About
With more than 30 years of experience in information technology, knowledge management…
Services
Articles by Chuck
Contributions
Activity
-
Best new word o the day - "enshittification" - rapid decay of the digital environment and its contents. https://lnkd.in/enTfhWiy
Best new word o the day - "enshittification" - rapid decay of the digital environment and its contents. https://lnkd.in/enTfhWiy
Shared by Chuck Georgo
Experience
Education
-
-
-
-
The British Standards Institute (BSI) issued ISO/IEC 27001:2005 Lead Auditor (TPECS) certificate to Chuck Georgo today. ISO/IEC 27001ISO/IEC 27001 is an Information Security Management System (ISMS) standard published in October 2005 by the International
Organization for Standardization (ISO) and the International Electrotechnical Commission (IEC).
ISO/IEC 27001 formally specifies a management system that is intended to bring information security under explicit management control…The British Standards Institute (BSI) issued ISO/IEC 27001:2005 Lead Auditor (TPECS) certificate to Chuck Georgo today. ISO/IEC 27001ISO/IEC 27001 is an Information Security Management System (ISMS) standard published in October 2005 by the International
Organization for Standardization (ISO) and the International Electrotechnical Commission (IEC).
ISO/IEC 27001 formally specifies a management system that is intended to bring information security under explicit management control. Being a formal specification means that it mandates specific requirements. Organizations that claim to have adopted ISO/IEC 27001 can therefore be formally audited and certified compliant with the standard. -
-
Master's of Science in Public Administration
-
Licenses & Certifications
-
ICTTF Ransomware Uncovered Specialist
ICTTF - Cyber Risk Academy
IssuedCredential ID 63eafe50746223013f467f7d -
Certified Cyber Risk Officer (CCRO)
International Compliance Association
IssuedCredential ID 52162227 -
Submarine Service (SS) Designation
US Navy USS Billfish (SSN-676)
Issued
Volunteer Experience
-
Project Lead
Cypresswood Veterans Memorial
- Present 1 year 6 months
i18n_veterans
I am leading a project to build a veterans memorial within the Cypresswood community in Winter Haven, FL.
-
Group Founder/Group Manager, LinkedIn
InfraGard National Members Alliance (INMA)
- Present 16 years 2 months
Education
InfraGard is a cooperative undertaking between the FBI and an association of businesses, academic institutions, state and local law enforcement agencies, and other participants dedicated to increasing the security of United States critical infrastructures.
InfraGard is a public-private volunteer organization that serves as the critical link that forms a tightly-knit working relationship across all levels. Each InfraGard chapter provides all stakeholders immediate access to experts from…InfraGard is a cooperative undertaking between the FBI and an association of businesses, academic institutions, state and local law enforcement agencies, and other participants dedicated to increasing the security of United States critical infrastructures.
InfraGard is a public-private volunteer organization that serves as the critical link that forms a tightly-knit working relationship across all levels. Each InfraGard chapter provides all stakeholders immediate access to experts from law enforcement, industry, academic institutions and other federal, state and local government agencies.
By utilizing the talents and expertise of the InfraGard network, information is shared to mitigate threats to our nation’s critical infrastructures and key resources.
This group was established as an adjunct to the InfraGard portal and individual InfraGard chapters and serves to connect LinkedIn members who are also members of InfraGard. This group was not meant to be the primary means for InfraGard member collaboration; however, we are using the infragard.org email authentication method to ensure only vetted members are accepted into this group.
-
Crisis Response Volunteer
Team Rubicon, Inc.
- Present 11 years 6 months
Disaster and Humanitarian Relief
Team Rubicon unites the skills and experiences of military veterans with first responders to rapidly deploy emergency response teams. I'm just at the early stages of participation in this organization, going through a number of disaster response and incident management training programs. Eventually, I will volunteer to deploy on Domestic or International Missions in response to a crisis. The missions tend to be oriented towards: Low-Level Search-and-Rescue (SAR), debris removal, home repair…
Team Rubicon unites the skills and experiences of military veterans with first responders to rapidly deploy emergency response teams. I'm just at the early stages of participation in this organization, going through a number of disaster response and incident management training programs. Eventually, I will volunteer to deploy on Domestic or International Missions in response to a crisis. The missions tend to be oriented towards: Low-Level Search-and-Rescue (SAR), debris removal, home repair, disaster prep (i.e sandbagging, fire preparation).
More info: http://teamrubiconusa.org/ -
Webmaster and photographer
Operation Welcome Home (Maryland)
- Present 17 years 9 months
Social Services
All volunteer organization that facilitates welome home events for troops returning from the global war on terror (GWOT). See more at www.owhmd.org.
-
Group Founder/Group Manager, LinkedIn
U.S. Navy Cryptologic Technician Maintenance Group
- Present 16 years 4 months
Social Services
The CTM rating was established in 1948 along with five other "CT" ratings--CTR, CTI, CTO, CTT and CTA. CTMs are the MacGyvers of the fleet--they install, can operate, take care of, and repair of state-of-the-art electronic, computer and networking equipment and systems.
Many thought the CTM rating would go away when the CTN rating was established. But as of Aug 12, 2008, it appears that the demise of the CTM rating was premature"--NETWARCOM Adm. Deets killed all plans to do away with…The CTM rating was established in 1948 along with five other "CT" ratings--CTR, CTI, CTO, CTT and CTA. CTMs are the MacGyvers of the fleet--they install, can operate, take care of, and repair of state-of-the-art electronic, computer and networking equipment and systems.
Many thought the CTM rating would go away when the CTN rating was established. But as of Aug 12, 2008, it appears that the demise of the CTM rating was premature"--NETWARCOM Adm. Deets killed all plans to do away with the CTM rating...we're still going!
-
Group Founder/Group Manager, LinkedIn
Silent Service - Submarine Veterans
- Present 16 years 9 months
Social Services
This group will serve as a forum to connect those LinkedIn members who share the life-long bond of loyalty and friendship after having braved the ocean's depths aboard naval submarines. Nicknamed "submariners," this group will give them an opportunity to share stories and interact with each other.
-
Group Founder/Group Manager, LinkedIn
I Love Adak Alaska
- Present 16 years 5 months
Social Services
This group is for people who have either lived, worked or visited the beautiful and historic island of Adak, Alaska. It was a World War II Army post and a Navy base during the Cold War. It's now home to 69 people and 3,000 caribou. I hope to get members to share memories of their time on the island.
Publications
-
Marrying BPM and SOA to Improve Intelligence Delivery and Fusion Center Solutions
http://marketing.bpm.com/acton/attachment/9188/f-009c/0/-/-/-/-/Georgo%2020140610%20Marrying%20BPM%20and%20SOA%20to%20Improve%20Intel-Fusion%20Centers%20%28final%29.pdf
Gone are the days when a Business Analyst can just toss the functional requirements "over the wall" to developers and expect delivery of effective IT solutions. This is especially true in the world of intelligence and fusion centers – The nature of the knowledge-work, number of solution options available, and pace of technology advancement requires a much closer relationship between those that do the work, those that develop and deliver technology solutions, and those translating between the…
Gone are the days when a Business Analyst can just toss the functional requirements "over the wall" to developers and expect delivery of effective IT solutions. This is especially true in the world of intelligence and fusion centers – The nature of the knowledge-work, number of solution options available, and pace of technology advancement requires a much closer relationship between those that do the work, those that develop and deliver technology solutions, and those translating between the two.
To prevent disillusionment of the users and costs associated with rework during design and development, solution developers must now engage with the business analysts long before the functional requirements document is published. This session presents a collaborative approach for extending the classic requirements analysis process through what I call "Service-Oriented Analysis" to develop comprehensive service contracts that will help you to deliver better Service-Oriented Architecture (SOA) based solutions. -
Hit Me With Your Best Hack: Hardening Your Agency from Internal and External Cyber Threats
http://govsecinfo.com/events/govsec-2014/sessions/wednesday/le2-2.aspx
You’ve heard it before – it’s not a matter of if, but when your agency will become the target of a cyber-attack. People won’t be able to access your website, they’ll deface your home page, and maybe even post up embarrassing stuff about you on the internet…right? But you know what? Most penetrations don’t make the headlines. The truth is, they are probably already inside your network. Insiders or external actors, quietly gathering your files, monitoring your operational activities, stealing…
You’ve heard it before – it’s not a matter of if, but when your agency will become the target of a cyber-attack. People won’t be able to access your website, they’ll deface your home page, and maybe even post up embarrassing stuff about you on the internet…right? But you know what? Most penetrations don’t make the headlines. The truth is, they are probably already inside your network. Insiders or external actors, quietly gathering your files, monitoring your operational activities, stealing personal information.
So how can you defend yourself from these threats? Routers and firewalls are important, but that’s only a piece of the solution. A good cyber-defense strategy must include policies, processes, and a workforce that does the right things to protect your agency. This session will present you with a framework for Law Enforcement Executives to protect their networks, information, and staff.
At the completion of this presentation, you will learn about:
1. The top internal and external cyber-threats to your agency.
2.A cyber-security framework you can apply to your agency.
3.Tools you can use to determine your agency’s level of vulnerability.
Courses
-
Information Security Management System
BSI ISO/IEC 27001
Honors & Awards
-
Certified Knowledge Manager (CKM)
Knowledge Management Institute (KMI)
CKM is the Flagship Certification for Managers and Leaders of KM Initiatives; public or private sector, large or small – the CKM is the international standard for all KM Professionals.
Includes a proven methodology and the methods/techniques
necessary to:
- Implement KM using proven tips/tools anyone can use
- Build better collaboration; better communication, and spark innovation
- Transform an organization or customer into a rapid learning environment
- Teach…CKM is the Flagship Certification for Managers and Leaders of KM Initiatives; public or private sector, large or small – the CKM is the international standard for all KM Professionals.
Includes a proven methodology and the methods/techniques
necessary to:
- Implement KM using proven tips/tools anyone can use
- Build better collaboration; better communication, and spark innovation
- Transform an organization or customer into a rapid learning environment
- Teach innovative ways to do Knowledge Mapping
- Create the KM Vision and solid strategy to get there
- Initiate successful Communities of Practice
- Offer usable, real-world KM principles and keys to success
- Lead a successful KM initiative
-
Certified Performance Technologist
International Society for Performance Improvement (ISPI)
Offered since 2002, this proficiency-based Human Performance Technology (HPT) certification involves practitioners committing to a code of ethical practice and documenting how multiple examples of their work meet validated Performance Improvement Standards. The CPT credential is in demand by organizations hiring for specific performance improvement expertise and used as a benchmark for organizations choosing to develop their staff, deploy teams, and evaluate the expertise of vendors and…
Offered since 2002, this proficiency-based Human Performance Technology (HPT) certification involves practitioners committing to a code of ethical practice and documenting how multiple examples of their work meet validated Performance Improvement Standards. The CPT credential is in demand by organizations hiring for specific performance improvement expertise and used as a benchmark for organizations choosing to develop their staff, deploy teams, and evaluate the expertise of vendors and consultants. The CPT is the sole performance improvement credential available that is based on a comprehensive demonstration of real-world experience and competence across multiple projects. You are not required to complete a formal training or education program or an exam.
Organizations
-
Maryland Chiefs of Police Association (MCPA)
Member
- Present -
National Seriff's Association
Life Member
- PresentTo encourage and promote fair and efficient administration of criminal justice throughout the United States.
-
International Association of Chiefs of Police (IACP)
Member, Criminal Justice Information Systems Committee
Recommendations received
19 people have recommended Chuck
Join now to viewMore activity by Chuck
-
9 Psychology Concepts for Marketing Credits to Pierre Herubel, follow him for more valuable content. ------ Here's the original post: Great…
9 Psychology Concepts for Marketing Credits to Pierre Herubel, follow him for more valuable content. ------ Here's the original post: Great…
Liked by Chuck Georgo
-
Fascinating new study out from Rebecca L. Rickert and her team at Empower this morning, looking at financial success by generation. There's one truly…
Fascinating new study out from Rebecca L. Rickert and her team at Empower this morning, looking at financial success by generation. There's one truly…
Liked by Chuck Georgo
-
On the dangers of measuring behavior vs accomplishment: “Behavioral measures are measures of what people do. Accomplishment measures are measures…
On the dangers of measuring behavior vs accomplishment: “Behavioral measures are measures of what people do. Accomplishment measures are measures…
Liked by Chuck Georgo
-
Enterprise L&D: Just because someone/anyone can identify a Valid Learning Need doesn't mean it's worthy of addressing. You might only be able to…
Enterprise L&D: Just because someone/anyone can identify a Valid Learning Need doesn't mean it's worthy of addressing. You might only be able to…
Liked by Chuck Georgo
-
Introverts lead with actions - Not noise: Quiet people often have the loudest impact in workplaces that value their strengths. Yet, many…
Introverts lead with actions - Not noise: Quiet people often have the loudest impact in workplaces that value their strengths. Yet, many…
Liked by Chuck Georgo
-
⏰ As of today, the deadlines for the Cyber Resilience Act have been set. ⏰ The Cyber Resilience Act (CRA) was published today in the EU Official…
⏰ As of today, the deadlines for the Cyber Resilience Act have been set. ⏰ The Cyber Resilience Act (CRA) was published today in the EU Official…
Liked by Chuck Georgo
-
Work smarter, not harder. These 20 sentences will help you cut through the noise, get more done, and create space for what truly matters—both at…
Work smarter, not harder. These 20 sentences will help you cut through the noise, get more done, and create space for what truly matters—both at…
Liked by Chuck Georgo
-
I always said she'll be mayor someday...she's one step closer... https://lnkd.in/egxCGY3B #nypd #tisch #DomainAwarenessSystem
I always said she'll be mayor someday...she's one step closer... https://lnkd.in/egxCGY3B #nypd #tisch #DomainAwarenessSystem
Shared by Chuck Georgo
-
How many mistakes are caused by assumptions? Far too many - Assumptions are silent disruptors – They can sabotage your work and…
How many mistakes are caused by assumptions? Far too many - Assumptions are silent disruptors – They can sabotage your work and…
Liked by Chuck Georgo
Other similar profiles
Explore collaborative articles
We’re unlocking community knowledge in a new way. Experts add insights directly into each article, started with the help of AI.
Explore MoreOthers named Chuck Georgo
1 other named Chuck Georgo is on LinkedIn
See others named Chuck Georgo