Vision Statement

GTISC Past Events

Georgia Tech Cyber Security Summit

Brenden Hannigan

November 14, 2012
9:30 am – 12:15 pm
Continental breakfast starting at 8:30 am
GTRI Conference Center,
250 14th Street NW, Atlanta, GA 30318

Read Cyber Threats Report 2013
Download Keynote Presentation Slides
View the webcast

Keynote Address by Brendan Hannigan,
General Manager, IBM Security Systems

Panel Discussion on the Evolving Nature of Cyber Threats
Moderated by Val Rahmani, CEO of Damballa

Hosted by:
Georgia Tech Information Security Center and Georgia Tech Research Institute

GTISC Distinguished Lecture

Henning Schulzrinne

"The Internet is Insecure and Will Likely Remain So - What Now?"
Henning Schulzrinne
Chief Technology Officer,
US Federal Communications Commission

Thursday, November 13, 2012
3:00pm - 4:00pm
Klaus Advanced Computing Building; Room 2447
266 Ferst Drive, Atlanta, GA 30332

ABSTRACT: A common claim is that the Internet should be redesigned to make it "more secure". However, I believe that attempts to fix security problems at the network level are likely misguided and futile. We need to take into account the motivations of real-world attackers and capabilities of non-technical users. In the talk, I will propose some of the principles and approaches that combine new technical capabilities, public policy and incentives to reduce the overall impact of security vulnerabilities. I will also describe some of the FCC public policy approaches in the area of botnet mitigation, routing security, wireless infrastructure security and DNSsec deployment, as well as the threats posed by caller ID spoofing and the opportunity offered by the redesign of the phone system. Public safety systems such as the next-generation 9-1-1 system illustrate new security threats, such as location spoofing and human resource exhaustion.

BIO: Henning Schulzrinne received degrees in economics and electrical engineering from the Darmstadt University of Technology, Germany, the University of Cincinnati, Ohio and the University of Massachusetts in Amherst, Massachusetts. He was a member of technical staff at AT&T Bell Laboratories, Murray Hill and an associate department head at GMD-Fokus (Berlin), before joining the Computer Science and Electrical Engineering departments at Columbia University, New York. He is currently serving as the Chief Technology Officer of the Federal Communications Commission (FCC).

GTISC Faculty/Student Open House

Monday, August 27, 2012
12:00 pm - 2:00 pm
Klaus Advanced Computing Building
GTISC Common Area
3rd Floor

GTISC/ARC Distinguished LectureAdi Shamir

"How Cryptosystems Are Really Broken"
Professor Adi Shamir Paul and Marlene Borman Professor of Applied Mathematics, Weizmann Institute of Science

Thursday, March 8, 2012
3:00 pm
Klaus Advanced Computing Building; Room 1116 E&W
266 Ferst Drive, Atlanta, GA 30332
Reception immediately following

Hosted by: Georgia Tech Information Security Center and Algorithms and Randomness Center

ABSTRACT: Most of the cryptosystems we currently use are highly secure, and cannot be broken by mathematical cryptanalysis. However, over the last fifteen years researchers have developed many types of physical attacks on their implementations which can easily bypass their mathematical security. In this talk I will survey some of the latest attacks, and show how difficult it is to build a truly secure communication system. The talk will not require any prior knowledge in cryptanalysis.

BIO: Adi Shamir is an Israeli cryptographer who has made numerous groundbreaking contributions to the theory and practice of computer science. The Paul and Marlene Borman Professor of Applied Mathematics at the Weizmann Institute of Science, Shamir is the 2002 winner of the ACM Turing Award for co-inventing (with Rivest and Adelman) the RSA cryptosystem, among countless other contributions to cryptography and cryptanalysis (code-breaking). He is well known for proving the equivalence of IP and PSPACE, and for his work on devices for factoring large integers. Shamir is also the recipient of (among others) the Erdos Prize and the Paris Kanellakis Theory and Practice Award.

2011 Georgia Tech Cyber Security Summit

"Evolving Nature of Cyber Security Threats"
Admiral William J. Fallon, United State Navy (Retired)

Tuesday, October 11, 2011
9:30am – 12:00pm
Georgia Tech College of Management
LeCraw Auditorium
800 West Peachtree Street NW
Atlanta, Georgia 30308
Visit www.gtcybersecuritysummit.com
[ view the recorded webcast ]

Download the Emerging Cyber Threats Report 2012

Keynote Speaker: Admiral William J. Fallon, U.S. Navy (ret.)
A retired four-star Admiral with a distinguished 40-year career of military and strategic leadership, Admiral Fallon led U.S. and Allied forces in eight separate commands and played a leadership role in military and diplomatic matters at the highest levels of U.S. government. Former head of both U.S. Central Command and U.S. Pacific Command, he has worldwide experience in international, political and commercial affairs.

Owner of his own consulting and advisory business, William J. Fallon & Associates, LLC, he is a partner in Tilwell Petroleum, LLC. Admiral Fallon recently completed a year at the Massachusetts Institute of Technology, Center for International Studies as a Robert E. Wilhelm Fellow and chairs the Center's Advisory Board. He is a distinguished Fellow at the Center for Naval Analyses and is a member of the U.S. Secretary of Defense Science Board. Admiral Fallon holds an A.B. and an honorary Ph.D. from Villanova University as well as an M.A. in International Studies from Old Dominion University. He is a graduate of the Naval War College and the National War College.

Georgia Tech Information Security Center Distinguished Lecture

John L. Mandeferdelli

"The Evolution of Security of Cloud Computing"
John L. Manferdelli, Senion Principal Engineer, Intel Corporation

Monday, October 10, 2011
4:00pm – 5:00pm
Klaus Advanced Computing Building
Room 1116

ABSTRACT: Amazon is reported to have said that "Cloud Computing is another name for the Internet." Many companies have policy initiatives encouraging or even mandating the use of "cloud" computing despite, or perhaps because of, the current confusing marketing miasma about clouds. While IT organizations hope for significant cost savings on existing applications from clouds, cloud computing has distinct features and technology that offer new capabilities like the ability to scale quickly without large capital expenditures and efficient sharing and curation of very large data sets.

Cloud computing in all its incarnations (Infrastructure as a Service, Software as a Service, Platform as a Service) raises a number of security questions that current providers have not addressed (or remain ominously silent about): increased susceptibility to insider attacks due to concentration of valuable data, "fate-sharing" and other vulnerabilities due to multi-tenancy, policy issues arising from multi-jurisdictional siting, and security vulnerabilities and benefits arising from scale operations.

Despite these potential issues, cloud computing can be safe with judicial and transparent application of some simple security principles. We discuss cloud infrastructure, economics, operations and security infrastructure and the special benefits that clouds can provide.

BIO: John Manferdelli is a Senior Principal Engineer at Intel Corporation and co-Principal Investigator (with David Wagner) of the Intel Science and Technology Center for Secure Computing at the University of California at Berkeley. Prior to Intel John was a Distinguished Engineer at Microsoft and an affiliate faculty member in Computer Science at University of Washington.

John got a Ph.D. at the University of California at Berkeley in the Math Department. John also worked at TRW, Lawrence Livermore National Lab, Bell Labs Research, Natural Language Incorporated (a company he started with his friend, Jerrold Ginsparg) and Microsoft.

At Berkeley and Microsoft, he and his group did research and development on operating systems, quantum computing, computer security and cryptography notably the Trusted Computing Initiative. John is a member of DARPA's Information Science and Technology group. His personal research of interest: Cryptography, Number Theory, Group Theory, Combinatorics, Operating Systems, Algebra, Quantum Computing, Computer Security and Computer Architecture.

GTISC Faculty/Student Open House 2011

Monday, August 30, 2011
12:15pm – 2:00pm
Klaus Advanced Computing Building
Room 1116 East and West

College of Computing Research Day

Congratulations to Best Poster, Demo and Talk Winners
Congratulations to the winners of the Best Demo, Poster, and Talk awards, as voted on by the CoC community (faculty, students, and the visiting students).

Best Demo ($200)
Is Browsing Internet on Your Mobile Phone Secure?
Chaitrali Amrutkar
(Advisor: Patrick Traynor)

Best Poster ($200)
(sp)iPhone: Decoding Vibrations From Nearby Keyboards Using Mobile Phone Accelerometers
Arunabh Verma
(Advisor: Patrick Traynor)

Best Talk (Tie! $200 to both winners!)
Partial Persistent Sequences and Their Applications to Unstructured Text Documents
Qinyi Wu
(Advisor: Calton Pu)

Spectral algorithms for graph partitioning
Anand Louis
(Advisor: Santosh Vempala)

Health Systems Seminar Series
Challenges in Software Engineering for Assisted Living

Carl A. Gunter, Ph.D.
Professor of Computer Science & Director of Illinois Security Lab - Center for Health Information Privacy and Security; & HHS Strategic Healthcare IT Advanced Research Projects on Security (SHARPS) University of Illinois

Wednesday, March 9, 2011 • 11:00am - 12:00pm
Health Systems Institute, Suite 207, 2nd Floor, 828 W. Peachtree Street, N.W. Atlanta GA 30332-0477

Abstract
Assisted Living offers the prospect of better care at lower costs by exploiting technology advances that enable low-cost medical devices that can report their results from remote locations, such as homes or assisted living residences. However, this promise also faces a collection of sobering challenges for the software engineering of such systems. In particular, there is a need for them to be highly reliable, very user-friendly, and respect the safety and privacy constraints befitting their application. Moreover, this needs to be accomplished in a business and regulatory environment oriented more toward hospital systems; such systems often fail to meet the requirements for interoperability and extensibility needed by assisted living systems. This talk overviews some of these challenges and experience with working on them, touching on ideas for the development of an "Assisted Living Service Provider (ALSP)" akin to the current services that monitor homes for fires and security violations. Key issues include how to achieve reliability for extensible medical systems and how to protect security and privacy while maintaining ease of use in remote monitoring systems.

Speaker's Bio
Carl A. Gunter is a professor in the Computer Science Department of the University of Illinois, director of Illinois Security Lab, the Center for Health Information Privacy and Security, and the HHS Strategic Healthcare IT Advanced Research Projects on Security (SHARPS). He has made research contributions in the semantics of programming languages, formal analysis of networks and security, and privacy. His recent work concerns security and privacy issues for the power grid and healthcare information technology. He is the author of more than 100 scientific research publications and patents and a textbook on semantics of programming languages published by MIT Press. He is a founder of Probaris Technologies, a company that provides identity management technologies, and has served as aconsultant to research labs and companies and as an expert witness on legal cases concerning fraud, contract, copyright, and patent infringement.

Colonel Leslie Callahan Memorial Endowment Lunch and Lecture
"Cyberattack as An Instrument of National Policy"

Dr. Herbert Lin
Chief Scientist, Computer Science and Telecommunications Board
National Research Council, National Academies

Tuesday, February 15, 2011 • 12 pm
Bill Moore Student Success Center, Press Room A

GTISC Faculty/Student Open House 2011

Wednesday, January 19, 2011 • 12-2pm
GTISC Common Area - Third Floor

GTISC Distinguised Lecture: Yousef A. Khalidi

Distinguished Engineer, Windows Azure, Microsoft
Wednesday, October 6, 2010 • 4:00 p.m. – 5:30 p.m.
Klaus Building, Room 1116
Title: Cloud Computing – Challenges and Opportunities

2010 GTISC Security Summit
"Evolving Nature of Cyber Security Threats"

October 7, 2010
Ferst Center for the Arts

Download the 2011 Emerging Cyber Threats Report

View Archived Webcast

updated Photo Gallery

The 2010 GTISC Security Summit will be held on Thursday, October 7 (the summit is coordinated with FutureMedia Fest (FM) and will be part of the morning session of FM on Oct 7). This year, we have brought back Georgia Tech graduates and GTISC friends who have distinguished themselves in the cyber security field for the Summit. The theme of the summit is going to the "evolving nature of cyber security threats". The line up is as follows:

Keynote: Kenneth Silva, SVP and CTO, VeriSign

Panel Moderator: Rich DeMillo, Georgia Tech PhD, Distinguished Professor of Computing, College of Computer Science; Professor of Management; and former Dean, College of Computing, Georgia Tech

Panelists:

Demos
[download demo descriptions]

Ether: Malware Analysis via Hardware Virtualization Extensions
Paul Royal

Circumventing Censorship with Collage
Sam Burnett

Hyonoon (Joon) Kim

PinDr0p: Using Single-Ended Audio Features to Determine Call Provenance
Vijay A. Balasubramaniyan, Kelsey Francis

A Crow or a Blackbird?: Using True Social Network and Tweeting Behavior to Detect Malicious Entities in Twitter
Vijay A. Balasubramaniyan, Manojh Ananthakrishnan

Study of Trend-Stuffing on Twitter through Text Classification
Danesh Irani

Italo DaCosta

Spy vs Spy: Location Oblivious Rendezvous at Starbucks
(Efficient privacy preserving context sensitive applications on mobile devices)

Chaitrali Amrutkar

PRIVACYGRID: Supporting Anonymous Location Queries in Mobile Environments
Balaji Palanisamy

 

MedVault
Apurva Mohan

Manos Antonakakis

BotMiner: Clustering Analysis of Network Traffic for Protocol- and Structure-Independent Botnet Detection
Junjie Zhang

BLADE: An Attack-Agnostic Approach for Preventing Drive-By Malware Infections
To appear in Proceedings of the 17th ACM Conference on Computer and Communications Security (CCS 2010), Chicago, IL, October 2010.

Martin Carbone, Long Lu

1: TIme-Based DynamiC Keying and En-Route Filtering (TICK) for Sensor-Based Cyber Physical Systems (CPS)

2: The Design of NetSecLab: A Small Competition-Based Network   Security Lab

Arif Selcuk Uluagac

eDemocs: Electronic Distributed Election Monitoring over Cellular Systems
Emily Ivey and Jillian Pilch

 

GTISC Demo Day

March 29, 2010

3:00pm - 5:00pm – Klaus Building - GTISC Common Area

Demo Day Winners Announced

The visitors were impressed with the great work that is going on here at GTISC and the effort the students put into these demos is key in showcasing our research. And with great pleasure GTISC announces the winners of the GTISC Demo Day Competition:
 
“PinDr0p” – Vijay A. Balasubramaniyan and Aamir Poonawalla

“Leveraging Forensic Tools for VM Introspection” –  Bryan D. Payne and Brendan Dolan-Gavitt

Demo Day Event Photo Gallery

Demos

Ether: Malware Analysis via Hardware Virtualization Extensions
Paul Royal

Anax: A Monitoring Infrastructure for Improving DNS Security
Manos Antonakakis, David Dagon, Xiapu Luo, Roberto Perdisci and Wenke Lee

Notos: Building a Dynamic Reputation System for DNS,
Manos Antonakakis, Roberto Perdisci, David Dagon, Wenke Lee and Nick Feamster

PRIVACYGRID: Supporting Anonymous Location Queries in Mobile Environments
Balaji Palanisamy, Bhuvan Bamba

Spy vs. Spy: Location-Oblivious Rendezvous at Starbucks
(Oblivious Context Sensitive Communications)

Chaitrali Amrutkar, Rishikesh Naik, Patrick Traynor, Italo Dacosta

Cellular Device Remote Repair
Ferdinand Schober, Yacin Nadji

Circumventing Policy-Based Listening Restrictions via Smart-Phone Accelerometers
Frank Park

Mix-In-Place Anonymity Network
Nilesh Nipane

Leveraging Forensic Tools for Virtual Machine Introspection
Bryan Payne, Brendan Dolan-Gavitt

 

BotMiner: Clustering Analysis of Network Traffic for Protocol and Structure-Independent Botnet Detection
Junjie Zhang

Traffic Forwarding in the GT Apiary
Peter Huang

Securing Enterprise Networks Using Traffic Tagging
Anirudh Ramachandran, Yogesh Mundada, Mukarram Bin Tariq, Nick Feamster

OpenFlow Campus Trials
Hyojoon Kim, Ankur Nayak

PinDr0p: Using Single-Ended Audio Features to Determine Call Provenance
Vijay A. Balasubramaniyan, Aamir Poonawalla

CacoPhony: Structural and Behavioral Analysis of Twitter to Differentiate Between Legitimate and Malicious Users
Viswanathan Mahalingam, Arjun Maheswaran, Vijay A. Balasubramaniyan

Study of Static Classification of Social Spam Profiles in MySpace
Danesh Irani

MedVault
Daisuke Mashima

Patient Policy Manager
Ketan Kalgaonkar

eDemocracy:  Secure Computer Systems that Enable Democratic Processes
Emily Ivey, Duncan Osborn, Chris Julian, Michael T. Hunter

 

ISSA Conference

November 11, 2009

More information about the annual ISSA Conference

Social Networking: Protecting your Online Identity

October 29, 2009

8:30am - 11:00am – Klaus Atrium
More information about the panel discussion
View streaming video
follow us on twitter Follow us on Twitter

Information Systems Security Association (ISSA-CISO) Meeting

March 5 & 6, 2009

Klaus Atrium & 1116 East & West
The invitation-only March 2009 ISSA-CISO Executive Forum will be held at GTISC. The Information Systems Security Association’s (ISSA) series of executive forums deliver market knowledge from leading information security executives in an open dialogue format. The CISO Executive Forums attract information security executives from across industry sectors providing them with the opportunity to listen, interact and solve critical issues. [website]

GTISC Mini Career Fair

February 6, 2009

Klaus Atrium; 9:00 am - Noon
Participating companies: SunTrust, Lockheed, SecureWorks, GasSouth, Equifax, Red Prarie, Purewire, Air Defense/Motorola, McAfee, Endgame Systems
Photo Gallery

Office Practices

January 27, 2009

Klaus (room location TBD); 5:00 pm - 7:00 pm
Speakers:
Mary Jane Panzeri, SunTrust; Meredith Hodges, GasSouth; Em Mosier, Georgia Power Co.

GTISC Faculty/Student Open House

Tuesday, January 13, 2009

GTISC Common Area, Klaus 3rd Floor; Noon - 1:30 pm

Capture the Flag Competition

December 5, 2008

Klaus Lab 1201; 2:00 pm - 8:00 pm
Photo Gallery

GTISC Alumni Association

December 5, 2008

Klaus Atrium; 4:00 pm - 6:00 pm

The 2008 GTISC Security Summit - Emerging CyberSecurity Threats

Wednesday, October 15, 2008

The Ferst Center for the Arts; 10:00am

Summit co-sponsored by the Center for International Strategy, Technology and Policy

Keynote Address: Lt. General Robert J. Elder, Jr. [ Presentation ] Elder 2008 presentation
Commander Eighth Air Force, Barksdale Air Force Base
“Global Operations and Mission Assurance in a Contested Cyber Environment”

ARCHIVED WEBCAST

2009 Cyber Threats Report 2009 Cyber Threats Report

Photo Gallery

Panel Presentations

Morris Moore - presentation Elder 2008 presentation
Jon Ramsey - presentation Elder 2008 presentation, audio file1, audio file2

GTISC Industry Leader
Richard M. George, Information Assurance Technical Director, National Security Agency

Tuesday, October 21, 2008

KACB - 1116 East • 4:30 pm - 6:30 pm

College of Computing Distinguished Lecture
Susan Herbst - Media and American Democracy

Wednesday, September 24, 2008

Information about Lukasik [Abstract and Ms. Herbst's bio]
Streaming Video
Technology Square Research Building (TSRB) Auditorium • 3:00 pm - 4:00 pm
Hosted by the Georgia Tech Information Security Center

Office Practices Workshop

Tuesday, September 23, 2008

MiRC - Room 102 A&B • 4:30 pm - 6:00 pm

cistp logo

GTISC - CISTP Distinguished Lecture
Dr. Steve Lukasik - Rainbow's Beginning: The Difficult Birth of Networking

Wednesday, September 17, 2008

Information about Lukasik [Abstract and Dr. Lukasik's bio]
Charles A. Smithgall Student Services Building
353 Ferst Drive, Auditorium – Room 117 • 12:00 pm - 1:00 pm

GTISC/ACM Distinguished Lecture
Dr. Barbara Simons - Computerize Voting: Will you be able to vote? Will your vote be properly counted?

Wednesday, September 10, 2008

Information about Lukasik [Abstract and Dr. Simons' bio]
Streaming Video
Technology Square Research Building (TSRB) Auditorium • 3:00 pm - 4:00 pm

GTISC Industry Leaders Series
Patrick Taylor, CEO, Oversight Systems

Tuesday, September 9, 2008

KACB - Room 1116 East • 4:30 pm - 6:30 pm

GTISC Faculty/Student Open House

Friday, September 5, 2008

GTISC Common Area • 11:30 am - 1:30 pm

Susan Herbst Lecture Poster

College of Computing Distinguished Lecture
Susan Herbst
Media and American Democracy

Wednesday, September 24, 2008

Information about Lukasik [Abstract and Ms. Herbst's bio]
Update: Streaming Video Streaming Video
Technology Square Research Building (TSRB) Auditorium • 3:00 pm - 4:00 pm
Hosted by the Georgia Tech Information Security Center

Office Practices Workshop

Tuesday, September 23, 2008

MiRC - Room 102 A&B • 4:30 pm - 6:00 pm

cistp logo

GTISC - CISTP Distinguished Lecture
Dr. Steve Lukasik
Rainbow's Beginning: The Difficult Birth of Networking

Wednesday, September 17, 2008

Information about Lukasik [Abstract and Dr. Lukasik's bio]
Charles A. Smithgall Student Services Building
353 Ferst Drive, Auditorium – Room 117 • 12:00 pm - 1:00 pm

GTISC/ACM Lecture poster - Barbara Simons

GTISC/ACM Distinguished Lecture
Dr. Barbara Simons
Computerize Voting: Will you be able to vote? Will your vote be properly counted?

Wednesday, September 10, 2008

Information about Lukasik [Abstract and Dr. Simons' bio]
Update: Streaming Video Streaming Video
Technology Square Research Building (TSRB) Auditorium • 3:00 pm - 4:00 pm

GTISC Industry Leaders Series
Patrick Taylor, CEO, Oversight Systems

Tuesday, September 9, 2008

KACB - Room 1116 East • 4:30 pm - 6:30 pm

GTISC Faculty/Student Open House

Friday, September 5, 2008

GTISC Common Area • 11:30 am - 1:30 pm

 

Google Tech Talks: Network-Based Spam Filtering by GTISC Faculty Nick Feamster

(with Anirudh Ramachandran, Nadeem Syed, Alex Gray, Sven Krasser, Santosh Vempala)

GTISC Demo Day

April 24, 2008

[Photo Gallery]
GTISC Common Area
Klaus Advanced Computing Building, 3rd Floor [map]

Schedule

8:30 am    Continental Breakfast
9:00 am - 11 am    Demo Presentations | Presenter List [download]

GTISC Symposium

April 2, 2008

[Photo Gallery]

GTISC Information Security Seminars

12:00 pm, Spring 2008

Klaus Advanced Computing Building
1116 East - Atrium Level
Directions & Map

Industry Leaders include:

Jan 29, 2008 - Paul Q. Judge, Judge Ventures [ bio]
Feb 20, 2008 - Edwin Marcial, SVP & CTO, IntercontinentalExchange
Mar 4, 2008 - Robin Sundaram, VP of Information Security, ChoicePoint [ppt]
Mar 11, 2008 - Chris Ray, 2nd VP Information Technology, Aflac [ppt] [Aflac ppt]
April 15, 2008 - Caleb Sima, Spi Dynamics-HP

Office Practices, Everyday Etiquette, Resumes & Networking Workshop

4:30 pm, February 7, 2008

Klaus 116 East & West
[ Photo Gallery ]

Intercontinental Exchange

February 1, 2008

GTISC Common Area
Jerry Perullo, Director of Information Security

Tony Rutkowski

GTISC Industry Leaders Series

4:30 pm - 6:00 pm, Tuesday, November, 13, 2007

Centergy Bldg, 5th floor, 75 5th Street, NW, Atlanta, GA 30308
"Next Gen Identity Management for Networks: Old Problems, New Challenges"
Anthony Rutowski, VP for Regulatory Affairs, VeriSign, Inc.
[Presentation] PowerPoint

This lecture describes a significant initiative of almost non-stop global activity over the past year that brought together a diverse array of people and communities to explore and map the uncharted new universe of Identity Management.  The "map" consists of four reports that attempt to structure a Next Generation Identity Management universe and chart a destiny through a set of requirements and framework(s).

The objective of this endeavor falls into the category of "grand challenge," but is an essential one for some reasonable level of cybersecurity as well as a broad ensemble of government, business, and consumser needs, including the holy grail of nomadicity - anytime, anywhere, using any device, by anyone.

This lecture also poses a potentially controversial implementation hypothesis that reaches back more than a hundred years to early open nomadic radio-based network infrastructures, and suggests that similar regulatory and global cooperative agreements serve as useful models.

Fall 2007 Industry Leaders Series

4:30 pm - 6:00 pm, Tuesday, October 16, 2007

Centergy Building, 5th floor, 75 5th St. NW, Atlanta, GA 30308
"Overview of Exploiting Web Applications"
Caleb Sima, CTO, SPI Dynamics   [bio PDF Icon]

Summit WebcastGTISC Fall 2007 Security Summit

10:00 am - 12:00 pm, Tuesday, October 2, 2007

GTRI Conference Center
"Emerging Cyber Security Threats and Countermeasures"
[Summit Webpage with Photo Gallery, Comments and Archived Webcast]
[Emerging Cyber Threats Report for 2008] Emerging Cyber Threats Reports for 2008 pdf

Keynote Speaker: Vinton G. Cerf, VP & Chief Internet Evangelist, Google
Moderator: Chris Rouland, CTO and Distinguished Engineer, IBM Internet Security Systems
Panelists: Merrick Furst, Associate Dean and Professor, Georgia Tech, College of Computing; Richard (Dickie) M. George, Information Assurance Technical Director, National Security Agency; George Heron, VP and Chief Scientist, McAfee; Paul Judge, CTO, Secure Computing; Caleb Sima, CTO, Spi Dynamics; Rowan Trollope, VP of Consumer Products, Symantec

Pictures Posted for
Office Survival & Everyday Etiquette Workshop

4:30pm

Klaus Advanced Computing Building, Room 1116, 266 Ferst Drive
[Photo Gallery]
Featured Speaker: Mary Jane Panzeri, ISO Manager, SunTrust
Also, Peggy Parks, AICI, President, The Parks Image Group, Inc.

IBM Internet Security Systems Day

Tuesday, April 24, 2007

Klaus Advanced Computing Building, 3rd Floor
Photo Gallery

GTISC Open House

Noon-1:30pm, Tuesday, February 13, 2007

Klaus Advanced Computing Building, 3rd Floor
directions Directions
demo list Demo List
Photo Gallery

NSF 2007 Cyber Trust PI Meeting

GTISC hosted the NSF 2007 Cyber Trust PI Meeting, January 2007
The 2007 National Science Foundation Cyber Trust PI meeting was in Atlanta, Georgia from January 28 - 30. The Georgia Tech Information Security Center (GTISC) hosted this meeting and was responsible for meeting logistics. There were 240+ in attendance. The meeting website will have the posters and presentations uploaded shortly.

Photo Gallery
Posters
Presentations

I3P Consortium

GTISC hosted the December I3P Consortium Meeting.
"The Institute for Information Infrastructure Protection (I3P) is a consortium of 29 leading national cyber security institutions, including 20 academic institutions. It helps meet the well-documented need for improved research and development to protect the Nation's information infrastructure against cyber incidents."
» Photo Gallery

2007 Computer Science/ Computer Engineering Career Fair

February 14, 2007, 9:00 am - 12:00 pm & 1:30 pm - 4:00 pm
Student Center Ballroom
Note: Open to Georgia Tech Students ONLY. Students must show their valid GT Buzz cards.

Fall 2006 Industry Leaders Series

5:00 pm, Tuesday, November 28, 2006

Centergy Building, Technology Square
"Managing Information Security Risks at The Coca-Cola Company"
Tom Place    [bio PDF Icon]
Director of Global Security and Compliance, The Coca-Cola Company

Host for IT Security Officials from Rwanda and Tsunisia

November 10-15, 2006

The Sam Nunn School of International Affairs, the Ivan Allen College, the Georgia Tech Information Security Center, and the Office of Information Technology hosted and met with four IT security officials from Rwanda and Tunisia to aid them in building national information and cyber security capabilities. These events were sponsored by the MacArthur Foundation Grant. This concluded a three week trip to the US, which also included visits to Washington, DC and Carnegie Mellon University.

Vistors:
Nkurikiyimfura K. Didier; National University of Rwanda; Member of the Faculty and Director, Computer Center Rwanda

Raphael Mmasi; Government of Rwanda; Director National Computer Center & Deputy Director, Rwandan Information Technology Authority Rwanda

Nabil Sahli; University of Tunis & Government of Tunisia Director, National Center for Information Security Tunisia

Naoufel Frikha; Government of Tunisia; Deputy Director, National Center for Information Security Tunisia

Hosts:
Dr. Sy Goodman, College of Computing
Danika Schmitt, International Affairs
Christopher LaRosa, International Affairs
Erika Shehan, College of Computing
Jeff King, College of Computing

Fall 2006 Industry Leaders Series

5:00 pm, Tuesday, October 31, 2006

Centergy Building, Technology Square
"Equifax Identity Management Program: Technology, Compliance, Management, and Risk"
Tony Spinelli, Equifax   [bio PDF Icon]
Senior Vice President, Information Technology Security
» Abstract (PDF Icon pdf)

Fall 2006 Industry Leaders Series

5:00 pm, Tuesday, October 10, 2006

Centergy Building, Technology Square
"Hurricane Katrina: Business Continuity Story"
Rebecca (Becky) Blalock, Southern Company   [bio PDF Icon]
Senior Vice President, Chief Information Officer, Southern Company
» Presentation (PDF Icon pdf)

Fall 2006 Industry Leaders Series

5:00 pm, Tuesday, September 26, 2006

Centergy Building, Technology Square
"Perspectives on security management: What the educational community can do?"
David Rowan, SunTrust   [bio PDF Icon]
Senior Vice President and Director, Enterprise Technology Risk Management, SunTrust

Fall 2006 Industry Leaders Series

5:00 pm, Tuesday, September 19, 2006

Centergy Building, Technology Square
"Electronic and Human Communication: Engaging the Private Sector in Global Critical Infrastructure Protection"
Phyllis Schneck, Ph.D., Secure Computing   [bio PDF Icon]
Vice President, Research Integration, Secure Computing
Chairman, Board of Directors, InfraGard National Members Alliance
» Abstract (PDF Icon pdf)
» Q & A (PDF Icon pdf)

What people are saying about the Industry Leaders Series...
I'm excited to see you creating these sorts of of events for people in industry to interact directly with the students, and I'm particularly impressed with the quality of the industry leaders that have agreed to be a part of it. I hope your students appreciate what a privilege it is to spend time with your honored guests in such an intimate environment. I'm very happy to support your efforts there, and look forward to continuing to participate (both individually, and with the rest of my company) in your future events. This is a great opportunity for the university and businesses to join together in creating a stronger economy for the entire community, while nurturing our most precious resources - the students who are our future leaders!

Keith McInish
VP of Professional Services, Americas
Seagull Software
10/11/06

Safeguarding Information on the Internet: What Consumers Should Expect of Government and Business
A Town Hall Discussion

Presented by Cyber Security Industry Alliance

11:30 am - 1:30 pm, Tuesday, June 6, 2006

GTRI Conference Center
There is no charge to attend the town hall.
More informationDownload press release ( PDF)
More informationMore Information
Streaming Video (QuickTime 7 Required)
Photo Gallery
Indentity Managment Summit Communiqué [Download PDF] | [Web] Download Communique

Keynote Speaker: The Honorable Thurbert E. Baker, Attorney General, State of Georgia
Moderator: David Allison, Editor, Atlanta Business Chronicle
Distinguished panelists, includingThomas E. Noonan, President & CEO, Internet Security Systems; Chad Hunt, Special Agent, Federal Bureau of Investigation; Mustaque Ahamad, Director, Georgia Tech Information Security Center; Leslie Harris, Executive Director, Center for Democracy & Technology; Horace Johnson, Manager of Information Security Operations, Ceridian

Sponsored by GTISC in cooperation with Internet Security Systems, Technology Association of Georgia, and GeorgiaLink Public Affairs Group

GTISC Identity Management Summit and the Thomas E. Noonan Information Security Lecture

sponosored by CipherTrust

2:00pm, Wednesday, May 17, 2006

GTRI Conference Center
More informationMore Information
video Streaming Video (QuickTime 7 Required)
Photo Gallery

Moderator: Paul Judge, CTO, CipherTrust
Panel: Jeff Schmidt, CEO, Authis; Todd Inskeep, Sr. Architect for Identity Management, Bank of America; Tony Spinelli, SVP, Information Technology Security, Equifax; Dick Lipton, Professor, College of Computing, GA Tech; Burt Kaliski, Chief Scientist, RSA Security; Chris Meaney, VP Secure Networks, Siemens Enterprise Networks

"Invitation Only" Fireside Chat

10:00am, Wednesday, May 17, 2006

GTRI Conference Center
Photo Gallery

Scott Charney, Chief Security Strategist, Microsoft
Howard Schmidt, Former White House Cyber Security Advisory and President & CEO of R&H Security Consulting LLC

GTISC Industry Leaders Lecture

4:00pm, Monday, April 5, 2006

Fran Dramis, Chief Information, E-Commerce and Security Officer, BellSouth
Centergy One Building
(Limited seating) Reception immediately following

"The Changing Nature of Cybercrime. Is Your Business at Risk?"

7:30am-9:15am, Wednesday, March 29, 2006

Hosted by the Metro Atlanta Chamber of Commerce and IBM

Moderator: Phyllis Schneck, Chairman, National Board of Directors, InfraGard Members Alliance & Vice President of Strategic Development, CipherTrust, Inc.
Panelists: Mustaque Ahamed, Director of the Georgia Tech Information Security Center, and Professor, College of Computing; Peter Andersen, Deputy Chief, Atlanta Police Department; Edwin Marcial, Senior Vice President and Chief Technology Officer, Intercontinental Exchange; Charles Palmer, Manager, Security and Privacy, IBM Research

Metro Atlanta Chamber of Commerce, Board Room
235 Andrew Young International Blvd., Atlanta, GA
No fee.

2006 Sam Nunn Bank of America Policy Forum

8:30am-4:30pm, Monday, March 27, 2006

"The Impact of Information and Communications Technologies on Economic Development, National Competitiveness, and Social Justice."
Georgia Tech Global Learning Center at 5th and Spring Streets in midtown Atlanta
Complimentary lunch at the nearby Biltmore Hotel.
More information

GTISC Industry Leaders Lecture

11:30am, Tuesday, March 21, 2006

Carol DiBattiste, Chief Credentialing, Compliance and Privacy Officer, ChoicePoint
Lunch, Centergy One Building
(Limited seating)
DiBattiste Questions & Answers
ChoicePoint Privacy Enhancements ( PDF)

GTISC Industry Leaders Lecture

2:00pm, Friday, March 17, 2006

Cynthia Dwork, Microsoft Research
MARC Auditorium
Reception immediately following

Executive Forum on the Global State of Information Security

8:00 a.m., Tuesday, February 28, 2006
more details

Presented by GTISC, PricewaterhouseCoopers, TAG (The Technology Association of Georgia)'s Business & Technology Alliance,
(CIO Magazine article-11.15.05)

Panel: Becky Blalock, CIO, Southern Co.; Paul Judge, CTO, CipherTrust; Dr. Guido Sacchi, CIO, CompuCredit; Gustaaf Schrils, CTO, InterContinental Hotels; Rob Webb, CTO, Equifax

GTISC Wireless Security Summit

3:00 p.m., Thursday, November 15, 2005
more details

Keynote Address: by Mitch Gelman, CNN.com
Senior Vice President and Executive Producer
John Paris, CNN.com - Wireless Products Director
(Download Presentation PowerPoint | Download Script )

Moderator: Steve Zimba (BellSouth)
Panelist: David Thomas (AirDefense), Jack Storey (Children's Healthcare of Atlanta),
Kelly Williams (Cingular Wireless), John Copeland (Georgia Institute of Technology),
Gustaaf Schrils (Intercontinental Hotel Group), Chris Rouland (Internet Security Systems), Jerry Neal (RF Micro Devices)

»View Photo Gallery

GTISC Distinguished Lecture

CipherTrust logo

September 27, 2005

Distinguished Lecture

"An Emerging Ecosystem for Security and Critical Infrastructure Protection of Public Next Generation Networks"
Tony Rutkowski of VeriSign, Inc
» About Tony Rutkowski and lecture slides
» View Photo Gallery

GTISC Faculty & Student Reception

August 26, 2005

Noon-1:30pm
GTISC Conference Room, Room 259
»View Photo Gallery

Ralph Merkle's Crytography Talk

The Development of Public Key Cryptography a personal view

GTISC VoIP Security Summit

3:00 p.m., Thursday, April 21, 2005

Brand New Day: Open Networks and Open Society
Keynote Address: by Reed Hundt
Former Chairman Federal Communications Commission
and Senior Advisor, McKinsey and Company

Moderator: Richard DeMillo (Georgia Tech)
Panelist: Kurt Bertone (Covergence), Steve W. Chaddick (CIENA Corporation), Adam T. Drobot (Telcordia Applied Research Business Unit), Nikil Jayant (Georgia Centers for Advanced Telecommunications Technology), Steve Zimbia (BellSouth), Mahalingam Mani (Avaya Inc.), Chris Rouland (Internet Security Systems)
»View Photo Gallery

GTISC Security Summit

January 18 , 2005

Panelists: Rich DeMillo (Georgia Tech), Art Coviello (RSA Security), Paul Judge (CiperTrust), Garry Betty (Earthlink), Doug Isenberg (Needle & Rosenberg, P.C. and GigaLaw.com), and Chris Rouland (Internet Security Systems)
»For more information
»View Photo Gallery

Fall 2004 Distinguished Lecture Series

November 4, 2004

"Information Security: Addressing Surety for Various Communities"
Roger M. Callahan: Senior Vice President -- Corporate Information Security, Bank of America

Fall 2004 Distinguished Lecture Series

October 9 , 2004

"Rethinking PKI: What's Trust Got to Do With It?"
Steve Kent: Vice President and Chief Scientist -- Information Security, BBN Technologies
» More information including lecture slides

Fall 2004 Distinguished Lecture Series

September 9 , 2004

"Creating and Maintaining Software that Resists Malicious Attack"
David Aucsmith: Security Architect, Chief Technology Officer -- Security and Business Unit, Microsoft
» More information including lecture slides

Fall 2004 Distinguished Lecture Series

October 9 , 2004

"Rethinking PKI: What's Trust Got to Do With It?"
Steve Kent: Vice President and Chief Scientist -- Information Security, BBN Technologies
» More information including lecture slides

Fall 2004 Distinguished Lecture Series

September 9 , 2004

"Creating and Maintaining Software that Resists Malicious Attack"
David Aucsmith: Security Architect, Chief Technology Officer -- Security and Business Unit, Microsoft
» More information including lecture slides

Fall 2004 Distinguished Lecture Series

April 7, 2004

"Whither nanotechnology? A new manufacturing technology looms on the horizon: molecular nanotechnology"
Dr. Ralph Merkle
11:00 pm to 1:00 pm
CCB room 354
» View presentation slides