<node id="591176">
  <nid>591176</nid>
  <type>news</type>
  <uid>
    <user id="27918"><![CDATA[27918]]></user>
  </uid>
  <created>1493668102</created>
  <changed>1493668502</changed>
  <title><![CDATA[A Bipartisan Approach to Cyber]]></title>
  <body><![CDATA[<p>As the threat of cyberattacks continues to grow, government officials are asking what can individuals and businesses do to protect themselves.</p>

<p>&ldquo;We are starting this conversation of when it is time to go on the offensive as it relates to cybersecurity,&rdquo; said Rep. Tom Graves (R-Ga 14). &ldquo;This creates a lot of policy, ethics and privacy questions.&rdquo;</p>

<p>Graves and Rep. Kyrsten Sinema (D-Ariz. 9) heard some answers to those questions during a panel discussion they held at Georgia Tech Monday. The bipartisan event examined how public policy can help people and companies go on the offense to defeat and unmask cyber attackers.</p>

<p>In March, Graves put forth a <a href="http://tomgraves.house.gov/news/documentsingle.aspx?DocumentID=398726">discussion draft of a bill</a> to allow the use of limited defensive measures to identify and stop attackers. While cyber policy discussions are taking place in Washington, Graves said they wanted to hear from others.</p>

<p>&ldquo;Quite frankly we&rsquo;re not satisfied with the direction of where policy has gone as it relates to cybersecurity,&rdquo; he said.</p>

<p>Monday&rsquo;s panel allowed for a robust discussion on cybersecurity from a policy perspective, an academic perspective and the private sector perspective.</p>

<p>In addition to Graves and Sinema, the other panelists were:</p>

<ul>
	<li>John Lens, a vice president for the Network and Security Business Unit at VMware.</li>
	<li>Stephen Pair, co-founder and CEO of BitPay.</li>
	<li>Peter Swire, the Huang Professor of Law and Ethics in the Scheller College of Business.</li>
	<li>Candace Worley, chief technical strategist for McAfee.</li>
</ul>

<p>Georgia Tech is a place &ldquo;where government, industry and universities can come together to talk about some very, very challenging problems in the world,&rdquo; said Stephen E. Cross, the Institute&rsquo;s executive vice president for research.</p>

<p>The Institute has been developing cybersecurity solutions for more than 20 years. Tech&nbsp;houses nearly a dozen labs and centers dedicated to cybersecurity, and has more than 450 scientists, faculty and students involved with this research.</p>

<p>Georgia Tech is also home to the <a href="http://atdc.org">Advanced Technology Development Center</a> (ATDC), the state&#39;s technology incubator. ATDC is currently incubating seven companies in the cybersecurity space and assisting 33 entrepreneurs and early-stage startups&nbsp;statewide with entrepreneurial education in cybersecurity.</p>
]]></body>
  <field_subtitle>
    <item>
      <value><![CDATA[]]></value>
    </item>
  </field_subtitle>
  <field_dateline>
    <item>
      <value>2017-05-01T00:00:00-04:00</value>
      <timezone><![CDATA[America/New_York]]></timezone>
    </item>
  </field_dateline>
  <field_summary_sentence>
    <item>
      <value><![CDATA[Rep. Tom Graves, Rep. Kyrsten Sinema hold panel discussion at Georgia Tech to talk about cybersecurity policy and technical challenges.]]></value>
    </item>
  </field_summary_sentence>
  <field_summary>
    <item>
      <value><![CDATA[<p>Rep. Tom Graves (R-Ga 14) and&nbsp;Rep. Kyrsten Sinema (D-Ariz. 9) hold a panel discussion at Georgia Tech to talk about cybersecurity policy and technical challenges.&nbsp;The bipartisan event examined how public policy can help people and companies go on the offense to defeat and unmask cyber attackers.&nbsp;</p>
]]></value>
    </item>
  </field_summary>
  <field_media>
          <item>
        <nid>
          <node id="591172">
            <nid>591172</nid>
            <type>image</type>
            <title><![CDATA[Cyber MayDay at Georgia Tech]]></title>
            <body><![CDATA[]]></body>
                          <field_image>
                <item>
                  <fid>225255</fid>
                  <filename><![CDATA[CyberMayDay.jpeg.png]]></filename>
                  <filepath><![CDATA[/sites/default/files/images/CyberMayDay.jpeg.png]]></filepath>
                  <file_full_path><![CDATA[http://www.tlwarc.hg.gatech.edu//sites/default/files/images/CyberMayDay.jpeg.png]]></file_full_path>
                  <filemime>image/png</filemime>
                  <image_740><![CDATA[]]></image_740>
                  <image_alt><![CDATA[]]></image_alt>
                </item>
              </field_image>
            
                      </node>
        </nid>
      </item>
          <item>
        <nid>
          <node id="591174">
            <nid>591174</nid>
            <type>image</type>
            <title><![CDATA[Cyber MayDay Welcome]]></title>
            <body><![CDATA[]]></body>
                          <field_image>
                <item>
                  <fid>225257</fid>
                  <filename><![CDATA[CyberMayDayCross.JPG]]></filename>
                  <filepath><![CDATA[/sites/default/files/images/CyberMayDayCross.JPG]]></filepath>
                  <file_full_path><![CDATA[http://www.tlwarc.hg.gatech.edu//sites/default/files/images/CyberMayDayCross.JPG]]></file_full_path>
                  <filemime>image/jpeg</filemime>
                  <image_740><![CDATA[]]></image_740>
                  <image_alt><![CDATA[]]></image_alt>
                </item>
              </field_image>
            
                      </node>
        </nid>
      </item>
          <item>
        <nid>
          <node id="590939">
            <nid>590939</nid>
            <type>image</type>
            <title><![CDATA[Cyber MayDay]]></title>
            <body><![CDATA[]]></body>
                          <field_image>
                <item>
                  <fid>225158</fid>
                  <filename><![CDATA[iStock-629285904_1024x540_w_chevron_01.jpg]]></filename>
                  <filepath><![CDATA[/sites/default/files/images/iStock-629285904_1024x540_w_chevron_01.jpg]]></filepath>
                  <file_full_path><![CDATA[http://www.tlwarc.hg.gatech.edu//sites/default/files/images/iStock-629285904_1024x540_w_chevron_01.jpg]]></file_full_path>
                  <filemime>image/jpeg</filemime>
                  <image_740><![CDATA[]]></image_740>
                  <image_alt><![CDATA[]]></image_alt>
                </item>
              </field_image>
            
                      </node>
        </nid>
      </item>
      </field_media>
  <field_contact_email>
    <item>
      <email><![CDATA[laura.diamond@gatech.edu]]></email>
    </item>
  </field_contact_email>
  <field_location>
    <item>
      <value><![CDATA[]]></value>
    </item>
  </field_location>
  <field_contact>
    <item>
      <value><![CDATA[]]></value>
    </item>
  </field_contact>
  <field_sidebar>
    <item>
      <value><![CDATA[]]></value>
    </item>
  </field_sidebar>
  <field_boilerplate>
    <item>
      <nid><![CDATA[]]></nid>
    </item>
  </field_boilerplate>
  <!--  TO DO: correct to not conflate categories and news room topics  -->
  <!--  Disquisition: it's funny how I write these TODOs and then never
         revisit them. It's as though the act of writing the thing down frees me
         from the responsibility to actually solve the problem. But what can I
         say? There are more problems than there's time to solve.  -->
  <links_related> </links_related>
  <files> </files>
  <og_groups>
          <item>1214</item>
      </og_groups>
  <og_groups_both>
          <item>
        <![CDATA[Institute and Campus]]>
      </item>
          <item>
        <![CDATA[Economic Development and Policy]]>
      </item>
          <item>
        <![CDATA[Institute Leadership]]>
      </item>
          <item>
        <![CDATA[Special Events and Guest Speakers]]>
      </item>
          <item>
        <![CDATA[Computer Science/Information Technology and Security]]>
      </item>
      </og_groups_both>
  <field_categories>
          <item>
        <tid>129</tid>
        <value><![CDATA[Institute and Campus]]></value>
      </item>
          <item>
        <tid>131</tid>
        <value><![CDATA[Economic Development and Policy]]></value>
      </item>
          <item>
        <tid>132</tid>
        <value><![CDATA[Institute Leadership]]></value>
      </item>
          <item>
        <tid>133</tid>
        <value><![CDATA[Special Events and Guest Speakers]]></value>
      </item>
          <item>
        <tid>153</tid>
        <value><![CDATA[Computer Science/Information Technology and Security]]></value>
      </item>
      </field_categories>
  <core_research_areas>
          <term tid="145171"><![CDATA[Cybersecurity]]></term>
      </core_research_areas>
  <field_news_room_topics>
          <item>
        <tid>106361</tid>
        <value><![CDATA[Business and Economic Development]]></value>
      </item>
          <item>
        <tid>71871</tid>
        <value><![CDATA[Campus and Community]]></value>
      </item>
          <item>
        <tid>71881</tid>
        <value><![CDATA[Science and Technology]]></value>
      </item>
          <item>
        <tid>71901</tid>
        <value><![CDATA[Society and Culture]]></value>
      </item>
      </field_news_room_topics>
  <links_related>
          <link>
      <url>http://iisp.gatech.edu</url>
      <title></title>
      </link>
      </links_related>
  <files>
      </files>
  <og_groups>
          <item>1214</item>
      </og_groups>
  <og_groups_both>
          <item><![CDATA[News Room]]></item>
      </og_groups_both>
  <field_keywords>
          <item>
        <tid>145981</tid>
        <value><![CDATA[IISP]]></value>
      </item>
          <item>
        <tid>141341</tid>
        <value><![CDATA[Institute for Information Security & Privacy]]></value>
      </item>
      </field_keywords>
  <field_userdata>
      <![CDATA[]]>
  </field_userdata>
</node>
