Thinkers360
Interested in getting your own thought leader profile? Get Started Today.

G Hancock

Global Cybersecurity Strategy, CISO/CTO at World Wide Technologies

Washington DC, United States

I’m an experienced highly techncial cybersecurity and business professional with several decades of operational and leadership experience. Across Military, IC, DHS and commercial sectors. with additional experience globally. As a CISO and business leader I am able to help organizations run and manage cyber operations efficiently and create, produce and protect business value.

My professional focal points include
15 years as a CISO with experience across private and public sector organizations
Built/ran over 36 Security Operations Centers (SOC), for governments and commercial entities.
Building/leading Cyber Professional services practices. (built 2 ran 2)
Working with/mentoring CISO’s (federal and commercial)
Working with CEO’s and staff to help manage cyber risk.
Advising senior leadership across the federal government on national security, cybersecurity and countering nation state threats. (Congressional adviser)
-Certifications CISSP, CISA, PMP, CEH and various IT and Cyber certs

Specific expertise(technical skills)
-Helping both business and technical executives successfully implement cyber programs and reduce risk.
- Cyber operations, systems engineering, Cloud security.
-Cyber Intelligence Operations (Cyber Intel Training & Programs)
-Cyber Deception Programs & instruction
-Active Cyber Defense Programs
-Cyber Resilience Programs
-Offensive Cyber Operations
-Business and Cybersecurity Enterprise Risk Assessment
-Incident Response and Crisis management
-Insider Threat program development and operations

Instructor/Adjunct Professor
George Washington University World Cyber MBA program
National Intelligence University
Army Cyber Command.

Advisor
-DHS/DNI advisor to committee on security threats
-Senior Fellow at George Washington/Auburn Universities Center for Cyber and Homeland Security.
-Cyber and National Security Adviser Cipher Brief (Cipherbrief.com)
-CISO/Cyber Adviser for NTSC.org (largest private sector CISO organization)
-Chairman of the Federal CISO Alliance
-Editor/writer/adviser on-CIS 20 Critical Security Controls, NIST Cybersecurity

-Speaker at cyber conferences and private corporate/government events. (RSA, ISC2, Blackhat, US
Cyber Crime Conference, Gartner)

Available For: Advising, Authoring, Consulting, Influencing, Speaking
Travels From: Virginia
Speaking Topics: Cybersecurity, SOC, Cyber Diplomacy, Digital Transformation, Enterprise Business Risk, Cyber Operations, Cyber Intelligence and deception, nation sta

Speaking Fee $1

G Hancock Points
Academic 20
Author 6
Influencer 0
Speaker 6
Entrepreneur 0
Total 32

Points based upon Thinkers360 patent-pending algorithm.

Thought Leader Profile

Portfolio Mix

Company Information

Company Type: Company
Media Experience: 15

Areas of Expertise

5G 30.13
Agile
Blockchain
Business Continuity
Business Strategy
Change Management
Cloud
Cybersecurity 32.52
Digital Disruption
Digital Transformation 30.09
Emerging Technology 30.15
Entrepreneurship
Fintech
Govtech 30.18
Healthtech
Innovation
IoT
Leadership
Management
Privacy 31.76
Risk Management 31.46
Security 39.48
Startups
Supply Chain
Data Center

Industry Experience

Aerospace & Defense
Automotive
Chemicals
Consumer Products
Engineering & Construction
Federal & Public Sector
Financial Services & Banking
Healthcare
High Tech & Electronics
Higher Education & Research
Industrial Machinery & Components
Manufacturing
Oil & Gas
Pharmaceuticals
Professional Services
Retail
Telecommunications
Utilities

Publications

1 Academic Fellow / Scholar
Senior Fellow-Adjunct Professor Cybersecurity & Homeland Security
George Washington Center for Cyber and Homeland Security
February 01, 2015
Adjunct Professor at the World Cyber MBA Program | Key contributor/editor to Active Cyber Defense Program and advises a diverse group of government and corporate officials regarding federal and international policy of cybersecurity, issues and impacts of various breaches, cyber best practices and national security issues.
I meet with international representatives from various governments. Advising on cyber operations and policy, nation state threats and CT issues.

Washington DC--- The George Washington University Center for Cyber and Homeland Security (CCHS) has selected for a second time Geoff Hancock as a member of their Senior Fellows Program.

"I am very excited to join this new group exceptional professionals in cyber, national defense and homeland security who will be offering meaningful research and solutions for adoption by government and the private sector,” Hancock said after the announcement.

"We look forward to continuing to work with Geoff and utilizing his leadership and expertise working on new program and initiatives with this new cohort" said Frank Cilluffo Founder and Director of the Center for Cyber and Homeland Security.

CCHS's senior fellows are a distinguished group of policy experts and practitioners in the areas of cybersecurity, counterterrorism, and homeland security, drawn from the private sector, government, academia, and the non-profit sector.

As a senior fellow Hancock will help to set the Center's policy and research agenda through his role serving on the Center's task forces. In addition, he contributes to the work of the Center by participating as a speaker at policy events; writing and publishing policy reports, opinion pieces, and blog posts; and engaging in outreach with the news media and other stakeholders.

See publication

Tags: Cybersecurity, Privacy, Security

3 Article/Blogs
4 Pillars of Cyber Resilience
WWT
October 07, 2021
The proliferation of high-profile, sophisticated ransomware attacks has brought cyber resilience into the spotlight. Board members, regulators and government leaders are asking CISOs to get their organizations “resilient” ASAP. But what does a cyber resilience program actually look like?

To answer this question, it’s important to understand that cyber resilience differs from traditional security disciplines in that it’s not preventative in nature. Instead, cyber resilience assumes a breach will occur. The goal of cyber resilience is to make sure an organization maintains critical business operations when one does.

See publication

Tags: Cybersecurity, Digital Transformation, Risk Management

Losing Our National Security Through 5G Networks
Cypher Brief
October 01, 2020
The advent of 4G technology in 2006 and subsequent Smartphones completely changed the world of communication. Now 5G, which will be able to support billions of newly connected sensors and new classes of devices, stands to make an exponentially larger global impact. With 5G’s expanded accessibility to internet services across all industries, it’s even more imperative to highlight privacy issues, national security and defense risks.

See publication

Tags: 5G, Cybersecurity, Govtech

Evolving Cybersecurity Operations Across the Organization
Geoff Hancock
August 12, 2020
Successfully defending the organization requires more than guarding against security threats. As organizational success and technology become more intertwined, a holistic cybersecurity operations program can be the piece of the puzzle that helps CISOs connect organizational goals, technology investments and daily defense.

See publication

Tags: Cybersecurity, Risk Management, Security

1 Miscellaneous
Cyber Resilience
WWT
June 03, 2021
Many global organizations now regard state-sponsored cybersecurity attacks as a major threat. Ransomware attacks have become the most lucrative cyber-crime area —  in 2020 approximately 58% of ransomware victims paid versus 39% in 2017. It's no wonder — attacks ranging from nuisance malware to more sophisticated attacks can cripple an entire organization.  

To mitigate cybersecurity risks, organizations of all sizes and industries are exploring more robust capabilities and frameworks to detect, prevent and respond to these attacks. One of these advanced capabilities is called cyber resilience. It gives an organization the ability to prepare for, withstand, recover from and adapt to adverse conditions, stresses, attacks or compromises on cyber resources.

See publication

Tags: Cybersecurity, Data Center, Risk Management

2 Speaking Engagements
Four Pillars of Cyber Resilience
WWT
November 10, 2021
Cyber resilience is one of the biggest trends in cybersecurity. With the proliferation of damaging ransomware attacks and enterprise-wide threats, organizations are increasingly required to have a cyber resilience program. But the best way to build a program remains a topic of confusion. Join host Robb Boyd as he speaks with WWT’s Geoff Hancock, Global Director of Cybersecurity Engineering and Scott Webb, Global Storage Practice Manager, as they dig into the nuances of cyber resilience.

See publication

Tags: Cybersecurity, Digital Transformation, Risk Management

Holistic Approach to Cybersecurity
WWT
February 01, 2021
Business and technology executives are challenged with aligning business goals, increased dependence on technology and the responsibility to secure the organizations most important assets. As any breach report can attest, this is a complicated task that requires a balance of understanding the business risks and goals, managing technology tied into the responsibility to secure the organization and its assets. That is why it is critical that organizations stop being focused on specific solutions and start looking at their organization holistically. How can organizations holistically be secure? In this episode, we will discuss the elements that make up an enterprise wide security program and how this program impact every aspect of the organization. We will also discuss traditional cyber operations and compare it to how some organizations are being more proactive with how they approach holistic cyber security, and we will outline how business executives are managing their cyber risk.

See publication

Tags: Cybersecurity, Digital Transformation, Risk Management

1 Whitepaper
Cyber Deception
Geoff Hancock
October 01, 2020
Today’s cyber defenders are at a disadvantage. Some tools and methods like whitelisting IP addresses are intended
to help them be somewhat proactive. But by and large, today’s cyber operations have been designed to respond only
after attacks take place. This gives adversaries a significantly asymmetric advantage: They can probe systems,
and then prepare and launch attacks within a short period, leaving little opportunity for defenders to defeat them.
A critical change in approach is needed. Cyber deception is an emerging proactive cyber defense methodology that, when done
well, can put the defender in the driver’s seat. It enables defenders to lead the attacker and gather intelligence on the adversary’s
tools, methods, and behaviors. In this way, defenders have the upper hand in cyber operations.

See publication

Tags: Cybersecurity, Emerging Technology, Risk Management

Radar

Blog

Opportunities

Contact G Hancock

Book G Hancock for Speaking

Book a Meeting

Media Kit

Share Profile

Contact Info

  Profile

G Hancock