{"583213":{"#nid":"583213","#data":{"type":"event","title":"Cybersecurity Lecture Series with Christopher Smoak","body":[{"value":"\u003Ch3\u003EMeet academic and industry leaders for intimate discussions about new cyber threats, trends and technologies.\u0026nbsp;\u003C\/h3\u003E\r\n\r\n\u003Cp\u003EThe weekly \u003Cstrong\u003ECybersecurity Lecture Series\u003C\/strong\u003E is a free, open-to-the-public lecture from a thought leader who is advancing the field of information security and privacy. Invited speakers include executives and researchers from private companies, government agencies, start-up incubators as well as Georgia Tech faculty and students presenting their research.\u003C\/p\u003E\r\n\r\n\u003Cp\u003EHeld \u003Cstrong\u003Eweekly each Friday at Noon\u003C\/strong\u003E \u003Cstrong\u003Ethrough Dec. 2\u003C\/strong\u003E, lectures are open to all -- students, faculty, industry, government, or simply the curious. Students may register for credit under seminar course CS-8001-INF.\u003C\/p\u003E\r\n\r\n\u003Cp\u003E\u003Cem\u003E\u003Ca href=\u0022http:\/\/www.iisp.gatech.edu\/register-cybersecurity-lecture-series-sept-9\u0022 target=\u0022_blank\u0022\u003EComplimentary lunch provided for registered guests\u003C\/a\u003E. Please bring your own beverage.\u003C\/em\u003E\u003C\/p\u003E\r\n\r\n\u003Cp\u003E\u003Cem\u003E\u003Ca href=\u0022http:\/\/www.iisp.gatech.edu\/cyber-lecture\u0022 target=\u0022_blank\u0022\u003ESign up to receive future lecture announcements.\u003C\/a\u003E\u003C\/em\u003E\u003C\/p\u003E\r\n\r\n\u003Cp\u003E\u0026nbsp;\u003C\/p\u003E\r\n\r\n\u003Ch3\u003EFeaturing Chris Smoak on Nov. 4\u003C\/h3\u003E\r\n\r\n\u003Ch4\u003E\u003Cem\u003E\u0026ldquo;The Evolution of Modern Malware: Technology Trends and Motivations\u0026rdquo;\u003C\/em\u003E\u003C\/h4\u003E\r\n\r\n\u003Cp\u003E\u0026nbsp;\u003Cbr \/\u003E\r\n\u003Cem\u003E\u003Cstrong\u003EABSTRACT\u003C\/strong\u003E\u003C\/em\u003E\u0026nbsp;\u0026nbsp; |\u0026nbsp;\u0026nbsp; Over the past decade, malware has continued to evolve to adapt to increasing pressure from prevention and detection technologies. Techniques that were relied upon previously are no longer effective, while some persist across generations and families. This lecture paints a picture of how malware has adapted across numerous platforms, including Windows, Linux, OSX, and mobile devices. It describes an iterative evolutionary chain of advancements that has been observed from years of malware analysis efforts\u0026mdash;perhaps including a surprising trend. Throughout the lecture, potential motivations for attackers will be addressed, providing a foundation for understanding future threats.\u003C\/p\u003E\r\n\r\n\u003Cp\u003EBIO\u0026nbsp;\u0026nbsp; |\u0026nbsp;\u0026nbsp; Christopher Smoak is a senior researcher and chief of the Emerging Threats and Countermeasures Division within the Georgia Tech Research Institute\u0026rsquo;s Cyber Technology and Information Security Laboratory (CTISL). He is a hacker and technologist with over 15 years of experience in the security industry. He\u0026rsquo;s architected and built numerous security-related tools targeting malware analysis, information collection, threat analytics, vulnerability discovery, and information sharing. Smoak has been an outspoken advocate for increased sharing and dialogue within the security community.\u003C\/p\u003E\r\n\r\n\u003Cp\u003ESmoak has worked within both government and commercial sectors to build and deploy these systems to organizations requiring novel solutions to increasingly complex problem sets. He has leveraged a wide array of technologies including artificial intelligence, statistical analysis, and parallel computing in unique ways, building new approaches to overcome such challenges. Chris frequently speaks on security related topics and has been consulted as a subject matter expert for both televised and print media across United States and Europe. He holds a B.S. and M.S. in Computer Science from the Georgia Institute of Technology.\u003C\/p\u003E\r\n\r\n\u003Cp\u003E\u0026nbsp;\u003C\/p\u003E\r\n\r\n\u003Cp\u003E\u003Cem\u003ESupported by Jackson National Life Insurance Company\u003C\/em\u003E\u003C\/p\u003E\r\n","summary":null,"format":"limited_html"}],"field_subtitle":"","field_summary":"","field_summary_sentence":[{"value":"Christopher Smoak, division chief the Cyber Technology \u0026 Information Security Lab, delivers a guest lecture about the evolution of malware."}],"uid":"27490","created_gmt":"2016-10-27 15:53:19","changed_gmt":"2017-04-13 21:14:09","author":"Tara La Bouff","boilerplate_text":"","field_publication":"","field_article_url":"","field_event_time":{"event_time_start":"2016-11-04T13:00:00-04:00","event_time_end":"2016-11-04T14:00:00-04:00","event_time_end_last":"2016-11-04T14:00:00-04:00","gmt_time_start":"2016-11-04 17:00:00","gmt_time_end":"2016-11-04 18:00:00","gmt_time_end_last":"2016-11-04 18:00:00","rrule":null,"timezone":"America\/New_York"},"extras":[],"hg_media":{"538461":{"id":"538461","type":"image","title":"Cybersecurity Lecture Series","body":null,"created":"1464703200","gmt_created":"2016-05-31 14:00:00","changed":"1475895326","gmt_changed":"2016-10-08 02:55:26","alt":"Cybersecurity Lecture Series","file":{"fid":"89506","name":"cls_email_header.jpg","image_path":"\/sites\/default\/files\/images\/cls_email_header.jpg","image_full_path":"http:\/\/www.tlwarc.hg.gatech.edu\/\/sites\/default\/files\/images\/cls_email_header.jpg","mime":"image\/jpeg","size":461835,"path_740":"http:\/\/www.tlwarc.hg.gatech.edu\/sites\/default\/files\/styles\/740xx_scale\/public\/images\/cls_email_header.jpg?itok=NPA_x_rn"}},"583219":{"id":"583219","type":"image","title":"Jackson National Life Insurance Company","body":null,"created":"1477585591","gmt_created":"2016-10-27 16:26:31","changed":"1477585591","gmt_changed":"2016-10-27 16:26:31","alt":"","file":{"fid":"222329","name":"Jackson_NLIC_sm.jpg","image_path":"\/sites\/default\/files\/images\/Jackson_NLIC_sm.jpg","image_full_path":"http:\/\/www.tlwarc.hg.gatech.edu\/\/sites\/default\/files\/images\/Jackson_NLIC_sm.jpg","mime":"image\/jpeg","size":69862,"path_740":"http:\/\/www.tlwarc.hg.gatech.edu\/sites\/default\/files\/styles\/740xx_scale\/public\/images\/Jackson_NLIC_sm.jpg?itok=RJbpkMqL"}}},"media_ids":["538461","583219"],"groups":[{"id":"47223","name":"College of Computing"},{"id":"322011","name":"College of Computing Events"},{"id":"430601","name":"Institute for Information Security and Privacy"},{"id":"50877","name":"School of Computational Science and Engineering"},{"id":"50875","name":"School of Computer Science"},{"id":"50876","name":"School of Interactive Computing"}],"categories":[],"keywords":[{"id":"1404","name":"Cybersecurity"}],"core_research_areas":[],"news_room_topics":[],"event_categories":[{"id":"1795","name":"Seminar\/Lecture\/Colloquium"}],"invited_audience":[{"id":"78761","name":"Faculty\/Staff"},{"id":"78771","name":"Public"},{"id":"78751","name":"Undergraduate students"},{"id":"174045","name":"Graduate students"}],"affiliations":[],"classification":[],"areas_of_expertise":[],"news_and_recent_appearances":[],"phone":[],"contact":[{"value":"\u003Cp\u003ETara La Bouff, \u003Ca href=\u0022mailto:tara.labouff@iisp.gatech.edu\u0022\u003Etara.labouff@iisp.gatech.edu\u003C\/a\u003E, 404.769.5408\u003C\/p\u003E\r\n","format":"limited_html"}],"email":[],"slides":[],"orientation":[],"userdata":""}}}