<node id="587178">
  <nid>587178</nid>
  <type>news</type>
  <uid>
    <user id="27490"><![CDATA[27490]]></user>
  </uid>
  <created>1486591249</created>
  <changed>1486736057</changed>
  <title><![CDATA[Three Georgia Tech Students Chosen as 'Scholars' for RSA® Conference]]></title>
  <body><![CDATA[<p>Attending the <a href="https://www.rsaconference.com/events/us17" target="_blank">RSA&reg; Conference</a> (RSAC) is a coveted, career-building, right-of-passage for professionals in the cybersecurity field, and next week, three Georgia Tech students will be honored as <a href="https://www.rsaconference.com/about/rsac-security-scholar" target="_blank">&ldquo;RSA<sup>&reg;</sup>C Security Scholars</a>&rdquo; among an expected crowd of 45,000 in San Francisco.</p>

<p>Georgia Tech was one of just 20 universities nationwide invited to send three students to RSAC, courtesy of the conference. RSAC selected universities based upon the strength of their cybersecurity programs, and students were chosen by their schools. Attending from Georgia Tech are <strong>David Formby</strong> (Ph.D. ECE), <strong>Marie Le Pichon</strong> (Ph.D. CS), and <strong>Carter Yagemann</strong> (Ph.D. CS).</p>

<div>
<div>
<p>&ldquo;It really is an honor to be chosen to represent Georgia Tech when we have so many great security students here doing amazing work,&rdquo; says Formby, whose research under Prof. <a href="https://www.ece.gatech.edu/faculty-staff-directory/abdul-r-beyah" target="_blank"><strong>Raheem Beyah</strong></a> in the School of Electrical &amp; Computer Engineering focuses on problems in industrial control systems, such as the power grid. &ldquo;I&#39;m hoping to learn something from all the brilliant speakers and fellow scholars that will inspire new and interesting directions in my research.&rdquo;</p>

<p>The <a href="http://iisp.gatech.edu/">Institute for Information Security &amp; Privacy</a> invited students to apply to be chosen last fall. Students were evaluated based upon academic standing, demonstrated interest in cybersecurity, and voluntary participation in IISP learning activities, such as the weekly Cybersecurity Lecture Series and Fall Demo Day at the Georgia Tech Cyber Security Summit.</p>

<p>&ldquo;This will be my first time attending RSAC so I&#39;m very excited,&rdquo; says Yagemann, whose background in mobile security ultimately led him toward researching systems and machine learning security under professors <a href="http://iisp.gatech.edu/wenke-lee"><strong>Wenke Lee</strong></a> and <a href="https://taesoo.gtisc.gatech.edu/" target="_blank"><strong>Taesoo Kim</strong></a> in the School of Computer Science. &ldquo;Being able to attend as an RSAC Security Scholar makes it even better. Industry prioritizes security problems differently than academia&hellip; I believe security is one of the fields where academics need to work closest with industry; getting to see another perspective is a wonderful opportunity.&rdquo;</p>

<p>Le Pichon said her focus will be on &ldquo;information and good conversation&rdquo; about privacy, law, and identity &ndash; all central to her doctoral focus on cybersecurity public policy under <a href="http://www.cc.gatech.edu/%7Eaianton/" target="_blank"><strong>Annie Ant&oacute;n</strong></a>, chair of the School of Interactive Computing.</p>

<p>&ldquo;Being selected as an RSAC Security Scholar not only&nbsp;affords me the opportunity to take advantage of this well of knowledge, but validates my work in the field of information&nbsp;security,&rdquo; she says. &ldquo;I believe that the fields of privacy, security, and compliance are inextricably intertwined, and this further confirms&nbsp;an openness on the part of the security community to work on these issues holistically.&rdquo;</p>

<p>The scholars will receive priority seating at conference keynotes, enjoy a private dinner with industry leaders, and a state of the industry panel with information security professionals from defense, consulting and manufacturing.&nbsp; <a href="https://www.rsaconference.com/blogs/rsac-2017-ransomware-summit" target="_blank">Formby will present and speak in the ransomware seminar track</a>. &nbsp;Yagemann says he also will compete in a voluntary &ldquo;capture the flag&rdquo; hacking contest. Le Pichon says she will follow the Hackers and Threats track in addition to her area of research.&nbsp;</p>

<p>&ldquo;With more than 500 sessions at RSAC, we hope the students will discover a new angle of cybersecurity outside of their current focus,&rdquo; said Lee, co-director of the Institute for Information Security &amp; Privacy. &ldquo;This is a phenomenal opportunity at a diverse and popular event. Being a security scholar will help them stand out in the crowd.&rdquo;</p>

<p><em>All students are invited to participate in cybersecurity activities at Georgia Tech to help them understand facets of the problem applicable to their future careers. To learn more, visit <a href="http://www.iisp.gatech.edu/events" target="_blank">www.iisp.gatech.edu/events</a></em></p>
</div>
</div>
]]></body>
  <field_subtitle>
    <item>
      <value><![CDATA[]]></value>
    </item>
  </field_subtitle>
  <field_dateline>
    <item>
      <value>2017-02-09T00:00:00-05:00</value>
      <timezone><![CDATA[America/New_York]]></timezone>
    </item>
  </field_dateline>
  <field_summary_sentence>
    <item>
      <value><![CDATA[Three Georgia Tech students head to the RSA® Conference as 'Security Scholars' to broaden their research.]]></value>
    </item>
  </field_summary_sentence>
  <field_summary>
    <item>
      <value><![CDATA[]]></value>
    </item>
  </field_summary>
  <field_media>
          <item>
        <nid>
          <node id="587177">
            <nid>587177</nid>
            <type>image</type>
            <title><![CDATA[RSAC Security Scholars]]></title>
            <body><![CDATA[]]></body>
                          <field_image>
                <item>
                  <fid>223781</fid>
                  <filename><![CDATA[Formby_LePichon_yagemann2-01.jpg]]></filename>
                  <filepath><![CDATA[/sites/default/files/images/Formby_LePichon_yagemann2-01.jpg]]></filepath>
                  <file_full_path><![CDATA[http://www.tlwarc.hg.gatech.edu//sites/default/files/images/Formby_LePichon_yagemann2-01.jpg]]></file_full_path>
                  <filemime>image/jpeg</filemime>
                  <image_740><![CDATA[]]></image_740>
                  <image_alt><![CDATA[]]></image_alt>
                </item>
              </field_image>
            
                      </node>
        </nid>
      </item>
      </field_media>
  <field_contact_email>
    <item>
      <email><![CDATA[tara.labouff@iisp.gatech.edu]]></email>
    </item>
  </field_contact_email>
  <field_location>
    <item>
      <value><![CDATA[]]></value>
    </item>
  </field_location>
  <field_contact>
    <item>
      <value><![CDATA[<p><a href="mailto:tara.labouff@iisp.gatech.edu?subject=Inquiry%20re%3A%20RSAC%20Security%20Scholars">Tara La Bouff</a>, 404.769.5408</p>
]]></value>
    </item>
  </field_contact>
  <field_sidebar>
    <item>
      <value><![CDATA[]]></value>
    </item>
  </field_sidebar>
  <field_boilerplate>
    <item>
      <nid><![CDATA[]]></nid>
    </item>
  </field_boilerplate>
  <!--  TO DO: correct to not conflate categories and news room topics  -->
  <!--  Disquisition: it's funny how I write these TODOs and then never
         revisit them. It's as though the act of writing the thing down frees me
         from the responsibility to actually solve the problem. But what can I
         say? There are more problems than there's time to solve.  -->
  <links_related> </links_related>
  <files> </files>
  <og_groups>
          <item>47223</item>
          <item>430601</item>
          <item>50875</item>
          <item>50876</item>
      </og_groups>
  <og_groups_both>
          <item>
        <![CDATA[Institute and Campus]]>
      </item>
          <item>
        <![CDATA[Student and Faculty]]>
      </item>
          <item>
        <![CDATA[Student Research]]>
      </item>
          <item>
        <![CDATA[Computer Science/Information Technology and Security]]>
      </item>
      </og_groups_both>
  <field_categories>
          <item>
        <tid>129</tid>
        <value><![CDATA[Institute and Campus]]></value>
      </item>
          <item>
        <tid>134</tid>
        <value><![CDATA[Student and Faculty]]></value>
      </item>
          <item>
        <tid>8862</tid>
        <value><![CDATA[Student Research]]></value>
      </item>
          <item>
        <tid>153</tid>
        <value><![CDATA[Computer Science/Information Technology and Security]]></value>
      </item>
      </field_categories>
  <core_research_areas>
          <term tid="145171"><![CDATA[Cybersecurity]]></term>
      </core_research_areas>
  <field_news_room_topics>
      </field_news_room_topics>
  <links_related>
      </links_related>
  <files>
      </files>
  <og_groups>
          <item>47223</item>
          <item>430601</item>
          <item>50875</item>
          <item>50876</item>
      </og_groups>
  <og_groups_both>
          <item><![CDATA[College of Computing]]></item>
          <item><![CDATA[Institute for Information Security and Privacy]]></item>
          <item><![CDATA[School of Computer Science]]></item>
          <item><![CDATA[School of Interactive Computing]]></item>
      </og_groups_both>
  <field_keywords>
          <item>
        <tid>1404</tid>
        <value><![CDATA[Cybersecurity]]></value>
      </item>
          <item>
        <tid>173440</tid>
        <value><![CDATA[RSA Conference]]></value>
      </item>
      </field_keywords>
  <field_userdata>
      <![CDATA[]]>
  </field_userdata>
</node>
