17 Posts

George Moraetes

VP, Chief Security Officer and Architect, Securityminders Corporation

George Moraetes is one of the leading information security practitioners with over 20 years of industry experience. He currently serves as the VP, Chief Security Officer and Architect of Securityminders Corporation. In this role, he provides consulting services for Fortune 500 clients, federal and state governments in multiple management role engagements. He is responsible for strategy development, designing and implementing security architectures and overseeing security infrastructure implementations.

Written By George Moraetes

Don’t Let Organizational Politics Derail Security Initiatives

For IT professionals, gaining executive buy-in for information security initiatives requires masterful navigation of organizational politics.

The CISO’s Guide to Minimizing Health Care Security Risks

CISOs must possess skills and expertise in multiple areas to combat health care security risks in this age of ransomware and connected medical devices.

When Responding to a Data Breach, Cooperation Is Nine-Tenths of the Law

When responding to a data breach, the CISO must work closely with the legal department to minimize the risks of litigation and reputational damage.

The CISO’s Guide to Managing Insider Threats

To effectively manage and remediate insider threats, the CISO must establish a comprehensive approach to governance, data analysis and incident response.

Why Machine Learning Is an Essential Tool In the CISO’s Arsenal

To protect their networks from malicious insiders, user negligence and other threats, CISOs need advanced machine learning capabilities such as UBA.

Hire a Team of Hackers to Identify Vulnerabilities

Many companies have adopted the practice of recruiting a team of hackers to poke holes in their networks and assess their incident response capabilities.

Is Cloud Security a Safe Bet for Highly Sensitive Government Data?

Given the sensitivity of data and the rising volume of cyberattacks across the globe, government agencies have deep concerns about cloud security.

Succession Planning: The Importance of a Deputy CISO

To ensure a smooth transfer of security power, organizations should establish a definitive plan to appoint and develop a deputy CISO.

Information Security in the Age of Disinformation

With so much disinformation being reported in the news and spread through social media, it's hard for security professionals to know what to believe.

Is the CISO Job Market Overcrowded?

The CISO job market is full of qualified and underemployed security leaders champing at the bit to provide value to organizations.