Interested in getting your own thought leader profile? Get Started Today.

George Platsis

Washington, District Of Columbia, United States

WHAT I DO: I work to solve today’s and tomorrow’s problems, many of which not we have not identified yet. My single greatest skill: helping you see what you don’t see coming. Once we achieve that – together – through relationship building and challenging questions, we work to create solutions that protect and strengthen what matters most to you. When we achieve that, I call it success.

WHERE I FOCUS MY EFFORTS: I have a multidisciplinary background that allows me take on complex problems. I enjoy these challenges most. My current professional efforts focus on human factor vulnerabilities related to cybersecurity, information security, and data security by separating the network and information risk areas. Some of the issues I tackle include: business continuity, resilience strategies, social engineering, insider threats, psychological warfare, data manipulation and integrity, and information dominance.

ABOUT ME: I work as a consultant and educator. My project areas include: business development, risk/crisis management, and cultural relations. For over 15 years I have been helping people with their strategic, operational, and training needs.

VOLUNTEER EFFORTS: Women’s rights, military and veteran affairs, youth leadership, and education. I am the elected Chair of the NGO Committee on Education, Learning and Literacy (a NGO Substantive Committee member of CoNGO), and an official Delegate of the United Nations, representing a NGO in Special Consultative Status with ECOSOC at the NGO Committee for the Status of Women (New York).

LASTLY (AND MOST IMPORTANTLY): Thank you to all that have helped me along the way...couldn't be where I am without you.

George PlatsisPoints

Points based upon Thinkers360 patent-pending algorithm.

Thought Leader Profile

Portfolio Mix

Company Information

Areas of Expertise

AI 30.72
Cybersecurity 30.84
Emerging Technology 30.09
Management 30.27
IoT 30.29
Privacy 30.41
Big Data 30.20
Social 30.19
Risk Management 30.28
Quantum Computing 31.89
5G 31.84
Cloud 30.16
Digital Transformation 30.07

Industry Experience

Please signin or signup to view publication section.


12 Article/Blogs
The Case for Integrating Dark Web Intelligence Into Your Daily Operations
Security Intelligence
January 30, 2020
Some of the best intelligence an operator or decision-maker can obtain comes straight from the belly of the beast. That’s why dark web intelligence can be incredibly valuable to your security operations center (SOC). By leveraging this critical information, operators can gain a better understanding of the tactics, techniques and procedures (TTPs) employed by threat actors. With that knowledge in hand, decision-makers can better position themselves to protect their organizations.

See publication

Tags: Risk Management

3 Steps to Find the Right Digital Transformation Strategy for You
Security Intelligence
January 17, 2020
You should not feel overly concerned if somebody says “digital transformation” and you are not exactly sure what that means. It’s a phrase that means different things to different people. For some, it might mean cloud migration. For others, it could mean a new set of data and analytics processes being integrated into business operations. And for others, it could simply mean moving completely to the exclusive use of mobile devices to conduct business.

See publication

Tags: AI, Cloud, Digital Transformation

How Do We Ensure the Security of What Comes After the 5G Revolution?
Security Intelligence
January 16, 2020
2020 will see huge investments in 5G networks — Greensill estimated that the 5G rollout throughout the global supply chain will top $2.7 trillion by the end of the year. That’s not a number to sneeze at either, as it’s equal to roughly three percent of the world’s total gross domestic product. And while most of the investment will be in the infrastructure rollout, do not forget the other pieces. Hardware, software and services are also among the necessary investments.

See publication

Tags: AI, Cybersecurity, Privacy, Quantum Computing, 5G

About That IoT Device You Received as a Holiday Gift…
Security Intelligence
December 30, 2019
It is quite possible that you received an internet of things (IoT) device as a holiday gift, and it’s very likely that you will find this holiday gift useful. But it’s also possible you received an additional gift you have no use for at all: security vulnerabilities. This is the inconvenient truth about the average IoT device — like all technologies, it has flaws and it can add to your risk profile.

See publication

Tags: AI, IoT, Risk Management

Does Social Media Visualization Serve as a Primer for 5G Data Visualization?
December 01, 2019
The deployment of 5G data technology in our daily lives will be revolutionary, but this blast of speed and data will burden cybersecurity management teams and create an entirely new set of risks to handle around issues such as mobile security and integration with smart cities.

See publication

Tags: Big Data, Cybersecurity, Social, 5G

Will the Future of Authentication Run Into a Privacy Wall?
October 16, 2019
Identity authentication is absolutely necessary to conducting our affairs today. Without it, we would lose virtually all confidence to conduct business or create and foster relationships. But with ever increasing concerns related to data privacy, it is worth looking at the past to see what future challenges we may face in the digital identity space.

See publication

Tags: AI, Privacy

When Digital Identity and Access Management Meets Physical Security
October 06, 2019
Originally published on IBM's SecurityIntelligence on October 3, 2019

Where does digital security end and tangible, or physical, security begin? In today’s cybersecurity ecosystem, I’d argue that it’s all just security. In fact, if you are handling these domains in discrete silos, your cyber resilience is already taking a hit.

See publication

Tags: AI, Cybersecurity, Management, Privacy

What Does Good Cyber Resilience Look Like in 2019?
September 08, 2019
Originally published on IBM's SecurityIntelligence on September 6, 2019

The Greek philosopher Heraclitus of Ephesus once said, “πάντα χωρεῖ καὶ οὐδὲν μένει.” If you’re getting the blue screen feeling, it’s probably because that’s Greek to you. Here’s the translation: “Everything changes and nothing stands still.”

See publication

Tags: AI, Cybersecurity

Is Staff Burnout the Best Reason to Implement Cybersecurity AI?
August 18, 2019
Originally published on SecurityIntelligence on August 14th, 2019

Many in the cybersecurity workforce can’t keep up with technological change and are too busy to learn about the latest threats. Some are even so burned out that they are leaving the industry entirely. These are some of the findings of a June 2019 study by Goldsmiths, the University of London and Symantec, the results of which should not only worry those who work in the cybersecurity space, but everyone who relies on a computer to do their work.

If there wa

See publication

Tags: AI, Cybersecurity, Emerging Technology, Management

How to Reduce the Risk Posed by Vulnerable Mobile Apps
August 11, 2019
In June 2019, a study on mobile app vulnerabilities presented some incredible and worrisome findings. Most notably, high-risk vulnerabilities were found in 43 percent of mobile apps for Android and 38 percent for iOS, according to Positive Technologies. Now, consider this: In terms of market share, per IDC, Android owns nearly 87 percent and iOS owns around 13 percent.

See publication

Tags: Cybersecurity

Is It Time to Start Certifying Connected Devices?
July 30, 2019
At some point, you’ve likely seen markings and icons on an electronic device, its user manual or the box it came in. If you’re unsure what these markings are, they are almost certainly some type of certification.

See publication

Tags: Cybersecurity, IoT

Technology, the Enterprise or the User: Which Owns Mobile Security?
July 03, 2019
It’s not outrageous to suggest that you might be reading this on a mobile device. Nor is it outrageous to think that most people use a mobile device for the majority of their reading these days. I’m even writing this on a mobile device. So for those not following along, at this point, mobile security is really just security. There really isn’t any difference anymore.

See publication

Tags: Cybersecurity



Contact George Platsis

Media Kit

Share Profile

Contact Info


George Platsis

Latest Tweets