{"612794":{"#nid":"612794","#data":{"type":"news","title":"Government and Corporate Responsibility the Focus of 2018 Cybersecurity Summit","body":[{"value":"\u003Cp\u003ECyberwarfare increasingly crosses international borders, affecting diplomacy, the global economy, and privacy of citizens. Governments and corporations must set new frameworks to defend against nation-state attacks.\u003C\/p\u003E\r\n\r\n\u003Cp\u003EThis issue was the focus of the \u003Ca href=\u0022https:\/\/cyber.gatech.edu\/\u0022\u003EInstitute for Information Security and Privacy\u0026rsquo;s\u003C\/a\u003E (IISP) \u003Ca href=\u0022https:\/\/cyber.gatech.edu\/georgia-tech-cybersecurity-summit?_ga=2.139833521.303891271.1539043905-252725775.1501600503\u0022\u003ECybersecurity Summit\u003C\/a\u003E, featuring the\u003Cstrong\u003E \u003C\/strong\u003E\u003Cstrong\u003ESam Nunn Bank of America Policy Forum\u003C\/strong\u003E, on Oct. 4. More than 270 cybersecurity academics and professionals attended the 16\u003Csup\u003Eth\u003C\/sup\u003E annual event. IISP Associate Director of Policy Peter Swire organized this year\u0026rsquo;s policy focus. The combined event was due in part to the generosity of sponsors \u0026mdash; including Bank of America for the Nunn Policy Forum, and Jones Day, Turner, and ADP for the Cybersecurity Summit.\u003C\/p\u003E\r\n\r\n\u003Cp\u003E\u003Cstrong\u003EAndy Ozment\u003C\/strong\u003E, a College of Computing alumnus and chief information security officer at Goldman Sachs and former secretary for cybersecurity at the U.S. Department of Homeland Security, delivered the keynote, \u003Cem\u003EIn the Crosshairs: When You\u0026#39;re the Target of Nation-State Cyberattacks\u003C\/em\u003E. His expertise in both government and corporate security set the tone for the day as he advocated for \u0026ldquo;reasonable cybersecurity.\u0026rdquo;\u003C\/p\u003E\r\n\r\n\u003Cp\u003E\u0026ldquo;If a sovereign adversary is willing to take a year of their time and thousands of their people, I can\u0026rsquo;t keep them from breaking in,\u0026rdquo; he said. \u0026ldquo;You need to think about resilience strategies.\u0026rdquo;\u003C\/p\u003E\r\n\r\n\u003Cp\u003EHe suggested both companies and governments need to track threat environments to prevent attacks. Although the government can\u0026rsquo;t help every company, it can concentrate resources on certain areas and set a precedent to deter attacks.\u003C\/p\u003E\r\n\r\n\u003Cp\u003E\u0026ldquo;The more expertise the government can share the better,\u0026rdquo; he said. \u0026ldquo;I don\u0026rsquo;t have a way of changing attackers\u0026rsquo; behavior, but the government does.\u0026rdquo;\u003C\/p\u003E\r\n\r\n\u003Cp\u003ESenator \u003Cstrong\u003ESam Nunn\u003C\/strong\u003E, a champion of cybersecurity policy and research, also made remarks. He is focused on issues of cyberwarfare, effective deterrence, cyber offense, attribution, the role of private sector in working with the government, and cyber understandings with other countries to restrain attacks.\u003C\/p\u003E\r\n\r\n\u003Cp\u003E\u0026quot;I\u0026#39;m very proud of the role Georgia Tech is playing in security,\u0026quot; he said.\u003C\/p\u003E\r\n\r\n\u003Cp\u003ENunn\u0026rsquo;s remarks led well into the first panel on how governments can better protect against cyberwarfare, \u003Cstrong\u003E\u003Cem\u003EThe Elephant in the Room: Cyberwarfare is War on the Economy\u003C\/em\u003E\u003C\/strong\u003E\u003Cstrong\u003E, moderated by \u003C\/strong\u003EAnnie Ant\u0026oacute;n, IISP\u0026rsquo;s associate director of privacy engineering and \u003Ca href=\u0022https:\/\/www.ic.gatech.edu\/\u0022\u003ESchool of Interactive Computing\u003C\/a\u003E professor. The panel included:\u003C\/p\u003E\r\n\r\n\u003Cul\u003E\r\n\t\u003Cli\u003E\u003Cstrong\u003EMich\u0026egrave;le Flournoy\u003C\/strong\u003E, co-founder and managing partner, WestExec Advisors; former undersecretary of defense policy, U.S. Department of Defense\u003Cbr \/\u003E\r\n\t\u0026nbsp;\u003C\/li\u003E\r\n\t\u003Cli\u003E\u003Cstrong\u003ERick Ledgett\u003C\/strong\u003E, advisor, fellow, and trustee; former deputy director, National Security Agency\u003Cbr \/\u003E\r\n\t\u0026nbsp;\u003C\/li\u003E\r\n\t\u003Cli\u003E\u0026nbsp;\u003Cstrong\u003EMichael Morell\u003C\/strong\u003E, advisor and author; chairman of the National Security Task Force, U.S. Chamber of Commerce; former acting director and deputy director, Central Intelligence Agency\u003Cbr \/\u003E\r\n\t\u0026nbsp;\u003C\/li\u003E\r\n\t\u003Cli\u003E\u003Cstrong\u003ENiloofar Razi Howe\u003C\/strong\u003E, technology investor, executive and entrepreneur; recently chief strategy officer and senior vice president of strategy and operations, RSA\u003C\/li\u003E\r\n\u003C\/ul\u003E\r\n\r\n\u003Cp\u003EThe discussion centered on deterrence and how governments could effectively deter nation state attacks without compromising security.\u003C\/p\u003E\r\n\r\n\u003Cp\u003E\u0026ldquo;We\u0026rsquo;re in a deep deterrence hole,\u0026rdquo; Flournoy said. \u0026ldquo;State sponsors of cyberattacks have come to believe they can attack our core democratic processes, and we will do nothing. The first order of business is to try to reestablish some measure of deterrence in cyberspace.\u0026rdquo;\u003C\/p\u003E\r\n\r\n\u003Cp\u003EJust before lunch IISP Co-Executive Directors, \u003Cstrong\u003EMichael Farrell\u003C\/strong\u003E, principal researcher at \u003Ca href=\u0022https:\/\/gtri.gatech.edu\/\u0022\u003EGTRI\u003C\/a\u003E, and \u003Cstrong\u003EWenke Lee\u003C\/strong\u003E, Imlay Chair and \u003Ca href=\u0022https:\/\/www.scs.gatech.edu\/\u0022\u003Eprofessor in the School of Computer Science\u003C\/a\u003E, presented an award to r00timentary for \u003Ca href=\u0022https:\/\/www.scs.gatech.edu\/news\/609900\/team-georgia-tech-students-win-world-hacking-competition\u0022\u003Etheir capture the flag (CTF) victory\u003C\/a\u003E at this year\u0026rsquo;s DEFCON conference.\u0026nbsp; r00timentary team members include Assistant Professor \u003Cstrong\u003ETaesoo Kim\u003C\/strong\u003E and his Ph.D. students \u003Cstrong\u003EInsu Yun\u003C\/strong\u003E, \u003Cstrong\u003EWen Xu\u003C\/strong\u003E, \u003Cstrong\u003ESoyeon Park\u003C\/strong\u003E, \u003Cstrong\u003EJinho Jung\u003C\/strong\u003E, master\u0026rsquo;s student \u003Cstrong\u003EPo-ning Tseng\u003C\/strong\u003E, and alumnus \u003Cstrong\u003EYeongjin Jang\u003C\/strong\u003E.\u003C\/p\u003E\r\n\r\n\u003Cp\u003EThe afternoon panel, \u003Cem\u003EWho\u0026rsquo;s Wearing Your Flak Jacket? Corporate Defense for Nation-State Attacks\u003C\/em\u003E, emphasized corporate responses to cyberattacks. Moderated by \u003Ca href=\u0022https:\/\/inta.gatech.edu\/\u0022\u003ESam Nunn School of International Affairs\u003C\/a\u003E distinguished professor and Admiral \u003Cstrong\u003ESandy Winnefeld\u003C\/strong\u003E, it included:\u003C\/p\u003E\r\n\r\n\u003Cp\u003E\u0026nbsp;\u003C\/p\u003E\r\n\r\n\u003Cul\u003E\r\n\t\u003Cli\u003E\u003Cstrong\u003EJim Harvey\u003C\/strong\u003E\u003Cstrong\u003E,\u003C\/strong\u003E\u003Cstrong\u003E\u0026nbsp;\u003C\/strong\u003Epartner, Alston \u0026amp; Bird LLC; co-Chair of\u0026nbsp;Cybersecurity\u0026nbsp;Preparedness and Response; leader, Data Privacy and Security\u003Cbr \/\u003E\r\n\t\u0026nbsp;\u003C\/li\u003E\r\n\t\u003Cli\u003E\u003Cstrong\u003EDavid Kris\u003C\/strong\u003E, founder, Culper Partners LLC; former assistant attorney general for national security, U.S. Department of Justice; former deputy general counsel, chief ethics and compliance officer, Time Warner Inc.\u003Cbr \/\u003E\r\n\t\u0026nbsp;\u003C\/li\u003E\r\n\t\u003Cli\u003E\u003Cstrong\u003ETony Scott\u003C\/strong\u003E, former chief information officer, U.S. Government, VMware, Walt Disney Company; former chief technology officer, General Motors Information Systems \u0026amp; Services\u003C\/li\u003E\r\n\u003C\/ul\u003E\r\n\r\n\u003Cp\u003EThe panel broke down how to find vulnerabilities in a company and why it\u0026rsquo;s so important for the government and corporations to work together.\u003C\/p\u003E\r\n\r\n\u003Cp\u003E\u0026quot;The relationship between government and private sector regarding cybersecurity ebbs and flows,\u0026rdquo; Kris said. \u0026ldquo;Private companies generally don\u0026rsquo;t want the Feds in their network, but increasingly see the benefits from engaging DHS and, when needed, the FBI. From the government side, they\u0026#39;re puzzled that some of these companies tell the public about an advanced persistent threat first.\u0026quot;\u0026nbsp; Enhanced information and threat sharing was highlighted as critically important for defending against nation-state attacks.\u003C\/p\u003E\r\n\r\n\u003Cp\u003EThe summit also included a \u0026ldquo;Two-Minute Madness\u0026rdquo; session, when students took the stage for short presentations on their cybersecurity research. This was followed by a poster session showcasing student research, where event participants engaged students in Q\u0026amp;A.\u0026nbsp; All of this was a part of IISP\u0026rsquo;s annual \u003Ca href=\u0022http:\/\/cyber.gatech.edu\/cyber-demo-day\u0022\u003EDemo Day\u003C\/a\u003E festivities, in which students compete for cash prizes and potential follow-up support to take their research to the next level. The top three teams walked away with a combined total of $10,000 in prize money, after a popular vote from all participants determined the first winner and an expert panel of local chief information security officers (CISOs) selected the second and third-place winners. A bonus award was given to a team of student researchers, giving them automatic entry into Tech\u0026rsquo;s exciting \u003Ca href=\u0022https:\/\/create-x.gatech.edu\/\u0022\u003ECreate-X\u003C\/a\u003E program, an initiative to instill entrepreneurial confidence in students and empower them to launch real startups.\u003C\/p\u003E\r\n\r\n\u003Cp\u003EThe event ended with breakout sessions on FinTech, smart cities, and the role artificial intelligence (AI) and machine learning (ML) in cybersecurity.\u003C\/p\u003E\r\n\r\n\u003Cp\u003E\u0026nbsp;\u003C\/p\u003E\r\n\r\n\u003Cul\u003E\r\n\t\u003Cli\u003E\u003Cem\u003EFinTech: Cybersecurity Risk in Financial Services and FinTech\u003C\/em\u003E\u0026nbsp;explored cybersecurity and regulatory considerations for FinTech companies, financial exchanges, payment processors, banks, and other financial services companies.\r\n\r\n\t\u003Cul\u003E\r\n\t\t\u003Cli\u003EModerated by Georgia Tech\u0026rsquo;s\u003Cstrong\u003E Sudheer Chava\u003C\/strong\u003E, with cybersecurity executives from Jones Day, RELX Group, Intercontinental Exchange and Bank of America\u003C\/li\u003E\r\n\t\u003C\/ul\u003E\r\n\t\u003C\/li\u003E\r\n\u003C\/ul\u003E\r\n\r\n\u003Cp\u003E\u0026nbsp;\u003C\/p\u003E\r\n\r\n\u003Cul\u003E\r\n\t\u003Cli\u003E\u003Cem\u003EMachine Learning: The Essentials of Cybersecurity for AI and Machine Learning\u003C\/em\u003E\u0026nbsp;explored the new considerations for CISOs, network administrators, and frontline responders associated with ML, and recent advances, including research underway at Georgia Tech.\r\n\r\n\t\u003Cul\u003E\r\n\t\t\u003Cli\u003EModerated by \u003Cstrong\u003EPatrick Gaul \u003C\/strong\u003Efrom National Technology Security Coalition and Wenke Lee of Georgia Tech, and executives from Turner Broadcasting and JASK\u003C\/li\u003E\r\n\t\u003C\/ul\u003E\r\n\t\u003C\/li\u003E\r\n\u003C\/ul\u003E\r\n\r\n\u003Cp\u003E\u0026nbsp;\u003C\/p\u003E\r\n\r\n\u003Cul\u003E\r\n\t\u003Cli\u003E\u003Cem\u003ESmart Cities: The Security of Smart Cities under Nation-State Threats\u003C\/em\u003E\u003Cem\u003E\u0026nbsp;\u003C\/em\u003Efocused on the critical risk factors that need to be assessed as smart cities and vendors prepare for the evolving risks.\u0026nbsp;\r\n\r\n\t\u003Cul\u003E\r\n\t\t\u003Cli\u003EModerated by Georgia Tech\u0026rsquo;s\u003Cstrong\u003E Margaret Loper\u003C\/strong\u003E, with executives from Honeywell, IPaT at Georgia Tech, Bastille Networks. and Prototype Prime\u003C\/li\u003E\r\n\t\u003C\/ul\u003E\r\n\t\u003C\/li\u003E\r\n\u003C\/ul\u003E\r\n\r\n\u003Cp\u003E\u0026nbsp;\u003C\/p\u003E\r\n\r\n\u003Cp\u003E\u0026nbsp;\u003C\/p\u003E\r\n","summary":null,"format":"limited_html"}],"field_subtitle":"","field_summary":"","field_summary_sentence":[{"value":"IISP hosts 16th annual Cybersecurity Summit."}],"uid":"34541","created_gmt":"2018-10-15 21:06:02","changed_gmt":"2018-10-15 21:40:23","author":"Tess Malone","boilerplate_text":"","field_publication":"","field_article_url":"","dateline":{"date":"2018-10-15T00:00:00-04:00","iso_date":"2018-10-15T00:00:00-04:00","tz":"America\/New_York"},"extras":[],"hg_media":{"612798":{"id":"612798","type":"image","title":"Def Con at summit","body":null,"created":"1539639596","gmt_created":"2018-10-15 21:39:56","changed":"1539639596","gmt_changed":"2018-10-15 21:39:56","alt":"winning team","file":{"fid":"233288","name":"Unknown-3.jpeg","image_path":"\/sites\/default\/files\/images\/Unknown-3_2.jpeg","image_full_path":"http:\/\/www.tlwarc.hg.gatech.edu\/\/sites\/default\/files\/images\/Unknown-3_2.jpeg","mime":"image\/jpeg","size":62739,"path_740":"http:\/\/www.tlwarc.hg.gatech.edu\/sites\/default\/files\/styles\/740xx_scale\/public\/images\/Unknown-3_2.jpeg?itok=eJFoZgK4"}}},"media_ids":["612798"],"groups":[{"id":"47223","name":"College of Computing"},{"id":"50875","name":"School of Computer Science"},{"id":"50876","name":"School of Interactive Computing"}],"categories":[],"keywords":[],"core_research_areas":[{"id":"145171","name":"Cybersecurity"}],"news_room_topics":[],"event_categories":[],"invited_audience":[],"affiliations":[],"classification":[],"areas_of_expertise":[],"news_and_recent_appearances":[],"phone":[],"contact":[{"value":"\u003Cp\u003ETess Malone, Communications Officer\u003C\/p\u003E\r\n\r\n\u003Cp\u003E\u003Ca href=\u0022mailto:tess.malone@cc.gatech.edu\u0022\u003Etess.malone@cc.gatech.edu\u003C\/a\u003E\u003C\/p\u003E\r\n","format":"limited_html"}],"email":["tess.malone@cc.gatech.edu"],"slides":[],"orientation":[],"userdata":""}}}