<node id="594891">
  <nid>594891</nid>
  <type>news</type>
  <uid>
    <user id="27490"><![CDATA[27490]]></user>
  </uid>
  <created>1503540367</created>
  <changed>1503540998</changed>
  <title><![CDATA[ Sync Up with Cybersecurity: Fall '17]]></title>
  <body><![CDATA[<p>A global shortfall of 1.5 million cybersecurity workers in 2020 is predicted by Frost &amp; Sullivan and other organizations. Whether enrolled in a cybersecurity degree program or not, Georgia Tech students can tap into this in-demand, rapidly changing discipline through a variety of campus activities &ndash; many of which are open to all majors.</p>

<h4><a href="http://iisp.gatech.edu/cyber-lecture"><strong>Cybersecurity Lecture Series</strong></a></h4>

<p>Get up to speed on emerging threats and meet leaders who are advancing the field of information security at the <strong>Cybersecurity Lecture Series</strong> held each Friday at Noon. Invited speakers include executives and researchers from Fortune 500 companies, start-ups, intelligence agencies, visiting faculty, as well as Georgia Tech faculty and students presenting conference research. Lectures are open to all majors. Graduate students may register by Aug. 25 for credit under seminar course CS-8001-INF.</p>

<h4><a href="http://iisp.gatech.edu/cybersecurity-demo-day"><strong>IISP Cybersecurity Demo Day</strong></a></h4>

<p>&nbsp;All students are invited to bring new ideas for commercialization (or continued research) before business leaders at the Institute for Information Security &amp; Privacy&#39;s <strong>Cybersecurity Demo Day</strong>. Students can win cash and prizes valued at <strong>$125,000</strong> to move great ideas to market &ndash; including eligibility for a $50,000 grant from the National Science Foundation or a spot in <a href="http://create-x.gatech.edu/1about.html" target="_blank">Create-X Startup LAUNCH</a> worth $70,000. (Who doesn&#39;t want $20,000 for their prototype...? <em>Yeah, we thought so!</em>) For the first time this year, Demo Day includes entrepreneurial coaching, powered by <a href="http://venturelab.gatech.edu/" target="_blank">VentureLab</a>, to help all competitors hone their pitch before investors or academics.</p>

<h4><a href="http://iisp.gatech.edu/rsar-conference-security-scholar-program"><strong>RSA Security Scholars Program</strong></a></h4>

<p>Two scholars from Georgia Tech will be chosen to attend the <strong>RSA<sup>&reg;</sup> Conference 2018</strong> at no expense. The <strong><a href="https://www.rsaconference.com/about/rsac-security-scholar" target="_blank">RSA<sup>&reg;</sup>C Security Scholar </a></strong>program brings the brightest up-and-coming cybersecurity students nationwide to a premier information security industry conference -- helping students meet 40,000 industry attendees, learn how to pursue a cybersecurity career, and build the connections that can make it happen. Past scholars enjoyed reserved seating at RSA&#39;s opening keynote, intimate meetings with industry luminaries, Learning Labs, and had an opportunity to present their work. Students who demonstrate extracurricular involvement in cybersecurity and excel in their work at Georgia Tech will qualify for selection. Get involved now to be considered when the 2018 scholars are chosen in October.</p>

<h4><strong>Scholarships &amp; Fellowships</strong></h4>

<p>Students in Computer Science, Electrical and Computer Engineering,<strong> </strong>Public Policy or<strong> </strong>International Affairs with a strong interest in cybersecurity may apply for a full-ride scholarship, the <a href="http://www.iisp.gatech.edu/cybercorps-scholarship-service" target="_blank"><strong>CyberCorps<sup>&reg;</sup> Scholarship for Service</strong></a>. Recipients of this multi-year scholarship agree to work in a cybersecurity role for a federal, state, local or tribal government organization in the United States after graduation for a period equal to the length of the scholarship.</p>

<p>Additionally, Ph.D. students may apply for the<strong> <a href="http://www.iisp.gatech.edu/cybersecurity-fellowship-program" target="_blank">IISP Cybersecurity Fellowship</a></strong> program to gain financial support for unfunded or under-funded research ideas. All Ph.D. students from any unit at Georgia Tech are encouraged to apply if they demonstrate a significant focus in one of six, core, cybersecurity research areas: policy, consumer-facing privacy, risk, trust, attribution, or cyber-physical systems. Mark your calendar to apply for Spring &rsquo;18 before Nov. 30.</p>

<h4><a href="http://www.vip.gatech.edu/" target="_blank"><strong>Vertically Integrated Projects</strong></a></h4>

<p>Undergraduate students can participate in on-going, exploratory research in a variety of fields, including cybersecurity. The <strong>Vertically Integrated Projects </strong>(VIP) Program unites undergraduate education and faculty research in a team-based context. Undergraduate VIP students earn academic credits, while faculty and graduate students benefit from the design/discovery efforts of their teams. Projects related to cybersecurity are recruiting additional team members now. Search projects and how to apply at&nbsp;<a href="http://www.vip.gatech.edu/" target="_blank">http://www.vip.gatech.edu/</a></p>

<h4><strong><a href="https://greyhat.gatech.edu/" target="_blank">GreyHat Club</a></strong></h4>

<p>Beginners in cybersecurity and those who want to compete in hacking challenges to test their skills can sync up with the student-led <strong>GreyHat Club</strong>. Find details and a calendar of events online.</p>

<p>Stay engaged all year long. Visit<a href="http://iisp.gatech.edu/"><strong> iisp.gatech.edu</strong></a> for events, research updates, news commentary and more.</p>
]]></body>
  <field_subtitle>
    <item>
      <value><![CDATA[]]></value>
    </item>
  </field_subtitle>
  <field_dateline>
    <item>
      <value>2017-08-23T00:00:00-04:00</value>
      <timezone><![CDATA[America/New_York]]></timezone>
    </item>
  </field_dateline>
  <field_summary_sentence>
    <item>
      <value><![CDATA[Interested in cybersecurity at Georgia Tech? Gain traction in this fast-growing field during Fall '17 ]]></value>
    </item>
  </field_summary_sentence>
  <field_summary>
    <item>
      <value><![CDATA[<p>Georgia Tech students from any major can grow their cybersecurity skills through a wide variety of campus activities this Fall.</p>
]]></value>
    </item>
  </field_summary>
  <field_media>
          <item>
        <nid>
          <node id="594890">
            <nid>594890</nid>
            <type>image</type>
            <title><![CDATA[Sync Up with Cybersecurity]]></title>
            <body><![CDATA[]]></body>
                          <field_image>
                <item>
                  <fid>226719</fid>
                  <filename><![CDATA[iStock-626008940.jpg]]></filename>
                  <filepath><![CDATA[/sites/default/files/images/iStock-626008940.jpg]]></filepath>
                  <file_full_path><![CDATA[http://www.tlwarc.hg.gatech.edu//sites/default/files/images/iStock-626008940.jpg]]></file_full_path>
                  <filemime>image/jpeg</filemime>
                  <image_740><![CDATA[]]></image_740>
                  <image_alt><![CDATA[]]></image_alt>
                </item>
              </field_image>
            
                      </node>
        </nid>
      </item>
      </field_media>
  <field_contact_email>
    <item>
      <email><![CDATA[]]></email>
    </item>
  </field_contact_email>
  <field_location>
    <item>
      <value><![CDATA[]]></value>
    </item>
  </field_location>
  <field_contact>
    <item>
      <value><![CDATA[]]></value>
    </item>
  </field_contact>
  <field_sidebar>
    <item>
      <value><![CDATA[]]></value>
    </item>
  </field_sidebar>
  <field_boilerplate>
    <item>
      <nid><![CDATA[]]></nid>
    </item>
  </field_boilerplate>
  <!--  TO DO: correct to not conflate categories and news room topics  -->
  <!--  Disquisition: it's funny how I write these TODOs and then never
         revisit them. It's as though the act of writing the thing down frees me
         from the responsibility to actually solve the problem. But what can I
         say? There are more problems than there's time to solve.  -->
  <links_related> </links_related>
  <files> </files>
  <og_groups>
          <item>47223</item>
          <item>430601</item>
          <item>50877</item>
          <item>50875</item>
          <item>50876</item>
      </og_groups>
  <og_groups_both>
          <item>
        <![CDATA[Institute and Campus]]>
      </item>
          <item>
        <![CDATA[Education]]>
      </item>
          <item>
        <![CDATA[Special Events and Guest Speakers]]>
      </item>
          <item>
        <![CDATA[Student Research]]>
      </item>
          <item>
        <![CDATA[Computer Science/Information Technology and Security]]>
      </item>
      </og_groups_both>
  <field_categories>
          <item>
        <tid>129</tid>
        <value><![CDATA[Institute and Campus]]></value>
      </item>
          <item>
        <tid>42911</tid>
        <value><![CDATA[Education]]></value>
      </item>
          <item>
        <tid>133</tid>
        <value><![CDATA[Special Events and Guest Speakers]]></value>
      </item>
          <item>
        <tid>8862</tid>
        <value><![CDATA[Student Research]]></value>
      </item>
          <item>
        <tid>153</tid>
        <value><![CDATA[Computer Science/Information Technology and Security]]></value>
      </item>
      </field_categories>
  <core_research_areas>
          <term tid="145171"><![CDATA[Cybersecurity]]></term>
      </core_research_areas>
  <field_news_room_topics>
      </field_news_room_topics>
  <links_related>
      </links_related>
  <files>
      </files>
  <og_groups>
          <item>47223</item>
          <item>430601</item>
          <item>50877</item>
          <item>50875</item>
          <item>50876</item>
      </og_groups>
  <og_groups_both>
          <item><![CDATA[College of Computing]]></item>
          <item><![CDATA[Institute for Information Security and Privacy]]></item>
          <item><![CDATA[School of Computational Science and Engineering]]></item>
          <item><![CDATA[School of Computer Science]]></item>
          <item><![CDATA[School of Interactive Computing]]></item>
      </og_groups_both>
  <field_keywords>
          <item>
        <tid>1404</tid>
        <value><![CDATA[Cybersecurity]]></value>
      </item>
      </field_keywords>
  <field_userdata>
      <![CDATA[]]>
  </field_userdata>
</node>
