5 Posts

George Platsis

George Platsis works with the private, public and nonprofit sectors to address their strategic, operational and training needs, focusing on projects related to business development, risk/crisis management, resilience, cyber and information security, and cultural relations.His primary focus is on human factor vulnerabilities related to cybersecurity, information security and data security by separating the network and information risk areas. Some of the issues he tackles include: business continuity, resilience strategies, social engineering, insider threats, psychological warfare, data manipulation and integrity, and information dominance.George is a team member of SDI Cyber, based in Washington, D.C., an independent consultant, educator, author and a founding member of the #CyberAvengers. He holds a bachelor's degree in Business Administration and has graduate degrees in Business Administration, Disaster and Emergency Management, Law and Cybersecurity. He has completed executive education in national/international security and cybersecurity at Harvard University, Syracuse University and the Canadian Forces College.

Written By George Platsis

5G Will Change How We Manage Mobile Security — Here’s How to Start Preparing

The rollout of 5G technology could forever change how we manage mobile security, posing an entirely new set of risks we have not handled before.

Mobile Security Versus Desktop and Laptop Security: Is There Even a Difference Anymore?

Do you remember your first mobile phone, and the newfound feelings of connectedness and convenience that came with it? Nowadays, are these devices really phones or are they computers? Labels matter.

What Is Endpoint Security Today? Big Data and Mobile Trends Point to the ‘Startpoint’

We can probably all agree that securing the devices on our networks is a fair definition of endpoint security. But within this traditional definition, what, really, is the endpoint of today?

The Language of Business: Where the Board of Directors and Security Leaders Can Meet

IT and security professionals must be able to talk business to the C-suite and the board of directors, especially if new security products need to be added into the organization's portfolio.

An Apple a Day Won’t Improve Your Security Hygiene, But a Cyber Doctor Might

Internal assessments and audits are necessary, but they have their limitations. Some outside assistance could help improve your security hygiene and inoculate you from the nastiest of cyber bugs.