Unlock access to Thinkers360 AI to fast-track your search for analysts and influencers.
This feature is available for Enterprise Lite and Enterprise Members Only.
You have been temporarily restricted. Please be more thoughtful when adding content for your portfolio. Your portfolio and digital media kit and should be reflective of the professional image you wish to convey. Accounts may be temporarily restricted if we receive reports of spamming or if the system detects excessive entries.
Membership
Publish your original ideas on the Thinkers360 platform!
This feature is available for Pro and Pro-Plus Members Only.
Speaker Bureau functionality whereby individuals can be featured speakers within our Speaker Bureau service and enterprises can find and work with speakers.
This feature is available for Pro, Pro-Plus, Premium and Enterprise Members Only.
Highlight your featured products and services within our company directory for enhanced visibility to active B2B buyers worldwide. This feature is available for Pro, Pro Plus, Premium and Enterprise Members Only.
Contribute to the Thinkers360 Member Blog and have your thought leadership featured on our web site, newsletter and social channels. Reach our opt-in B2B thought leader community and influencer marketplace with over 100M followers on social media combined!
You’ve reached your daily limit for entering quotes. Please only add personally-authored content which is reflective of your digital media kit and thought leadership portfolio.
Thinkers360 Content Library
For full access to the Thinkers360 content library, please join ourContent Planor become a contributor by posting your own personally-authored content into the system viaAdd PublicationorImport Publication.
Dashboard
Unlock your personalized dashboard including metrics for your member blogs and press releases as well as all the features and benefits of our member plans!
Interested in getting your own thought leader profile? Get Started Today.
George Platsis
Washington, District Of Columbia, United States
WHAT I DO: I work to solve today’s and tomorrow’s problems, many of which not we have not identified yet. My single greatest skill: helping you see what you don’t see coming. Once we achieve that – together – through relationship building and challenging questions, we work to create solutions that protect and strengthen what matters most to you. When we achieve that, I call it success.
WHERE I FOCUS MY EFFORTS: I have a multidisciplinary background that allows me take on complex problems. I enjoy these challenges most. My current professional efforts focus on human factor vulnerabilities related to cybersecurity, information security, and data security by separating the network and information risk areas. Some of the issues I tackle include: business continuity, resilience strategies, social engineering, insider threats, psychological warfare, data manipulation and integrity, and information dominance.
ABOUT ME: I work as a consultant and educator. My project areas include: business development, risk/crisis management, and cultural relations. For over 15 years I have been helping people with their strategic, operational, and training needs.
VOLUNTEER EFFORTS: Women’s rights, military and veteran affairs, youth leadership, and education. I am the elected Chair of the NGO Committee on Education, Learning and Literacy (a NGO Substantive Committee member of CoNGO), and an official Delegate of the United Nations, representing a NGO in Special Consultative Status with ECOSOC at the NGO Committee for the Status of Women (New York).
LASTLY (AND MOST IMPORTANTLY): Thank you to all that have helped me along the way...couldn't be where I am without you.
George Platsis
Points
Academic
0
Author
40
Influencer
0
Speaker
0
Entrepreneur
0
Total
40
Points based upon Thinkers360 patent-pending algorithm.
Thought Leader Profile
Portfolio Mix
Company Information
Areas of Expertise
5G 30.07
AI 30.08
Big Data 30.03
Business Continuity 30.49
Cloud 30.04
Cryptocurrency 30.13
Cybersecurity 31.27
Data Center 30.04
Digital Transformation 30.01
Emerging Technology 30.05
IoT 30.04
Management 30.05
Mental Health 30.05
Mobility 30.19
Privacy 31.40
Quantum Computing
Risk Management 31.40
Security 31.75
Smart Cities 30.51
Social
Industry Experience
Publications
40 Article/Blogs
A Day in the Life: Working in Cyber Incident Response
Security Intelligence
October 25, 2022
As a cybersecurity incident responder, your life can go from zero to 100 in a heartbeat. One moment you are sipping a beverage reading the latest threat intelligence or getting the kids ready for bed; the next, you may be lunging for your “go bag” because you cannot remote in to the breached system. It’s all part of the game.
What Kind of Data Costs Most in a Breach?
Security Intelligence
September 14, 2022
Today’s most valuable currency is data. Breaches, information operations, analytics and behavior recognition are all driven by data and the desire to possess it, regardless of what those who possess it want to do with it. We set out to answer the question “What kind of data costs the most in a breach?” As it happens, that’s a complicated question. We’ll need to factor in many variables depending on the specifics of your business.
What Should Customers Ask Managed Service Providers?
Security Intelligence
September 01, 2022
Managed service providers (MSPs), sometimes called managed security services (MSS) or MSSP, play a very important role in protecting data and other digital assets and will continue to do so. Some of the benefits include, but are not limited to:
Data Fabric: What It Is and How It Impacts Cybersecurity
Security Intelligence
March 07, 2022
Data use and generation today are both awesome and daunting to manage. What is the best way to manage this mountain of dispersed and disparate data? A possible answer lies in the concept of ‘data fabric’ as a means to unify data. This is an integrated layer of data and connecting processes that “utilizes continuous analytics over existing, discoverable and inferenced metadata assets to support the design, deployment and utilization of integrated and reusable data across all environments.”
The Great Resignation: How to Acquire and Retain Cybersecurity Talent
Security Intelligence
January 14, 2022
If you’ve been following reports and whispering with industry colleagues, you know what’s going on: the cybersecurity skills gap is difficult to close, and the Great Resignation is here. The 2021 (ISC)2 workforce study gives us a mixed picture of what to expect:
Small Business Cybersecurity: What to Fix, What to Manage and What to Outsource
Security Intelligence
January 10, 2022
The risk posture of small and medium-sized businesses has changed a lot over the last few years. Bluntly: small businesses inherited a series of digital risks. Many of these risks, such as supply chain and cloud-related risks, can wound and devastate a small business. Meanwhile, the enterprise, armed with more resources, could sustain the shock. When, and how, do you need to boost your small business cybersecurity?
Tags: Privacy, Risk Management, Business Continuity, Security
It’s Not Too Soon to Start Talking About 6G
Security Intelligence
December 17, 2021
We may be only a short time into 5G deployments, but discussions of the impact 6G technology will have on our lives have already started. In late 2020, the Alliance for Telecommunications Industry Solutions created a new group called the Next G Alliance to “advance North American mobile technology leadership over the next decade through private sector-led efforts.”
A Journey in Organizational Resilience: Geopolitical and Socio-Economic Trends and Threats
Security Intelligence
December 13, 2021
The last stop on our organizational resilience journey touches one of the issues organizations have the least control over: geopolitical and socio-economic trends and threats.
A Journey in Organizational Resilience: Security by Design
Security Intelligence
November 01, 2021
Security by design is one of those concepts that happily goes hand in hand with resilience. Candidly, they were made for each other. The security by design methodology helps minimize some of the inherent risk we cannot do anything about.
Cybersecurity First: Becoming GOAT
Security Intelligence
October 25, 2021
As we close off Cybersecurity Awareness Month, let us examine how we can become the cyber GOAT: ‘greatest of all time’. Sure, there will be plenty this week on cybersecurity training, making security a priority, more investments into products and processes and all that fun stuff. But we’re not going to talk about that right now. We are going to talk about something different you may not see elsewhere. We are going to talk about success.
A Journey in Organizational Resiliency: Governance
Security Intelligence
October 11, 2021
From governance comes everything else. It would be reasonable if this journey in organizational resilience started with the governance theme. In fact, many important standards or cybersecurity frameworks begin with policy development. For example:
The OSI Model and You Part 7: Stopping Threats at the Application Layer
Security Intelligence
July 05, 2021
A lot has changed since the creation of the Open Systems Interconnection (OSI) model. The OSI model dates back to the mid-1970s, designed to serve as a common basis for system interconnection and networking. It has been very useful in that regard, but we have to be aware a lot has changed since its inception. The greatest disrupter to this model is cloud computing. With that said, there is still value in the OSI model and how to reduce risk in each layer, as many of our systems today still rely on its design.
The OSI Model and You Part 3: Stopping Threats at the OSI Network Layer
Security Intelligence
June 07, 2021
Networking models help us understand the ‘lay of the land’ when it comes to protecting the network. In our journey through the Open Systems Interconnection (OSI) framework, we’ve arrived at the last stop in the media group, the OSI network layer.
The OSI Model and You Part 2: The Data Link Layer
Security Intelligence
May 31, 2021
If the physical layer we talked about earlier in this series about OSI layers is the ‘what’ that allows data to travel, the data link layer is the ‘how.’ In the previous piece of this seven-part series on the OSI model, we described the physical layer and what cybersecurity threats could impact it. Remember, the key takeaway on how to protect the physical layer is this: business impact, contingency planning and continuity. NIST Special Publication 800-34 Revision 1, Contingency Planning Guide for Federal Information Systems, is one of your best friends here. Now, let’s take a look at the data link layer.
Ransomware Attacks in 2021: Information Meets Emotion
Security Intelligence
April 16, 2021
“If you want to go quickly, go alone, but if you want to go far, go together.”
This African proverb opens the Sophos 2021 Threat Report, and in view of recent cybersecurity events, its meaning is very important when it comes to defending against ransomware attacks. As threat actors work together to provide ransomware-as-a-service, defenders also need to focus on working together, even when teams are separated in home offices.
As ransomware trends change in 2021, what should we look out for? An overview of the Sophos report provides some ideas.
Does a Strong Privacy Program Make for a Stronger Security Program?
Security Intelligence
February 04, 2021
There is a saying in sociopolitical circles: “politics is downstream from culture.” Using that same line of thinking, poses a question: Is information security downstream from data privacy?
CISO Success: It’s About More Than Tech Skills
Security Intelligence
February 02, 2021
The chief information security officer (CISO) is a relatively new position in the C-suite. It’s about 25 years old or less, depending on whom you ask. But, it is only within the last 10 or so years that the role has taken on greater prominence, likely because of the increase in cyber breaches over the last decade. What does a CISO do, and what skills are required?
Tags: Cybersecurity, Privacy, Risk Management, Business Continuity
Space Cybersecurity: How Lessons Learned on Earth Apply in Orbit
Security Intelligence
January 29, 2021
The universe is getting smaller, and space cybersecurity is keeping up. On May 30, 2020, nearly a decade after the Space Shuttle program ended, people witnessed a first: a vehicle built as part of a public-private partnership (between SpaceX and NASA) took off into space. This development was transformational because it brought the world one step closer to commercial space travel. We now have proof of concept that space travel, once reserved for powerful nation-states, is something that can be achieved, albeit with a lot of assistance right now, by a commercial company.
Managing Cybersecurity Costs: Bake These Ingredients Into Your Annual Budget
Security Intelligence
January 15, 2021
As businesses across all industries evolve, once discretionary expenses become operating costs. Insurance coverage, for example, is pretty much ‘a must’ across many industries. The latest may be cybersecurity costs, because protecting your most important currency, information, requires ongoing attention. When looking at your cybersecurity budget, factor in every part of the recipe. What are some items you can bake into your cybersecurity budget that will reduce your overall risk posture?
Peaks and Valleys: The Mental Health Side of Cybersecurity Risk Management
Security Intelligence
January 12, 2021
There is one risk cybersecurity experts often overlook: burnout. We can build on threat detection and incident response capabilities and use cybersecurity risk management frameworks, such as NIST CSF, to improve our overall risk posture all we want without ever looking inward. Because burnout is internal, we may not always see it. But left unmanaged, it can be a serious problem for workers.
Tags: Cybersecurity, Risk Management, Mental Health
Data Destruction: Importance and Best Practices
Security Intelligence
November 19, 2020
As discussed in an earlier piece, data should be treated as a valuable currency. But there is another aspect to data handling that needs to be considered: data as a liability. Having your data fall into the wrong hands can be incredibly damaging to you and your team, which is all the more reason to have a sound and secure data destruction policy for the last mile.
Cybersecurity Today: The Intersection of Technology and Behavior
Security Intelligence
September 30, 2020
In the movie “Back to the Future II,” protagonist Marty McFly travels forward to the year 2015. During a quick stop at Café 80s, Marty encounters two children, confused by the 80s-style arcade game in the store. When Marty shows them how to play, the kids retort with, “You mean you have to use your hands?”
Cybersecurity Risk Management: Protecting Our Most Valuable Currency
Security Intelligence
September 29, 2020
Cybersecurity risk management can be a unifying conversation throughout your organization. Few things are more challenging in the cybersecurity business than getting stakeholders to speak in the same language. The business planners are talking supply and demand; the IT department is talking bits and bytes; the HR department is talking wellness and productivity; the C-suite is talking dollars and cents; and the board of directors are talking governance and liability. All these competing challenges make discussions about endpoint solutions, monitoring systems and identity management systems difficult to have.
Back to Basics: Creating a Culture of Cybersecurity at Work
Security Intelligence
September 16, 2020
The importance of security culture can be seen now more than ever. Many of us work remotely; there are app concerns; and the lines between personal and business use of devices and networks are blurred, challenging our cyber resilience. Therefore, despite all the great tools, frameworks and protective measures in place, we need to ensure people are doing what they can to help protect the larger network. These basic tips can make a great checklist for creating a culture of cybersecurity at work, regardless of employees’ level of security literacy.
Join Thinkers360 for free! Are you a Reader/Writer, Thought Leader/Influencer (looking to increase your earnings), or an Enterprise User (looking to work with experts)?