<node id="616844">
  <nid>616844</nid>
  <type>event</type>
  <uid>
    <user id="34659"><![CDATA[34659]]></user>
  </uid>
  <created>1548354790</created>
  <changed>1548356283</changed>
  <title><![CDATA[Cybersecurity Lecture Series with Shelby Allen]]></title>
  <body><![CDATA[<p>The&nbsp;<a href="https://iisp.gatech.edu/cyber-lecture">Cybersecurity Lecture Series at Georgia&nbsp;Tech</a>isa free, one-hour lecture from a thought leader who is advancing the field of information security and privacy. Invited speakers include executives and researchers from Fortune 500 companies, federal intelligence agencies, start-ups, and incubators, as well as Georgia Tech faculty and students presenting their research. Lectures are open to all -- students, faculty, industry, government, or simply the curious.</p>

<p><a href="http://attend.com/cyberlecture-allen">RSVP</a></p>

<h3>Abstract:</h3>

<p>Secure software development can be categorized into two major tasks: designing secure software and validating secure software.&nbsp;&nbsp;In this&nbsp;talk, we will review both categories as well as some resources&nbsp;helpful&nbsp;for continuous learning.&nbsp;Designing secure software requires being aware of good design patterns as well as avoiding patterns that are famous for introducing common bugs. Validating the security of a particular piece of software is an undecidable problem: there is no analysis that can guarantee that software is bug-free, this doesn&rsquo;t mean that the attempt shouldn&rsquo;t be made. By narrowing the scope of what guarantees are made during analysis, one can collect actionable information both by statically inspecting code/binaries and dynamically running the program under analysis. We will discuss various techniques for both types of analysis.&nbsp;</p>

<h3>Bio:&nbsp;</h3>

<p><a href="https://www.linkedin.com/in/shelbyladallen/">Shelby Allen</a>&nbsp;is a Research Scientist at Georgia Tech Research Institute, focusing on R&amp;D for software security and assurance. He received his bachelor&rsquo;s from Georgia Tech for electrical engineering in 2007 and is expecting to finish the OMS CS program this semester. Before returning to Tech, he worked for various industries including cybersecurity,&nbsp;high-frequency trading, and embedded lighting control.</p>

<p>&nbsp;</p>
]]></body>
  <field_summary_sentence>
    <item>
      <value><![CDATA[Free, open-to-the public discussion about cybersecurity risks, trends, and techniques.]]></value>
    </item>
  </field_summary_sentence>
  <field_summary>
    <item>
      <value><![CDATA[<p>On Friday, March 8th guest speaker, <a href="https://www.gtri.gatech.edu">GTRI&nbsp;</a>Research Engineer, <a href="https://www.linkedin.com/in/shelbyladallen/">Shelby Allen</a> will discuss the tasks of designing and validating secure software platforms as well as his own helpful resources and techniques for analysis.&nbsp;</p>
]]></value>
    </item>
  </field_summary>
  <field_time>
    <item>
      <value><![CDATA[2019-03-08T12:00:00-05:00]]></value>
      <value2><![CDATA[2019-03-08T13:00:00-05:00]]></value2>
      <rrule><![CDATA[]]></rrule>
      <timezone><![CDATA[America/New_York]]></timezone>
    </item>
  </field_time>
  <field_fee>
    <item>
      <value><![CDATA[]]></value>
    </item>
  </field_fee>
  <field_extras>
      </field_extras>
  <field_audience>
          <item>
        <value><![CDATA[Faculty/Staff]]></value>
      </item>
          <item>
        <value><![CDATA[Postdoc]]></value>
      </item>
          <item>
        <value><![CDATA[Public]]></value>
      </item>
          <item>
        <value><![CDATA[Graduate students]]></value>
      </item>
          <item>
        <value><![CDATA[Undergraduate students]]></value>
      </item>
      </field_audience>
  <field_media>
          <item>
        <nid>
          <node id="616841">
            <nid>616841</nid>
            <type>image</type>
            <title><![CDATA[Shelby Allen ]]></title>
            <body><![CDATA[]]></body>
                          <field_image>
                <item>
                  <fid>234770</fid>
                  <filename><![CDATA[shelby_allen_headshot - Shelby Allen.jpg]]></filename>
                  <filepath><![CDATA[/sites/default/files/images/shelby_allen_headshot%20-%20Shelby%20Allen.jpg]]></filepath>
                  <file_full_path><![CDATA[http://tlwarc.hg.gatech.edu//sites/default/files/images/shelby_allen_headshot%20-%20Shelby%20Allen.jpg]]></file_full_path>
                  <filemime>image/jpeg</filemime>
                  <image_740><![CDATA[]]></image_740>
                  <image_alt><![CDATA[]]></image_alt>
                </item>
              </field_image>
            
                      </node>
        </nid>
      </item>
          <item>
        <nid>
          <node id="593723">
            <nid>593723</nid>
            <type>image</type>
            <title><![CDATA[Cybersecurity Lecture Series by IISP]]></title>
            <body><![CDATA[]]></body>
                          <field_image>
                <item>
                  <fid>226333</fid>
                  <filename><![CDATA[CLS_logo_FY18 w tag.jpg]]></filename>
                  <filepath><![CDATA[/sites/default/files/images/CLS_logo_FY18%20w%20tag.jpg]]></filepath>
                  <file_full_path><![CDATA[http://tlwarc.hg.gatech.edu//sites/default/files/images/CLS_logo_FY18%20w%20tag.jpg]]></file_full_path>
                  <filemime>image/jpeg</filemime>
                  <image_740><![CDATA[]]></image_740>
                  <image_alt><![CDATA[]]></image_alt>
                </item>
              </field_image>
            
                      </node>
        </nid>
      </item>
      </field_media>
  <field_contact>
    <item>
      <value><![CDATA[<p><a href="mailto:lindsey.panetta@gtri.gatech.edu">lindsey.panetta@gtri.gatech.edu</a></p>
]]></value>
    </item>
  </field_contact>
  <field_location>
    <item>
      <value><![CDATA[]]></value>
    </item>
  </field_location>
  <field_sidebar>
    <item>
      <value><![CDATA[]]></value>
    </item>
  </field_sidebar>
  <field_phone>
    <item>
      <value><![CDATA[]]></value>
    </item>
  </field_phone>
  <field_url>
    <item>
      <url><![CDATA[]]></url>
      <title><![CDATA[]]></title>
            <attributes><![CDATA[]]></attributes>
    </item>
  </field_url>
  <field_email>
    <item>
      <email><![CDATA[]]></email>
    </item>
  </field_email>
  <field_boilerplate>
    <item>
      <nid><![CDATA[]]></nid>
    </item>
  </field_boilerplate>
  <links_related>
      </links_related>
  <files>
      </files>
  <og_groups>
          <item>430601</item>
      </og_groups>
  <og_groups_both>
          <item><![CDATA[Institute for Information Security and Privacy]]></item>
      </og_groups_both>
  <field_categories>
          <item>
        <tid>10377</tid>
        <value><![CDATA[Career/Professional development]]></value>
      </item>
          <item>
        <tid>1789</tid>
        <value><![CDATA[Conference/Symposium]]></value>
      </item>
          <item>
        <tid>1788</tid>
        <value><![CDATA[Other/Miscellaneous]]></value>
      </item>
          <item>
        <tid>1795</tid>
        <value><![CDATA[Seminar/Lecture/Colloquium]]></value>
      </item>
      </field_categories>
  <field_keywords>
          <item>
        <tid>180297</tid>
        <value><![CDATA[Shelby Allen]]></value>
      </item>
          <item>
        <tid>416</tid>
        <value><![CDATA[GTRI]]></value>
      </item>
          <item>
        <tid>167055</tid>
        <value><![CDATA[security]]></value>
      </item>
          <item>
        <tid>177932</tid>
        <value><![CDATA[computer-based cyber systems]]></value>
      </item>
      </field_keywords>
  <userdata><![CDATA[]]></userdata>
</node>
