{"576821":{"#nid":"576821","#data":{"type":"news","title":"Creating the Next: Cybersecurity Ideas Can Win VC Cash","body":[{"value":"\u003Cp\u003EOK. Admit it. Cybersecurity has crossed your mind at least once this week, even today, perhaps in the last hour. Can you trust that link? What else is in this download? Will this security update actually make a difference?\u003C\/p\u003E\u003Cp\u003ELet\u2019s solve it together.\u003C\/p\u003E\u003Ch4\u003EThe \u003Ca href=\u0022http:\/\/iisp.gatech.edu\u0022 target=\u0022_blank\u0022\u003EInstitute for Information Security \u0026amp; Privacy\u003C\/a\u003E invites students of any major, any year to bring cybersecurity research ideas to Fall \u201916 Demo Day. Projects may be ideas in formation, research underway or completed projects.\u003C\/h4\u003E\u003Cp\u003EStudents will display a poster about their idea on Sept. 28 at the Georgia Tech Cyber Security Summit, where audience vote by 300+ attendees determines which ideas will be invited back to the Spring \u201917 Demo Day Finale. At that point, students deliver a 5-minute presentation about their idea for a chance to win up to $7,000 from venture capitalists. Everyone walks away with generous advice from seasoned business investors. Someone walks away with cash to launch the next cybersecurity solution.\u003C\/p\u003E\u003Cp\u003E\u0022The Institute for Information Security \u0026amp; Privacy wants to move good ideas to market,\u0022 says \u003Cstrong\u003EWenke Lee\u003C\/strong\u003E, co-director. \u0022We know industry leans on academic researchers to raise new ideas and we lean on industry to take solutions to the public. Our hope is that by introducing students to business mentors early in the research timeline that we can help them naturally build productive relationships and reduce time to market. All students participating in Demo Day will benefit from the insight and critique of those closest to industry needs today.\u0022\u003C\/p\u003E\u003Cp\u003EProjects in the areas of public policy, business risk management, cyber-physical systems, privacy, or computer science are welcome. Deadline to register is Sept. 19. All students or teams must \u003Cstrong\u003E\u003Ca href=\u0022http:\/\/iisp.gatech.edu\/demo-day\u0022 target=\u0022_blank\u0022\u003Ecomplete the registration form by Sept. 19\u003C\/a\u003E.\u003C\/strong\u003E\u003C\/p\u003E\u003Cp\u003ELast year\u2019s winner of the IISP Demo Day, \u003Cstrong\u003EMusheer Ahmed\u003C\/strong\u003E (Ph.D. CS \u201916) has since collected more than $400,000 for his idea \u2013 FraudScope, a software algorithm for healthcare fraud detection. Ahmed continues to work with his Ph.D. advisor \u003Cstrong\u003EMustaque Ahamad\u003C\/strong\u003E, professor of computer science, on the idea.\u003C\/p\u003E\u003Cp\u003EAll students who enter Fall \u201916 Demo Day also will be eligible for another exciting prize -- an all-expense paid trip to the \u003Ca href=\u0022https:\/\/www.rsaconference.com\/about\/rsac-security-scholar\u0022 target=\u0022_blank\u0022\u003ERSA Conference\u003C\/a\u003E in Silicon Valley (Feb. 13-18, 2017). Only students who participate in Demo Day will be considered to go.\u003C\/p\u003E\u003Ch5\u003EHurry, the deadline is Monday, Sept. 19! Walk-ins cannot be accepted.\u003C\/h5\u003E\u003Cp\u003E\u003Ca href=\u0022http:\/\/iisp.gatech.edu\/demo-day\u0022\u003Ehttp:\/\/iisp.gatech.edu\/demo-day\u003C\/a\u003E\u003C\/p\u003E\u003Cp\u003E\u0026nbsp;\u003C\/p\u003E","summary":null,"format":"limited_html"}],"field_subtitle":"","field_summary":[{"value":"\u003Cp\u003EThe Institute for Information Security \u0026amp; Privacy invites students of any major, any year to bring cybersecurity research ideas to Fall \u201916 Demo Day. Projects may be ideas in formation, research underway or completed projects and from the areas of public policy, business risk management, cyber-physical systems, privacy, or computer science.\u003C\/p\u003E","format":"limited_html"}],"field_summary_sentence":[{"value":"The Institute for Information Security \u0026 Privacy invites students of any major, any year to bring cybersecurity research ideas to Fall \u201916 Demo Day."}],"uid":"27490","created_gmt":"2016-09-14 16:15:52","changed_gmt":"2016-10-08 03:22:37","author":"Tara La Bouff","boilerplate_text":"","field_publication":"","field_article_url":"","dateline":{"date":"2016-09-14T00:00:00-04:00","iso_date":"2016-09-14T00:00:00-04:00","tz":"America\/New_York"},"extras":[],"hg_media":{"576831":{"id":"576831","type":"image","title":"Fall \u002716 Demo Day","body":null,"created":"1473884311","gmt_created":"2016-09-14 20:18:31","changed":"1475895386","gmt_changed":"2016-10-08 02:56:26","alt":"Fall \u002716 Demo Day","file":{"fid":"207245","name":"demo_day_sign_1600x900_08-01.jpg","image_path":"\/sites\/default\/files\/images\/demo_day_sign_1600x900_08-01.jpg","image_full_path":"http:\/\/www.tlwarc.hg.gatech.edu\/\/sites\/default\/files\/images\/demo_day_sign_1600x900_08-01.jpg","mime":"image\/jpeg","size":668919,"path_740":"http:\/\/www.tlwarc.hg.gatech.edu\/sites\/default\/files\/styles\/740xx_scale\/public\/images\/demo_day_sign_1600x900_08-01.jpg?itok=mgLdi51Z"}},"451391":{"id":"451391","type":"image","title":"IISP logo","body":null,"created":"1449256280","gmt_created":"2015-12-04 19:11:20","changed":"1475895192","gmt_changed":"2016-10-08 02:53:12","alt":"IISP logo","file":{"fid":"203339","name":"instituteforinformationsecurityprivacy-outline-black874.jpg","image_path":"\/sites\/default\/files\/images\/instituteforinformationsecurityprivacy-outline-black874_0.jpg","image_full_path":"http:\/\/www.tlwarc.hg.gatech.edu\/\/sites\/default\/files\/images\/instituteforinformationsecurityprivacy-outline-black874_0.jpg","mime":"image\/jpeg","size":88082,"path_740":"http:\/\/www.tlwarc.hg.gatech.edu\/sites\/default\/files\/styles\/740xx_scale\/public\/images\/instituteforinformationsecurityprivacy-outline-black874_0.jpg?itok=JGV2BzFy"}}},"media_ids":["576831","451391"],"groups":[{"id":"47223","name":"College of Computing"}],"categories":[{"id":"153","name":"Computer Science\/Information Technology and Security"}],"keywords":[{"id":"1404","name":"Cybersecurity"}],"core_research_areas":[{"id":"145171","name":"Cybersecurity"}],"news_room_topics":[],"event_categories":[],"invited_audience":[],"affiliations":[],"classification":[],"areas_of_expertise":[],"news_and_recent_appearances":[],"phone":[],"contact":[],"email":[],"slides":[],"orientation":[],"userdata":""}}}