Interested in getting your own thought leader profile? Get Started Today.

George Platsis

Washington, District Of Columbia, United States


WHAT I DO: I work to solve today’s and tomorrow’s problems, many of which not we have not identified yet. My single greatest skill: helping you see what you don’t see coming. Once we achieve that – together – through relationship building and challenging questions, we work to create solutions that protect and strengthen what matters most to you. When we achieve that, I call it success.

WHERE I FOCUS MY EFFORTS: I have a multidisciplinary background that allows me take on complex problems. I enjoy these challenges most. My current professional efforts focus on human factor vulnerabilities related to cybersecurity, information security, and data security by separating the network and information risk areas. Some of the issues I tackle include: business continuity, resilience strategies, social engineering, insider threats, psychological warfare, data manipulation and integrity, and information dominance.

ABOUT ME: I work as a consultant and educator. My project areas include: business development, risk/crisis management, and cultural relations. For over 15 years I have been helping people with their strategic, operational, and training needs.

VOLUNTEER EFFORTS: Women’s rights, military and veteran affairs, youth leadership, and education. I am the elected Chair of the NGO Committee on Education, Learning and Literacy (a NGO Substantive Committee member of CoNGO), and an official Delegate of the United Nations, representing a NGO in Special Consultative Status with ECOSOC at the NGO Committee for the Status of Women (New York).

LASTLY (AND MOST IMPORTANTLY): Thank you to all that have helped me along the way...couldn't be where I am without you.

George PlatsisPoints

Points based upon Thinkers360 patent-pending algorithm.

Thought Leader Profile

Portfolio Mix

Company Information

Areas of Expertise

AI 30.67
Cybersecurity 31.01
Emerging Technology 30.16
Management 30.32
IoT 30.33
Privacy 30.36
Big Data 30.23
Social 30.10

Industry Experience


8 Article/Blogs
Does Social Media Visualization Serve as a Primer for 5G Data Visualization?
December 01, 2019
The deployment of 5G data technology in our daily lives will be revolutionary, but this blast of speed and data will burden cybersecurity management teams and create an entirely new set of risks to handle around issues such as mobile security and integration with smart cities.

See publication

Tags: Big Data, Cybersecurity, Social

Will the Future of Authentication Run Into a Privacy Wall?
October 16, 2019
Identity authentication is absolutely necessary to conducting our affairs today. Without it, we would lose virtually all confidence to conduct business or create and foster relationships. But with ever increasing concerns related to data privacy, it is worth looking at the past to see what future challenges we may face in the digital identity space.

See publication

Tags: AI, Privacy

When Digital Identity and Access Management Meets Physical Security
October 06, 2019
Originally published on IBM's SecurityIntelligence on October 3, 2019

Where does digital security end and tangible, or physical, security begin? In today’s cybersecurity ecosystem, I’d argue that it’s all just security. In fact, if you are handling these domains in discrete silos, your cyber resilience is already taking a hit.

See publication

Tags: AI, Cybersecurity, Management, Privacy

What Does Good Cyber Resilience Look Like in 2019?
September 08, 2019
Originally published on IBM's SecurityIntelligence on September 6, 2019

The Greek philosopher Heraclitus of Ephesus once said, “πάντα χωρεῖ καὶ οὐδὲν μένει.” If you’re getting the blue screen feeling, it’s probably because that’s Greek to you. Here’s the translation: “Everything changes and nothing stands still.”

See publication

Tags: AI, Cybersecurity

Is Staff Burnout the Best Reason to Implement Cybersecurity AI?
August 18, 2019
Originally published on SecurityIntelligence on August 14th, 2019

Many in the cybersecurity workforce can’t keep up with technological change and are too busy to learn about the latest threats. Some are even so burned out that they are leaving the industry entirely. These are some of the findings of a June 2019 study by Goldsmiths, the University of London and Symantec, the results of which should not only worry those who work in the cybersecurity space, but everyone who relies on a computer to do their work.

If there wa

See publication

Tags: AI, Cybersecurity, Emerging Technology, Management

How to Reduce the Risk Posed by Vulnerable Mobile Apps
August 11, 2019
In June 2019, a study on mobile app vulnerabilities presented some incredible and worrisome findings. Most notably, high-risk vulnerabilities were found in 43 percent of mobile apps for Android and 38 percent for iOS, according to Positive Technologies. Now, consider this: In terms of market share, per IDC, Android owns nearly 87 percent and iOS owns around 13 percent.

See publication

Tags: Cybersecurity

Is It Time to Start Certifying Connected Devices?
July 30, 2019
At some point, you’ve likely seen markings and icons on an electronic device, its user manual or the box it came in. If you’re unsure what these markings are, they are almost certainly some type of certification.

See publication

Tags: Cybersecurity, IoT

Technology, the Enterprise or the User: Which Owns Mobile Security?
July 03, 2019
It’s not outrageous to suggest that you might be reading this on a mobile device. Nor is it outrageous to think that most people use a mobile device for the majority of their reading these days. I’m even writing this on a mobile device. So for those not following along, at this point, mobile security is really just security. There really isn’t any difference anymore.

See publication

Tags: Cybersecurity



Contact George Platsis

Media Kit

Share Profile

Contact Info


George Platsis

Latest Tweets