Thinkers360
Interested in getting your own thought leader profile? Get Started Today.

Geoff Hancock

Deputy CEO and Global CISO at Access Point Consulting

Washington DC, United States

As an experienced business and technology (6x CISO) executive across corporate and government organizations, with 20+ years of experience in advising and empowering business and technology leaders to effectively manage their cybersecurity strategies and operations across industries. I specialize in enterprise risk management, cyber operations, business and technology transformation, digital security transformation, and enterprise risk.

My professional focal points include
Specialties:
CISO (fortune 100), leadership, CISO-CIO coaching, business executive, cyber operations, national security policy, professional services, advisory boards, Board of Directors, Adjunct Professor, Task Force member (DHS-ODNI), M&A, VC and PE advisor. Co-author/contributor to NIST CSF, CIS 18 and MITRE Attack Framework.

I have built or run 36 Security Operations Centers (SOC) and led small to large engineering and operations teams.

I have built and run many Cyber Intelligence programs for corporations and government agencies.
As an Adjunct professor I have created content and taught: Cyber MBA program, Cyber Intelligence, National Security George Washington University, US Army Cyber Command, National Intelligence University and lectured across several universities.
Strong and deep expertise across many verticals-(Finance-Government- Healthcare-Telecommunications- Supply Chain-Manufacturing-OT/IoT-Aviation)

I work with CEO's, Boards, CIOs and CISOs across cyber operations, the business of cybersecurity and leadership and teamwork.

Serving as a Senior Fellow at George Washington/Auburn Universities Center for Cyber and Homeland Security.

Cyber advisor to Private Equity (PE) and Venture Capital firms (NightDragon, Capital Partners, Dell Technologies Capital-Kingdom, Chertoff and others) on cyber market trends and specific acquisition targets related to their portfolio. And I am a member of several CISO only professional organizations, providing insight, coaching and support to the CISO community.

Published articles in CSO Magazine, Dark Reading, SC Magazine, SecurityNow, ModernCISO, and news media publications (Wall Street Journal, Washing Post, CNN, Fox) and have been featured in Cyber Defense Magazine, ISMG’s BankInfoSecurity, TechTarget.com.

I have spoken at conferences and events for 15 years on cybersecurity, business, national security and leadership.

Before I got into cybersecurity I was a Special Operations soldier (18A) Green Beret for many years supporting JSOC and the Intelligence community on multiple global deployments.

Available For: Advising, Authoring, Consulting, Influencing, Speaking
Travels From: Virginia
Speaking Topics: Cybersecurity, SOC, Cyber Diplomacy, Digital Transformation, Enterprise Business Risk, Cyber Operations, Cyber Intelligence and deception, nation sta

Geoff Hancock Points
Academic 20
Author 23
Influencer 3
Speaker 25
Entrepreneur 20
Total 91

Points based upon Thinkers360 patent-pending algorithm.

Thought Leader Profile

Portfolio Mix

Company Information

Company Type: Enterprise
Minimum Project Size: N/A
Average Hourly Rate: N/A
Number of Employees: 251-500
Company Founded Date: Undisclosed
Media Experience: 15

Areas of Expertise

5G 30.02
Agile
Blockchain
Business Continuity
Business Strategy 30.08
Change Management
Cloud 30.12
Cybersecurity 33.36
Data Center
Digital Disruption
Digital Transformation 30.67
Emerging Technology 30.14
Entrepreneurship
FinTech
GovTech 30.09
HealthTech
Innovation
IoT
Leadership 30.09
Management
National Security 31.09
Privacy 31.65
Risk Management 31.07
Security 35.04
Startups
Supply Chain

Industry Experience

Aerospace & Defense
Automotive
Chemicals
Consumer Products
Engineering & Construction
Federal & Public Sector
Financial Services & Banking
Healthcare
High Tech & Electronics
Higher Education & Research
Industrial Machinery & Components
Manufacturing
Oil & Gas
Pharmaceuticals
Professional Services
Retail
Telecommunications
Utilities

Publications

1 Academic Fellow / Scholar
Senior Fellow-Adjunct Professor Cybersecurity & Homeland Security
George Washington Center for Cyber and Homeland Security
February 01, 2015
Adjunct Professor at the World Cyber MBA Program | Key contributor/editor to Active Cyber Defense Program and advises a diverse group of government and corporate officials regarding federal and international policy of cybersecurity, issues and impacts of various breaches, cyber best practices and national security issues.
I meet with international representatives from various governments. Advising on cyber operations and policy, nation state threats and CT issues.

Washington DC--- The George Washington University Center for Cyber and Homeland Security (CCHS) has selected for a second time Geoff Hancock as a member of their Senior Fellows Program.

"I am very excited to join this new group exceptional professionals in cyber, national defense and homeland security who will be offering meaningful research and solutions for adoption by government and the private sector,” Hancock said after the announcement.

"We look forward to continuing to work with Geoff and utilizing his leadership and expertise working on new program and initiatives with this new cohort" said Frank Cilluffo Founder and Director of the Center for Cyber and Homeland Security.

CCHS's senior fellows are a distinguished group of policy experts and practitioners in the areas of cybersecurity, counterterrorism, and homeland security, drawn from the private sector, government, academia, and the non-profit sector.

As a senior fellow Hancock will help to set the Center's policy and research agenda through his role serving on the Center's task forces. In addition, he contributes to the work of the Center by participating as a speaker at policy events; writing and publishing policy reports, opinion pieces, and blog posts; and engaging in outreach with the news media and other stakeholders.

See publication

Tags: Cybersecurity, Privacy, Security

1 Advisory Board Membership
Advanced Cybersecurity Group Principal Geoff Hancock Joins the National Technology Security Coalition’s Advisory Board
NTSC
August 22, 2018
Geoff Hancock, Principal of Advanced Cybersecurity Group, has joined the National Technology Security Coalition’s (NTSC) Advisory Board. The NTSC Advisory Board serves as a forum for national cybersecurity policy leaders, technology executives, and vendor companies to discuss national policy issues that impact their ability to conduct business. They also help guide the NTSC Board’s involvement with advocacy initiatives.

See publication

Tags: Cybersecurity, Digital Transformation, Security

20 Article/Blogs
Being a Leader People Admire
LinkedIn
March 21, 2024
It's about something other than having the loudest voice or the most authoritative presence.

See publication

Tags: Cybersecurity, Digital Transformation, Security

Your Leadership in 2024: Steering Business and Cybersecurity – 8 things you need to know and review at least monthly.
LinkedIn
January 18, 2024
The traditional, linear approach to leadership is not adequate for leaders anymore. Today's leaders must navigate a landscape where change is the only constant, and old management paradigms have become obsolete.

See publication

Tags: Cybersecurity, Leadership

Leadership this year - Leadership in 2024 – what will you change?
LinkedIn
December 22, 2023
The Prussian military strategist Karl von Clausewitz once said, "Everything in war is easy, but the easy things are difficult." All the theories, five-step workshops, and how-to books on leadership, emotional intelligence, and self-improvement often oversimplify the implementation process, making it appear straightforward. However, leadership is a nuanced blend of art and science.

See publication

Tags: Cybersecurity, Leadership

Leadership Negligence or Responsibility- How can CISO's navigate this?
LinkedIn
December 12, 2023
Leading is like conducting a symphony, where each instrument plays a vital role. It's about orchestrating harmony, even amidst diverse notes.

See publication

Tags: Cybersecurity, Leadership

Prioritizing preparation for incoming attacks –STOP playing defense all the time!
LinkedIn
October 23, 2023
I recently conversed with a prominent CEO whose company had experienced a breach earlier this year. This discussion unfolded over meetings with the Board of Directors and executive leadership sans the Chief Information Security Officer (CISO).

See publication

Tags: Cybersecurity

3 ideas that will guide your leadership success
LinkedIn
October 12, 2023
Last week I was asked to give my opinion on 3 qualities of effective leaders…on the spot…in front of an audience. It was unexpected and I had not thought through an answer.
I’m not one for speaking in generalities or repeating big, well known concepts. I like to be practical and appliable...I stumbled through it, but it got me thinking.

See publication

Tags: Cybersecurity, Leadership

Leadership Metrics: How to Assess Your Impact and Elevate Your Team
LinkedIn
October 05, 2023
In my career (especially recently) I have had to manage through some tremendously bad, narcissistic leaders and staff. I had to make a choice–go along and act the same way. Could have ignored it (same as condoning it), or make some hard decisions…given my values and personality – I made the hard decision.

See publication

Tags: Cybersecurity, Leadership

10 Signs You're in a Toxic Work Environment
LinkedIn
September 15, 2023
A long time ago, I was told that everyone should be treated with Dignity, Respect, and Civility, and that should be the baseline behavior for everyone. So if someone deviates from that, they will stick out like a sore thumb and be unacceptable to everyone.

See publication

Tags: Cybersecurity

Cyber Resilience Strategy–you gotta start somewhere.
LinkedIn
September 12, 2023
In the last article I outlined a foundational approach to Cyber Resilience. In this article I wanted to provide a more strategic approach, by outlining several key steps to consider when you need to build out a plan.

See publication

Tags: Cybersecurity, Business Strategy

Can CISOs give business advice?
Medium
June 30, 2023
A lot has been written over the last few months about if a CISO can be a valuabel member of a Board of Directors.

As a collegue recently wrote "Most of the current commentary about the potential “fit” of CISOs in Board of Directors is written by people who have never held the position of “CISO” in a publicly-traded organization. It is not surprising then, that these people don’t truly understand what a CISO does, or how they do it."

See publication

Tags: Cybersecurity, Risk Management, Business Strategy

How to build a cyber-resilience culture in the enterprise
https://www.techtarget.com/searchsecurity/post/How-to-build-a-cyber-resilience-culture-in-the-enterprise
January 24, 2023

See publication

Tags: Cybersecurity, Leadership, Risk Management

4 Pillars of Cyber Resilience
WWT
October 07, 2021
The proliferation of high-profile, sophisticated ransomware attacks has brought cyber resilience into the spotlight. Board members, regulators and government leaders are asking CISOs to get their organizations “resilient” ASAP. But what does a cyber resilience program actually look like?

To answer this question, it’s important to understand that cyber resilience differs from traditional security disciplines in that it’s not preventative in nature. Instead, cyber resilience assumes a breach will occur. The goal of cyber resilience is to make sure an organization maintains critical business operations when one does.

See publication

Tags: Cybersecurity, Digital Transformation, Risk Management

What Is Cyber Vault and How Does It Relate to Cyber Resilience?
WWT
March 26, 2021
Many global organizations now regard state-sponsored cybersecurity attacks as a major threat. Ransomware attacks have become the most lucrative cyber-crime area --  in 2020 approximately 58% of ransomware victims paid versus 39% in 2017. It's no wonder -- attacks ranging from nuisance malware to more sophisticated attacks can cripple an entire organization.  

See publication

Tags: Cybersecurity, Digital Transformation, Security

Strategic Actions You Can Take After SolarWinds
WWT
January 28, 2021
The cybersecurity world saw a dramatic end to 2020 with the disclosure of a large-scale, sophisticated breach orchestrated through the SolarWinds supply chain that affected to more than 18,000 organizations. For the first few weeks following the breach, organizations performed due diligence to identify and mitigate the impact. But what do you do now as we emerge from tactical response to developing a proactive strategy in 2021?

See publication

Tags: Cybersecurity, Digital Transformation, Security

SolarWinds Supply Chain Breach: What You Need to Know
WWT
December 18, 2020
SolarWinds, a popular provider of IT and monitoring solutions, has disclosed a large-scale breach. FireEye has attributed attacks to a sophisticated nation-state actor group. Once SolarWinds was breached, actors modified source code updates to the Orion platform to include malware. To date, compromised update packages include 2019.4 HF5 through 2020.2.1, deployed during March 2020 to June 2020 to clients through supply chain updates to the Orion platform.

See publication

Tags: Cybersecurity, Digital Transformation, Security

Cyber Resilience for Your Business
WWT
October 18, 2020
Cybersecurity and cyber resilience are distinct disciplines. Cybersecurity is comprised of mostly defensive actions and what can be done to keep attackers out. Cyber resilience is designed to minimize the impact of a cyberattack on the organization. You have to start from the perspective that you are attacked.

See publication

Tags: Cybersecurity, Digital Transformation, Security

Losing Our National Security Through 5G Networks
Cypher Brief
October 01, 2020
The advent of 4G technology in 2006 and subsequent Smartphones completely changed the world of communication. Now 5G, which will be able to support billions of newly connected sensors and new classes of devices, stands to make an exponentially larger global impact. With 5G’s expanded accessibility to internet services across all industries, it’s even more imperative to highlight privacy issues, national security and defense risks.

See publication

Tags: GovTech, 5G, National Security

Evolving Cybersecurity Operations Across the Organization
Geoff Hancock
August 12, 2020
Successfully defending the organization requires more than guarding against security threats. As organizational success and technology become more intertwined, a holistic cybersecurity operations program can be the piece of the puzzle that helps CISOs connect organizational goals, technology investments and daily defense.

See publication

Tags: Cybersecurity, Risk Management, Security

Do you really CELEBRATE Memorial Day?
LinkedIn
May 27, 2019
Today there are many articles, Op-Eds, LinkedIn posts, Tweets etc all reminding us of the ultimate sacrifice that was made today.

See publication

Tags: Cybersecurity, Digital Transformation

Make Sure You Are Not Helping The Russians Spy On American Asset
LinkedIn
June 02, 2018
Fancy Bear, the same Russian hacking group responsible for the DNC breach, recently released a well-designed malware capable of not only stealing data, but remotely shutting off Internet services of organizations that use certain internet routers and Internet of Things (IoT) devices. Its purpose is offensive cyber operations against many targets, placing businesses, federal agencies, and the national security infrastructure possibly at risk.

See publication

Tags: Cybersecurity, Security, National Security

1 Keynote
GEOFF HANCOCK Senior Executive Cyber Security George Washington Center for Cyber and Homeland Security
Docplayer
September 22, 2015
1 DON T MISS OUT ON THE OPPORTUNITY TO: IQPC S CYBER SECURITY SERIES PRESENTS Hear from the EMV designers to learn how implementing this technology will protect your network Learn how to keep retailers and customers safe with innovative network solution such as Advanced Threat Protection SEPTEMBER ORLANDO, FLORIDA Protect Your Network and Customer Data by Incorporating Effective and Efficient Solutions To Safeguard Your Company s Future HEAR FROM THE EXPERTS: ANDRE MACHICAO SVP Merchant Solutions VISA HARRIS SCHWARTZ Senior Manager Cyber Security Levi Strauss & Co. STEVE WINTERFELD Information Security Officer Fortune 200 Retailer Sponsor: Media Partners: MAURICE EDWARDS SVP Enterprise Risk Management Mattress Firm BRIAN ENGLE Executive Director Retail Cyber Intelligence Sharing Center GEOFF HANCOCK Senior Executive Cyber Security George Washington Center for Cyber and Homeland Security Understand how spending money on solutions like Anti Virus and Internet security software will save money for your company in the end WHAT TYPES OF RETAILERS WILL YOU HAVE THE OPPORTUNITY TO MEET? Global Department Stores Leading Supermarkets Prominent Warehouse Retailers Well-known Specialty Retailers Established Convenience Retailers Recognized Discount Retailers WHAT TOPICS WILL YOU LEARN ABOUT? EMV Implementation and Tokenization How to Safeguard Customer Data With Mobile Wallets Alternative Approaches for Online Payments Identifying the Weakest Entries of Your Network How to Balance Reactivity and Proactivity in Threat Monitoring an Incident Response New Cyber Security Regulations that Could Effect Your Company in the Future

See publication

Tags: Cybersecurity, Digital Transformation, Security

1 Media Interview
conversation with Geoff Hancock, Global Director Cybersecurity strategy and development
YouTube
March 23, 2022
Geoff is the Global Director of Strategy for technology/solutions development and customer innovation.
This includes all aspects of security operations and specialty programs such as: Security Operations Centers, Cyber Resilience, OT Security as well as some core security disciplines. Also, work with private/public sector executives (CISO-CIO-CEO) on cyber opertions, risk management-from strategy to tactical programs.

See publication

Tags: Cloud, Cybersecurity, Security

1 Miscellaneous
Cyber Resilience
WWT
June 03, 2021
Many global organizations now regard state-sponsored cybersecurity attacks as a major threat. Ransomware attacks have become the most lucrative cyber-crime area —  in 2020 approximately 58% of ransomware victims paid versus 39% in 2017. It's no wonder — attacks ranging from nuisance malware to more sophisticated attacks can cripple an entire organization.  

To mitigate cybersecurity risks, organizations of all sizes and industries are exploring more robust capabilities and frameworks to detect, prevent and respond to these attacks. One of these advanced capabilities is called cyber resilience. It gives an organization the ability to prepare for, withstand, recover from and adapt to adverse conditions, stresses, attacks or compromises on cyber resources.

See publication

Tags: Cybersecurity, Data Center, Risk Management

3 Panels
Cyber Intelligence Initiative Inaugural Conference: Breakout Session A
YouTube
May 24, 2016
This certification provides a comprehensive, strategic, and practical, in-depth understanding of the growing importance of cyber intelligence capabilities and analysis for U.S. corporations and government agencies. By combining the operational and strategic value of cyber intelligence as applied to both government and corporate users, this certification will help government and industry professionals create clarity around breaches and cyber events, and create deterrence strategies to better protect their organizations in this ever changing cyber battlefield.

See publication

Tags: Cybersecurity, Digital Transformation, Security

Cyber Intelligence: Operationalizing Best Practices
YouTube
October 19, 2015
When an organization incurs a network intrusion, an attempt to degrade its network capabilities, or other cyber incident against its systems and data, cyber intelligence can provide exquisite insight into the tactics, techniques and procedures (TTPs) implemented as well as the motivations and capabilities of the perpetrator. Organizations looking to gain greater insight into the threat environment are now integrating cyber intelligence into their operations, from the strategic-minded executive leadership to the operational managers and the tactical, on-the-network cybersecurity personnel. Panelists will examine the best practices of cyber intelligence, and how organizations from the public, private, nonprofit and academic sectors can benefit.

See publication

Tags: Cybersecurity, Digital Transformation, Security

Understanding Cyber Adversaries
C - Span
February 22, 2013
Senior officials from government agencies discussed efforts to guard against cyber attacks. They said the rapid pace of change in the cyber world often clashed with government’s ability to deploy tools for combating the threats. Jeff Eisensmith, of the Homeland Security Department, said a bigger budget would allow his agency to do a better job of policing the information technology supply chain, which is one of the areas vulnerable to cyber attacks.

See publication

Tags: Cybersecurity, Digital Transformation, Security

2 Speaking Engagements
Four Pillars of Cyber Resilience
WWT
November 10, 2021
Cyber resilience is one of the biggest trends in cybersecurity. With the proliferation of damaging ransomware attacks and enterprise-wide threats, organizations are increasingly required to have a cyber resilience program. But the best way to build a program remains a topic of confusion. Join host Robb Boyd as he speaks with WWT’s Geoff Hancock, Global Director of Cybersecurity Engineering and Scott Webb, Global Storage Practice Manager, as they dig into the nuances of cyber resilience.

See publication

Tags: Cybersecurity, Digital Transformation, Risk Management

Holistic Approach to Cybersecurity
WWT
February 01, 2021
Business and technology executives are challenged with aligning business goals, increased dependence on technology and the responsibility to secure the organizations most important assets. As any breach report can attest, this is a complicated task that requires a balance of understanding the business risks and goals, managing technology tied into the responsibility to secure the organization and its assets. That is why it is critical that organizations stop being focused on specific solutions and start looking at their organization holistically. How can organizations holistically be secure? In this episode, we will discuss the elements that make up an enterprise wide security program and how this program impact every aspect of the organization. We will also discuss traditional cyber operations and compare it to how some organizations are being more proactive with how they approach holistic cyber security, and we will outline how business executives are managing their cyber risk.

See publication

Tags: Cybersecurity, Digital Transformation, Risk Management

2 Webinars
TEC37 Security Series E08 The Four Pillars of Cyber Resilience
YouTube
January 13, 2022
Cyber resilience is one of the biggest trends in cybersecurity. With the proliferation of damaging ransomware attacks and enterprise-wide threats, organizations are increasingly required to have a cyber resilience program. But the best way to build a program remains a topic of confusion. Join host Robb Boyd as he speaks with WWT’s Geoff Hancock, Global Director of Cybersecurity Engineering and Scott Webb, Global Storage Practice Manager, as they dig into the nuances of cyber resilience

See publication

Tags: Cybersecurity, Digital Transformation, Security

An Approach to Prioritize Threats for Government Agencies
YouTube
February 26, 2015
Todd Harris, Director, Product Marketing, Core Security and Geoff Hancock, CEO, Advanced Cybersecurity Group discuss how to mature and operationalize Threat and Vulnerability Management programs, efficiently approach the Risk Management Framework, establish well-defined processes, continuous monitoring, and risk assessments.

See publication

Tags: Cybersecurity, Digital Transformation, Security

1 Whitepaper
Cyber Deception
Geoff Hancock
October 01, 2020
Today’s cyber defenders are at a disadvantage. Some tools and methods like whitelisting IP addresses are intended
to help them be somewhat proactive. But by and large, today’s cyber operations have been designed to respond only
after attacks take place. This gives adversaries a significantly asymmetric advantage: They can probe systems,
and then prepare and launch attacks within a short period, leaving little opportunity for defenders to defeat them.
A critical change in approach is needed. Cyber deception is an emerging proactive cyber defense methodology that, when done
well, can put the defender in the driver’s seat. It enables defenders to lead the attacker and gather intelligence on the adversary’s
tools, methods, and behaviors. In this way, defenders have the upper hand in cyber operations.

See publication

Tags: Cybersecurity, Emerging Technology, Risk Management

Thinkers360 Credentials

6 Badges

Blog

Opportunities

Contact Geoff Hancock

Book Geoff Hancock for Speaking

Book a Meeting

Media Kit

Share Profile

Contact Info

  Profile

Geoff Hancock


Latest Activity