When Virtual Becomes Actual
The Institute for Information Security & Privacy hosts events throughout the year to stimulate face-to-face conversations and solutions around cybersecurity. Our aim is to offer events that are open to all who wish to participate and free to attend, thanks to the generous support of industry partners. Connect with Georgia Tech in Atlanta or at these premier events around the globe.
Coming Up... Join us at these events!
Cybersecurity Lecture Series: Aug. 24 - Nov. 30
Join Georgia Tech faculty and students each week for a free, open-to-the-public lecture about emerging cybersecurity solutions and trends. Lectures are held on campus each Friday at Noon from Aug. 24 - Nov. 30 during the Fall 2018 semester.
August 4 - 9 and 9 - 12
Georgia Tech attends two capital events for cybersecurity enthusiasts and security researchers with interests in software, computer architecture, hardware modification, and more.
August 14 - 16
For Working Professionals: "A Systems Approach"
Earn credits toward a cybersecurity certificate from Georgia Tech Professional Education with this three-day course. Explore information security vulnerabilities and how to approach cybersecurity resilience as a complex system. Conduct workshop exercises for identifying vulnerabilities, defining threats, assessing risk, and designing a security plan.
August 15 - 17
The 27th USENIX Security Symposium brings together researchers, practitioners, system administrators, system programmers, and others interested in the latest advances in the security and privacy of computer systems and networks. Serving on the Program Committee is Taesoo Kim, assistant professor at Georgia Tech's School of Computer Science.
August 20 -23
Join the Georgia Tech Research Institute as we examine intricacies of the cyber domain with industry and military members, including the U.S. Army Cyber Center of Excellence.
Join ATDC, the Advanced Technology Development Center at Georgia Tech, to learn how entrepreneurs can license intellectual property -- borne from university research -- for business pursuits. Meet Musheer Ahmed, winner of the IISP's first Cybersecurity Demo Day contest for start-ups, who has attracted more than $1M in funding with his IP license.
Students, faculty, scientists and entrepreneurs-in-residence at Georgia Tech are invited to mingle with others interested in cybersecurity. Connect to the cybersecurity ecosystem at Georgia Tech and GTRI, which now includes 13 labs. All disciplines are welcome -- computer science, engineering, business, public policy, international affairs, and more.
August 28 - 30
For Working Professionals: "Secure Software Development"
Earn credits toward a cybersecurity certificate from Georgia Tech Professional Education with this three-day course. Learn good practice and techniques for developing software in a way that prevents the inadvertent introduction of security vulnerabilities in mobile, enterprise, web-based and embedded software systems.
September 11 - 13
For Working Professionals: "Data Analytics and Methodologies"
Earn credits toward a cybersecurity certificate from Georgia Tech Professional Education with this three-day course. This course will introduce the fundamentals of data analytics, big data frameworks, open source analytics tools, design methodologies, and visualization libraries through hands-on case studies.
For Working Professionals: "Cybersecurity Fundamentals: Multi-level Security"
Earn credits toward a cybersecurity certificate from Georgia Tech Professional Education with this one-day course. Gain an understanding of multi-level security systems (MLS), existing technologies, the risk management process, accreditation, and the trade-offs associated with introducing multilevel concepts to an existing system architecture.
Georgia Tech Cyber Security Summit, featuring the Sam Nunn Bank of America Policy Forum
How does a leader respond when the shot can’t be heard and the assailant can’t be seen? Today’s cyberwarfare led by nation-state actors threatens economic continuity and global transactions, traditional diplomacy, international norms, customers and personal freedom. Cybersecurity demands a new framework. This full-day Summit provides an examination of the new responses needed now by business and political leaders, with new models and policies that can be part of the solution. Registration opens in August 2018.
October 15 - 19
Georgia Tech attends the international, peer-reviewed academic conference -- the Association for Computing Machinery Symposium on Computer and Communications Security in Toronto, Canada.
October 23 - 25
For Working Professionals: "Introduction to Malware Analysis"
Earn credits toward a cybersecurity certificate from Georgia Tech Professional Education with this three-day course. Gain a foundational understanding of malicious software through discussions and hands-on exercises that demonstrate malware analysis processes as well as illustrate how to appropriately size, design, and build an analytical capability best suited for your organization. Think like a Black Hat, exploring advanced techniques and tools, including data exfiltration and stealthy operation, to understand the tactics of malware authors.
November 11 - 16
Georgia Tech attends Supercomputing 2018 in Dallas, the International conference for high performance computing, networking, storage and analysis.
December 4 - 6
For Working Professionals: "Risk Management Framework for DoD"
Earn credits toward a cybersecurity certificate from Georgia Tech Professional Education with this three-day course. This course introduces the Risk Management Framework for Department of Defense (DoD) for Information Technology also known as RDIT, which has been adopted as the common information security framework for federal government and government contractors. Informative lectures address transitions from DIACAP, threat processes, risk management concepts, and the roles defined by RDIT. The six-step life cycle process is explored through presentations and hands-on exercises as attendees learn to categorize information systems, select security controls, implement controls, assess controls, authorize information systems, and monitor the security controls.