George Grachis

Want to Join?
Opinions expressed by ICN authors are their own.

A senior security and compliance specialist, George Grachis has over 25 years’ experience in the tech sector. Some of his experience includes over a decade supporting the Space Shuttle program for Computer Sciences Corporation & Grumman Aerospace, security management for CFE Federal Credit Union, IT auditing & consulting for Deloitte and serving as Chief Security Officer for Satcom Direct.

George holds both the CISSP, and CISA certifications. George received the ISSA fellow Designation in 2016 and is currently an active senior board member of ISSA. George has been interviewed by WFTV ABC TV and Fortune Magazine. When not working he enjoys spending time with family & friends, Big Brothers Big Sisters, Playing the Drums, motorcycling, fitness, and writing articles for his CSOonline.com blog, Virtual CISO.

The opinions expressed in this blog are those of George Grachis and do not necessarily represent those of IDG Communications Inc. or its parent, subsidiary or affiliated companies.

Julian Assange arrested: Hero of transparency and privacy, or villain against nations?

Cybersecurity education in the age of acceleration

Cybersecurity education in the age of acceleration

The cyber threat landscape demands professional development initiatives.

Data Privacy Day 2019

Data Privacy Day 2019

GDPR was just the beginning. It started in the EU, but it’s waking up the world on just how much our privacy is being violated.

A look back at cybercrime in 2018

A look back at cybercrime in 2018

Prepare now to mitigate the most cyber risk in 2019!

The IoT tsunami is coming

The IoT tsunami is coming

The Internet of Things will change everything, in all sectors...and you'd better have a plan.

Are you prepared for hurricane season? Disaster recovery and business continuity plan best practices

Are you prepared for hurricane season? Disaster recovery and business continuity plan best practices

Despite the lull of a calm hurricane season so far, your enterprise’s disaster recovery/business continuity plan needs to be in place.

Is your organization a HITRUST org?

Is your organization a HITRUST org?

For good reason, there's now more focus on regulatory compliance for healthcare—which also includes a multitude of vendors and business associates to manage risk for and meet or exceed the Health & Human Services (HHS) compliance...

Automation is the key to mitigation of today’s cyber threats

Automation is the key to mitigation of today’s cyber threats

Organizations need to look at the real risk to its business and its data. When it comes to cybersecurity, one size definitely does not fit all.

Is your cloud service provider ready for HIPAA?

Is your cloud service provider ready for HIPAA?

Is your industry’s compliance with the Health Insurance Portability and Accountability Act of 1996 covered in the cloud?

A look back at cybersecurity in 2017

A look back at cybersecurity in 2017

We keep seeing more and more data breaches. This year Yahoo and Equifax were some of the biggest headline makers, but in the end, it’s more about who has not been breached vs who is the latest.

The security perimeter needs to use one of its most crucial resources: human sensors

The security perimeter needs to use one of its most crucial resources: human sensors

Security Manager George Grachis discusses the current cyber threat landscape and why human sensors, our users, are our most underutilized resource that can make all the difference.

Automating cloud compliance

Automating cloud compliance

The cloud is here, Its dynamic,scalable and ever changing. yesterdays bi yearly or yearly audit snap shots don't meet this new computing platforms needs to achieve compliance. It's time for continuous audits and a single risk...

Load More