Thinkers360
Interested in getting your own thought leader profile? Get Started Today.

Geoff Hancock

Global Cybersecurity Strategy, CISO/CTO at World Wide Technologies

Washington DC, United States

I’m an experienced highly techncial cybersecurity and business professional with several decades of operational and leadership experience. Across Military, IC, DHS and commercial sectors. with additional experience globally. As a CISO and business leader I am able to help organizations run and manage cyber operations efficiently and create, produce and protect business value.

My professional focal points include
17 years as a CISO with experience across private and public sector organizations
Built/ran over 36 Security Operations Centers (SOC), for governments and commercial entities.
Building/leading Cyber Professional services practices. (built 2 ran 2)
Working with/mentoring CISO’s (federal and commercial)
Working with CEO’s and staff to help manage cyber risk.
Advising senior leadership across the federal government on national security, cybersecurity and countering nation state threats. (Congressional adviser)
-Certifications CISSP, CISA, PMP, CEH and various IT and Cyber certs

Specific expertise(technical skills)
-Helping both business and technical executives successfully implement cyber programs and reduce risk.
- Cyber operations, systems engineering, Cloud security.
-Cyber Intelligence Operations (Cyber Intel Training & Programs)
-Cyber Deception Programs & instruction
-Active Cyber Defense Programs
-Cyber Resilience Programs
-Offensive Cyber Operations
-Business and Cybersecurity Enterprise Risk Assessment
-Incident Response and Crisis management
-Insider Threat program development and operations

Instructor/Adjunct Professor
George Washington University World Cyber MBA program
National Intelligence University
Army Cyber Command.

Advisor
-DHS/DNI advisor to committee on security threats
-Senior Fellow at George Washington/Auburn Universities Center for Cyber and Homeland Security.
-Cyber and National Security Adviser Cipher Brief (Cipherbrief.com)
-CISO/Cyber Adviser for NTSC.org (largest private sector CISO organization)
-Chairman of the Federal CISO Alliance
-Editor/writer/adviser on-CIS 20 Critical Security Controls, NIST Cybersecurity

-Speaker at cyber conferences and private corporate/government events. (RSA, ISC2, Blackhat, US
Cyber Crime Conference, Gartner)

Available For: Advising, Authoring, Consulting, Influencing, Speaking
Travels From: Virginia
Speaking Topics: Cybersecurity, SOC, Cyber Diplomacy, Digital Transformation, Enterprise Business Risk, Cyber Operations, Cyber Intelligence and deception, nation sta

Speaking Fee $1 (In-Person)

Geoff Hancock Points
Academic 20
Author 13
Influencer 3
Speaker 25
Entrepreneur 20
Total 81

Points based upon Thinkers360 patent-pending algorithm.

Thought Leader Profile

Portfolio Mix

Company Information

Company Type: Company
Media Experience: 15

Areas of Expertise

5G 30.12
Agile
Blockchain
Business Continuity
Business Strategy
Change Management
Cloud 30.24
Cybersecurity 35.87
Digital Disruption
Digital Transformation 30.66
Emerging Technology 30.15
Entrepreneurship
FinTech
GovTech 30.18
HealthTech
Innovation
IoT
Leadership 30.03
Management
Privacy 31.76
Risk Management 31.49
Security 42.05
Startups
Supply Chain
Data Center
National Security 31.28

Industry Experience

Aerospace & Defense
Automotive
Chemicals
Consumer Products
Engineering & Construction
Federal & Public Sector
Financial Services & Banking
Healthcare
High Tech & Electronics
Higher Education & Research
Industrial Machinery & Components
Manufacturing
Oil & Gas
Pharmaceuticals
Professional Services
Retail
Telecommunications
Utilities

Publications

1 Academic Fellow / Scholar
Senior Fellow-Adjunct Professor Cybersecurity & Homeland Security
George Washington Center for Cyber and Homeland Security
February 01, 2015
Adjunct Professor at the World Cyber MBA Program | Key contributor/editor to Active Cyber Defense Program and advises a diverse group of government and corporate officials regarding federal and international policy of cybersecurity, issues and impacts of various breaches, cyber best practices and national security issues.
I meet with international representatives from various governments. Advising on cyber operations and policy, nation state threats and CT issues.

Washington DC--- The George Washington University Center for Cyber and Homeland Security (CCHS) has selected for a second time Geoff Hancock as a member of their Senior Fellows Program.

"I am very excited to join this new group exceptional professionals in cyber, national defense and homeland security who will be offering meaningful research and solutions for adoption by government and the private sector,” Hancock said after the announcement.

"We look forward to continuing to work with Geoff and utilizing his leadership and expertise working on new program and initiatives with this new cohort" said Frank Cilluffo Founder and Director of the Center for Cyber and Homeland Security.

CCHS's senior fellows are a distinguished group of policy experts and practitioners in the areas of cybersecurity, counterterrorism, and homeland security, drawn from the private sector, government, academia, and the non-profit sector.

As a senior fellow Hancock will help to set the Center's policy and research agenda through his role serving on the Center's task forces. In addition, he contributes to the work of the Center by participating as a speaker at policy events; writing and publishing policy reports, opinion pieces, and blog posts; and engaging in outreach with the news media and other stakeholders.

See publication

Tags: Cybersecurity, Privacy, Security

1 Advisory Board Membership
Advanced Cybersecurity Group Principal Geoff Hancock Joins the National Technology Security Coalition’s Advisory Board
NTSC
August 22, 2018
Geoff Hancock, Principal of Advanced Cybersecurity Group, has joined the National Technology Security Coalition’s (NTSC) Advisory Board. The NTSC Advisory Board serves as a forum for national cybersecurity policy leaders, technology executives, and vendor companies to discuss national policy issues that impact their ability to conduct business. They also help guide the NTSC Board’s involvement with advocacy initiatives.

See publication

Tags: Cybersecurity, Digital Transformation, Security

10 Article/Blogs
How to build a cyber-resilience culture in the enterprise
https://www.techtarget.com/searchsecurity/post/How-to-build-a-cyber-resilience-culture-in-the-enterprise
January 24, 2023

See publication

Tags: Cybersecurity, Leadership, Risk Management

4 Pillars of Cyber Resilience
WWT
October 07, 2021
The proliferation of high-profile, sophisticated ransomware attacks has brought cyber resilience into the spotlight. Board members, regulators and government leaders are asking CISOs to get their organizations “resilient” ASAP. But what does a cyber resilience program actually look like?

To answer this question, it’s important to understand that cyber resilience differs from traditional security disciplines in that it’s not preventative in nature. Instead, cyber resilience assumes a breach will occur. The goal of cyber resilience is to make sure an organization maintains critical business operations when one does.

See publication

Tags: Cybersecurity, Digital Transformation, Risk Management

What Is Cyber Vault and How Does It Relate to Cyber Resilience?
WWT
March 26, 2021
Many global organizations now regard state-sponsored cybersecurity attacks as a major threat. Ransomware attacks have become the most lucrative cyber-crime area --  in 2020 approximately 58% of ransomware victims paid versus 39% in 2017. It's no wonder -- attacks ranging from nuisance malware to more sophisticated attacks can cripple an entire organization.  

See publication

Tags: Cybersecurity, Digital Transformation, Security

Strategic Actions You Can Take After SolarWinds
WWT
January 28, 2021
The cybersecurity world saw a dramatic end to 2020 with the disclosure of a large-scale, sophisticated breach orchestrated through the SolarWinds supply chain that affected to more than 18,000 organizations. For the first few weeks following the breach, organizations performed due diligence to identify and mitigate the impact. But what do you do now as we emerge from tactical response to developing a proactive strategy in 2021?

See publication

Tags: Cybersecurity, Digital Transformation, Security

SolarWinds Supply Chain Breach: What You Need to Know
WWT
December 18, 2020
SolarWinds, a popular provider of IT and monitoring solutions, has disclosed a large-scale breach. FireEye has attributed attacks to a sophisticated nation-state actor group. Once SolarWinds was breached, actors modified source code updates to the Orion platform to include malware. To date, compromised update packages include 2019.4 HF5 through 2020.2.1, deployed during March 2020 to June 2020 to clients through supply chain updates to the Orion platform.

See publication

Tags: Cybersecurity, Digital Transformation, Security

Cyber Resilience for Your Business
WWT
October 18, 2020
Cybersecurity and cyber resilience are distinct disciplines. Cybersecurity is comprised of mostly defensive actions and what can be done to keep attackers out. Cyber resilience is designed to minimize the impact of a cyberattack on the organization. You have to start from the perspective that you are attacked.

See publication

Tags: Cybersecurity, Digital Transformation, Security

Losing Our National Security Through 5G Networks
Cypher Brief
October 01, 2020
The advent of 4G technology in 2006 and subsequent Smartphones completely changed the world of communication. Now 5G, which will be able to support billions of newly connected sensors and new classes of devices, stands to make an exponentially larger global impact. With 5G’s expanded accessibility to internet services across all industries, it’s even more imperative to highlight privacy issues, national security and defense risks.

See publication

Tags: GovTech, 5G, National Security

Evolving Cybersecurity Operations Across the Organization
Geoff Hancock
August 12, 2020
Successfully defending the organization requires more than guarding against security threats. As organizational success and technology become more intertwined, a holistic cybersecurity operations program can be the piece of the puzzle that helps CISOs connect organizational goals, technology investments and daily defense.

See publication

Tags: Cybersecurity, Risk Management, Security

Do you really CELEBRATE Memorial Day?
LinkedIn
May 27, 2019
Today there are many articles, Op-Eds, LinkedIn posts, Tweets etc all reminding us of the ultimate sacrifice that was made today.

See publication

Tags: Cybersecurity, Digital Transformation

Make Sure You Are Not Helping The Russians Spy On American Asset
LinkedIn
June 02, 2018
Fancy Bear, the same Russian hacking group responsible for the DNC breach, recently released a well-designed malware capable of not only stealing data, but remotely shutting off Internet services of organizations that use certain internet routers and Internet of Things (IoT) devices. Its purpose is offensive cyber operations against many targets, placing businesses, federal agencies, and the national security infrastructure possibly at risk.

See publication

Tags: Cybersecurity, Security, National Security

1 Keynote
GEOFF HANCOCK Senior Executive Cyber Security George Washington Center for Cyber and Homeland Security
Docplayer
September 22, 2015
1 DON T MISS OUT ON THE OPPORTUNITY TO: IQPC S CYBER SECURITY SERIES PRESENTS Hear from the EMV designers to learn how implementing this technology will protect your network Learn how to keep retailers and customers safe with innovative network solution such as Advanced Threat Protection SEPTEMBER ORLANDO, FLORIDA Protect Your Network and Customer Data by Incorporating Effective and Efficient Solutions To Safeguard Your Company s Future HEAR FROM THE EXPERTS: ANDRE MACHICAO SVP Merchant Solutions VISA HARRIS SCHWARTZ Senior Manager Cyber Security Levi Strauss & Co. STEVE WINTERFELD Information Security Officer Fortune 200 Retailer Sponsor: Media Partners: MAURICE EDWARDS SVP Enterprise Risk Management Mattress Firm BRIAN ENGLE Executive Director Retail Cyber Intelligence Sharing Center GEOFF HANCOCK Senior Executive Cyber Security George Washington Center for Cyber and Homeland Security Understand how spending money on solutions like Anti Virus and Internet security software will save money for your company in the end WHAT TYPES OF RETAILERS WILL YOU HAVE THE OPPORTUNITY TO MEET? Global Department Stores Leading Supermarkets Prominent Warehouse Retailers Well-known Specialty Retailers Established Convenience Retailers Recognized Discount Retailers WHAT TOPICS WILL YOU LEARN ABOUT? EMV Implementation and Tokenization How to Safeguard Customer Data With Mobile Wallets Alternative Approaches for Online Payments Identifying the Weakest Entries of Your Network How to Balance Reactivity and Proactivity in Threat Monitoring an Incident Response New Cyber Security Regulations that Could Effect Your Company in the Future

See publication

Tags: Cybersecurity, Digital Transformation, Security

1 Media Interview
conversation with Geoff Hancock, Global Director Cybersecurity strategy and development
YouTube
March 23, 2022
Geoff is the Global Director of Strategy for technology/solutions development and customer innovation.
This includes all aspects of security operations and specialty programs such as: Security Operations Centers, Cyber Resilience, OT Security as well as some core security disciplines. Also, work with private/public sector executives (CISO-CIO-CEO) on cyber opertions, risk management-from strategy to tactical programs.

See publication

Tags: Cloud, Cybersecurity, Security

1 Miscellaneous
Cyber Resilience
WWT
June 03, 2021
Many global organizations now regard state-sponsored cybersecurity attacks as a major threat. Ransomware attacks have become the most lucrative cyber-crime area —  in 2020 approximately 58% of ransomware victims paid versus 39% in 2017. It's no wonder — attacks ranging from nuisance malware to more sophisticated attacks can cripple an entire organization.  

To mitigate cybersecurity risks, organizations of all sizes and industries are exploring more robust capabilities and frameworks to detect, prevent and respond to these attacks. One of these advanced capabilities is called cyber resilience. It gives an organization the ability to prepare for, withstand, recover from and adapt to adverse conditions, stresses, attacks or compromises on cyber resources.

See publication

Tags: Cybersecurity, Data Center, Risk Management

3 Panels
Cyber Intelligence Initiative Inaugural Conference: Breakout Session A
YouTube
May 24, 2016
This certification provides a comprehensive, strategic, and practical, in-depth understanding of the growing importance of cyber intelligence capabilities and analysis for U.S. corporations and government agencies. By combining the operational and strategic value of cyber intelligence as applied to both government and corporate users, this certification will help government and industry professionals create clarity around breaches and cyber events, and create deterrence strategies to better protect their organizations in this ever changing cyber battlefield.

See publication

Tags: Cybersecurity, Digital Transformation, Security

Cyber Intelligence: Operationalizing Best Practices
YouTube
October 19, 2015
When an organization incurs a network intrusion, an attempt to degrade its network capabilities, or other cyber incident against its systems and data, cyber intelligence can provide exquisite insight into the tactics, techniques and procedures (TTPs) implemented as well as the motivations and capabilities of the perpetrator. Organizations looking to gain greater insight into the threat environment are now integrating cyber intelligence into their operations, from the strategic-minded executive leadership to the operational managers and the tactical, on-the-network cybersecurity personnel. Panelists will examine the best practices of cyber intelligence, and how organizations from the public, private, nonprofit and academic sectors can benefit.

See publication

Tags: Cybersecurity, Digital Transformation, Security

Understanding Cyber Adversaries
C - Span
February 22, 2013
Senior officials from government agencies discussed efforts to guard against cyber attacks. They said the rapid pace of change in the cyber world often clashed with government’s ability to deploy tools for combating the threats. Jeff Eisensmith, of the Homeland Security Department, said a bigger budget would allow his agency to do a better job of policing the information technology supply chain, which is one of the areas vulnerable to cyber attacks.

See publication

Tags: Cybersecurity, Digital Transformation, Security

2 Speaking Engagements
Four Pillars of Cyber Resilience
WWT
November 10, 2021
Cyber resilience is one of the biggest trends in cybersecurity. With the proliferation of damaging ransomware attacks and enterprise-wide threats, organizations are increasingly required to have a cyber resilience program. But the best way to build a program remains a topic of confusion. Join host Robb Boyd as he speaks with WWT’s Geoff Hancock, Global Director of Cybersecurity Engineering and Scott Webb, Global Storage Practice Manager, as they dig into the nuances of cyber resilience.

See publication

Tags: Cybersecurity, Digital Transformation, Risk Management

Holistic Approach to Cybersecurity
WWT
February 01, 2021
Business and technology executives are challenged with aligning business goals, increased dependence on technology and the responsibility to secure the organizations most important assets. As any breach report can attest, this is a complicated task that requires a balance of understanding the business risks and goals, managing technology tied into the responsibility to secure the organization and its assets. That is why it is critical that organizations stop being focused on specific solutions and start looking at their organization holistically. How can organizations holistically be secure? In this episode, we will discuss the elements that make up an enterprise wide security program and how this program impact every aspect of the organization. We will also discuss traditional cyber operations and compare it to how some organizations are being more proactive with how they approach holistic cyber security, and we will outline how business executives are managing their cyber risk.

See publication

Tags: Cybersecurity, Digital Transformation, Risk Management

2 Webinars
TEC37 Security Series E08 The Four Pillars of Cyber Resilience
YouTube
January 13, 2022
Cyber resilience is one of the biggest trends in cybersecurity. With the proliferation of damaging ransomware attacks and enterprise-wide threats, organizations are increasingly required to have a cyber resilience program. But the best way to build a program remains a topic of confusion. Join host Robb Boyd as he speaks with WWT’s Geoff Hancock, Global Director of Cybersecurity Engineering and Scott Webb, Global Storage Practice Manager, as they dig into the nuances of cyber resilience

See publication

Tags: Cybersecurity, Digital Transformation, Security

An Approach to Prioritize Threats for Government Agencies
YouTube
February 26, 2015
Todd Harris, Director, Product Marketing, Core Security and Geoff Hancock, CEO, Advanced Cybersecurity Group discuss how to mature and operationalize Threat and Vulnerability Management programs, efficiently approach the Risk Management Framework, establish well-defined processes, continuous monitoring, and risk assessments.

See publication

Tags: Cybersecurity, Digital Transformation, Security

1 Whitepaper
Cyber Deception
Geoff Hancock
October 01, 2020
Today’s cyber defenders are at a disadvantage. Some tools and methods like whitelisting IP addresses are intended
to help them be somewhat proactive. But by and large, today’s cyber operations have been designed to respond only
after attacks take place. This gives adversaries a significantly asymmetric advantage: They can probe systems,
and then prepare and launch attacks within a short period, leaving little opportunity for defenders to defeat them.
A critical change in approach is needed. Cyber deception is an emerging proactive cyber defense methodology that, when done
well, can put the defender in the driver’s seat. It enables defenders to lead the attacker and gather intelligence on the adversary’s
tools, methods, and behaviors. In this way, defenders have the upper hand in cyber operations.

See publication

Tags: Cybersecurity, Emerging Technology, Risk Management

Thinkers360 Credentials

7 Badges

Radar

Blog

Opportunities

Contact Geoff Hancock

Book Geoff Hancock for Speaking

Book a Meeting

Media Kit

Share Profile

Contact Info

  Profile

Geoff Hancock