Each year, security experts see new evolutions in cyberthreats to people, businesses and governments. Our adversaries know no boundaries. The 15th Annual Georgia Tech Cyber Security Summit brought together government, industry, and academia to prepare for the newest challenges in securing information and cyber-connected systems.
Thank You for Attending!
Save the date for the next Summit -- to be held Thursday, Oct. 4, 2018. In the meantime, download last year's Summit materials or join Georgia Tech at these other events.
Captions (from upper left): 1.) Stewart Baker, attorney and first Assistant Secretary for Policy at the U.S. Department of Homeland Security, delivered the keynote address. 2.) Bo Rotoloni, the outgoing co-director at the Institute for Information Security & Privacy, received an award of honor from Executive Vice President of Research Stephen Cross. 3.) Peter Swire, professor and associate director of policy at Georgia Tech, explained why cross-border data sharing could help prevent law enforcement backdoors into personal devices. 4.) Cybersecurity short courses by Georgia Tech were open for registration at the 2017 Summit. 5.) Ph.D. Student Stacey Truex shared her research. 6.) Students from business, public policy, electrical engineering, and computer science programs were invited to display research at the Summit. 7.) Associate Director of Trust Margaret Loper attended with an interest in the security of machine-to-machine communications and IoT devices. 8.) Baker explained why he believes 2017 will be remembered as a turning point in the quest for better cyber attribution. 9.) More than 300 guests examined student research and voted on which projects they'd most like to see commercialized. 10.) Assistant Professor Manos Antonakakis revealed early insights from a $17-million project for the U.S. Department of Defense. 11.) Ph.D. Student Panagiotis Kintis discussed a multi-year examination of "combosquatting," or malicious domain-name abuse. 12.) Ph.D. Candidate Chaz Lever shared how the network layer can reveal early clues that a malware infection or cyberattack is coming.