Greg Genung

Greg Genung

Austin, Texas Metropolitan Area
18K followers 500+ connections

About

Greg Genung serves as Chief Executive Officer and is the Founder of Snowfire AI, where he…

Articles by Greg

Activity

Join now to see all activity

Experience

  • Snowfire.AI Graphic

    Snowfire.AI

    Austin, Texas Metropolitan Area

  • -

    United States

  • -

  • -

    Austin, Texas Area

  • -

    United States

  • -

    Austin, Texas, United States

  • -

    Austin, Texas Area

  • -

    Austin, Texas Area

  • -

    Austin, Texas Area

  • -

    Austin, Texas Metropolitan Area

  • -

    Austin, Texas

  • -

    Austin, Texas Area

  • -

    Austin, Texas

  • -

    US Market

  • -

    Texas

  • -

    San Antonio, Texas Area

  • -

    Austin, Texas Area

  • -

    San Antonio, Texas Area

  • -

    Austin, Texas Area

Education

  • MIT Professional Education Graphic

    MIT Professional Education

    -

    -

    Applied Digital Transformation Constructs including - Blockchain Technologies, Cloud Architectures, Artificial Intelligence (AI) Application, Internet of Things (IoT), and Cyber Security - Business Operations Transformation Modern Enterprises.

  • -

    -

  • -

    -

  • -

    -

  • -

    -

Licenses & Certifications

Patents

  • Systems and Methods for Security Operations Maturity Assessment

    Issued 11,170,334

    Systems and methods for assessing, tracking and improving security maturity of an organization are provided. Described is a system for assessing security maturity of an organization. The system receives a list of data sources located across multiple jurisdictions for the organization, collects data sources/data using custom rules from a plurality of data sources of the list of data sources, determine criticality score for each of the plurality of data sources, calculates data source coverage…

    Systems and methods for assessing, tracking and improving security maturity of an organization are provided. Described is a system for assessing security maturity of an organization. The system receives a list of data sources located across multiple jurisdictions for the organization, collects data sources/data using custom rules from a plurality of data sources of the list of data sources, determine criticality score for each of the plurality of data sources, calculates data source coverage and asset collection coverage, determines use case coverage, and determines security maturity score using a maturity score model. The maturity score model is a logistic equation which is a function of the data source coverage, the asset collection coverage, the criticality score associated with each of the plurality of data sources, the use case coverage, asset coverage by each the plurality of data sources.

    Other inventors
    See patent

Courses

  • Business Intelligence Analytics

    -

Projects

  • Cloud Coverage / Cyber Insurance Calculus

    Focused cyber liability insurance methodology for analysis using cybersecurity collection of sources, deployment of technology, and analyst coverage of best of breed tooling.

  • Whotype (Acquired by Cyber Human Analytics)

    Social dynamics; Human insights. Understand behavioral dynamics in groups, companies, and work with colleagues by aligning with what makes them unique. Best work and best agree at every layer of life.

    Yes, it can be used for dating.

  • FleetRadar - Product Development

    While working at NCI (Formerly Karta Technologies, Inc.), developing, selling, and operating the FleetRADAR a web-based, fleet management system. Designed as a web based application in 2005 to increase the security, efficiency, profitability, and safety of the nations largest companies and their fleet of vehicles. This project was concluded when Karta was acquired by NCI.

    See project
  • Cyber Security Behavioral Analysis and Pattern Visualization

    -

    Active Cyber Security Defense: Unleash all of your security data and achieve unprecedented network visibility and operational intelligence to create an active defense and go head-to-head against the adversaries. No longer will you sit around and sort through alerts and logs, instead you will realize a bigger promise from your perimeter defense investment while reducing root cause analysis time and identifying and examining previously hidden malicious behavior. Cyber security analysis that aids…

    Active Cyber Security Defense: Unleash all of your security data and achieve unprecedented network visibility and operational intelligence to create an active defense and go head-to-head against the adversaries. No longer will you sit around and sort through alerts and logs, instead you will realize a bigger promise from your perimeter defense investment while reducing root cause analysis time and identifying and examining previously hidden malicious behavior. Cyber security analysis that aids the hunt for the nefarious characters hiding within your network. Cyber Security helps dramatically accelerate time-to-detection of past and present malicious behavior and identify previously hidden threats in order to harden the network from the inside. Using an all-in-one, fully scalable solution for rapid analytical insight, Analysts can use one tool to import, analyze, and visualize enormous amounts of data and create a continuous security intelligence lifecycle that provides visibility into abnormal and potentially malicious activity.

    See project

Honors & Awards

  • Leadership Service Award

    ISSA Capitol of Texas Chapter

Languages

  • Spanish

    Limited working proficiency

  • Greek

    Elementary proficiency

Organizations

  • Infragard

    -

    - Present
  • North SA Chamber of Commerce - Leadership Lab Alumnus

    -

    - Present
  • OWASP & LASCON

    Membership Director, LASCON Planning Team

    - Present
  • ISSA

    Membership Director, Vice President, Past-President

    - Present
  • Trinity University Alumni

    -

    - Present
  • TASSCC

    Education Director

    -

More activity by Greg

View Greg’s full profile

  • See who you know in common
  • Get introduced
  • Contact Greg directly
Join to view full profile

Other similar profiles

Explore top content on LinkedIn

Find curated posts and insights for relevant topics all in one place.

View top content

Add new skills with these courses