About
Articles by Greg
-
Data, AI, & Cybersecurity Spend: Turbocharge SaaS Investments with AI-driven Business Intel
Data, AI, & Cybersecurity Spend: Turbocharge SaaS Investments with AI-driven Business Intel
By Greg G.
Activity
-
Brandon Pinzon presented the most innovative concept and platform I've seen in a long time. He had the crowd at B-Sides Las Vegas fully engaged. As a…
Brandon Pinzon presented the most innovative concept and platform I've seen in a long time. He had the crowd at B-Sides Las Vegas fully engaged. As a…
Liked by Greg G.
-
Meet Mithra, our massive graph neural network with 3.5 billion nodes and 48 billion edges that uses algorithms for high-fidelity threat intelligence.…
Meet Mithra, our massive graph neural network with 3.5 billion nodes and 48 billion edges that uses algorithms for high-fidelity threat intelligence.…
Liked by Greg G.
Experience & Education
Licenses & Certifications
Patents
-
Systems and Methods for Security Operations Maturity Assessment
Issued 11,170,334
Systems and methods for assessing, tracking and improving security maturity of an organization are provided. Described is a system for assessing security maturity of an organization. The system receives a list of data sources located across multiple jurisdictions for the organization, collects data sources/data using custom rules from a plurality of data sources of the list of data sources, determine criticality score for each of the plurality of data sources, calculates data source coverage…
Systems and methods for assessing, tracking and improving security maturity of an organization are provided. Described is a system for assessing security maturity of an organization. The system receives a list of data sources located across multiple jurisdictions for the organization, collects data sources/data using custom rules from a plurality of data sources of the list of data sources, determine criticality score for each of the plurality of data sources, calculates data source coverage and asset collection coverage, determines use case coverage, and determines security maturity score using a maturity score model. The maturity score model is a logistic equation which is a function of the data source coverage, the asset collection coverage, the criticality score associated with each of the plurality of data sources, the use case coverage, asset coverage by each the plurality of data sources.
Other inventorsSee patent
Courses
-
Business Intelligence Analytics
-
Projects
-
Cloud Coverage / Cyber Insurance Calculus
Focused cyber liability insurance methodology for analysis using cybersecurity collection of sources, deployment of technology, and analyst coverage of best of breed tooling.
-
Whotype (Acquired by Cyber Human Analytics)
Social dynamics; Human insights. Understand behavioral dynamics in groups, companies, and work with colleagues by aligning with what makes them unique. Best work and best agree at every layer of life.
Yes, it can be used for dating. -
FleetRadar - Product Development
While working at NCI (Formerly Karta Technologies, Inc.), developing, selling, and operating the FleetRADAR a web-based, fleet management system. Designed as a web based application in 2005 to increase the security, efficiency, profitability, and safety of the nations largest companies and their fleet of vehicles. This project was concluded when Karta was acquired by NCI.
-
Cyber Security Behavioral Analysis and Pattern Visualization
-
Active Cyber Security Defense: Unleash all of your security data and achieve unprecedented network visibility and operational intelligence to create an active defense and go head-to-head against the adversaries. No longer will you sit around and sort through alerts and logs, instead you will realize a bigger promise from your perimeter defense investment while reducing root cause analysis time and identifying and examining previously hidden malicious behavior. Cyber security analysis that aids…
Active Cyber Security Defense: Unleash all of your security data and achieve unprecedented network visibility and operational intelligence to create an active defense and go head-to-head against the adversaries. No longer will you sit around and sort through alerts and logs, instead you will realize a bigger promise from your perimeter defense investment while reducing root cause analysis time and identifying and examining previously hidden malicious behavior. Cyber security analysis that aids the hunt for the nefarious characters hiding within your network. Cyber Security helps dramatically accelerate time-to-detection of past and present malicious behavior and identify previously hidden threats in order to harden the network from the inside. Using an all-in-one, fully scalable solution for rapid analytical insight, Analysts can use one tool to import, analyze, and visualize enormous amounts of data and create a continuous security intelligence lifecycle that provides visibility into abnormal and potentially malicious activity.
Honors & Awards
-
Leadership Service Award
ISSA Capitol of Texas Chapter
Languages
-
Spanish
Limited working proficiency
-
Greek
Elementary proficiency
Organizations
-
Infragard
-
- Present -
North SA Chamber of Commerce - Leadership Lab Alumnus
-
- Present -
OWASP & LASCON
Membership Director, LASCON Planning Team
- Present -
ISSA
Membership Director, Vice President, Past-President
- Present -
Trinity University Alumni
-
- Present -
TASSCC
Education Director
-
More activity by Greg
-
Before every game this season, while coaching my son's 9 yr old team, I would say to the boys, hey - someone is going to strike out, someone is going…
Before every game this season, while coaching my son's 9 yr old team, I would say to the boys, hey - someone is going to strike out, someone is going…
Liked by Greg G.
-
Sharing in my network - Tyler & Toyota Cyber Leadership team are awesome.
Sharing in my network - Tyler & Toyota Cyber Leadership team are awesome.
Shared by Greg G.
-
We are very proud to share that Morgan Flager (#13) and Roger Chen (#34) have been recognized by Business Insider as two of the top 100 best…
We are very proud to share that Morgan Flager (#13) and Roger Chen (#34) have been recognized by Business Insider as two of the top 100 best…
Liked by Greg G.
-
Thank you Texas Exes Sara Light and The University of Texas at Austin This is an honor! Hookem🤘🏼 BlackLake Security #LonghornforLife…
Thank you Texas Exes Sara Light and The University of Texas at Austin This is an honor! Hookem🤘🏼 BlackLake Security #LonghornforLife…
Liked by Greg G.
-
Incredibly excited to welcome John DiLullo as the new CEO of ABS Capital portfolio company Deepwatch, a leading MDR cybersecurity company serving…
Incredibly excited to welcome John DiLullo as the new CEO of ABS Capital portfolio company Deepwatch, a leading MDR cybersecurity company serving…
Liked by Greg G.
-
It was a good, quick interview with the Bishop Fox folks. I speak a lot on AI ethics, but I think an easier way for people to think about this is…
It was a good, quick interview with the Bishop Fox folks. I speak a lot on AI ethics, but I think an easier way for people to think about this is…
Liked by Greg G.
-
Coming off the heels of our 7th anniversary and 5th virtual conference, I did an interview with Founder Reports, where I share our #founding story…
Coming off the heels of our 7th anniversary and 5th virtual conference, I did an interview with Founder Reports, where I share our #founding story…
Liked by Greg G.
-
Fellow techies and cloud engineers, how are you managing your cloud spend? A few years back, we implemented AWS Cloud Intelligence Dashboards to…
Fellow techies and cloud engineers, how are you managing your cloud spend? A few years back, we implemented AWS Cloud Intelligence Dashboards to…
Liked by Greg G.
-
Like anyone else who has been around in the tech industry for any period of time, I have been to a lot of events. However, there are industry events,…
Like anyone else who has been around in the tech industry for any period of time, I have been to a lot of events. However, there are industry events,…
Liked by Greg G.
Other similar profiles
Explore collaborative articles
We’re unlocking community knowledge in a new way. Experts add insights directly into each article, started with the help of AI.
Explore MoreOthers named Greg G. in United States
-
Greg Rehkemper
Bachelors in Data Analytics
-
Greg G.
-
Greg Stanley .
Staffing Manager @ Talent Logic Inc.
-
Greg Robinson
-
Greg Smith
Business Analyst Team Lead at Segue Technologies
265 others named Greg G. in United States are on LinkedIn
See others named Greg G.