
As an experienced business and technology (6x CISO) executive across corporate and government organizations, with 20+ years of experience in advising and empowering business and technology leaders to effectively manage their cybersecurity strategies and operations across industries. I specialize in enterprise risk management, cyber operations, business and technology transformation, digital security transformation, and enterprise risk.
My professional focal points include
Specialties:
CISO (fortune 100), leadership, CISO-CIO coaching, business executive, cyber operations, national security policy, professional services, advisory boards, Board of Directors, Adjunct Professor, Task Force member (DHS-ODNI), M&A, VC and PE advisor. Co-author/contributor to NIST CSF, CIS 18 and MITRE Attack Framework.
I have built or run 36 Security Operations Centers (SOC) and led small to large engineering and operations teams.
I have built and run many Cyber Intelligence programs for corporations and government agencies.
As an Adjunct professor I have created content and taught: Cyber MBA program, Cyber Intelligence, National Security George Washington University, US Army Cyber Command, National Intelligence University and lectured across several universities.
Strong and deep expertise across many verticals-(Finance-Government- Healthcare-Telecommunications- Supply Chain-Manufacturing-OT/IoT-Aviation)
I work with CEO's, Boards, CIOs and CISOs across cyber operations, the business of cybersecurity and leadership and teamwork.
Serving as a Senior Fellow at George Washington/Auburn Universities Center for Cyber and Homeland Security.
Cyber advisor to Private Equity (PE) and Venture Capital firms (NightDragon, Capital Partners, Dell Technologies Capital-Kingdom, Chertoff and others) on cyber market trends and specific acquisition targets related to their portfolio. And I am a member of several CISO only professional organizations, providing insight, coaching and support to the CISO community.
Published articles in CSO Magazine, Dark Reading, SC Magazine, SecurityNow, ModernCISO, and news media publications (Wall Street Journal, Washing Post, CNN, Fox) and have been featured in Cyber Defense Magazine, ISMG’s BankInfoSecurity, TechTarget.com.
I have spoken at conferences and events for 15 years on cybersecurity, business, national security and leadership.
Before I got into cybersecurity I was a Special Operations soldier (18A) Green Beret for many years supporting JSOC and the Intelligence community on multiple global deployments.
Available For: Advising, Authoring, Consulting, Influencing, Speaking
Travels From: Virginia
Speaking Topics: Cybersecurity, SOC, Cyber Diplomacy, Digital Transformation, Enterprise Business Risk, Cyber Operations, Cyber Intelligence and deception, nation sta
| Geoff Hancock | Points |
|---|---|
| Academic | 20 |
| Author | 23 |
| Influencer | 3 |
| Speaker | 25 |
| Entrepreneur | 20 |
| Total | 91 |
Points based upon Thinkers360 patent-pending algorithm.
Senior Fellow-Adjunct Professor Cybersecurity & Homeland Security
Tags: Cybersecurity, Privacy, Security
Advanced Cybersecurity Group Principal Geoff Hancock Joins the National Technology Security Coalition’s Advisory Board
Tags: Cybersecurity, Digital Transformation, Security
Being a Leader People Admire
Tags: Cybersecurity, Digital Transformation, Security
Your Leadership in 2024: Steering Business and Cybersecurity – 8 things you need to know and review at least monthly.
Tags: Cybersecurity, Leadership
Leadership this year - Leadership in 2024 – what will you change?
Tags: Cybersecurity, Leadership
Leadership Negligence or Responsibility- How can CISO's navigate this?
Tags: Cybersecurity, Leadership
Prioritizing preparation for incoming attacks –STOP playing defense all the time!
Tags: Cybersecurity
3 ideas that will guide your leadership success
Tags: Cybersecurity, Leadership
Leadership Metrics: How to Assess Your Impact and Elevate Your Team
Tags: Cybersecurity, Leadership
10 Signs You're in a Toxic Work Environment
Tags: Cybersecurity
Cyber Resilience Strategy–you gotta start somewhere.
Tags: Cybersecurity, Business Strategy
Can CISOs give business advice?
Tags: Cybersecurity, Risk Management, Business Strategy
How to build a cyber-resilience culture in the enterprise
Tags: Cybersecurity, Leadership, Risk Management
4 Pillars of Cyber Resilience
Tags: Cybersecurity, Digital Transformation, Risk Management
What Is Cyber Vault and How Does It Relate to Cyber Resilience?
Tags: Cybersecurity, Digital Transformation, Security
Strategic Actions You Can Take After SolarWinds
Tags: Cybersecurity, Digital Transformation, Security
SolarWinds Supply Chain Breach: What You Need to Know
Tags: Cybersecurity, Digital Transformation, Security
Cyber Resilience for Your Business
Tags: Cybersecurity, Digital Transformation, Security
Tags: GovTech, 5G, National Security
Tags: Cybersecurity, Risk Management, Security
Do you really CELEBRATE Memorial Day?
Tags: Cybersecurity, Digital Transformation
Make Sure You Are Not Helping The Russians Spy On American Asset
Tags: Cybersecurity, Security, National Security
Tags: Cybersecurity, Digital Transformation, Security
Tags: Cloud, Cybersecurity, Security
Tags: Cybersecurity, Data Center, Risk Management
Tags: Cybersecurity, Digital Transformation, Security
Tags: Cybersecurity, Digital Transformation, Security
Tags: Cybersecurity, Digital Transformation, Security
Tags: Cybersecurity, Digital Transformation, Risk Management
Tags: Cybersecurity, Digital Transformation, Risk Management
Tags: Cybersecurity, Digital Transformation, Security
Tags: Cybersecurity, Digital Transformation, Security
Tags: Cybersecurity, Emerging Technology, Risk Management