{"616844":{"#nid":"616844","#data":{"type":"event","title":"Cybersecurity Lecture Series with Shelby Allen","body":[{"value":"\u003Cp\u003EThe\u0026nbsp;\u003Ca href=\u0022https:\/\/iisp.gatech.edu\/cyber-lecture\u0022\u003ECybersecurity Lecture Series at Georgia\u0026nbsp;Tech\u003C\/a\u003Eisa free, one-hour lecture from a thought leader who is advancing the field of information security and privacy. Invited speakers include executives and researchers from Fortune 500 companies, federal intelligence agencies, start-ups, and incubators, as well as Georgia Tech faculty and students presenting their research. Lectures are open to all -- students, faculty, industry, government, or simply the curious.\u003C\/p\u003E\r\n\r\n\u003Cp\u003E\u003Ca href=\u0022http:\/\/attend.com\/cyberlecture-allen\u0022\u003ERSVP\u003C\/a\u003E\u003C\/p\u003E\r\n\r\n\u003Ch3\u003EAbstract:\u003C\/h3\u003E\r\n\r\n\u003Cp\u003ESecure software development can be categorized into two major tasks: designing secure software and validating secure software.\u0026nbsp;\u0026nbsp;In this\u0026nbsp;talk, we will review both categories as well as some resources\u0026nbsp;helpful\u0026nbsp;for continuous learning.\u0026nbsp;Designing secure software requires being aware of good design patterns as well as avoiding patterns that are famous for introducing common bugs. Validating the security of a particular piece of software is an undecidable problem: there is no analysis that can guarantee that software is bug-free, this doesn\u0026rsquo;t mean that the attempt shouldn\u0026rsquo;t be made. By narrowing the scope of what guarantees are made during analysis, one can collect actionable information both by statically inspecting code\/binaries and dynamically running the program under analysis. We will discuss various techniques for both types of analysis.\u0026nbsp;\u003C\/p\u003E\r\n\r\n\u003Ch3\u003EBio:\u0026nbsp;\u003C\/h3\u003E\r\n\r\n\u003Cp\u003E\u003Ca href=\u0022https:\/\/www.linkedin.com\/in\/shelbyladallen\/\u0022\u003EShelby Allen\u003C\/a\u003E\u0026nbsp;is a Research Scientist at Georgia Tech Research Institute, focusing on R\u0026amp;D for software security and assurance. He received his bachelor\u0026rsquo;s from Georgia Tech for electrical engineering in 2007 and is expecting to finish the OMS CS program this semester. Before returning to Tech, he worked for various industries including cybersecurity,\u0026nbsp;high-frequency trading, and embedded lighting control.\u003C\/p\u003E\r\n\r\n\u003Cp\u003E\u0026nbsp;\u003C\/p\u003E\r\n","summary":null,"format":"limited_html"}],"field_subtitle":"","field_summary":[{"value":"\u003Cp\u003EOn Friday, March 8th guest speaker, \u003Ca href=\u0022https:\/\/www.gtri.gatech.edu\u0022\u003EGTRI\u0026nbsp;\u003C\/a\u003EResearch Engineer, \u003Ca href=\u0022https:\/\/www.linkedin.com\/in\/shelbyladallen\/\u0022\u003EShelby Allen\u003C\/a\u003E will discuss the tasks of designing and validating secure software platforms as well as his own helpful resources and techniques for analysis.\u0026nbsp;\u003C\/p\u003E\r\n","format":"limited_html"}],"field_summary_sentence":[{"value":"Free, open-to-the public discussion about cybersecurity risks, trends, and techniques."}],"uid":"34659","created_gmt":"2019-01-24 18:33:10","changed_gmt":"2019-01-24 18:58:03","author":"lpanetta3","boilerplate_text":"","field_publication":"","field_article_url":"","field_event_time":{"event_time_start":"2019-03-08T12:00:00-05:00","event_time_end":"2019-03-08T13:00:00-05:00","event_time_end_last":"2019-03-08T13:00:00-05:00","gmt_time_start":"2019-03-08 17:00:00","gmt_time_end":"2019-03-08 18:00:00","gmt_time_end_last":"2019-03-08 18:00:00","rrule":null,"timezone":"America\/New_York"},"extras":[],"hg_media":{"616841":{"id":"616841","type":"image","title":"Shelby Allen ","body":null,"created":"1548353345","gmt_created":"2019-01-24 18:09:05","changed":"1548353345","gmt_changed":"2019-01-24 18:09:05","alt":"","file":{"fid":"234770","name":"shelby_allen_headshot - Shelby Allen.jpg","image_path":"\/sites\/default\/files\/images\/shelby_allen_headshot%20-%20Shelby%20Allen.jpg","image_full_path":"http:\/\/tlwarc.hg.gatech.edu\/\/sites\/default\/files\/images\/shelby_allen_headshot%20-%20Shelby%20Allen.jpg","mime":"image\/jpeg","size":2268579,"path_740":"http:\/\/tlwarc.hg.gatech.edu\/sites\/default\/files\/styles\/740xx_scale\/public\/images\/shelby_allen_headshot%20-%20Shelby%20Allen.jpg?itok=2LEqsLl7"}},"593723":{"id":"593723","type":"image","title":"Cybersecurity Lecture Series by IISP","body":null,"created":"1500996186","gmt_created":"2017-07-25 15:23:06","changed":"1500996186","gmt_changed":"2017-07-25 15:23:06","alt":"","file":{"fid":"226333","name":"CLS_logo_FY18 w tag.jpg","image_path":"\/sites\/default\/files\/images\/CLS_logo_FY18%20w%20tag.jpg","image_full_path":"http:\/\/tlwarc.hg.gatech.edu\/\/sites\/default\/files\/images\/CLS_logo_FY18%20w%20tag.jpg","mime":"image\/jpeg","size":580256,"path_740":"http:\/\/tlwarc.hg.gatech.edu\/sites\/default\/files\/styles\/740xx_scale\/public\/images\/CLS_logo_FY18%20w%20tag.jpg?itok=8s4XWw-w"}}},"media_ids":["616841","593723"],"groups":[{"id":"430601","name":"Institute for Information Security and Privacy"}],"categories":[],"keywords":[{"id":"180297","name":"Shelby Allen"},{"id":"416","name":"GTRI"},{"id":"167055","name":"security"},{"id":"177932","name":"computer-based cyber systems"}],"core_research_areas":[],"news_room_topics":[],"event_categories":[{"id":"10377","name":"Career\/Professional development"},{"id":"1789","name":"Conference\/Symposium"},{"id":"1788","name":"Other\/Miscellaneous"},{"id":"1795","name":"Seminar\/Lecture\/Colloquium"}],"invited_audience":[{"id":"78761","name":"Faculty\/Staff"},{"id":"177814","name":"Postdoc"},{"id":"78771","name":"Public"},{"id":"174045","name":"Graduate students"},{"id":"78751","name":"Undergraduate students"}],"affiliations":[],"classification":[],"areas_of_expertise":[],"news_and_recent_appearances":[],"phone":[],"contact":[{"value":"\u003Cp\u003E\u003Ca href=\u0022mailto:lindsey.panetta@gtri.gatech.edu\u0022\u003Elindsey.panetta@gtri.gatech.edu\u003C\/a\u003E\u003C\/p\u003E\r\n","format":"limited_html"}],"email":[],"slides":[],"orientation":[],"userdata":""}}}