Show simple item record

dc.contributor.authorJohnson-Bey, Charles
dc.date.accessioned2019-10-25T18:08:14Z
dc.date.available2019-10-25T18:08:14Z
dc.date.issued2019-10-11
dc.identifier.urihttp://hdl.handle.net/1853/61978
dc.descriptionPresented on October 11, 2019 at 12:00 p.m. in the Klaus Advanced Computing Building, Room 1116.en_US
dc.descriptionDr. Charles Johnson-Bey has demonstrated experience in leading global organizational change to reflect evolving markets and technology dynamics. He uniquely leverages the intersection of technology, strategy, and business to create & capture value, lead change and drive execution. His expertise has spanned academia as well as the commercial and defense industries. At Lockheed Martin Corporation, he has had increasing levels of responsibility in engineering, advanced technology and strategy.en_US
dc.descriptionRuntime: 53:03 minutesen_US
dc.description.abstractOver the last several decades Data Security became Information Security which then rolled into Cyber Security. All along this journey cyber has become defined as “Us versus Them”; electronic cyber-attack and cyber-defense illustrates the current entire domain of Cyber Security. Significant investment has gone into protecting networks, training staff to operate expensive architecture, and ultimately changing how business operations are conducted. Attacks are common place and resources in high demand. However, much of these capabilities required the development of unique methods to deal with chaotic information, to pick up subtle data changes, and to fine tune networks and computer systems. There is a possibility of expanding these capabilities from a two-tier war fighting model (Cyber Defense and Cyber Offense) over to a new third tier, Cyber Science. This enables cyber capabilities to provide profit back to a business instead of being a sunk cost (re. insurance policy of sorts). We envision a near future that allows Cyber engineering to build new solutions that aren’t mired in “Us versus Them” but is used for the betterment of society. These take the form of new quantum-based data structures, new approaches to biologic science analytics, new ways to connect the worlds of IOT, MTM, and humans, and more. We explore where this makes sense and highlight a possible way to engage cyber engineering groups into a profit center.en_US
dc.format.extent53:03 minutes
dc.language.isoen_USen_US
dc.publisherGeorgia Institute of Technologyen_US
dc.relation.ispartofseriesCybersecurity Lecture Seriesen_US
dc.subjectCybersecurityen_US
dc.subjectCyber Scienceen_US
dc.subjectDataen_US
dc.titleCyber Science: The Third Frontieren_US
dc.typeLectureen_US
dc.typeVideoen_US
dc.contributor.corporatenameGeorgia Institute of Technology. Institute for Information Security & Privacyen_US
dc.contributor.corporatenameLockheed Martinen_US


Files in this item

Thumbnail

This item appears in the following Collection(s)

Show simple item record