{"583217":{"#nid":"583217","#data":{"type":"event","title":"Cybersecurity Lecture Series with Jeff Reava","body":[{"value":"\u003Ch3\u003EMeet academic and industry leaders for intimate discussions about new cyber threats, trends and technologies.\u0026nbsp;\u003C\/h3\u003E\r\n\r\n\u003Cp\u003EThe weekly \u003Cstrong\u003ECybersecurity Lecture Series\u003C\/strong\u003E is a free, open-to-the-public lecture from a thought leader who is advancing the field of information security and privacy. Invited speakers include executives and researchers from private companies, government agencies, start-up incubators as well as Georgia Tech faculty and students presenting their research.\u003C\/p\u003E\r\n\r\n\u003Cp\u003EHeld \u003Cstrong\u003Eweekly each Friday at Noon\u003C\/strong\u003E \u003Cstrong\u003Ethrough Dec. 2\u003C\/strong\u003E, lectures are open to all -- students, faculty, industry, government, or simply the curious. Students may register for credit under seminar course CS-8001-INF.\u003C\/p\u003E\r\n\r\n\u003Cp\u003E\u003Cem\u003E\u003Ca href=\u0022http:\/\/www.iisp.gatech.edu\/register-cybersecurity-lecture-series-sept-9\u0022 target=\u0022_blank\u0022\u003EComplimentary lunch provided for registered guests\u003C\/a\u003E. Please bring your own beverage.\u003C\/em\u003E\u003C\/p\u003E\r\n\r\n\u003Cp\u003E\u003Cem\u003E\u003Ca href=\u0022http:\/\/www.iisp.gatech.edu\/cyber-lecture\u0022 target=\u0022_blank\u0022\u003ESign up to receive future lecture announcements.\u003C\/a\u003E\u003C\/em\u003E\u003C\/p\u003E\r\n\r\n\u003Ch4\u003E\u0026nbsp;\u003C\/h4\u003E\r\n\r\n\u003Ch3\u003EFeaturing Jeff Reava on Nov. 11\u003C\/h3\u003E\r\n\r\n\u003Ch4\u003E\u003Cem\u003E\u0026quot;Leveraging Information Symmetry and Asymmetry for Effective Cyber Defense\u0026quot;\u003C\/em\u003E\u003C\/h4\u003E\r\n\r\n\u003Cp\u003E\u003Cbr \/\u003E\r\n\u0026nbsp;\u003Cbr \/\u003E\r\n\u003Cem\u003E\u003Cstrong\u003EABSTRACT\u003C\/strong\u003E\u003C\/em\u003E\u0026nbsp;\u0026nbsp; |\u0026nbsp;\u0026nbsp;\u0026nbsp; Effective cyber defense requires security controls that raise the cost to attackers beyond their ability or willingness to overcome. In theory, this is accomplished through a defense in depth approach using independent layers of protection that maximize attacker cost regardless of how they approach their target. In practice, most organizations lack the funding, staff and time to implement all the layers of control that they want. Instead, most organizations implement controls strategically, and attempt to conceal their defensive posture in order to raise the effort level required to compromise an environment. A concealment-oriented approach is difficult to fully implement in practice, and misses some of the strategic value of disclosing certain forms of controls. This talk will examine the value of sharing some elements of security posture, while concealing other controls to enable an organization to optimize its cyber defense effectiveness.\u003C\/p\u003E\r\n\r\n\u003Cp\u003E\u003Cem\u003E\u003Cstrong\u003EBIO\u003C\/strong\u003E\u003C\/em\u003E\u0026nbsp;\u0026nbsp; |\u0026nbsp;\u0026nbsp; Jeff Reava,\u0026nbsp;CISSP, CISM, CISA, is director of Information Security Operations, and has responsibility for identity management, security monitoring, and incident response for Jackson National Life Insurance Company. Since joining in June of 2015, Jeff has built and lead teams that provide 24-hour security monitoring and response operations, automate identity and access provisioning, and implement a set of capabilities to detect and disrupt malicious activity across the environment. Prior to Jackson, Jeff spent five years at Farmers Insurance integrating security capabilities into technical and business processes, standing up a new security operations hub, and leading identity management and technology operations teams. He also held a number of roles at Pfizer, addressing privacy incidents and leading forensic investigations while driving remediation of security issues across multiple global teams.\u003Cbr \/\u003E\r\n\u0026nbsp;\u003Cbr \/\u003E\r\nJeff holds a B.A. in Public Administration from Michigan State University, and an M.B.A. from James Madison University in Harrisonburg, VA.\u003Cbr \/\u003E\r\n\u0026nbsp;\u003Cbr \/\u003E\r\nOutside of work, Jeff founded a competitive policy debate team at a local high school, and mentors and teaches high school kids in his spare time. Jeff is married with three daughters, ages 19, 16 and 10.\u003C\/p\u003E\r\n\r\n\u003Cp\u003E\u0026nbsp;\u003C\/p\u003E\r\n\r\n\u003Cp\u003E\u003Cem\u003ESupported by Jackson National Life Insurance Company\u003C\/em\u003E\u003C\/p\u003E\r\n","summary":null,"format":"limited_html"}],"field_subtitle":"","field_summary":"","field_summary_sentence":[{"value":"Jeff Reava, director of information security at Jackson National Life Insurance, discusses effective cyber defense."}],"uid":"27490","created_gmt":"2016-10-27 16:02:32","changed_gmt":"2017-04-13 21:14:09","author":"Tara La Bouff","boilerplate_text":"","field_publication":"","field_article_url":"","field_event_time":{"event_time_start":"2016-11-11T12:00:00-05:00","event_time_end":"2016-11-11T13:00:00-05:00","event_time_end_last":"2016-11-11T13:00:00-05:00","gmt_time_start":"2016-11-11 17:00:00","gmt_time_end":"2016-11-11 18:00:00","gmt_time_end_last":"2016-11-11 18:00:00","rrule":null,"timezone":"America\/New_York"},"extras":[],"hg_media":{"538461":{"id":"538461","type":"image","title":"Cybersecurity Lecture Series","body":null,"created":"1464703200","gmt_created":"2016-05-31 14:00:00","changed":"1475895326","gmt_changed":"2016-10-08 02:55:26","alt":"Cybersecurity Lecture Series","file":{"fid":"89506","name":"cls_email_header.jpg","image_path":"\/sites\/default\/files\/images\/cls_email_header.jpg","image_full_path":"http:\/\/www.tlwarc.hg.gatech.edu\/\/sites\/default\/files\/images\/cls_email_header.jpg","mime":"image\/jpeg","size":461835,"path_740":"http:\/\/www.tlwarc.hg.gatech.edu\/sites\/default\/files\/styles\/740xx_scale\/public\/images\/cls_email_header.jpg?itok=NPA_x_rn"}},"583219":{"id":"583219","type":"image","title":"Jackson National Life Insurance Company","body":null,"created":"1477585591","gmt_created":"2016-10-27 16:26:31","changed":"1477585591","gmt_changed":"2016-10-27 16:26:31","alt":"","file":{"fid":"222329","name":"Jackson_NLIC_sm.jpg","image_path":"\/sites\/default\/files\/images\/Jackson_NLIC_sm.jpg","image_full_path":"http:\/\/www.tlwarc.hg.gatech.edu\/\/sites\/default\/files\/images\/Jackson_NLIC_sm.jpg","mime":"image\/jpeg","size":69862,"path_740":"http:\/\/www.tlwarc.hg.gatech.edu\/sites\/default\/files\/styles\/740xx_scale\/public\/images\/Jackson_NLIC_sm.jpg?itok=RJbpkMqL"}}},"media_ids":["538461","583219"],"groups":[{"id":"47223","name":"College of Computing"},{"id":"322011","name":"College of Computing Events"},{"id":"430601","name":"Institute for Information Security and Privacy"},{"id":"50877","name":"School of Computational Science and Engineering"},{"id":"50875","name":"School of Computer Science"},{"id":"50876","name":"School of Interactive Computing"}],"categories":[],"keywords":[{"id":"1404","name":"Cybersecurity"}],"core_research_areas":[],"news_room_topics":[],"event_categories":[{"id":"1795","name":"Seminar\/Lecture\/Colloquium"}],"invited_audience":[{"id":"78761","name":"Faculty\/Staff"},{"id":"78771","name":"Public"},{"id":"78751","name":"Undergraduate students"},{"id":"174045","name":"Graduate students"}],"affiliations":[],"classification":[],"areas_of_expertise":[],"news_and_recent_appearances":[],"phone":[],"contact":[{"value":"\u003Cp\u003ETara La Bouff, \u003Ca href=\u0022mailto:tara.labouff@iisp.gatech.edu\u0022\u003Etara.labouff@iisp.gatech.edu\u003C\/a\u003E, 404.769.5408\u003C\/p\u003E\r\n","format":"limited_html"}],"email":[],"slides":[],"orientation":[],"userdata":""}}}