{"515621":{"#nid":"515621","#data":{"type":"event","title":"Cybersecurity Lecture Series - Apr. 15","body":[{"value":"\u003Cp\u003EMeet academic and industry leaders for intimate discussions about new threats, trends and technologies. Preview new cybersecurity research ahead of international conferences. Hear from exceptional Georgia Tech students about their body of work.\u003C\/p\u003E\u003Cp\u003E\u0026nbsp;\u003C\/p\u003E\u003Cp\u003E\u003Cstrong\u003EApr. 15\u0026nbsp; Guest Speaker\u003C\/strong\u003E\u003C\/p\u003E\u003Ch3\u003E\u003Cem\u003EJohn Corliss, senior computer scientist, \u003Ca href=\u0022https:\/\/www.dhs.gov\/topic\/cybersecurity\u0022 target=\u0022_blank\u0022\u003EU.S. Department of Homeland Security\u003C\/a\u003E\u003Cbr \/\u003E\u003C\/em\u003E\u003C\/h3\u003E\u003Cp\u003E\u0026nbsp;\u003C\/p\u003E\u003Cp\u003EJohn Corliss from the U.S. Department of Homeland Security leads a discussion about strengthening the security and resilience of cyberspace and federal networks as an important part of the homeland security mission.\u003C\/p\u003E\u003Cp\u003EJohn Corliss is a computer scientist with the DHS National Protection and Programs Directorate.\u0026nbsp; He has been supporting national cybersecurity programs for over 10 years, and before that he worked as a mechanical engineering intern with the U.S. Navy designing and analyzing missiles.\u003Cbr \/\u003EJohn has lived in the Pensacola area since 1999 and is a product of the opportunities presented in that area, with degrees from both the University of West Florida and Pensacola Christian College.\u0026nbsp; John\u0027s passions are his family, cybersecurity research, robotics, next-generation cyberspace visualization tools, and the application of artificial intelligence techniques to the cyber domain.\u0026nbsp; John enjoys presenting on cybersecurity topics to audiences ranging from the engineering and science community to completely non-technical people who are curious how cybersecurity impacts them, and makes use of many communications channels to spread the word about the excitement involved with choosing a career in cybersecurity.\u0026nbsp; He is also active in supporting the DHS summer cyber intern program, which provides hands-on experience to college students during their summer vacation.\u003C\/p\u003E\u003Cp\u003ELunch provided. No registration necessary.\u003C\/p\u003E\u003Cp\u003E\u0026nbsp;\u003C\/p\u003E\u003Cp\u003E\u003Ca href=\u0022http:\/\/www.iisp.gatech.edu\/cyber-lecture\u0022 target=\u0022_blank\u0022\u003E\u003Cstrong\u003E\u003Cem\u003ESpring 2016 Schedule\u003C\/em\u003E\u003C\/strong\u003E\u003C\/a\u003E\u003Cbr \/\u003E \u003Cstrong\u003EJan. 15\u003C\/strong\u003E \u2014 Opening discussion\u003Cbr \/\u003E \u003Cstrong\u003EJan. 22\u003C\/strong\u003E \u2014 Milos Prvulovic\u003Cbr \/\u003E \u003Cstrong\u003EJan. 29\u003C\/strong\u003E \u2014 PhD Candidate - Byoungyoung Lee\u003Cbr \/\u003E \u003Cstrong\u003EFeb. 5\u003C\/strong\u003E \u2014 NDSS Conference Preview\u003Cbr \/\u003E \u003Cstrong\u003EFeb. 12\u003C\/strong\u003E \u2014 NDSS Conference Preview\u003Cbr \/\u003E \u003Cstrong\u003EFeb. 19\u003C\/strong\u003E \u2014 NDSS Conference Preview \u003Cbr \/\u003E \u003Cstrong\u003EFeb. 26\u003C\/strong\u003E \u2014 Stephen Pair, co-founder and CEO, \u003Ca href=\u0022https:\/\/bitpay.com\/about\u0022 target=\u0022_blank\u0022\u003EBitPay\u003C\/a\u003E\u003Cbr \/\u003E \u003Cstrong\u003EMar. 4\u003C\/strong\u003E \u2014 Frank Wang, coordinator, \u003Ca href=\u0022http:\/\/cybersecurityfactory.com\/\u0022 target=\u0022_blank\u0022\u003EThe Cybersecurity Factory\u003C\/a\u003E\u003Cbr \/\u003E \u003Cstrong\u003EMar. 11\u003C\/strong\u003E \u2013 Raghupathy \u0022Siva\u0022 Sivakumar, director,\u003Ca href=\u0022http:\/\/create-x.gatech.edu\/\u0022 target=\u0022_blank\u0022\u003E CREATE-X\u003C\/a\u003E\u003C\/p\u003E\u003Cp\u003E\u003Cstrong\u003EMar. 18\u003C\/strong\u003E \u2013 PhD Candidates - David Formby, Xiaojing Liao\u003Cbr \/\u003E \u003Cstrong\u003EMar. 25\u003C\/strong\u003E \u2013 Spring Break\u003Cbr \/\u003E \u003Cstrong\u003EApr. 1\u003C\/strong\u003E \u2013 Adam Wenchel, vice president, \u003Ca href=\u0022https:\/\/www.capitalone.com\/about\/?Log=1\u0026amp;EventType=Link\u0026amp;ComponentType=T\u0026amp;LOB=MTS%3A%3ALVFX4215\u0026amp;PageName=Small+Business+Bank+Homepage\u0026amp;PortletLocation=5\u0026amp;ComponentName=footer\u0026amp;ContentElement=12%3BAbout+Capital+One\u0026amp;TargetLob=MTS%3A%3ALCTMJBE8Z\u0026amp;TargetPageName=About+Capital+One\u0026amp;referer=https%3A%2F%2Fwww.capitalone.com%2Fsmall-business-bank\u0022 target=\u0022_blank\u0022\u003ECapital One\u003C\/a\u003E\u003Cbr \/\u003E \u003Cstrong\u003EApr. 8 \u003C\/strong\u003E\u2013 Kyle Grossman and Jim Schwoebel, co-founders, \u003Ca href=\u0022http:\/\/www.cyberlaunch.vc\/\u0022 target=\u0022_blank\u0022\u003ECyberLaunch\u003C\/a\u003E\u003Cbr \/\u003E \u003Cstrong\u003EApr. 15\u003C\/strong\u003E \u2013 John Corliss, sr. computer scientist, \u003Ca href=\u0022https:\/\/www.dhs.gov\/\u0022 target=\u0022_blank\u0022\u003EU.S. Department of Homeland Security\u003C\/a\u003E\u003Cbr \/\u003E \u003Cstrong\u003EApr. 22 \u003C\/strong\u003E\u2013 Tim Junio\u003Cem\u003E,\u003C\/em\u003E co-founder and CEO, \u003Ca href=\u0022https:\/\/qadium.com\/\u0022 target=\u0022_blank\u0022\u003EQadium Inc.\u003C\/a\u003E\u003C\/p\u003E\u003Cp\u003ESponsored by MailChimp\u003C\/p\u003E","summary":null,"format":"limited_html"}],"field_subtitle":"","field_summary":[{"value":"\u003Cp\u003E\u0026nbsp;Leadership from the U.S. Department of Homeland Security leads a discussion about working with federal departments and agencies to secure networks, respond to incidents and integrate privacy protections as a senior computer scientist for the federal government. Lunch provided. No registration necessary.\u003C\/p\u003E","format":"limited_html"}],"field_summary_sentence":[{"value":"John Corliss from the US Department of Homeland Security presents."}],"uid":"27490","created_gmt":"2016-03-18 17:09:15","changed_gmt":"2017-04-13 21:16:16","author":"Tara La Bouff","boilerplate_text":"","field_publication":"","field_article_url":"","field_event_time":{"event_time_start":"2016-04-15T13:00:00-04:00","event_time_end":"2016-04-15T14:00:00-04:00","event_time_end_last":"2016-04-15T14:00:00-04:00","gmt_time_start":"2016-04-15 17:00:00","gmt_time_end":"2016-04-15 18:00:00","gmt_time_end_last":"2016-04-15 18:00:00","rrule":null,"timezone":"America\/New_York"},"extras":["free_food"],"hg_media":{"451391":{"id":"451391","type":"image","title":"IISP logo","body":null,"created":"1449256280","gmt_created":"2015-12-04 19:11:20","changed":"1475895192","gmt_changed":"2016-10-08 02:53:12","alt":"IISP logo","file":{"fid":"203339","name":"instituteforinformationsecurityprivacy-outline-black874.jpg","image_path":"\/sites\/default\/files\/images\/instituteforinformationsecurityprivacy-outline-black874_0.jpg","image_full_path":"http:\/\/www.tlwarc.hg.gatech.edu\/\/sites\/default\/files\/images\/instituteforinformationsecurityprivacy-outline-black874_0.jpg","mime":"image\/jpeg","size":88082,"path_740":"http:\/\/www.tlwarc.hg.gatech.edu\/sites\/default\/files\/styles\/740xx_scale\/public\/images\/instituteforinformationsecurityprivacy-outline-black874_0.jpg?itok=JGV2BzFy"}},"517351":{"id":"517351","type":"image","title":"John Corliss, US Department of Homeland Security","body":null,"created":"1458923959","gmt_created":"2016-03-25 16:39:19","changed":"1475895282","gmt_changed":"2016-10-08 02:54:42","alt":"John Corliss, US Department of Homeland Security","file":{"fid":"205173","name":"corlissjohn.jpg","image_path":"\/sites\/default\/files\/images\/corlissjohn_0.jpg","image_full_path":"http:\/\/www.tlwarc.hg.gatech.edu\/\/sites\/default\/files\/images\/corlissjohn_0.jpg","mime":"image\/jpeg","size":312126,"path_740":"http:\/\/www.tlwarc.hg.gatech.edu\/sites\/default\/files\/styles\/740xx_scale\/public\/images\/corlissjohn_0.jpg?itok=97F0AZ6P"}}},"media_ids":["451391","517351"],"groups":[{"id":"47223","name":"College of Computing"},{"id":"322011","name":"College of Computing Events"},{"id":"430601","name":"Institute for Information Security and Privacy"},{"id":"50875","name":"School of Computer Science"},{"id":"50877","name":"School of Computational Science and Engineering"}],"categories":[],"keywords":[{"id":"1404","name":"Cybersecurity"}],"core_research_areas":[],"news_room_topics":[],"event_categories":[{"id":"1795","name":"Seminar\/Lecture\/Colloquium"}],"invited_audience":[{"id":"78751","name":"Undergraduate students"},{"id":"78761","name":"Faculty\/Staff"},{"id":"78771","name":"Public"},{"id":"174045","name":"Graduate students"}],"affiliations":[],"classification":[],"areas_of_expertise":[],"news_and_recent_appearances":[],"phone":[],"contact":[],"email":[],"slides":[],"orientation":[],"userdata":""}}}