7 Posts

George Platsis

George Platsis works with the private, public and nonprofit sectors to address their strategic, operational and training needs, focusing on projects related to business development, risk/crisis management, resilience, cyber and information security, and cultural relations. His primary focus is on human factor vulnerabilities related to cybersecurity, information security and data security by separating the network and information risk areas. Some of the issues he tackles include: business continuity, resilience strategies, social engineering, insider threats, psychological warfare, data manipulation and integrity, and information dominance. George is a director of cybersecurity at FTI Consulting, based in Washington, D.C., an educator, author and a founding member of the #CyberAvengers. He holds a bachelor's degree in business administration and has graduate degrees in business administration, disaster and emergency management, law and cybersecurity. He has completed executive education in national/international security and cybersecurity at Harvard University, Syracuse University and the Canadian Forces College.The views expressed by this author on SecurityIntelligence are those of the author and not necessarily the views of FTI Consulting, its management, its subsidiaries, its affiliates or its other professionals.

Written By George Platsis

Technology, the Enterprise or the User: Which Owns Mobile Security?

To best manage mobile security within your enterprise, you need to maintain balance between technology, enterprise and user responsibilities.

Is Your Endpoint Protection Strategy Ready for 5G?

If you accept that 5G technology comes with three inherent challenges — manageability, the supply chain and usage — then the endpoint protection challenge makes a whole lot more sense.

5G Will Change How We Manage Mobile Security — Here’s How to Start Preparing

The rollout of 5G technology could forever change how we manage mobile security, posing an entirely new set of risks we have not handled before.

Mobile Security Versus Desktop and Laptop Security: Is There Even a Difference Anymore?

Do you remember your first mobile phone, and the newfound feelings of connectedness and convenience that came with it? Nowadays, are these devices really phones or are they computers? Labels matter.

What Is Endpoint Security Today? Big Data and Mobile Trends Point to the ‘Startpoint’

We can probably all agree that securing the devices on our networks is a fair definition of endpoint security. But within this traditional definition, what, really, is the endpoint of today?

The Language of Business: Where the Board of Directors and Security Leaders Can Meet

IT and security professionals must be able to talk business to the C-suite and the board of directors, especially if new security products need to be added into the organization's portfolio.

An Apple a Day Won’t Improve Your Security Hygiene, But a Cyber Doctor Might

Internal assessments and audits are necessary, but they have their limitations. Some outside assistance could help improve your security hygiene and inoculate you from the nastiest of cyber bugs.