><p><em><strong>10:00 a.m.</strong></em><br /> Meet the Students / Fall '16 Demo Day</p><p><strong><em>11:00 a.m. - Noon</em></strong><br /> <strong><em>Panel: “Partners in Crisis? Legislation has yet to improve information sharing”</em></strong><br /> Evan Glover, senior counsel, GE Transportation<br /> Paul Huesken, chief information assurance officer, Coca-Cola<br /> Lee Kirschbaum, special agent, FBI<br /> Jimmy Lummis, associate director, Georgia Tech Cyber Security</p><h5>&nbsp;</h5><h5><strong>Afternoon </strong></h5><p><em><strong>1:30 p.m.</strong></em><br /> Keynote by <a href="http://www.southerncompany.com/about-us/leadership/ceo/pdfs/Tom-Fanning-biography.pdf" target="_blank"><strong>Tom Fanning</strong></a>, chairman, president &amp; CEO, Southern Company</p><h6><strong>Breakout Sessions</strong></h6><p><strong><em>2:30 - 3:30 p.m.</em></strong><br /> <strong><em>TRACK A: “Ransomware: How to respond”</em></strong><br /> Chris Smoak, division chief, Cyber Technology &amp; Information Security Lab, GTRI<br /> Evan Downing, Ph.D. student, Georgia Tech</p><p><strong><em>TRACK B: “The Cyber Policy Landscape at Home &amp; Abroad”</em></strong><br /> Klaus Brisch, partner, DWF Germany<br /> Rick Stewart, director of cyber security services, CGI Federal of Canada<br /> Peter Swire, associate director of policy, Institute for Information Security &amp; Privacy</p><p><strong><em>3:30 - 4:30 p.m.</em></strong><br /> <strong><em>TRACK A: “Cryptocurrency: Current and future state of dark money”</em></strong><br /> Mark Ray, PwC, director, Cyber Investigations and Breach Response<br /> SSA Chad Hunt, FBI Atlanta – Computer Intrusion Squad<br /> Michael Farrell, chief research scientist, CTISL – GTRI</p><p><strong><em>TRACK B: “Cybersecurity: Not just the IT department’s problem”</em></strong><br /> COL Alprentice Smith, Joint Functional Component Command Headquarters, U.S. Army Cyber Command<br /> Leo Mark, associate dean, Georgia Tech Professional Education<br /> Taesoo Kim, assistant professor, School of Computer Science</p><p><em><br /></em></p>]]></body>  <author>Tara La Bouff</author>  <status>1</status>  <created>1452527100</created>  <gmt_created>2016-01-11 15:45:00</gmt_created>  <changed>1492118233</changed>  <gmt_changed>2017-04-13 21:17:13</gmt_changed>  <promote>0</promote>  <sticky>0</sticky>  <teaser><![CDATA[Georgia Tech invites the public to a free, full-day seminar hosted by the Institute for Information Security & Privacy.]]></teaser>  <type>event</type>  <sentence><![CDATA[Georgia Tech invites the public to a free, full-day seminar hosted by the Institute for Information Security & Privacy.]]></sentence>  <summary><![CDATA[<p>The Georgia Tech Cyber Security Summit gathers government, industry, and academia to discuss the newest threats and trends in cyberspace, critical data, and cyber-connected devices.</p>]]></summary>  <start>2016-09-28T09:30:00-04:00</start>  <end>2016-09-28T17:30:00-04:00</end>  <end_last>2016-09-28T17:30:00-04:00</end_last>  <gmt_start>2016-09-28 13:30:00</gmt_start>  <gmt_end>2016-09-28 21:30:00</gmt_end>  <gmt_end_last>2016-09-28 21:30:00</gmt_end_last>  <times>    <item>      <value>2016-09-28T09:30:00-04:00</value>      <value2>2016-09-28T17:30:00-04:00</value2>      <rrule><![CDATA[  ]]></rrule>      <timezone>America/New_York</timezone>      <timezone_db>America/New_York</timezone_db>      <date_type>datetime</date_type>    </item>  </times>  <gmt_times>    <item>      <value>2016-09-28 09:30:00</value>      <value2>2016-09-28 05:30:00</value2>      <rrule><![CDATA[  ]]></rrule>      <timezone>America/New_York</timezone>      <timezone_db>America/New_York</timezone_db>      <date_type>datetime</date_type>    </item>  </gmt_times>  <phone><![CDATA[]]></phone>  <url><![CDATA[http://www.iisp.gatech.edu/2016-cyber-security-summit]]></url>  <location_url>    <url><![CDATA[http://www.iisp.gatech.edu/2016-cyber-security-summit]]></url>    <title><![CDATA[]]></title>  </location_url>  <email><![CDATA[]]></email>  <contact><![CDATA[<p>Tara La Bouff, Marketing Communications Manager</p><p><a href="mailto:tara.labouff@iisp.gatech.edu">tara.labouff@iisp.gatech.edu</a>, 404.769.5408</p>]]></contact>  <fee><![CDATA[$0.00]]></fee>  <extras>          <extra><![CDATA[free_food]]></extra>      </extras>  <location><![CDATA[]]></location>  <media>          <item>573901</item>          <item>580761</item>          <item>451391</item>      </media>  <hg_media>          <item>          <nid>573901</nid>          <type>image</type>          <title><![CDATA[GTCSS'16]]></title>          <body><![CDATA[]]></body>                      <image_name><![CDATA[blue_banner_1140x570_01-01.jpg]]></image_name>            <image_path><![CDATA[/sites/default/files/images/blue_banner_1140x570_01-01.jpg]]></image_path>            <image_full_path><![CDATA[http://www.tlwarc.hg.gatech.edu//sites/default/files/images/blue_banner_1140x570_01-01.jpg]]></image_full_path>            <image_740><![CDATA[http://www.tlwarc.hg.gatech.edu/sites/default/files/styles/740xx_scale/public/sites/default/files/images/blue_banner_1140x570_01-01.jpg?itok=J020IYbH]]></image_740>            <image_mime>image/jpeg</image_mime>            <image_alt><![CDATA[GTCSS&#039;16]]></image_alt>                              <created>1473278783</created>          <gmt_created>2016-09-07 20:06:23</gmt_created>          <changed>1475895383</changed>          <gmt_changed>2016-10-08 02:56:23</gmt_changed>      </item>          <item>          <nid>580761</nid>          <type>image</type>          <title><![CDATA[2016 Keynote Speakers - GT CSS]]></title>          <body><![CDATA[]]></body>                      <image_name><![CDATA[gtcss_keynotes_091616_2.jpg]]></image_name>            <image_path><![CDATA[/sites/default/files/images/gtcss_keynotes_091616_2.jpg]]></image_path>            <image_full_path><![CDATA[http://www.tlwarc.hg.gatech.edu//sites/default/files/images/gtcss_keynotes_091616_2.jpg]]></image_full_path>            <image_740><![CDATA[http://www.tlwarc.hg.gatech.edu/sites/default/files/styles/740xx_scale/public/sites/default/files/images/gtcss_keynotes_091616_2.jpg?itok=SqmPdG6d]]></image_740>            <image_mime>image/jpeg</image_mime>            <image_alt><![CDATA[2016 Keynote Speakers - GT CSS]]></image_alt>                              <created>1474488184</created>          <gmt_created>2016-09-21 20:03:04</gmt_created>          <changed>1475895391</changed>          <gmt_changed>2016-10-08 02:56:31</gmt_changed>      </item>          <item>          <nid>451391</nid>          <type>image</type>          <title><![CDATA[IISP logo]]></title>          <body><![CDATA[]]></body>                      <image_name><![CDATA[instituteforinformationsecurityprivacy-outline-black874.jpg]]></image_name>            <image_path><![CDATA[/sites/default/files/images/instituteforinformationsecurityprivacy-outline-black874_0.jpg]]></image_path>            <image_full_path><![CDATA[http://www.tlwarc.hg.gatech.edu//sites/default/files/images/instituteforinformationsecurityprivacy-outline-black874_0.jpg]]></image_full_path>            <image_740><![CDATA[http://www.tlwarc.hg.gatech.edu/sites/default/files/styles/740xx_scale/public/sites/default/files/images/instituteforinformationsecurityprivacy-outline-black874_0.jpg?itok=1zeF6pZR]]></image_740>            <image_mime>image/jpeg</image_mime>            <image_alt><![CDATA[IISP logo]]></image_alt>                              <created>1449256280</created>          <gmt_created>2015-12-04 19:11:20</gmt_created>          <changed>1475895192</changed>          <gmt_changed>2016-10-08 02:53:12</gmt_changed>      </item>      </hg_media>  <boilerplate></boilerplate>  <boilerplate_text><![CDATA[]]></boilerplate_text>  <sidebar><![CDATA[]]></sidebar>  <related>      </related>  <files>      </files>  <groups>          <group id="1304"><![CDATA[High Performance Computing (HPC)]]></group>          <group id="47223"><![CDATA[College of Computing]]></group>          <group id="50875"><![CDATA[School of Computer Science]]></group>          <group id="50876"><![CDATA[School of Interactive Computing]]></group>          <group id="50877"><![CDATA[School of Computational Science and Engineering]]></group>          <group id="69599"><![CDATA[IPaT]]></group>          <group id="322011"><![CDATA[College of Computing Events]]></group>          <group id="430601"><![CDATA[Institute for Information Security and Privacy]]></group>      </groups>  <categories>          <category tid="1795"><![CDATA[Seminar/Lecture/Colloquium]]></category>      </categories>  <event_terms>          <term tid="1795"><![CDATA[Seminar/Lecture/Colloquium]]></term>      </event_terms>  <event_audience>          <term tid="78751"><![CDATA[Undergraduate students]]></term>          <term tid="78761"><![CDATA[Faculty/Staff]]></term>          <term tid="78771"><![CDATA[Public]]></term>          <term tid="174045"><![CDATA[Graduate students]]></term>      </event_audience>  <keywords>          <keyword tid="345"><![CDATA[cyber security]]></keyword>          <keyword tid="2254"><![CDATA[gtisc]]></keyword>          <keyword tid="416"><![CDATA[GTRI]]></keyword>          <keyword tid="2678"><![CDATA[information security]]></keyword>          <keyword tid="141341"><![CDATA[Institute for Information Security &amp; Privacy]]></keyword>      </keywords>  <userdata>      <![CDATA[]]>  </userdata></node><node id="563551">  <title><![CDATA[Cybersecurity Lecture Series - Sept. 30]]></title>  <uid>27490</uid>  <body><![CDATA[<h4>Meet academic and industry leaders for intimate discussions about new cyber threats, trends and technologies.<em> <br /></em></h4><p>The weekly <strong>Cybersecurity Lecture Series</strong> is a free, open-to-the-public lecture from a thought leader who is advancing the field of information security and privacy. Invited speakers include executives and researchers from private companies, government agencies, start-up incubators as well as Georgia Tech faculty and students presenting their research.</p><p>Held <strong>weekly each Friday at Noon</strong> <strong>through Dec. 2</strong>, lectures are open to all -- students, faculty, industry, government, or simply the curious. Students may register for credit under seminar course CS-8001-INF.</p><p><em><a href="http://www.iisp.gatech.edu/register-cybersecurity-lecture-series-sept-30" target="_blank">Complimentary lunch provided for registered guests</a>. Please bring your own beverage.</em></p><p><em><a href="http://www.iisp.gatech.edu/cyber-lecture" target="_blank">Sign up to receive future lecture announcements.</a><br /></em></p><h4><em>&nbsp;<br /></em></h4><h4>Featuring Frank Wang on Sept. 30<em><br /></em></h4><h5>"Cryptographically Enforced Access Control for User Data in Untrusted Clouds"</h5><p>Modern web services rob users of low-level control over cloud storage—a user’s single logical data set is scattered across multiple storage silos whose access controls are set by web services, not users. The consequence is that users lack the ultimate authority to determine how their data is shared with other web services.<br />In this talk, we introduce Sieve, a new platform which selectively (and securely) exposes user data to web services. Sieve has a user-centric storage model: each user uploads encrypted data to a single cloud store, and by default, only the user knows the decryption keys. Given this storage model, Sieve defines an infrastructure to support rich, legacy web applications. Using attribute-based encryption, Sieve allows users to define intuitively understandable access policies that are cryptographically enforceable. Using key homomorphism, Sieve can reencrypt user data on storage providers in situ, revoking decryption keys from web services without revealing new keys to the storage provider. Using secret sharing and two-factor authentication, Sieve protects cryptographic secrets against the loss of user devices like smartphones and laptops. The result is that users can enjoy rich, legacy web applications, while benefiting from cryptographically strong controls over which data a web service can access.</p><p><strong>BIO</strong></p><p><strong>Frank Wang</strong> is a Ph.D. student at the Massachusetts Institute of Technology focusing on building secure systems. He is advised by Nickolai Zeldovich and James Mickens. He completed his undergraduate studies at Stanford University, focusing on applied cryptography. He runs the MIT security seminar, and he is also a member of Roughdraft Ventures, which provides small amounts of capital to early stage student startups. He is currently running a summer program for early stage security companies called Cybersecurity Factory. He has interned at the security teams at Google and Facebook as well as consulted for security companies, such as Qualys. When he is not busy worrying about your security, he enjoys going to art museums and being outdoors.</p><p>&nbsp;</p>]]></body>  <author>Tara La Bouff</author>  <status>1</status>  <created>1471357736</created>  <gmt_created>2016-08-16 14:28:56</gmt_created>  <changed>1492118106</changed>  <gmt_changed>2017-04-13 21:15:06</gmt_changed>  <promote>0</promote>  <sticky>0</sticky>  <teaser><![CDATA[Meet students, academic and industry leaders for intimate discussions about new cyber threats, trends and technologies.]]></teaser>  <type>event</type>  <sentence><![CDATA[Meet students, academic and industry leaders for intimate discussions about new cyber threats, trends and technologies.]]></sentence>  <summary><![CDATA[<p>Frank Wang from The Cybersecurity Factory at the Massachusetts Institute of Technology delivers a technical talk about "Sieve" for cloud storage security.<em><br /></em></p>]]></summary>  <start>2016-09-30T13:00:00-04:00</start>  <end>2016-09-30T14:00:00-04:00</end>  <end_last>2016-09-30T14:00:00-04:00</end_last>  <gmt_start>2016-09-30 17:00:00</gmt_start>  <gmt_end>2016-09-30 18:00:00</gmt_end>  <gmt_end_last>2016-09-30 18:00:00</gmt_end_last>  <times>    <item>      <value>2016-09-30T13:00:00-04:00</value>      <value2>2016-09-30T14:00:00-04:00</value2>      <rrule><![CDATA[  ]]></rrule>      <timezone>America/New_York</timezone>      <timezone_db>America/New_York</timezone_db>      <date_type>datetime</date_type>    </item>  </times>  <gmt_times>    <item>      <value>2016-09-30 01:00:00</value>      <value2>2016-09-30 02:00:00</value2>      <rrule><![CDATA[  ]]></rrule>      <timezone>America/New_York</timezone>      <timezone_db>America/New_York</timezone_db>      <date_type>datetime</date_type>    </item>  </gmt_times>  <phone><![CDATA[]]></phone>  <url><![CDATA[http://iisp.gatech.edu/contact-institute]]></url>  <location_url>    <url><![CDATA[http://iisp.gatech.edu/contact-institute]]></url>    <title><![CDATA[]]></title>  </location_url>  <email><![CDATA[]]></email>  <contact><![CDATA[<p>Tara La Bouff, <a href="mailto:tara.labouff@iisp.gatech.edu">tara.labouff@iisp.gatech.edu</a>, 404.769.5408</p>]]></contact>  <fee><![CDATA[]]></fee>  <extras>      </extras>  <location><![CDATA[]]></location>  <media>          <item>538461</item>          <item>451391</item>          <item>490641</item>      </media>  <hg_media>          <item>          <nid>538461</nid>          <type>image</type>          <title><![CDATA[Cybersecurity Lecture Series]]></title>          <body><![CDATA[]]></body>                      <image_name><![CDATA[cls_email_header.jpg]]></image_name>            <image_path><![CDATA[/sites/default/files/images/cls_email_header.jpg]]></image_path>            <image_full_path><![CDATA[http://www.tlwarc.hg.gatech.edu//sites/default/files/images/cls_email_header.jpg]]></image_full_path>            <image_740><![CDATA[http://www.tlwarc.hg.gatech.edu/sites/default/files/styles/740xx_scale/public/sites/default/files/images/cls_email_header.jpg?itok=gbmJn3e2]]></image_740>            <image_mime>image/jpeg</image_mime>            <image_alt><![CDATA[Cybersecurity Lecture Series]]></image_alt>                              <created>1464703200</created>          <gmt_created>2016-05-31 14:00:00</gmt_created>          <changed>1475895326</changed>          <gmt_changed>2016-10-08 02:55:26</gmt_changed>      </item>          <item>          <nid>451391</nid>          <type>image</type>          <title><![CDATA[IISP logo]]></title>          <body><![CDATA[]]></body>                      <image_name><![CDATA[instituteforinformationsecurityprivacy-outline-black874.jpg]]></image_name>            <image_path><![CDATA[/sites/default/files/images/instituteforinformationsecurityprivacy-outline-black874_0.jpg]]></image_path>            <image_full_path><![CDATA[http://www.tlwarc.hg.gatech.edu//sites/default/files/images/instituteforinformationsecurityprivacy-outline-black874_0.jpg]]></image_full_path>            <image_740><![CDATA[http://www.tlwarc.hg.gatech.edu/sites/default/files/styles/740xx_scale/public/sites/default/files/images/instituteforinformationsecurityprivacy-outline-black874_0.jpg?itok=1zeF6pZR]]></image_740>            <image_mime>image/jpeg</image_mime>            <image_alt><![CDATA[IISP logo]]></image_alt>                              <created>1449256280</created>          <gmt_created>2015-12-04 19:11:20</gmt_created>          <changed>1475895192</changed>          <gmt_changed>2016-10-08 02:53:12</gmt_changed>      </item>          <item>          <nid>490641</nid>          <type>image</type>          <title><![CDATA[Frank Wang, coordinator, The Cybersecurity Factory]]></title>          <body><![CDATA[]]></body>                      <image_name><![CDATA[rdv-06_big.jpg]]></image_name>            <image_path><![CDATA[/sites/default/files/images/rdv-06_big_0.jpg]]></image_path>            <image_full_path><![CDATA[http://www.tlwarc.hg.gatech.edu//sites/default/files/images/rdv-06_big_0.jpg]]></image_full_path>            <image_740><![CDATA[http://www.tlwarc.hg.gatech.edu/sites/default/files/styles/740xx_scale/public/sites/default/files/images/rdv-06_big_0.jpg?itok=wbtMgOmU]]></image_740>            <image_mime>image/jpeg</image_mime>            <image_alt><![CDATA[Frank Wang, coordinator, The Cybersecurity Factory]]></image_alt>                              <created>1453827600</created>          <gmt_created>2016-01-26 17:00:00</gmt_created>          <changed>1475895248</changed>          <gmt_changed>2016-10-08 02:54:08</gmt_changed>      </item>      </hg_media>  <boilerplate></boilerplate>  <boilerplate_text><![CDATA[]]></boilerplate_text>  <sidebar><![CDATA[]]></sidebar>  <related>      </related>  <files>      </files>  <groups>          <group id="47223"><![CDATA[College of Computing]]></group>          <group id="50875"><![CDATA[School of Computer Science]]></group>          <group id="50876"><![CDATA[School of Interactive Computing]]></group>          <group id="50877"><![CDATA[School of Computational Science and Engineering]]></group>          <group id="322011"><![CDATA[College of Computing Events]]></group>          <group id="430601"><![CDATA[Institute for Information Security and Privacy]]></group>      </groups>  <categories>          <category tid="1795"><![CDATA[Seminar/Lecture/Colloquium]]></category>      </categories>  <event_terms>          <term tid="1795"><![CDATA[Seminar/Lecture/Colloquium]]></term>      </event_terms>  <event_audience>          <term tid="78751"><![CDATA[Undergraduate students]]></term>          <term tid="78761"><![CDATA[Faculty/Staff]]></term>          <term tid="78771"><![CDATA[Public]]></term>          <term tid="174045"><![CDATA[Graduate students]]></term>      </event_audience>  <keywords>          <keyword tid="10807"><![CDATA[cloud computing]]></keyword>          <keyword tid="1404"><![CDATA[Cybersecurity]]></keyword>      </keywords>  <userdata>      <![CDATA[]]>  </userdata></node><node id="565881">  <title><![CDATA[France-Atlanta 2016: Cybersecurity: Transatlantic Innovation & Strategies]]></title>  <uid>27490</uid>  <body><![CDATA[<blockquote><p><em>The Consulate General of France in Atlanta and the Georgia Institute of Technology will co-present the 7th Annual France-Atlanta, a series of French-American events centered on innovation, from October 12-22, 2016 in Atlanta, Georgia. Activities include a two-day scientific symposium about cybersecurity, co-hosted by the Institute for Information Security &amp; Privacy and Georgia Tech Lorraine.</em></p></blockquote><h4><strong>Cybersecurity: Transatlantic Innovation and Strategies</strong> </h4><p>Vulnerability to cyberattacks, theft, and other threats is as much a personal concern as it is one of national and global security. Ensuring the secure and reliable exchange of information is a critical task and one that the scientific community has been engaged in since the rise of new technologies.</p><p><strong>Cybersecurity: Transatlantic Innovation and Strategies</strong> is a free, two-day symposium that will enable leading scientists in this field to identify current challenges and to share the results of their research. French and American cybersecurity experts will have the opportunity to come together and discuss the development of new scientific partnerships between the United States and France.</p><p>Discussions will focus on privacy and data protection, cryptology and system security, formal methods for security, and the education and training of tomorrow’s cybersecurity scientists. In addition, industry leaders, representatives from innovative start-ups and policy researchers from both sides of the Atlantic will tackle current technology transfer and innovation challenges in this field during a roundtable discussion.</p><p>Pre-registration required. To register, <a href="https://www.eventbrite.com/e/cybersecurity-transatlantic-innovation-strategies-tickets-27215380937">click here</a>. <br /></p>]]></body>  <author>Tara La Bouff</author>  <status>1</status>  <created>1471857056</created>  <gmt_created>2016-08-22 09:10:56</gmt_created>  <changed>1492118102</changed>  <gmt_changed>2017-04-13 21:15:02</gmt_changed>  <promote>0</promote>  <sticky>0</sticky>  <teaser><![CDATA[The Consulate General of France in Atlanta and Georgia Tech partner to hold a two-day symposium about cybersecurity.]]></teaser>  <type>event</type>  <sentence><![CDATA[The Consulate General of France in Atlanta and Georgia Tech partner to hold a two-day symposium about cybersecurity.]]></sentence>  <summary><![CDATA[<p>The Consulate General of France in Atlanta and the Georgia Institute of Technology will co-present the 7th Annual France-Atlanta, a series of French-American events centered on innovation, from October 12-22, 2016 in Atlanta, Georgia.</p>]]></summary>  <start>2016-10-13T09:30:00-04:00</start>  <end>2016-10-14T09:30:00-04:00</end>  <end_last>2016-10-14T09:30:00-04:00</end_last>  <gmt_start>2016-10-13 13:30:00</gmt_start>  <gmt_end>2016-10-14 13:30:00</gmt_end>  <gmt_end_last>2016-10-14 13:30:00</gmt_end_last>  <times>    <item>      <value>2016-10-13T09:30:00-04:00</value>      <value2>2016-10-14T09:30:00-04:00</value2>      <rrule><![CDATA[  ]]></rrule>      <timezone>America/New_York</timezone>      <timezone_db>America/New_York</timezone_db>      <date_type>datetime</date_type>    </item>  </times>  <gmt_times>    <item>      <value>2016-10-13 09:30:00</value>      <value2>2016-10-14 09:30:00</value2>      <rrule><![CDATA[  ]]></rrule>      <timezone>America/New_York</timezone>      <timezone_db>America/New_York</timezone_db>      <date_type>datetime</date_type>    </item>  </gmt_times>  <phone><![CDATA[(404) 495-1682]]></phone>  <url><![CDATA[http://map.gatech.edu/]]></url>  <location_url>    <url><![CDATA[http://map.gatech.edu/]]></url>    <title><![CDATA[]]></title>  </location_url>  <email><![CDATA[]]></email>  <contact><![CDATA[]]></contact>  <fee><![CDATA[]]></fee>  <extras>      </extras>  <location><![CDATA[]]></location>  <media>          <item>565871</item>          <item>565861</item>      </media>  <hg_media>          <item>          <nid>565871</nid>          <type>image</type>          <title><![CDATA[France-Atlanta 2016 logo]]></title>          <body><![CDATA[]]></body>                      <image_name><![CDATA[france-atl-2016-logo_date_tag.jpg]]></image_name>            <image_path><![CDATA[/sites/default/files/images/france-atl-2016-logo_date_tag.jpg]]></image_path>            <image_full_path><![CDATA[http://www.tlwarc.hg.gatech.edu//sites/default/files/images/france-atl-2016-logo_date_tag.jpg]]></image_full_path>            <image_740><![CDATA[http://www.tlwarc.hg.gatech.edu/sites/default/files/styles/740xx_scale/public/sites/default/files/images/france-atl-2016-logo_date_tag.jpg?itok=_o5mYOZ3]]></image_740>            <image_mime>image/jpeg</image_mime>            <image_alt><![CDATA[France-Atlanta 2016 logo]]></image_alt>                              <created>1471870643</created>          <gmt_created>2016-08-22 12:57:23</gmt_created>          <changed>1475895371</changed>          <gmt_changed>2016-10-08 02:56:11</gmt_changed>      </item>          <item>          <nid>565861</nid>          <type>image</type>          <title><![CDATA[Cybersecurity: Transatlantic Innovation & Strategies]]></title>          <body><![CDATA[]]></body>                      <image_name><![CDATA[france-atlanta_event_web.jpg]]></image_name>            <image_path><![CDATA[/sites/default/files/images/france-atlanta_event_web.jpg]]></image_path>            <image_full_path><![CDATA[http://www.tlwarc.hg.gatech.edu//sites/default/files/images/france-atlanta_event_web.jpg]]></image_full_path>            <image_740><![CDATA[http://www.tlwarc.hg.gatech.edu/sites/default/files/styles/740xx_scale/public/sites/default/files/images/france-atlanta_event_web.jpg?itok=S2kGfPTM]]></image_740>            <image_mime>image/jpeg</image_mime>            <image_alt><![CDATA[Cybersecurity: Transatlantic Innovation &amp; Strategies]]></image_alt>                              <created>1471870413</created>          <gmt_created>2016-08-22 12:53:33</gmt_created>          <changed>1475895371</changed>          <gmt_changed>2016-10-08 02:56:11</gmt_changed>      </item>      </hg_media>  <boilerplate></boilerplate>  <boilerplate_text><![CDATA[]]></boilerplate_text>  <sidebar><![CDATA[]]></sidebar>  <related>      </related>  <files>      </files>  <groups>          <group id="47223"><![CDATA[College of Computing]]></group>          <group id="50875"><![CDATA[School of Computer Science]]></group>          <group id="50876"><![CDATA[School of Interactive Computing]]></group>          <group id="50877"><![CDATA[School of Computational Science and Engineering]]></group>          <group id="322011"><![CDATA[College of Computing Events]]></group>          <group id="430601"><![CDATA[Institute for Information Security and Privacy]]></group>          <group id="54809"><![CDATA[Georgia Tech-Europe (GTE)]]></group>      </groups>  <categories>          <category tid="1789"><![CDATA[Conference/Symposium]]></category>      </categories>  <event_terms>          <term tid="1789"><![CDATA[Conference/Symposium]]></term>      </event_terms>  <event_audience>          <term tid="78751"><![CDATA[Undergraduate students]]></term>          <term tid="78761"><![CDATA[Faculty/Staff]]></term>          <term tid="78771"><![CDATA[Public]]></term>          <term tid="174045"><![CDATA[Graduate students]]></term>      </event_audience>  <keywords>          <keyword tid="1404"><![CDATA[Cybersecurity]]></keyword>      </keywords>  <userdata>      <![CDATA[]]>  </userdata></node></nodes>