<node id="588126">
  <nid>588126</nid>
  <type>event</type>
  <uid>
    <user id="27490"><![CDATA[27490]]></user>
  </uid>
  <created>1488320353</created>
  <changed>1492117955</changed>
  <title><![CDATA[Cybersecurity Lecture Series - David Formby]]></title>
  <body><![CDATA[<h3><strong>Meet academic and industry leaders for intimate discussions about new cyber threats, trends and technologies. </strong></h3>

<p>The <strong>Cybersecurity Lecture Series</strong> is a free, open-to-the-public lecture from a thought leader who is advancing the field of information security and privacy. Invited speakers include executives and researchers from private companies, government agencies, start-up incubators as well as Georgia Tech faculty and students presenting their research.</p>

<p>Held <strong>weekly each Friday at Noon</strong> <strong>through Apr. 21,</strong> lectures are open to all -- students, faculty, industry, government, or simply the curious. Graduate students may register for credit under seminar course CS-8001-INF.</p>

<p><em>Complimentary lunch provided for registered guests. Please bring your own beverage.</em></p>

<p><a href="http://www.iisp.gatech.edu/cyber-lecture" target="_blank"><em>Sign up to receive future lecture announcements.</em></a></p>

<h3>&nbsp;</h3>

<h3><strong>Featuring David Formby on Mar. 17, 2017</strong></h3>

<h4><strong><em>&quot;Out of Control: Ransomware for Industrial Control Systems&quot;&nbsp;</em></strong></h4>

<p><a href="http://www.iisp.gatech.edu/register-cybersecurity-lecture-series-mar-17"><strong><em>RSVP</em></strong></a></p>

<p><strong><em>ABSTRACT</em></strong>&nbsp;&nbsp; |&nbsp;&nbsp; Ransomware has recently emerged as the trending new&nbsp;business model for cybercrime with high-profile attacks on hospitals,&nbsp;revealing how profitable the technique can be when&nbsp;used to hold operationally critical assets for ransom. Meanwhile, industrial control system (ICS) networks are still struggling to update their security practices due to the perceived absence of threats and rarity of real-world ICS attacks. Recent reports suggest that ICS networks may be the next domain that ransomware is targeting but, to date, all attacks have simply used standard ransomware against personal computers with limited effect. In this work, we develop the first known version of ransomware that targets programmable logic controllers, discuss the economic implications of such an attack, and lay out a generic framework for ICS ransomware to aid in future study and defenses.</p>

<p>&nbsp;</p>

<p><strong><em>BIO</em></strong>&nbsp;&nbsp; |&nbsp;&nbsp; <strong>David Formby</strong> is a Ph.D. Candidate in the School of Electrical and Computer Engineering, performing research in the area of network security for industrial control systems under Dr. Raheem Beyah. His past and current research&nbsp;projects include network characterizations of power distribution substations, techniques for device type fingerprinting for cyber-physical systems, and tools to detect and analyze changes to industrial controller programming.</p>

<p>&nbsp;</p>

<p>&nbsp;</p>
]]></body>
  <field_summary_sentence>
    <item>
      <value><![CDATA[Ph.D. Candidate David Formby presents the first known ransomware that targets programmable logic controllers in industrial control systems.]]></value>
    </item>
  </field_summary_sentence>
  <field_summary>
    <item>
      <value><![CDATA[]]></value>
    </item>
  </field_summary>
  <field_time>
    <item>
      <value><![CDATA[2017-03-17T13:00:00-04:00]]></value>
      <value2><![CDATA[2017-03-17T14:00:00-04:00]]></value2>
      <rrule><![CDATA[]]></rrule>
      <timezone><![CDATA[America/New_York]]></timezone>
    </item>
  </field_time>
  <field_fee>
    <item>
      <value><![CDATA[]]></value>
    </item>
  </field_fee>
  <field_extras>
      </field_extras>
  <field_audience>
          <item>
        <value><![CDATA[Faculty/Staff]]></value>
      </item>
          <item>
        <value><![CDATA[Public]]></value>
      </item>
          <item>
        <value><![CDATA[Undergraduate students]]></value>
      </item>
          <item>
        <value><![CDATA[Graduate students]]></value>
      </item>
      </field_audience>
  <field_media>
          <item>
        <nid>
          <node id="538461">
            <nid>538461</nid>
            <type>image</type>
            <title><![CDATA[Cybersecurity Lecture Series]]></title>
            <body><![CDATA[]]></body>
                          <field_image>
                <item>
                  <fid>89506</fid>
                  <filename><![CDATA[cls_email_header.jpg]]></filename>
                  <filepath><![CDATA[/sites/default/files/images/cls_email_header.jpg]]></filepath>
                  <file_full_path><![CDATA[http://www.tlwarc.hg.gatech.edu//sites/default/files/images/cls_email_header.jpg]]></file_full_path>
                  <filemime>image/jpeg</filemime>
                  <image_740><![CDATA[]]></image_740>
                  <image_alt><![CDATA[Cybersecurity Lecture Series]]></image_alt>
                </item>
              </field_image>
            
                      </node>
        </nid>
      </item>
      </field_media>
  <field_contact>
    <item>
      <value><![CDATA[<p>Lindsey Panetta, <a href="mailto:lindsey.panetta@gtri.gatech.edu">lindsey.panetta@gtri.gatech.edu</a></p>
]]></value>
    </item>
  </field_contact>
  <field_location>
    <item>
      <value><![CDATA[]]></value>
    </item>
  </field_location>
  <field_sidebar>
    <item>
      <value><![CDATA[]]></value>
    </item>
  </field_sidebar>
  <field_phone>
    <item>
      <value><![CDATA[]]></value>
    </item>
  </field_phone>
  <field_url>
    <item>
      <url><![CDATA[]]></url>
      <title><![CDATA[]]></title>
            <attributes><![CDATA[]]></attributes>
    </item>
  </field_url>
  <field_email>
    <item>
      <email><![CDATA[]]></email>
    </item>
  </field_email>
  <field_boilerplate>
    <item>
      <nid><![CDATA[]]></nid>
    </item>
  </field_boilerplate>
  <links_related>
      </links_related>
  <files>
      </files>
  <og_groups>
          <item>47223</item>
          <item>322011</item>
          <item>430601</item>
          <item>50877</item>
          <item>50875</item>
          <item>50876</item>
      </og_groups>
  <og_groups_both>
          <item><![CDATA[College of Computing]]></item>
          <item><![CDATA[College of Computing Events]]></item>
          <item><![CDATA[Institute for Information Security and Privacy]]></item>
          <item><![CDATA[School of Computational Science and Engineering]]></item>
          <item><![CDATA[School of Computer Science]]></item>
          <item><![CDATA[School of Interactive Computing]]></item>
      </og_groups_both>
  <field_categories>
          <item>
        <tid>1795</tid>
        <value><![CDATA[Seminar/Lecture/Colloquium]]></value>
      </item>
      </field_categories>
  <field_keywords>
          <item>
        <tid>1404</tid>
        <value><![CDATA[Cybersecurity]]></value>
      </item>
      </field_keywords>
  <userdata><![CDATA[]]></userdata>
</node>
