<node id="598043">
  <nid>598043</nid>
  <type>event</type>
  <uid>
    <user id="27490"><![CDATA[27490]]></user>
  </uid>
  <created>1509369324</created>
  <changed>1509370432</changed>
  <title><![CDATA[Cybersecurity Lecture Series with Holly Dragoo]]></title>
  <body><![CDATA[<h5><strong><em>&quot;What Constitutes War in Cyberspace?&rdquo;</em></strong></h5>

<p><br />
Is cyberspace merely another domain for 21st Century kinetic battles to operate in, or does it merit special consideration and unique rules of engagement? In this talk, Holly Dragoo will explore the challenges of distinguishing intelligence gathering activities from acts of aggression and why it&rsquo;s so hard for military doctrine to address this issue.</p>

<p><br />
<br />
<strong>Holly Dragoo</strong> is a research associate with the&nbsp;<a href="https://gtri.gatech.edu/laboratories/cybersecurity-information-protection-and-hardware-evaluation-research">Cybersecurity, Information Protection, and Hardware Evaluation Research (CIPHER) Laboratory</a> at the Georgia Tech Research Institute. Her previous work with the U.S. Department of Defense and Federal Bureau of Investigation give her a unique understanding of intelligence community requirements. Dragoo&rsquo;s research interests include cybersecurity policy issues, threat attribution, metadata analysis, and adversarial network reconstruction.</p>

<p>&nbsp;</p>

<p>The <a href="http://www.iisp.gatech.edu/cyber-lecture">Cybersecurity Lecture Series at Georgia Tech</a> is a free, one-hour lecture from a thought leader who is advancing the field of information security and privacy. Invited speakers include executives and researchers from Fortune 500 companies, federal intelligence agencies, start-ups and incubators, as well as Georgia Tech faculty and students presenting their research. Lectures are open to all -- students, faculty, industry, government, or simply the curious.</p>

<h6><em><strong>Presented by the <a href="http://cyber.gatech.edu/">Institute for Information Security &amp; Privacy</a></strong></em></h6>
]]></body>
  <field_summary_sentence>
    <item>
      <value><![CDATA[Research Associate Holly Dragoo explains why it’s so hard for military doctrine to address new cyberwarfare.]]></value>
    </item>
  </field_summary_sentence>
  <field_summary>
    <item>
      <value><![CDATA[<p>Research Associate Holly Dragoo will explore the challenges of distinguishing intelligence gathering activities from acts of aggression and why it&rsquo;s so hard for military doctrine to address this issue under new methods of cyberwarfare.</p>
]]></value>
    </item>
  </field_summary>
  <field_time>
    <item>
      <value><![CDATA[2017-11-17T12:00:00-05:00]]></value>
      <value2><![CDATA[2017-11-17T13:00:00-05:00]]></value2>
      <rrule><![CDATA[]]></rrule>
      <timezone><![CDATA[America/New_York]]></timezone>
    </item>
  </field_time>
  <field_fee>
    <item>
      <value><![CDATA[]]></value>
    </item>
  </field_fee>
  <field_extras>
      </field_extras>
  <field_audience>
          <item>
        <value><![CDATA[Faculty/Staff]]></value>
      </item>
          <item>
        <value><![CDATA[Public]]></value>
      </item>
          <item>
        <value><![CDATA[Graduate students]]></value>
      </item>
          <item>
        <value><![CDATA[Undergraduate students]]></value>
      </item>
      </field_audience>
  <field_media>
          <item>
        <nid>
          <node id="598044">
            <nid>598044</nid>
            <type>image</type>
            <title><![CDATA[Holly Dragoo]]></title>
            <body><![CDATA[]]></body>
                          <field_image>
                <item>
                  <fid>227990</fid>
                  <filename><![CDATA[Cybersecurity commentator_Holly Dragoo_FY18.jpg]]></filename>
                  <filepath><![CDATA[/sites/default/files/images/Cybersecurity%20commentator_Holly%20Dragoo_FY18.jpg]]></filepath>
                  <file_full_path><![CDATA[http://tlwarc.hg.gatech.edu//sites/default/files/images/Cybersecurity%20commentator_Holly%20Dragoo_FY18.jpg]]></file_full_path>
                  <filemime>image/jpeg</filemime>
                  <image_740><![CDATA[]]></image_740>
                  <image_alt><![CDATA[]]></image_alt>
                </item>
              </field_image>
            
                      </node>
        </nid>
      </item>
          <item>
        <nid>
          <node id="593723">
            <nid>593723</nid>
            <type>image</type>
            <title><![CDATA[Cybersecurity Lecture Series by IISP]]></title>
            <body><![CDATA[]]></body>
                          <field_image>
                <item>
                  <fid>226333</fid>
                  <filename><![CDATA[CLS_logo_FY18 w tag.jpg]]></filename>
                  <filepath><![CDATA[/sites/default/files/images/CLS_logo_FY18%20w%20tag.jpg]]></filepath>
                  <file_full_path><![CDATA[http://tlwarc.hg.gatech.edu//sites/default/files/images/CLS_logo_FY18%20w%20tag.jpg]]></file_full_path>
                  <filemime>image/jpeg</filemime>
                  <image_740><![CDATA[]]></image_740>
                  <image_alt><![CDATA[]]></image_alt>
                </item>
              </field_image>
            
                      </node>
        </nid>
      </item>
      </field_media>
  <field_contact>
    <item>
      <value><![CDATA[<p><a href="mailto:lindsey.panetta@gtri.gatech.edu">lindsey.panetta@gtri.gatech.edu</a></p>
]]></value>
    </item>
  </field_contact>
  <field_location>
    <item>
      <value><![CDATA[]]></value>
    </item>
  </field_location>
  <field_sidebar>
    <item>
      <value><![CDATA[]]></value>
    </item>
  </field_sidebar>
  <field_phone>
    <item>
      <value><![CDATA[]]></value>
    </item>
  </field_phone>
  <field_url>
    <item>
      <url><![CDATA[http://attend.com/holly-dragoo]]></url>
      <title><![CDATA[RSVP]]></title>
            <attributes><![CDATA[]]></attributes>
    </item>
  </field_url>
  <field_email>
    <item>
      <email><![CDATA[]]></email>
    </item>
  </field_email>
  <field_boilerplate>
    <item>
      <nid><![CDATA[]]></nid>
    </item>
  </field_boilerplate>
  <links_related>
      </links_related>
  <files>
      </files>
  <og_groups>
          <item>47223</item>
          <item>322011</item>
          <item>430601</item>
          <item>1281</item>
          <item>50875</item>
      </og_groups>
  <og_groups_both>
          <item><![CDATA[College of Computing]]></item>
          <item><![CDATA[College of Computing Events]]></item>
          <item><![CDATA[Institute for Information Security and Privacy]]></item>
          <item><![CDATA[Ivan Allen College of Liberal Arts]]></item>
          <item><![CDATA[School of Computer Science]]></item>
      </og_groups_both>
  <field_categories>
          <item>
        <tid>1795</tid>
        <value><![CDATA[Seminar/Lecture/Colloquium]]></value>
      </item>
      </field_categories>
  <field_keywords>
          <item>
        <tid>174439</tid>
        <value><![CDATA[cybersecurity policy]]></value>
      </item>
      </field_keywords>
  <userdata><![CDATA[]]></userdata>
</node>
