Come face to face with real solutions
Meet academic and industry leaders for intimate discussions about new cyber threats, trends and technologies.
The Cybersecurity Lecture Series at Georgia Tech is a free, one-hour lecture from a thought leader who is advancing the field of information security and privacy. Invited speakers include executives and researchers from Fortune 500 companies, federal intelligence agencies, start-ups and incubators, as well as Georgia Tech faculty and students presenting their research. Lectures are open to all -- students, faculty, industry, government, or simply the curious. Students may register for credit under seminar course CS-8001-INF.
Select a lecture to attend.
Inquire about sponsorship.
Fall '17 Schedule
Fridays at Noon at Georgia Tech
Klaus Advanced Computing Building
Room KACB #1116W
266 Ferst Drive
unless otherwise noted.
Lunch provided for students who RSVP. Bring your own beverage.
Thanksgiving Week - No lecture.
Patrick McDaniel, professor and director, Institute for Network and Security Research, The Pennsylvania State University
"Tracing the Arc of Smartphone Application Security"
Earlier This Fall
Tudor Dumitras, assistant professor, University of Maryland
"Automatic Feature Engineering: Learning to Detect Malware by Mining the Scientific Literature" [Video]
Energy & Cybersecurity
"Energy System Cybersecurity and Operational Reliability"
Sakis Meliopoulos, Institute for Information Security & Privacy
“Out of Control: the expanded attack surface of control systems” [Video]
Raheem Beyah, Georgia Tech School of Electrical & Computer Engineering
Internet & Infrastructure
"Multi-stakeholder Network Security Concerns" [Article]
Tony Tauber, Comcast
"Security and Privacy Issues of Modern Web Browsers" [Video]
Nick Nikiforakis, Stony Brook University
“The Domestic Benefits of Subversive Foreign Propaganda: The RT (Russia Today) News Network and Geopolitical Muckraking” [Video]
Hans Klein, Georgia Tech School of Public Policy
“What Can Social Science Contribute to Cybersecurity Attribution Research?”
Milton Mueller, Georgia Tech School of Public Policy
"What Constitutes an Act of War in Cyberspace?"
Holly Dragoo, CIPHER Laboratory, Georgia Tech Research Institute
Software, Systems & Hardware
"Why Memory Corruption is Hard" [Video]
Mathias Payer, Purdue University
“Modern Malware and Secure Techniques for Better Software” [Video]
Joel Odom, CIPHER Lab, Georgia Tech Research Institute
"Can Trust Be Delivered As a Service?"
Margaret Loper, Institute for Information Security & Privacy
Scams & Fraud
"Call Me: Gathering Threat Intelligence on Telephony Scams to Detect Fraud" [Video]
Terry Nelms, Pindrop Security