George Grachis

George Grachis, Senior Consultant for Maxis360, has over 25 years’ experience in the Tech Sector. Some of his experience includes over a decade supporting the Space Shuttle program for Computer Sciences Corporation, Security Management for CFE Federal Credit Union, Support Engineering for Dictaphone’s Hospital Information Systems and IT Auditing & Consulting for McGladrey. Specific roles include; Network and Systems Administration, Network Engineering, Governance, Risk & Compliance, Auditing, Risk Assessments, and Cyber Security Awareness presentations.

George graduated from Rollins College in Winter Park, FL with a CIS degree. George holds both the CISSP, and CISA certifications. He serves on the Keiser University Advisory Board and is currently an active senior board member of ISSA, ISACA, and InfraGard.

Recently, George joined the Cyber Security Committee of the Space Coast Tech Council. He was also a presenter at Info Sec World 2011 and Authored a book on Cyber Security Awareness. More recently he wrote two articles for CSO Online titled “The New Security Perimeter: Human Sensors” March 2014, and “How to fend off data breaches” Oct 2014 and was recently quoted in Fortune Magazine “How Home Depot CEO Frank Blake kept his legacy from being hacked” November 17, 2014.

The opinions expressed in this blog are those of George Grachis and do not necessarily represent those of IDG Communications, Inc., its parent, subsidiary or affiliated companies.

Law firms subject to same cyber risk as others, but is compliance required?

2016: A reflection of the year in cybercrime

2016: A reflection of the year in cybercrime

A look back at 2016 predictions in cyber crime and how it all actually played out.

Hillary or Donald: Who is more cybersecurity savvy?

Hillary or Donald: Who is more cybersecurity savvy?

Cybersecurity and the role of the President. What they say is one thing, what about their track record is something else altogether.

IT audits must consider the cyber kill chain and much more!

IT audits must consider the cyber kill chain and much more!

Its not enough to perform an IT audit to achieve compliance alone, Today's threat landscape includes sophisticated APT's, Advanced Persistent Threats, Remote access Trojans and Ransomeware to name a few, In order for an IT audit to...

Florida privacy law adds breach notification and strengthens compliance

Florida privacy law adds breach notification and strengthens compliance

A brief intro to US State and Federal Law and how they work to govern the United States, An intro to the FIPA (Florida Information Protection Act) and how it works with existing compliance to strengthen it and better protect business...

5 more critical IT policies you should have in place

5 more critical IT policies you should have in place

In this article we cover part 2 of 10 IT policies every organization should have.

A pen test a day keeps hackers away

A pen test a day keeps hackers away

Penetration testing has evolved from a nice to have test to a mandatory test, Besides compliance a PEN test will tell you just how secure your organizations data really is. Your network is being scanned and attacked daily, don't wait...

Critical IT policies you should have in place

Critical IT policies you should have in place

When we talk to clients as part of an IT audit we often find that policies are a concern, either the policies are out of date or just not in place at all. This often stems from the fact that no-one has been assigned to a permanent...

Is your healthcare organization leaking data?

Is your healthcare organization leaking data?

Recent news headlines and research has illustrated that healthcare organizations are either leaking data from various servers and medical devices or they are being hit with ransomware. This article looks at some of the reasons why...

Third-party vendors must abide by HIPAA privacy rules as well

Third-party vendors must abide by HIPAA privacy rules as well

This month I cover the HIPAA business associate rule, the FIPA, (Florida Information Protection Act) and summarize the latest FDA cyber security medical device guidance.

Privacy at what cost? Apple vs the US government

Privacy at what cost? Apple vs the US government

The Federal Government, and the FBI need access to the phone as in any shooting to help solve the crime, to look for links to other possible shooters. But Apple CEO Tim Cook says we can’t do that, to do so jeopardizes the technologies...

What every IT department needs to know about IT audits

What every IT department needs to know about IT audits

Today's IT departments are faced with deadlines to deploy and fix an ever increasing array of advanced technology. All of this while trying to maintain some sort of security and compliance posture. Add to this budget cuts and staff...

Load More