{"594621":{"#nid":"594621","#data":{"type":"event","title":"Cybersecurity Lecture Series with Joel Odom","body":[{"value":"\u003Cp\u003EGeorgia Tech\u0026rsquo;s free and open-to-the-public Cybersecurity Lecture Series convenes for the Fall \u0026#39;17 semester with Joel Odom, senior research scientist at the Georgia Tech Research Institute\u0026#39;s CIPHER Lab, who will present highlights and takeaways from malware analysis.\u003C\/p\u003E\r\n\r\n\u003Cp\u003E\u003Ca href=\u0022http:\/\/attend.com\/cyberlecture-Odom\u0022\u003E\u003Cstrong\u003ERegister to attend\u003C\/strong\u003E\u003C\/a\u003E\u003C\/p\u003E\r\n\r\n\u003Cp\u003E\u0026nbsp;\u003C\/p\u003E\r\n\r\n\u003Cp\u003E\u003Cstrong\u003E\u003Cem\u003E\u0026quot;Modern Malware and Secure Techniques for Better Software\u0026quot;\u003C\/em\u003E\u003C\/strong\u003E\u003C\/p\u003E\r\n\r\n\u003Cp\u003EModern society depends on reliable computer systems, yet hardly a day passes without news of a new failure of computer security. Whether enticed by profit or by politics, professional hacking organizations rival mainstream software companies in their technical and process sophistication. Professional malware and computer exploitation relies on the ability to take control of computer systems through software vulnerabilities. This seminar will explain software vulnerabilities and exploits through example. The seminar will explain techniques to create secure software, and will demonstrate GTRI work in the area of software assurance as applied to enterprise operating systems and embedded systems.\u003C\/p\u003E\r\n\r\n\u003Cp\u003E\u003Cstrong\u003EJoel Odom\u003C\/strong\u003E\u0026nbsp;leads a team of researchers focused on software security as branch head for the Cybersecurity, Information Protection, and Hardware Evaluation Research (CIPHER) Lab at the Georgia Tech Research Institute, where he serves as senior research scientist. He and his team research static and dynamic software analysis, software testing techniques, software reverse engineering, and software vulnerability discovery and mitigation.\u003C\/p\u003E\r\n\r\n\u003Cp\u003E\u0026nbsp;\u003C\/p\u003E\r\n\r\n\u003Cp\u003EOrganized by the\u0026nbsp;\u003Ca href=\u0022https:\/\/protect-us.mimecast.com\/s\/1dr5BkcYL59Mh8\u0022 rel=\u0022noopener\u0022 target=\u0022_blank\u0022\u003EInstitute for Information Security \u0026amp; Privacy\u003C\/a\u003E, the free and open-to-the-public Cybersecurity Lecture Series \u003Ca href=\u0022http:\/\/www.iisp.gatech.edu\/cyber-lecture\u0022 target=\u0022_blank\u0022\u003Emeets throughout the fall\u003C\/a\u003E each Friday at Noon on the Georgia Tech campus, August \u0026ndash; December. Invited speakers include executives and researchers from Fortune 500 companies, federal intelligence agencies, start-ups and incubators, as well as Georgia Tech faculty and students presenting their research.\u003C\/p\u003E\r\n\r\n\u003Cp\u003E\u003Cstrong\u003E\u003Ca href=\u0022http:\/\/www.iisp.gatech.edu\/sign-cybersecurity-lecture-updates\u0022\u003EReceive future schedule updates\u003C\/a\u003E\u003C\/strong\u003E\u003C\/p\u003E\r\n","summary":null,"format":"limited_html"}],"field_subtitle":"","field_summary":[{"value":"\u003Cp\u003EGeorgia Tech\u0026rsquo;s free and open-to-the-public Cybersecurity Lecture Series convenes for the Fall \u0026#39;17 semester with Joel Odom, senior research scientist at the Georgia Tech Research Institute\u0026#39;s CIPHER Lab, who will present highlights and takeaways from malware analysis.\u003C\/p\u003E\r\n","format":"limited_html"}],"field_summary_sentence":[{"value":"Georgia Tech\u2019s Cybersecurity Lecture Series features Joel Odom from the CIPHER Lab at GTRI for \u0022Modern Malware and Secure Techniques for Better Software.\u0022"}],"uid":"27490","created_gmt":"2017-08-18 04:06:14","changed_gmt":"2017-08-18 12:37:28","author":"Tara La Bouff","boilerplate_text":"","field_publication":"","field_article_url":"","field_event_time":{"event_time_start":"2017-08-25T13:00:00-04:00","event_time_end":"2017-08-25T14:00:00-04:00","event_time_end_last":"2017-08-25T14:00:00-04:00","gmt_time_start":"2017-08-25 17:00:00","gmt_time_end":"2017-08-25 18:00:00","gmt_time_end_last":"2017-08-25 18:00:00","rrule":null,"timezone":"America\/New_York"},"extras":[],"hg_media":{"593723":{"id":"593723","type":"image","title":"Cybersecurity Lecture Series by IISP","body":null,"created":"1500996186","gmt_created":"2017-07-25 15:23:06","changed":"1500996186","gmt_changed":"2017-07-25 15:23:06","alt":"","file":{"fid":"226333","name":"CLS_logo_FY18 w tag.jpg","image_path":"\/sites\/default\/files\/images\/CLS_logo_FY18%20w%20tag.jpg","image_full_path":"http:\/\/www.tlwarc.hg.gatech.edu\/\/sites\/default\/files\/images\/CLS_logo_FY18%20w%20tag.jpg","mime":"image\/jpeg","size":580256,"path_740":"http:\/\/www.tlwarc.hg.gatech.edu\/sites\/default\/files\/styles\/740xx_scale\/public\/images\/CLS_logo_FY18%20w%20tag.jpg?itok=8s4XWw-w"}},"594626":{"id":"594626","type":"image","title":"Joel Odom","body":null,"created":"1503059688","gmt_created":"2017-08-18 12:34:48","changed":"1503059729","gmt_changed":"2017-08-18 12:35:29","alt":"","file":{"fid":"226623","name":"Cybersecurity commentator_Joel Odom_FY18.jpg","image_path":"\/sites\/default\/files\/images\/Cybersecurity%20commentator_Joel%20Odom_FY18.jpg","image_full_path":"http:\/\/www.tlwarc.hg.gatech.edu\/\/sites\/default\/files\/images\/Cybersecurity%20commentator_Joel%20Odom_FY18.jpg","mime":"image\/jpeg","size":120466,"path_740":"http:\/\/www.tlwarc.hg.gatech.edu\/sites\/default\/files\/styles\/740xx_scale\/public\/images\/Cybersecurity%20commentator_Joel%20Odom_FY18.jpg?itok=YA5Pzxa5"}}},"media_ids":["593723","594626"],"groups":[{"id":"47223","name":"College of Computing"},{"id":"322011","name":"College of Computing Events"},{"id":"430601","name":"Institute for Information Security and Privacy"},{"id":"69599","name":"IPaT"},{"id":"1281","name":"Ivan Allen College of Liberal Arts"},{"id":"50877","name":"School of Computational Science and Engineering"},{"id":"50875","name":"School of Computer Science"},{"id":"50876","name":"School of Interactive Computing"}],"categories":[],"keywords":[{"id":"1404","name":"Cybersecurity"}],"core_research_areas":[],"news_room_topics":[],"event_categories":[{"id":"1795","name":"Seminar\/Lecture\/Colloquium"}],"invited_audience":[{"id":"78761","name":"Faculty\/Staff"},{"id":"78771","name":"Public"},{"id":"174045","name":"Graduate students"},{"id":"78751","name":"Undergraduate students"}],"affiliations":[],"classification":[],"areas_of_expertise":[],"news_and_recent_appearances":[],"phone":[],"contact":[{"value":"\u003Cp\u003ELindsey Panetta, \u003Ca href=\u0022mailto:lindsey.panetta@gtri.gatech.edu\u0022\u003Elindsey.panetta@gtri.gatech.edu\u003C\/a\u003E\u003C\/p\u003E\r\n","format":"limited_html"}],"email":[],"slides":[],"orientation":[],"userdata":""}}}