Brian Greenberg

Brian Greenberg

Chicago, Illinois, United States
29K followers 500 connections

About

I am a Chief Information Officer and senior-level information technology executive…

Articles by Brian

See all articles

Contributions

Activity

Join now to see all activity

Experience

  • RHR International Graphic

    RHR International

    Chicago, Illinois, United States

  • -

    Chicago, Illinois, United States

  • -

  • -

    Hanover, Minnesota, United States

  • -

    Chicago, Illinois, United States

  • -

    Chicago, IL

  • -

    Greater Chicago Area

  • -

    Chicago, Illinois, United States

  • -

    Greater Chicago Area

  • -

    Chicago, Illinois, United States

  • -

    San Francisco Bay Area

  • -

    Mechelen, Flanders, Belgium

  • -

    Greater Minneapolis-St. Paul Area

  • -

    Greater Chicago Area

  • -

    Chicago, IL.

  • -

    Greater Chicago Area

  • -

    Greater Chicago Area

  • -

    Greater Chicago Area

  • -

    Greater Chicago Area

  • -

    Greater New York City Area

  • -

    Greater Boston Area

  • -

    Greater Chicago Area

  • -

    Richmond, Virginia Area

  • -

    Greater Seattle Area

  • -

    Hartford, Connecticut Area

  • -

    Greater Seattle Area

  • -

    Tokyo, Japan (東京, 日本)

  • -

    Redmond, WA

  • -

    San Francisco Bay Area

  • -

    Greater Seattle Area

  • -

    Schaumburg, IL.

  • -

  • -

Education

  • Antioch University Seattle Graphic

    Antioch University Seattle

    Activities and Societies: Whole Systems Design Association, International Society of Systems Sciences, Association of Computing Machinery

    Systems research studies abroad; Egypt & Indonesia

  • Activities and Societies: Group Relations Conference

    Leadership & Membership In Our Time — Working with Identity, Authority, and Boundaries. By The New York Center for the Study of Groups, Organizations & Social Systems and the The A.K. Rice Institute.

  • Activities and Societies: (AEPi) Alpha Epsilon Pi Fraternity, Gamma Phi Circus, Philosophy Club, (ACM) Association of Computing Machinery, Gymnastics Club, Philosophy Club, Biology Department Greenhouse and Aquaculture Lab

    Systems Analysis and Design with extensive cooperative work with Motorola in CASE technologies, Methodology, Systems Architecture, and R&D for advanced systems research.

  • Activities and Societies: Concert Choir, Camerata Singers, Barbershop Quartet

    Music studies abroad; Poland and Hungry.

Licenses & Certifications

Volunteer Experience

Publications

  • Workers Of The World Unite: Embracing Technology In Every Job

    Forbes

    Throughout my career, I’ve had the privilege of working in several industries and many roles. The one constant was that I needed to keep learning along the way. There was always a new process to understand or technology to become familiar with. There was always something new, and as time went on, there was more and more technology to learn.

    In the ever-evolving landscape of the modern workplace, a new reality emerged: Every worker, regardless of their field, is now a tech worker to some…

    Throughout my career, I’ve had the privilege of working in several industries and many roles. The one constant was that I needed to keep learning along the way. There was always a new process to understand or technology to become familiar with. There was always something new, and as time went on, there was more and more technology to learn.

    In the ever-evolving landscape of the modern workplace, a new reality emerged: Every worker, regardless of their field, is now a tech worker to some extent. This shift is not limited to the tech industry and IT; it encompasses every sector, ranging from healthcare, education and carpentry to food service, manufacturing and retail. As technology permeates every aspect of our lives, adapting and continually retraining has become paramount.

    See publication
  • Understanding Smishing: How to Protect Yourself from SMS Phishing Scams

    In the digital age, smishing – SMS phishing – poses a growing threat. These scams, often disguised as urgent messages from trusted sources, aim to steal sensitive information. My latest post, “Understanding Smishing: How to Protect Yourself from SMS Phishing Scams,” dives into how these scams work and how you…

    See publication
  • Reassessing The Allure Of ‘Shiny Objects’ In Business Strategy

    Forbes

    For those organizations that don’t engage with new technologies thoughtfully, they’ll likely experience several pitfalls.

    See publication
  • Unleashing The Power Of IT Leadership: Revolutionizing The Business Landscape In The Digital Age

    Forbes

    The role of IT leadership in today's business world is undergoing a significant transformation, driven by factors such as digital transformation, cybersecurity, cloud computing, data analytics, artificial intelligence and the need for agility.

    See publication
  • This Year’s Top Cybersecurity Threats And How To Protect Your Business

    Forbes

    Last year, the average cost of a U.S. data breach was $9.44 million. Of those companies that suffered a breach, 60% were forced into bankruptcy within six months. No one wants to end up a statistic like that. Hence, the priority of cybersecurity has increased as a growing concern for businesses in all industries.

    Security risks come in many forms, from cyberattacks, phishing, and data breaches to insider threats and vulnerabilities in Internet of Things (IoT) devices. However, most…

    Last year, the average cost of a U.S. data breach was $9.44 million. Of those companies that suffered a breach, 60% were forced into bankruptcy within six months. No one wants to end up a statistic like that. Hence, the priority of cybersecurity has increased as a growing concern for businesses in all industries.

    Security risks come in many forms, from cyberattacks, phishing, and data breaches to insider threats and vulnerabilities in Internet of Things (IoT) devices. However, most businesses don’t know where to begin and have limited resources and small IT teams, if any at all.

    In this article, I’ll show you what you should be on the lookout for and what high-priority solutions you can employ to address the top cybersecurity issues in 2023.

    See publication
  • Cyber Insurance And Reassessing The Cyber Business

    Forbes

    Cybersecurity insurance should be another item on every organization’s checklist next to secure backups, especially as cybercriminals employ more sophisticated methods to access organizations’ digital assets.

    See publication
  • Entity-Level Encryption: The Only Defense Against Ransomware

    Forbes

    Ransomware is one of the fastest-growing forms of cybercrime. It begins when ransomware criminals gain access to a company’s network and, like a virus, spread their malware, infecting all the company's computers. From there, the malware encrypts all the company's data, making the information unreadable, shutting down the business until a ransom is paid, often in the millions of dollars. Ransomware is a grave threat to any business. It's an incredibly complicated problem that traditional IT…

    Ransomware is one of the fastest-growing forms of cybercrime. It begins when ransomware criminals gain access to a company’s network and, like a virus, spread their malware, infecting all the company's computers. From there, the malware encrypts all the company's data, making the information unreadable, shutting down the business until a ransom is paid, often in the millions of dollars. Ransomware is a grave threat to any business. It's an incredibly complicated problem that traditional IT defenses have been unable to stop, and a single strategy cannot fix it.

    See publication
  • The Achilles' Heel Of Business Technology: Zero-Day Vulnerabilities

    Forbes

    Even the smallest unknown or unpatched vulnerability can be catastrophic. Unlike known vulnerabilities that have been identified, patched and publicized, unknown (or known but unpatched) vulnerabilities are called zero-day vulnerabilities. It means that the developers have "zero days" to fix the problem that has just been exposed and likely already exploited by hackers. They're vulnerabilities that a malicious hacker or government agency could have discovered yet are not reported, or the…

    Even the smallest unknown or unpatched vulnerability can be catastrophic. Unlike known vulnerabilities that have been identified, patched and publicized, unknown (or known but unpatched) vulnerabilities are called zero-day vulnerabilities. It means that the developers have "zero days" to fix the problem that has just been exposed and likely already exploited by hackers. They're vulnerabilities that a malicious hacker or government agency could have discovered yet are not reported, or the developer knows about the vulnerabilities but hasn't yet issued a patch.

    See publication
  • To Delete Or Not To Delete -- That Is The Question

    Forbes

    There seems to be confusion in corporate America about whether or not to delete data. On one hand, there are legal departments that advise keeping everything forever, and on the other are those that recommend deleting everything as a matter of policy as soon as possible — whacking away at files and folders on your file servers like a drunk landscaper whirling a weed whacker around your yard. Meanwhile, IT is stuck in the middle trying to develop and engineer systems to enforce ever-changing…

    There seems to be confusion in corporate America about whether or not to delete data. On one hand, there are legal departments that advise keeping everything forever, and on the other are those that recommend deleting everything as a matter of policy as soon as possible — whacking away at files and folders on your file servers like a drunk landscaper whirling a weed whacker around your yard. Meanwhile, IT is stuck in the middle trying to develop and engineer systems to enforce ever-changing data retention policies.

    With a rash of security breaches and companies getting slapped with huge fines for mismanaging data during legal investigations, for some, the only reasonable thing to do is delete all data. The view taken by some is that if there’s no data, then it can’t be stolen and won't available for evidence in a lawsuit. Unfortunately, this is rarely true and likely to cost a lot more in the long run.

    See publication
  • Three Considerations To Help You Better Secure And Control Your Data

    Forbes

    The systems that we trust with our personal data, perhaps naïvely and at times reluctantly, are the targets. According to Privacy Rights Clearinghouse, 7,859 data breaches have been made public since 2005 (and the actual number may be higher). Juniper Research estimates that each single data breach will cost more than $150 million on average by 2020.

    Strong IT leadership is essential. Data breaches can happen at any moment, and we now need to assess the influx of increasingly massive…

    The systems that we trust with our personal data, perhaps naïvely and at times reluctantly, are the targets. According to Privacy Rights Clearinghouse, 7,859 data breaches have been made public since 2005 (and the actual number may be higher). Juniper Research estimates that each single data breach will cost more than $150 million on average by 2020.

    Strong IT leadership is essential. Data breaches can happen at any moment, and we now need to assess the influx of increasingly massive amounts of data for risk in real time.

    See publication
  • There is no cloud, it’s just someone else’s computer.

    musings...

    Let’s face it, the cloud is everywhere, but if you ask five different people what the cloud is, you’ll get five different answers. The fact of the matter is; There is no cloud, it’s just someone else’s computer.

    See publication
  • Big Data Under Attack

    Huffington Post

    Once again, everybody is talking about China. On Feb. 19, Mandiant, an American security company issued a startling report -- the result of a six-year investigation -- that makes the claim that the United Sates is in a cyber war with a 12-story building in Shanghai. The private security analyst concluded that the building is home of China's stealth cyber war division, the People's Liberation Army Unit 61398.

    If this sounds like the movie, War Games, make no mistake - this is real…

    Once again, everybody is talking about China. On Feb. 19, Mandiant, an American security company issued a startling report -- the result of a six-year investigation -- that makes the claim that the United Sates is in a cyber war with a 12-story building in Shanghai. The private security analyst concluded that the building is home of China's stealth cyber war division, the People's Liberation Army Unit 61398.

    If this sounds like the movie, War Games, make no mistake - this is real. According to Mandiant, for the last seven years, Chinese hackers have stolen data from at least 141 companies across 20 major industries, including critical infrastructure sectors like energy and telecommunications. At least 115 of the companies were in the United States. Sen. Dianne Feinstein (D-CA) chairwoman of the Senate Intelligence Committee said classified intelligence documents support Mandiant's claim.

    Last year, we proclaimed this the Era of Big Data, and, in light of the dramatic events of the last few weeks, we thought it was an appropriate time to consider what's happened since. In order to understand this from the inside, we invited a leading big data expert, Brian Greenberg, VP of Technology Operations at Total Attorneys and Founder of General System Dynamics, to help us parse fact from fiction or fantasy.

    Other authors
    See publication
  • Stop write protecting your backup tapes.

    General System Dynamics

    Want to know how to save yourself a lot of money and grief? Stop write protecting your backup tapes.

    It seems that there are a lot of people with relatively old knowledge about backup technology. There is an outmoded belief at many IT organizations that if you restore data from tape, you have to write protect the tape before you put the tape in the drive (or tape library), for fear that you might overwrite the data by accident. This belief has caused a great deal of trouble in lost…

    Want to know how to save yourself a lot of money and grief? Stop write protecting your backup tapes.

    It seems that there are a lot of people with relatively old knowledge about backup technology. There is an outmoded belief at many IT organizations that if you restore data from tape, you have to write protect the tape before you put the tape in the drive (or tape library), for fear that you might overwrite the data by accident. This belief has caused a great deal of trouble in lost time, increased grief, and lost budgetary dollars.

    This article explores why IT Departments continue to write protect backup tapes, the history behind the behavior, how to increase efficiency, reducing costs, and protecting your organizations data with modern backup systems.

    See publication
  • Are your backup systems secure?

    InfoSec

    Backup and documentation are together the most-often neglected facets of IT operational management. Why? Backups usually don’t contribute directly to revenue generation. But this is a fatal mistake: ignoring backup and documentation can cost a corporation millions of dollars, even in typical litigation or disaster recovery scenarios. In this article, you will learn:

    — Factors to consider before you move to a tapeless data backup system
    — Encryption challenges and…

    Backup and documentation are together the most-often neglected facets of IT operational management. Why? Backups usually don’t contribute directly to revenue generation. But this is a fatal mistake: ignoring backup and documentation can cost a corporation millions of dollars, even in typical litigation or disaster recovery scenarios. In this article, you will learn:

    — Factors to consider before you move to a tapeless data backup system
    — Encryption challenges and opportunities-related to keeping your off-site data secure
    — Approaches for backup tape reduction and legacy storage technology elimination

    By addressing backup challenges systemically in the context of the entire organization, you will see that running effective, efficient and secure backup operations is an opportunity to effectively contribute to the success of a company, even beyond protecting from financial risk. This perspective will help you to:

    — coherently manage data security
    — control data and data storage growth
    — reduce data storage costs
    — ensure business continuity
    — recover from disasters
    — provide effective reporting and data visualization of systems
    — automate processes to reduce data exposure, fine-tuning backup coverage and identifying security vulnerabilities

    See publication
  • Seven questions every CIO should be able to answer about eDiscovery and legal holds.

    General System Dynamics

    Electronic Discovery, eDiscovery, Legal Holds, Electronically Stored Information (ESI) and Data Preservation are just a few of an increasing family of terms that CIO's and IT Managers are hearing more and more every day. Particularly since the new Federal Rules of Civil Procedure (FRCP) came about at the end of 2006 have internal legal counsel and IT departments started a new dialogue as to what responsibilities, and capabilities an organization has in regards to preserving data required for…

    Electronic Discovery, eDiscovery, Legal Holds, Electronically Stored Information (ESI) and Data Preservation are just a few of an increasing family of terms that CIO's and IT Managers are hearing more and more every day. Particularly since the new Federal Rules of Civil Procedure (FRCP) came about at the end of 2006 have internal legal counsel and IT departments started a new dialogue as to what responsibilities, and capabilities an organization has in regards to preserving data required for legal discovery. Even more challenging are the tasks IT staff are being asked to perform in terms of actually doing the electronic preservation.

    What we have seen in recent years is where the necessity of data preservation is driving organizations to create new processes and procedures as well as vendors to develop new technologies that allow companies to preserve data in systems that otherwise never had been designed to conduct legal holds. Considering the scores of systems that we find throughout a company, to discuss the risks and challenges of data preservation of each type of system would be far too much to encompass in just one article. However, I will cover the most common and important aspects of data preservation and electronic discovery that companies have to address with particular emphasis on backup systems. Backup systems, as you will see, pose some of the most significant challenges and risks, in both financial and legal spaces when it comes to managing legal holds. Effective solutions for managing legal holds is currently provided by only a couple vendors for this complex and all too often, over-looked high risk area.

    See publication
  • A Cost Analysis of Media Consumption using System Dynamics Modeling in a Data Storage Backup Environment

    General System Dynamics

    Using computer tape for data storage has a long and established history going back to the early 1950’s. Today there are newer, heavily marketed and overly hyped disk storage technologies and even more advanced tape technology for the consumer to consider. Among these technologies are disk targets such as multi-tier virtual tape libraries and disk storage units. Additionally, there are MAID (massive array of idle disks), deduplication and single instance storage options. Assessing the options…

    Using computer tape for data storage has a long and established history going back to the early 1950’s. Today there are newer, heavily marketed and overly hyped disk storage technologies and even more advanced tape technology for the consumer to consider. Among these technologies are disk targets such as multi-tier virtual tape libraries and disk storage units. Additionally, there are MAID (massive array of idle disks), deduplication and single instance storage options. Assessing the options available and trying to figure out the costs of replacing tape with disk is not a simple one. Exploring the myriad of technologies, storage architectures and operational criteria such as performance, risk assessment, RTO (recovery time objective) and RPO (recovery point objectives) as well as the businesses data protection policies and legal requirements can bewilder even the most seasoned professionals. Particularly difficult is calculating the costs of these storage architectures which requires an understanding of data growth, storage density and calculating media consumption in a backup system with variable schedules, backup levels, data and media growth rates as well as activities involving data migration and moving media to an off-site location.

    In this paper, I present a unique approach to predict and model media consumption within production backup environments in various industries using either disk or tape as a backup target. The configurations and architectures of backup environments analyzed was done for the first time utilizing system dynamics modeling. By developing these models I was able to run backup system simulations over a span of years that provided data on media consumption for both disk and tape. I was also able to incorporate leveraging technologies such as de-duplication or single instance storage into the models to analyze the correlating cost differences potentially affecting the total cost of ownership for each architecture.

    See publication

Courses

  • Acting

    -

  • Creating a Culture of Design

    -

  • Creating a Professional Community I & II

    -

  • Designing with/in Community

    -

  • Entrepreneurial Studies

    -

  • Immersion into Whole Systems Design

    -

  • Improv

    Levels 1 - 5

  • Notational Design

    -

  • Storytelling

    -

  • System Dynamics Modeling

    -

  • Systems Theory

    -

  • Systems study abroad — Bali 2000

    -

  • Systems study abroad — Egypt 1999

    -

  • The Second City -- Improvisation

    Levels A-E

  • Whole Systems Design Labs [I, II, III, IV]

    -

Projects

  • Social Subject Matter Expert (SME)

    - Present

    Recognized as a Subject Matter Expert on IT Operations, Data Centers, and Enterprise Systems Architecture and hand selected by Dell leaders to participate in an elite Social SME Activation Program. Completed comprehensive training workshops to become an official thought leader on behalf of Dell in social media. Manage key influencer/customer relationships and share my expertise in relevant online communities to impact Dell’s overall credibility, share of voice, search engine rankings and online…

    Recognized as a Subject Matter Expert on IT Operations, Data Centers, and Enterprise Systems Architecture and hand selected by Dell leaders to participate in an elite Social SME Activation Program. Completed comprehensive training workshops to become an official thought leader on behalf of Dell in social media. Manage key influencer/customer relationships and share my expertise in relevant online communities to impact Dell’s overall credibility, share of voice, search engine rankings and online revenue.

    See project

Honors & Awards

  • Business of IT Advocate Award

    Think IT Association

  • Business of IT Facilitator of the Year Award

    Think IT Association

  • Guest Lecturer

    Roosevelt University

    Business Communications — Improv skills for enhanced communication and collaboration.

  • Dell Champions Ambassador

    Dell

  • Dell Champion

    Dell

Languages

  • English

    Native or bilingual proficiency

  • BASH

    Native or bilingual proficiency

  • Python

    Full professional proficiency

  • SQL

    Professional working proficiency

  • Swift

    Elementary proficiency

Organizations

  • Literacy Rescue

    Board Member, CIO, IT Committee Chair

    - Present
  • Resilience

    Director, IT Committee Chair

    - Present
  • InfraGard

    Chicago FBI Infragard Member

    - Present
  • Private Directors Association

    Member

    - Present
  • Forbes Technology Council

    Contributor and Council Member

    - Present
  • Turnaround Management Association (TMA)

    Member

    - Present
  • AITP (Association of Information Technology Professionals) & CompTIA

    Member

    - Present
  • Illinois Junior Academy of Science (IJAS)

    Judge

    - Present
  • WSDA — Whole Systems Design Association

    Founder

    - Present
  • Association of Computing Machinery (ACM)

    Member

    - Present
  • Executives' Club of Chicago

    Member

    -
  • Think IT Association

    Member, Board of Advisors

    -
  • EcoMyths Alliance

    CTO, Board Member, Executive Committee, Treasure, Communications Committee

    -

Recommendations received

More activity by Brian

View Brian’s full profile

  • See who you know in common
  • Get introduced
  • Contact Brian directly
Join to view full profile

Other similar profiles

Explore collaborative articles

We’re unlocking community knowledge in a new way. Experts add insights directly into each article, started with the help of AI.

Explore More

Others named Brian Greenberg in United States

Add new skills with these courses