{"651744":{"#nid":"651744","#data":{"type":"event","title":"Demystifying Ransomware and Defending Against Future Attacks","body":[{"value":"\u003Cdiv\u003E\r\n\u003Cp\u003ERansomware is an ever-evolving form of malware designed to encrypt files on a device. Malicious actors then demand payment in exchange for decryption. As attacks continue to rise, the government is creating a counter-ransomware strategy. What impact will these policies have on the relationship between the public and private sectors? The expert panelists from academia and research will discuss during a free webinar.\u0026nbsp;\u003C\/p\u003E\r\n\u003C\/div\u003E\r\n\r\n\u003Cdiv\u003E\r\n\u003Cp\u003EWe\u0026rsquo;d like to invite you to tune in on Oct. 25 at 11:00 a.m. (ET) for a panel discussion with Georgia Tech experts and have your questions answered live. \u003Ca href=\u0022https:\/\/bit.ly\/3lJA2BS\u0022\u003E\u003Cstrong\u003ERegister today!\u003C\/strong\u003E\u003C\/a\u003E\u003C\/p\u003E\r\n\r\n\u003Cdiv\u003E\r\n\u003Cp\u003E\u003Cstrong\u003EModerator\u003C\/strong\u003E\u0026nbsp;\u003C\/p\u003E\r\n\u003C\/div\u003E\r\n\r\n\u003Cdiv\u003E\r\n\u003Cul\u003E\r\n\t\u003Cli\u003E\u003Cstrong\u003EBrenden Kuerbis\u003C\/strong\u003E, Research Scientist II and Instructor, Online Master of Science in Cybersecurity, School of Public Policy, Georgia Tech\u003C\/li\u003E\r\n\u003C\/ul\u003E\r\n\u003C\/div\u003E\r\n\r\n\u003Cdiv\u003E\r\n\u003Cp\u003E\u003Cstrong\u003EPanelists\u003C\/strong\u003E\u0026nbsp;\u003C\/p\u003E\r\n\u003C\/div\u003E\r\n\r\n\u003Cdiv\u003E\r\n\u003Cul\u003E\r\n\t\u003Cli\u003E\u003Cstrong\u003EJoseph Jaeger, \u003C\/strong\u003EAssistant Professor, School of Cybersecurity and Privacy, Georgia Tech\u003C\/li\u003E\r\n\t\u003Cli\u003E\u003Cstrong\u003ENadiya Kostyuk,\u003C\/strong\u003E Assistant Professor, School of Public Policy, Georgia Tech\u003C\/li\u003E\r\n\t\u003Cli\u003E\u003Cstrong\u003ETrevor M. Lewis\u003C\/strong\u003E, Senior Research Scientist \/ Offensive Cybersecurity Engineer, Cyber Network Operations (CNO), Command and Control Mission Assurance (C2MA) \u0026ndash; CIPHER Lab, Georgia Tech Research Institute\u003C\/li\u003E\r\n\t\u003Cli\u003E\u003Cstrong\u003EMilton L Mueller\u003C\/strong\u003E, Program Director, Master of Science in Cybersecurity Policy, School of Public Policy, Georgia Tech\u0026nbsp;\u003C\/li\u003E\r\n\u003C\/ul\u003E\r\n\u003C\/div\u003E\r\n\u003C\/div\u003E\r\n","summary":null,"format":"limited_html"}],"field_subtitle":"","field_summary":"","field_summary_sentence":[{"value":"Join the live session at 11:00 a.m. (ET) on Monday, Oct. 25 to hear from a panel of experts and get your questions answered."}],"uid":"35141","created_gmt":"2021-10-15 18:29:57","changed_gmt":"2021-10-20 17:45:23","author":"Kelly Pierce","boilerplate_text":"","field_publication":"","field_article_url":"","field_event_time":{"event_time_start":"2021-10-25T12:00:00-04:00","event_time_end":"2021-10-25T12:45:00-04:00","event_time_end_last":"2021-10-25T12:45:00-04:00","gmt_time_start":"2021-10-25 16:00:00","gmt_time_end":"2021-10-25 16:45:00","gmt_time_end_last":"2021-10-25 16:45:00","rrule":null,"timezone":"America\/New_York"},"extras":[],"hg_media":{"651743":{"id":"651743","type":"image","title":"Demystifying Ransomware and Defending Against Future Attacks Graphic","body":null,"created":"1634322031","gmt_created":"2021-10-15 18:20:31","changed":"1634576180","gmt_changed":"2021-10-18 16:56:20","alt":"Join the Panel of Experts at Demystifying Ransomware and Defending Against Future Attacks: Live on Oct. 25 at 11:00 a.m. ET.","file":{"fid":"247272","name":"CST-000083-Graphics-for-Cybersecurity-Webinar-V1.jpg","image_path":"\/sites\/default\/files\/images\/CST-000083-Graphics-for-Cybersecurity-Webinar-V1.jpg","image_full_path":"http:\/\/www.tlwarc.hg.gatech.edu\/\/sites\/default\/files\/images\/CST-000083-Graphics-for-Cybersecurity-Webinar-V1.jpg","mime":"image\/jpeg","size":239078,"path_740":"http:\/\/www.tlwarc.hg.gatech.edu\/sites\/default\/files\/styles\/740xx_scale\/public\/images\/CST-000083-Graphics-for-Cybersecurity-Webinar-V1.jpg?itok=I8BHMZEh"}}},"media_ids":["651743"],"groups":[{"id":"1258","name":"Professional Education"},{"id":"1269","name":"Student Life"}],"categories":[],"keywords":[{"id":"344","name":"cyber"},{"id":"1404","name":"Cybersecurity"},{"id":"170302","name":"cybersecurity lecture"},{"id":"183265","name":"cybersecurity systems"}],"core_research_areas":[],"news_room_topics":[],"event_categories":[{"id":"10377","name":"Career\/Professional development"},{"id":"1788","name":"Other\/Miscellaneous"},{"id":"1795","name":"Seminar\/Lecture\/Colloquium"}],"invited_audience":[{"id":"78761","name":"Faculty\/Staff"},{"id":"177814","name":"Postdoc"},{"id":"78771","name":"Public"},{"id":"174045","name":"Graduate students"},{"id":"78751","name":"Undergraduate students"}],"affiliations":[],"classification":[],"areas_of_expertise":[],"news_and_recent_appearances":[],"phone":[],"contact":[],"email":[],"slides":[],"orientation":[],"userdata":""}}}