TAG Information Security Joint Event: Cyber Security in Manufacturing

*********************************
There is now a CONTENT FREEZE for Mercury while we switch to a new platform. It began on Friday, March 10 at 6pm and will end on Wednesday, March 15 at noon. No new content can be created during this time, but all material in the system as of the beginning of the freeze will be migrated to the new platform, including users and groups. Functionally the new site is identical to the old one. webteam@gatech.edu
*********************************

Event Details
  • Date/Time:
    • Tuesday March 8, 2016 - Wednesday March 9, 2016
      2:00 pm - 4:59 pm
  • Location: GTRI Conference Center, 250 14th St. NW, Atlanta, GA
  • Phone:
  • URL:
  • Email:
  • Fee(s):
    $30
  • Extras:
Contact
No contact information submitted.
Summaries

Summary Sentence: The Technology Association of Georgia welcomes Andrew Howard of Georgia Tech as keynote speaker.

Full Summary: The Technology Association of Georgia welcomes Andrew Howard of Georgia Tech Research Institute as keynote speaker at the "Cyber Security in Manufacturing" event, hosted by TAG Manufacturing and TAG Information Security.

Media
  • Andrew Howard Andrew Howard
    (image/jpeg)

The increasing interconnectivity of manufacturing control and information systems provides many benefits, but also introduces risks and threats to industrial operations. Join Atlanta's business community on Tuesday, March 8th as we discuss how to protect assets, machinery, and information in today’s connected manufacturing operations.


Keynote

Andrew Howard, Director, Cyber Technology & Information Security Laboratory, Georgia Tech Research Institute

Andrew Howard is the Director of the Cyber Technology & Information Security Laboratory (CTISL) based out of Georgia Tech's applied research arm, the Georgia Tech Research Institute (GTRI). CTISL conducts applied research focused on cyber threats and countermeasures, secure information sharing, resilient command and control network architectures, and vulnerability identification.

 
Panelists

Doug Wylie, VP Product Marketing and Strategy, NexDefense, Inc.

Scott Johnston, Network & Security Services Consultant, Rockwell Automation

Registration Required

3:00 - 3:30 p.m. Check-in

3:30 - 5:00 p.m. Keynote Speaker & Panel Discussion

5:00 - 6:00 p.m. Networking Reception

Hors d’ oeuvres & cocktails served

Additional Information

In Campus Calendar
No
Groups

Institute for Information Security and Privacy

Invited Audience
Undergraduate students, Faculty/Staff, Public, Graduate students
Categories
Conference/Symposium
Keywords
Cybersecurity
Status
  • Created By: Tara La Bouff
  • Workflow Status: Published
  • Created On: Feb 18, 2016 - 11:47am
  • Last Updated: Apr 13, 2017 - 5:16pm