<node id="52710">
  <nid>52710</nid>
  <type>event</type>
  <uid>
    <user id="27154"><![CDATA[27154]]></user>
  </uid>
  <created>1265903864</created>
  <changed>1475891399</changed>
  <title><![CDATA[The 2008 GTISC Security Summit - Emerging Cyber Security Threats]]></title>
  <body><![CDATA[<p>The 2008 GTISC Security Summit on Emerging Cyber Security Threats is the sixth security summit hosted at Georgia Tech since 2004. The summits began as an effort to engage the broader community in the Atlanta area and at the national level to better understand the threats to digital information and to develop strategies for securing it. The summits bring together thought leaders in the information technology and security fields to explore key cyber security threats and ways for countering them. The GTISC annual security summit has evolved into one of the most forward looking cyber security events with a focus on emerging threats that you and your company should be prepared to recognize and respond. This is not a product focused meeting. Instead, more than 250 attendees from academia, government and industry gather to discuss emerging cyber threats and explore potential solutions.</p>]]></body>
  <field_summary_sentence>
    <item>
      <value><![CDATA[]]></value>
    </item>
  </field_summary_sentence>
  <field_summary>
    <item>
      <value><![CDATA[]]></value>
    </item>
  </field_summary>
  <field_time>
    <item>
      <value><![CDATA[2008-10-15T11:00:00-04:00]]></value>
      <value2><![CDATA[2008-10-15T15:30:00-04:00]]></value2>
      <rrule><![CDATA[]]></rrule>
      <timezone><![CDATA[America/New_York]]></timezone>
    </item>
  </field_time>
  <field_fee>
    <item>
      <value><![CDATA[]]></value>
    </item>
  </field_fee>
  <field_extras>
      </field_extras>
  <field_audience>
      </field_audience>
  <field_media>
          <item>
        <nid>
          <node id="52709">
            <nid>52709</nid>
            <type>image</type>
            <title><![CDATA[The 2008 GTISC Security Summit - Emerging Cyber Security Threats]]></title>
            <body><![CDATA[]]></body>
                          <field_image>
                <item>
                  <fid>146086</fid>
                  <filename><![CDATA[GTISC-Feature.jpg]]></filename>
                  <filepath><![CDATA[/sites/default/files/images/GTISC-Feature_0.jpg]]></filepath>
                  <file_full_path><![CDATA[http://tlwarc.hg.gatech.edu//sites/default/files/images/GTISC-Feature_0.jpg]]></file_full_path>
                  <filemime>image/jpeg</filemime>
                  <image_740><![CDATA[]]></image_740>
                  <image_alt><![CDATA[The 2008 GTISC Security Summit - Emerging Cyber Security Threats]]></image_alt>
                </item>
              </field_image>
            
                      </node>
        </nid>
      </item>
      </field_media>
  <field_contact>
    <item>
      <value><![CDATA[]]></value>
    </item>
  </field_contact>
  <field_location>
    <item>
      <value><![CDATA[]]></value>
    </item>
  </field_location>
  <field_sidebar>
    <item>
      <value><![CDATA[]]></value>
    </item>
  </field_sidebar>
  <field_phone>
    <item>
      <value><![CDATA[]]></value>
    </item>
  </field_phone>
  <field_url>
    <item>
      <url><![CDATA[http://www.gtiscsecuritysummit.com/]]></url>
      <title><![CDATA[]]></title>
            <attributes><![CDATA[]]></attributes>
    </item>
  </field_url>
  <field_email>
    <item>
      <email><![CDATA[]]></email>
    </item>
  </field_email>
  <field_boilerplate>
    <item>
      <nid><![CDATA[]]></nid>
    </item>
  </field_boilerplate>
  <links_related>
      </links_related>
  <files>
      </files>
  <og_groups>
          <item>47223</item>
      </og_groups>
  <og_groups_both>
          <item><![CDATA[College of Computing]]></item>
      </og_groups_both>
  <field_categories>
      </field_categories>
  <field_keywords>
      </field_keywords>
  <userdata><![CDATA[]]></userdata>
</node>
