<node id="563441">
  <nid>563441</nid>
  <type>event</type>
  <uid>
    <user id="27490"><![CDATA[27490]]></user>
  </uid>
  <created>1471354635</created>
  <changed>1492118106</changed>
  <title><![CDATA[Cybersecurity Lecture Series - Sept. 9]]></title>
  <body><![CDATA[<h4>Meet academic and industry leaders for intimate discussions about new cyber threats, trends and technologies.&nbsp;</h4><p>The weekly <strong>Cybersecurity Lecture Series</strong> is a free, open-to-the-public lecture from a thought leader who is advancing the field of information security and privacy. Invited speakers include executives and researchers from private companies, government agencies, start-up incubators as well as Georgia Tech faculty and students presenting their research.</p><p>Held <strong>weekly each Friday at Noon</strong> <strong>through Dec. 2</strong>, lectures are open to all -- students, faculty, industry, government, or simply the curious. Students may register for credit under seminar course CS-8001-INF.</p><p><em><a href="http://www.iisp.gatech.edu/register-cybersecurity-lecture-series-sept-9" target="_blank">Complimentary lunch provided for registered guests</a>. Please bring your own beverage.</em></p><p><em><a href="http://www.iisp.gatech.edu/cyber-lecture" target="_blank">Sign up to receive future lecture announcements.</a><br /></em></p><h4><em>&nbsp;<br /></em></h4><h4>Featuring Curtis Walker on Sept. 9<em><br /></em></h4><h5>"Myths of Computer Security"</h5><p>&nbsp;Many organizations are dealing with repeated computer security breaches which can lead to data exfiltration, significant financial impact, and possibly much more catastrophic events with respect to cyber-physical systems. These breaches typically occur due to erroneous assumptions about what exactly "good security practices" entail. Antivirus, antimalware, and intrusion detection software are continually being recommended by security professionals, yet they often have a net negative impact on security. Security-focused operating systems that are supposed to be ahead of the curve, are often years behind with respect to mitigation technology. This talk will discuss the many myths of computer security, highlighting common misconceptions about existing security technologies, and detailing how these security technologies ironically can be abused and exploited providing the door into the systems they are supposed to protect.</p>]]></body>
  <field_summary_sentence>
    <item>
      <value><![CDATA[Meet students, academic and industry leaders for intimate discussions about new cyber threats, trends and technologies.]]></value>
    </item>
  </field_summary_sentence>
  <field_summary>
    <item>
      <value><![CDATA[<p>Curtis Walker from Draper Lab, formerly a unit of the Masschusetts Institute of Technology, leads a discussion about common myths behind computer security.</p>]]></value>
    </item>
  </field_summary>
  <field_time>
    <item>
      <value><![CDATA[2016-09-09T13:00:00-04:00]]></value>
      <value2><![CDATA[2016-09-09T14:00:00-04:00]]></value2>
      <rrule><![CDATA[]]></rrule>
      <timezone><![CDATA[America/New_York]]></timezone>
    </item>
  </field_time>
  <field_fee>
    <item>
      <value><![CDATA[]]></value>
    </item>
  </field_fee>
  <field_extras>
      </field_extras>
  <field_audience>
          <item>
        <value><![CDATA[Undergraduate students]]></value>
      </item>
          <item>
        <value><![CDATA[Faculty/Staff]]></value>
      </item>
          <item>
        <value><![CDATA[Public]]></value>
      </item>
          <item>
        <value><![CDATA[Graduate students]]></value>
      </item>
      </field_audience>
  <field_media>
          <item>
        <nid>
          <node id="538461">
            <nid>538461</nid>
            <type>image</type>
            <title><![CDATA[Cybersecurity Lecture Series]]></title>
            <body><![CDATA[]]></body>
                          <field_image>
                <item>
                  <fid>89506</fid>
                  <filename><![CDATA[cls_email_header.jpg]]></filename>
                  <filepath><![CDATA[/sites/default/files/images/cls_email_header.jpg]]></filepath>
                  <file_full_path><![CDATA[http://www.tlwarc.hg.gatech.edu//sites/default/files/images/cls_email_header.jpg]]></file_full_path>
                  <filemime>image/jpeg</filemime>
                  <image_740><![CDATA[]]></image_740>
                  <image_alt><![CDATA[Cybersecurity Lecture Series]]></image_alt>
                </item>
              </field_image>
            
                      </node>
        </nid>
      </item>
          <item>
        <nid>
          <node id="451391">
            <nid>451391</nid>
            <type>image</type>
            <title><![CDATA[IISP logo]]></title>
            <body><![CDATA[]]></body>
                          <field_image>
                <item>
                  <fid>203339</fid>
                  <filename><![CDATA[instituteforinformationsecurityprivacy-outline-black874.jpg]]></filename>
                  <filepath><![CDATA[/sites/default/files/images/instituteforinformationsecurityprivacy-outline-black874_0.jpg]]></filepath>
                  <file_full_path><![CDATA[http://www.tlwarc.hg.gatech.edu//sites/default/files/images/instituteforinformationsecurityprivacy-outline-black874_0.jpg]]></file_full_path>
                  <filemime>image/jpeg</filemime>
                  <image_740><![CDATA[]]></image_740>
                  <image_alt><![CDATA[IISP logo]]></image_alt>
                </item>
              </field_image>
            
                      </node>
        </nid>
      </item>
      </field_media>
  <field_contact>
    <item>
      <value><![CDATA[<p>Tara La Bouff, <a href="mailto:tara.labouff@iisp.gatech.edu">tara.labouff@iisp.gatech.edu</a>, 404.769.5408</p>]]></value>
    </item>
  </field_contact>
  <field_location>
    <item>
      <value><![CDATA[]]></value>
    </item>
  </field_location>
  <field_sidebar>
    <item>
      <value><![CDATA[]]></value>
    </item>
  </field_sidebar>
  <field_phone>
    <item>
      <value><![CDATA[]]></value>
    </item>
  </field_phone>
  <field_url>
    <item>
      <url><![CDATA[http://iisp.gatech.edu/contact-institute]]></url>
      <title><![CDATA[]]></title>
            <attributes><![CDATA[]]></attributes>
    </item>
  </field_url>
  <field_email>
    <item>
      <email><![CDATA[]]></email>
    </item>
  </field_email>
  <field_boilerplate>
    <item>
      <nid><![CDATA[]]></nid>
    </item>
  </field_boilerplate>
  <links_related>
      </links_related>
  <files>
      </files>
  <og_groups>
          <item>47223</item>
          <item>50875</item>
          <item>50876</item>
          <item>50877</item>
          <item>322011</item>
          <item>430601</item>
      </og_groups>
  <og_groups_both>
          <item><![CDATA[College of Computing]]></item>
          <item><![CDATA[School of Computer Science]]></item>
          <item><![CDATA[School of Interactive Computing]]></item>
          <item><![CDATA[School of Computational Science and Engineering]]></item>
          <item><![CDATA[College of Computing Events]]></item>
          <item><![CDATA[Institute for Information Security and Privacy]]></item>
      </og_groups_both>
  <field_categories>
          <item>
        <tid>1795</tid>
        <value><![CDATA[Seminar/Lecture/Colloquium]]></value>
      </item>
      </field_categories>
  <field_keywords>
          <item>
        <tid>1404</tid>
        <value><![CDATA[Cybersecurity]]></value>
      </item>
      </field_keywords>
  <userdata><![CDATA[]]></userdata>
</node>
