George Platsis works with the private, public and nonprofit sectors to address their strategic, operational and training needs, focusing on projects related to business development, risk/crisis management, resilience, cyber and information security, and cultural relations.His primary focus is on human factor vulnerabilities related to cybersecurity, information security and data security by separating the network and information risk areas. Some of the issues he tackles include: business continuity, resilience strategies, social engineering, insider threats, psychological warfare, data manipulation and integrity, and information dominance.George is a team member of SDI Cyber, based in Washington, D.C., an independent consultant, educator, author and a founding member of the #CyberAvengers. He holds a bachelor's degree in Business Administration and has graduate degrees in Business Administration, Disaster and Emergency Management, Law and Cybersecurity. He has completed executive education in national/international security and cybersecurity at Harvard University, Syracuse University and the Canadian Forces College.
Written By George Platsis
The rollout of 5G technology could forever change how we manage mobile security, posing an entirely new set of risks we have not handled before.
April 29, 2019 | By George Platsis
Do you remember your first mobile phone, and the newfound feelings of connectedness and convenience that came with it? Nowadays, are these devices really phones or are they computers? Labels matter.
April 19, 2019 | By George Platsis
We can probably all agree that securing the devices on our networks is a fair definition of endpoint security. But within this traditional definition, what, really, is the endpoint of today?
April 16, 2019 | By George Platsis
IT and security professionals must be able to talk business to the C-suite and the board of directors, especially if new security products need to be added into the organization's portfolio.
March 29, 2019 | By George Platsis
Internal assessments and audits are necessary, but they have their limitations. Some outside assistance could help improve your security hygiene and inoculate you from the nastiest of cyber bugs.
March 12, 2019 | By George Platsis