<node id="563421">
  <nid>563421</nid>
  <type>event</type>
  <uid>
    <user id="27490"><![CDATA[27490]]></user>
  </uid>
  <created>1471353877</created>
  <changed>1492118106</changed>
  <title><![CDATA[Cybersecurity Lecture Series - Sept. 2]]></title>
  <body><![CDATA[<h4>Meet academic and industry leaders for intimate discussions about new cyber threats, trends and technologies.</h4><p>The weekly <strong>Cybersecurity Lecture Series</strong> is a free, open-to-the-public lecture from a thought leader who is advancing the field of information security and privacy. Invited speakers include executives and researchers from private companies, government agencies, start-up incubators as well as Georgia Tech faculty and students presenting their research.</p><p>Held <strong>weekly each Friday at Noon</strong> <strong>through Dec. 2</strong>, lectures are open to all -- students, faculty, industry, government, or simply the curious. Students may register for credit under seminar course CS-8001-INF.</p><p><em><a href="http://www.iisp.gatech.edu/register-cybersecurity-lecture-series-sept-2" target="_blank">Complimentary lunch provided for registered guests.</a> Please bring your own beverage.</em></p><p><em><a href="http://www.iisp.gatech.edu/cyber-lecture" target="_blank">Sign up to receive future lecture announcements.</a><br /></em></p><h4><em>&nbsp;<br /></em></h4><h4>Featuring Terry Nelms on Sept. 2<em><br /></em></h4><h5>"Towards Measuring and Mitigating Social Engineering Software Download Attacks"</h5><p>Most modern malware infections happen through the browser, typically as the result of a drive-by or social engineering attack. While there have been numerous studies on measuring and defending against drive-by downloads, little attention has been dedicated to studying social engineering attacks. In this talk, we present the first systematic study of web-based social engineering (SE) attacks that successfully lured users into downloading malicious and unwanted software. To conduct this study, we collected and reconstructed more than 2,000 examples of in-the- wild SE download attacks from live network traffic. Via a detailed analysis of these attacks, we attained the following results: (i) a categorization system to identify and organize the tactics typically employed by attackers to gain the user’s attention and deceive or persuade them into downloading malicious and unwanted applications; (ii) reconstruction of the web path followed by the victims and observation that a large fraction of SE download attacks are delivered via online advertisement, typically served from “low tier” ad networks; (iii) measurement of the characteristics of the network infrastructure used to deliver such attacks and uncover a number of features that can be leveraged to distinguish between SE and benign (or non-SE) software downloads.<br /><br /><strong>BIO</strong><br />Terry Nelms is a Director of Research at Pindrop, where he leads a team of applied researchers solving challenging problems in fraud detection and authentication.&nbsp; Prior joining Pindrop, he spent over a decade inventing, designing and developing protection technologies at ISS, IBM and Damballa. His research has produced new security products, patents and publications in top industry and academic conferences. Nelms holds a B.S. and M.S. in Information Systems and a Ph.D. in Computer Science from the Georgia Institute of Technology. <br /><br /></p><p>&nbsp;</p>]]></body>
  <field_summary_sentence>
    <item>
      <value><![CDATA[Meet students, academic and industry leaders for intimate discussions about new cyber threats, trends and technologies.]]></value>
    </item>
  </field_summary_sentence>
  <field_summary>
    <item>
      <value><![CDATA[<p>Terry Nelms, director of research at Pindrop, presents a study of social-engineering attacks that he conducted with professors at Georgia Tech and Georgia State University.</p>]]></value>
    </item>
  </field_summary>
  <field_time>
    <item>
      <value><![CDATA[2016-09-02T13:00:00-04:00]]></value>
      <value2><![CDATA[2016-09-02T14:00:00-04:00]]></value2>
      <rrule><![CDATA[]]></rrule>
      <timezone><![CDATA[America/New_York]]></timezone>
    </item>
  </field_time>
  <field_fee>
    <item>
      <value><![CDATA[]]></value>
    </item>
  </field_fee>
  <field_extras>
      </field_extras>
  <field_audience>
          <item>
        <value><![CDATA[Undergraduate students]]></value>
      </item>
          <item>
        <value><![CDATA[Faculty/Staff]]></value>
      </item>
          <item>
        <value><![CDATA[Public]]></value>
      </item>
          <item>
        <value><![CDATA[Graduate students]]></value>
      </item>
      </field_audience>
  <field_media>
          <item>
        <nid>
          <node id="538461">
            <nid>538461</nid>
            <type>image</type>
            <title><![CDATA[Cybersecurity Lecture Series]]></title>
            <body><![CDATA[]]></body>
                          <field_image>
                <item>
                  <fid>89506</fid>
                  <filename><![CDATA[cls_email_header.jpg]]></filename>
                  <filepath><![CDATA[/sites/default/files/images/cls_email_header.jpg]]></filepath>
                  <file_full_path><![CDATA[http://www.tlwarc.hg.gatech.edu//sites/default/files/images/cls_email_header.jpg]]></file_full_path>
                  <filemime>image/jpeg</filemime>
                  <image_740><![CDATA[]]></image_740>
                  <image_alt><![CDATA[Cybersecurity Lecture Series]]></image_alt>
                </item>
              </field_image>
            
                      </node>
        </nid>
      </item>
          <item>
        <nid>
          <node id="451391">
            <nid>451391</nid>
            <type>image</type>
            <title><![CDATA[IISP logo]]></title>
            <body><![CDATA[]]></body>
                          <field_image>
                <item>
                  <fid>203339</fid>
                  <filename><![CDATA[instituteforinformationsecurityprivacy-outline-black874.jpg]]></filename>
                  <filepath><![CDATA[/sites/default/files/images/instituteforinformationsecurityprivacy-outline-black874_0.jpg]]></filepath>
                  <file_full_path><![CDATA[http://www.tlwarc.hg.gatech.edu//sites/default/files/images/instituteforinformationsecurityprivacy-outline-black874_0.jpg]]></file_full_path>
                  <filemime>image/jpeg</filemime>
                  <image_740><![CDATA[]]></image_740>
                  <image_alt><![CDATA[IISP logo]]></image_alt>
                </item>
              </field_image>
            
                      </node>
        </nid>
      </item>
          <item>
        <nid>
          <node id="570741">
            <nid>570741</nid>
            <type>image</type>
            <title><![CDATA[Terry Nelms]]></title>
            <body><![CDATA[]]></body>
                          <field_image>
                <item>
                  <fid>207073</fid>
                  <filename><![CDATA[terry_nelms.jpg]]></filename>
                  <filepath><![CDATA[/sites/default/files/images/terry_nelms.jpg]]></filepath>
                  <file_full_path><![CDATA[http://www.tlwarc.hg.gatech.edu//sites/default/files/images/terry_nelms.jpg]]></file_full_path>
                  <filemime>image/jpeg</filemime>
                  <image_740><![CDATA[]]></image_740>
                  <image_alt><![CDATA[Terry Nelms]]></image_alt>
                </item>
              </field_image>
            
                      </node>
        </nid>
      </item>
      </field_media>
  <field_contact>
    <item>
      <value><![CDATA[<p>Tara La Bouff, <a href="mailto:tara.labouff@iisp.gatech.edu">tara.labouff@iisp.gatech.edu</a>, 404.769.5408</p>]]></value>
    </item>
  </field_contact>
  <field_location>
    <item>
      <value><![CDATA[]]></value>
    </item>
  </field_location>
  <field_sidebar>
    <item>
      <value><![CDATA[]]></value>
    </item>
  </field_sidebar>
  <field_phone>
    <item>
      <value><![CDATA[]]></value>
    </item>
  </field_phone>
  <field_url>
    <item>
      <url><![CDATA[http://iisp.gatech.edu/contact-institute]]></url>
      <title><![CDATA[]]></title>
            <attributes><![CDATA[]]></attributes>
    </item>
  </field_url>
  <field_email>
    <item>
      <email><![CDATA[]]></email>
    </item>
  </field_email>
  <field_boilerplate>
    <item>
      <nid><![CDATA[]]></nid>
    </item>
  </field_boilerplate>
  <links_related>
      </links_related>
  <files>
      </files>
  <og_groups>
          <item>47223</item>
          <item>50875</item>
          <item>50876</item>
          <item>50877</item>
          <item>322011</item>
          <item>430601</item>
      </og_groups>
  <og_groups_both>
          <item><![CDATA[College of Computing]]></item>
          <item><![CDATA[School of Computer Science]]></item>
          <item><![CDATA[School of Interactive Computing]]></item>
          <item><![CDATA[School of Computational Science and Engineering]]></item>
          <item><![CDATA[College of Computing Events]]></item>
          <item><![CDATA[Institute for Information Security and Privacy]]></item>
      </og_groups_both>
  <field_categories>
          <item>
        <tid>1795</tid>
        <value><![CDATA[Seminar/Lecture/Colloquium]]></value>
      </item>
      </field_categories>
  <field_keywords>
          <item>
        <tid>1404</tid>
        <value><![CDATA[Cybersecurity]]></value>
      </item>
          <item>
        <tid>168599</tid>
        <value><![CDATA[smartphone security]]></value>
      </item>
      </field_keywords>
  <userdata><![CDATA[]]></userdata>
</node>
