Greg G.

Austin, Texas Metropolitan Area Contact Info
500+ connections

Join to view profile

About

🌟 20+ year Executive, Investor, and Inventor. Fueling Growth, Margin, and Retention in…

Articles by Greg

Activity

Join now to see all activity

Experience & Education

  • Snowfire.AI

View Greg’s full experience

See their title, tenure and more.

or

By clicking Continue to join or sign in, you agree to LinkedIn’s User Agreement, Privacy Policy, and Cookie Policy.

Licenses & Certifications

Patents

  • Systems and Methods for Security Operations Maturity Assessment

    Issued 11,170,334

    Systems and methods for assessing, tracking and improving security maturity of an organization are provided. Described is a system for assessing security maturity of an organization. The system receives a list of data sources located across multiple jurisdictions for the organization, collects data sources/data using custom rules from a plurality of data sources of the list of data sources, determine criticality score for each of the plurality of data sources, calculates data source coverage…

    Systems and methods for assessing, tracking and improving security maturity of an organization are provided. Described is a system for assessing security maturity of an organization. The system receives a list of data sources located across multiple jurisdictions for the organization, collects data sources/data using custom rules from a plurality of data sources of the list of data sources, determine criticality score for each of the plurality of data sources, calculates data source coverage and asset collection coverage, determines use case coverage, and determines security maturity score using a maturity score model. The maturity score model is a logistic equation which is a function of the data source coverage, the asset collection coverage, the criticality score associated with each of the plurality of data sources, the use case coverage, asset coverage by each the plurality of data sources.

    Other inventors
    See patent

Courses

  • Business Intelligence Analytics

    -

Projects

  • Cloud Coverage / Cyber Insurance Calculus

    Focused cyber liability insurance methodology for analysis using cybersecurity collection of sources, deployment of technology, and analyst coverage of best of breed tooling.

  • Whotype (Acquired by Cyber Human Analytics)

    Social dynamics; Human insights. Understand behavioral dynamics in groups, companies, and work with colleagues by aligning with what makes them unique. Best work and best agree at every layer of life.

    Yes, it can be used for dating.

  • FleetRadar - Product Development

    While working at NCI (Formerly Karta Technologies, Inc.), developing, selling, and operating the FleetRADAR a web-based, fleet management system. Designed as a web based application in 2005 to increase the security, efficiency, profitability, and safety of the nations largest companies and their fleet of vehicles. This project was concluded when Karta was acquired by NCI.

    See project
  • Cyber Security Behavioral Analysis and Pattern Visualization

    -

    Active Cyber Security Defense: Unleash all of your security data and achieve unprecedented network visibility and operational intelligence to create an active defense and go head-to-head against the adversaries. No longer will you sit around and sort through alerts and logs, instead you will realize a bigger promise from your perimeter defense investment while reducing root cause analysis time and identifying and examining previously hidden malicious behavior. Cyber security analysis that aids…

    Active Cyber Security Defense: Unleash all of your security data and achieve unprecedented network visibility and operational intelligence to create an active defense and go head-to-head against the adversaries. No longer will you sit around and sort through alerts and logs, instead you will realize a bigger promise from your perimeter defense investment while reducing root cause analysis time and identifying and examining previously hidden malicious behavior. Cyber security analysis that aids the hunt for the nefarious characters hiding within your network. Cyber Security helps dramatically accelerate time-to-detection of past and present malicious behavior and identify previously hidden threats in order to harden the network from the inside. Using an all-in-one, fully scalable solution for rapid analytical insight, Analysts can use one tool to import, analyze, and visualize enormous amounts of data and create a continuous security intelligence lifecycle that provides visibility into abnormal and potentially malicious activity.

    See project

Honors & Awards

  • Leadership Service Award

    ISSA Capitol of Texas Chapter

Languages

  • Spanish

    Limited working proficiency

  • Greek

    Elementary proficiency

Organizations

  • Infragard

    -

    - Present
  • North SA Chamber of Commerce - Leadership Lab Alumnus

    -

    - Present
  • OWASP & LASCON

    Membership Director, LASCON Planning Team

    - Present
  • ISSA

    Membership Director, Vice President, Past-President

    - Present
  • Trinity University Alumni

    -

    - Present
  • TASSCC

    Education Director

    -

More activity by Greg

View Greg’s full profile

  • See who you know in common
  • Get introduced
  • Contact Greg directly
Join to view full profile

Other similar profiles

Explore collaborative articles

We’re unlocking community knowledge in a new way. Experts add insights directly into each article, started with the help of AI.

Explore More

Others named Greg G. in United States

Add new skills with these courses