About
I am a Chief Information Officer and senior-level information technology executive…
Articles by Brian
-
Workers Of The World Unite: Embracing Technology In Every Job
Workers Of The World Unite: Embracing Technology In Every Job
By Brian Greenberg
-
Understanding Smishing: How to Protect Yourself from SMS Phishing Scams
Understanding Smishing: How to Protect Yourself from SMS Phishing Scams
By Brian Greenberg
-
Reassessing The Allure Of ‘Shiny Objects’ In Business Strategy
Reassessing The Allure Of ‘Shiny Objects’ In Business Strategy
By Brian Greenberg
Contributions
Activity
-
Life is a daily battle One day you think you're on top of your game— the next day you're in the bottom pit reaching for any branch to keep your…
Life is a daily battle One day you think you're on top of your game— the next day you're in the bottom pit reaching for any branch to keep your…
Liked by Brian Greenberg
Experience
Education
-
Antioch University Seattle
Activities and Societies: Whole Systems Design Association, International Society of Systems Sciences, Association of Computing Machinery
Systems research studies abroad; Egypt & Indonesia
-
-
Activities and Societies: Group Relations Conference
Leadership & Membership In Our Time — Working with Identity, Authority, and Boundaries. By The New York Center for the Study of Groups, Organizations & Social Systems and the The A.K. Rice Institute.
-
Activities and Societies: (AEPi) Alpha Epsilon Pi Fraternity, Gamma Phi Circus, Philosophy Club, (ACM) Association of Computing Machinery, Gymnastics Club, Philosophy Club, Biology Department Greenhouse and Aquaculture Lab
Systems Analysis and Design with extensive cooperative work with Motorola in CASE technologies, Methodology, Systems Architecture, and R&D for advanced systems research.
-
Activities and Societies: Concert Choir, Camerata Singers, Barbershop Quartet
Music studies abroad; Poland and Hungry.
Licenses & Certifications
Volunteer Experience
-
Board Member
Think IT Association
- 6 years
-
Member
The Executives' Club of Chicago
- Present 8 years
Business Technology Forum
Marketing, Communications, and Sales Forum
-
Founder
Whole Systems Design Association (WSDA)
- Present 25 years
Education
-
Science Fair Judge
Illinois Junior Academy of Science (IJAS)
- 1 year
Education
Publications
-
Workers Of The World Unite: Embracing Technology In Every Job
Forbes
Throughout my career, I’ve had the privilege of working in several industries and many roles. The one constant was that I needed to keep learning along the way. There was always a new process to understand or technology to become familiar with. There was always something new, and as time went on, there was more and more technology to learn.
In the ever-evolving landscape of the modern workplace, a new reality emerged: Every worker, regardless of their field, is now a tech worker to some…Throughout my career, I’ve had the privilege of working in several industries and many roles. The one constant was that I needed to keep learning along the way. There was always a new process to understand or technology to become familiar with. There was always something new, and as time went on, there was more and more technology to learn.
In the ever-evolving landscape of the modern workplace, a new reality emerged: Every worker, regardless of their field, is now a tech worker to some extent. This shift is not limited to the tech industry and IT; it encompasses every sector, ranging from healthcare, education and carpentry to food service, manufacturing and retail. As technology permeates every aspect of our lives, adapting and continually retraining has become paramount. -
Understanding Smishing: How to Protect Yourself from SMS Phishing Scams
In the digital age, smishing – SMS phishing – poses a growing threat. These scams, often disguised as urgent messages from trusted sources, aim to steal sensitive information. My latest post, “Understanding Smishing: How to Protect Yourself from SMS Phishing Scams,” dives into how these scams work and how you…
-
Reassessing The Allure Of ‘Shiny Objects’ In Business Strategy
Forbes
For those organizations that don’t engage with new technologies thoughtfully, they’ll likely experience several pitfalls.
-
Unleashing The Power Of IT Leadership: Revolutionizing The Business Landscape In The Digital Age
Forbes
The role of IT leadership in today's business world is undergoing a significant transformation, driven by factors such as digital transformation, cybersecurity, cloud computing, data analytics, artificial intelligence and the need for agility.
-
This Year’s Top Cybersecurity Threats And How To Protect Your Business
Forbes
Last year, the average cost of a U.S. data breach was $9.44 million. Of those companies that suffered a breach, 60% were forced into bankruptcy within six months. No one wants to end up a statistic like that. Hence, the priority of cybersecurity has increased as a growing concern for businesses in all industries.
Security risks come in many forms, from cyberattacks, phishing, and data breaches to insider threats and vulnerabilities in Internet of Things (IoT) devices. However, most…Last year, the average cost of a U.S. data breach was $9.44 million. Of those companies that suffered a breach, 60% were forced into bankruptcy within six months. No one wants to end up a statistic like that. Hence, the priority of cybersecurity has increased as a growing concern for businesses in all industries.
Security risks come in many forms, from cyberattacks, phishing, and data breaches to insider threats and vulnerabilities in Internet of Things (IoT) devices. However, most businesses don’t know where to begin and have limited resources and small IT teams, if any at all.
In this article, I’ll show you what you should be on the lookout for and what high-priority solutions you can employ to address the top cybersecurity issues in 2023. -
Cyber Insurance And Reassessing The Cyber Business
Forbes
Cybersecurity insurance should be another item on every organization’s checklist next to secure backups, especially as cybercriminals employ more sophisticated methods to access organizations’ digital assets.
-
Entity-Level Encryption: The Only Defense Against Ransomware
Forbes
Ransomware is one of the fastest-growing forms of cybercrime. It begins when ransomware criminals gain access to a company’s network and, like a virus, spread their malware, infecting all the company's computers. From there, the malware encrypts all the company's data, making the information unreadable, shutting down the business until a ransom is paid, often in the millions of dollars. Ransomware is a grave threat to any business. It's an incredibly complicated problem that traditional IT…
Ransomware is one of the fastest-growing forms of cybercrime. It begins when ransomware criminals gain access to a company’s network and, like a virus, spread their malware, infecting all the company's computers. From there, the malware encrypts all the company's data, making the information unreadable, shutting down the business until a ransom is paid, often in the millions of dollars. Ransomware is a grave threat to any business. It's an incredibly complicated problem that traditional IT defenses have been unable to stop, and a single strategy cannot fix it.
-
The Achilles' Heel Of Business Technology: Zero-Day Vulnerabilities
Forbes
Even the smallest unknown or unpatched vulnerability can be catastrophic. Unlike known vulnerabilities that have been identified, patched and publicized, unknown (or known but unpatched) vulnerabilities are called zero-day vulnerabilities. It means that the developers have "zero days" to fix the problem that has just been exposed and likely already exploited by hackers. They're vulnerabilities that a malicious hacker or government agency could have discovered yet are not reported, or the…
Even the smallest unknown or unpatched vulnerability can be catastrophic. Unlike known vulnerabilities that have been identified, patched and publicized, unknown (or known but unpatched) vulnerabilities are called zero-day vulnerabilities. It means that the developers have "zero days" to fix the problem that has just been exposed and likely already exploited by hackers. They're vulnerabilities that a malicious hacker or government agency could have discovered yet are not reported, or the developer knows about the vulnerabilities but hasn't yet issued a patch.
-
To Delete Or Not To Delete -- That Is The Question
Forbes
There seems to be confusion in corporate America about whether or not to delete data. On one hand, there are legal departments that advise keeping everything forever, and on the other are those that recommend deleting everything as a matter of policy as soon as possible — whacking away at files and folders on your file servers like a drunk landscaper whirling a weed whacker around your yard. Meanwhile, IT is stuck in the middle trying to develop and engineer systems to enforce ever-changing…
There seems to be confusion in corporate America about whether or not to delete data. On one hand, there are legal departments that advise keeping everything forever, and on the other are those that recommend deleting everything as a matter of policy as soon as possible — whacking away at files and folders on your file servers like a drunk landscaper whirling a weed whacker around your yard. Meanwhile, IT is stuck in the middle trying to develop and engineer systems to enforce ever-changing data retention policies.
With a rash of security breaches and companies getting slapped with huge fines for mismanaging data during legal investigations, for some, the only reasonable thing to do is delete all data. The view taken by some is that if there’s no data, then it can’t be stolen and won't available for evidence in a lawsuit. Unfortunately, this is rarely true and likely to cost a lot more in the long run. -
Three Considerations To Help You Better Secure And Control Your Data
Forbes
The systems that we trust with our personal data, perhaps naïvely and at times reluctantly, are the targets. According to Privacy Rights Clearinghouse, 7,859 data breaches have been made public since 2005 (and the actual number may be higher). Juniper Research estimates that each single data breach will cost more than $150 million on average by 2020.
Strong IT leadership is essential. Data breaches can happen at any moment, and we now need to assess the influx of increasingly massive…The systems that we trust with our personal data, perhaps naïvely and at times reluctantly, are the targets. According to Privacy Rights Clearinghouse, 7,859 data breaches have been made public since 2005 (and the actual number may be higher). Juniper Research estimates that each single data breach will cost more than $150 million on average by 2020.
Strong IT leadership is essential. Data breaches can happen at any moment, and we now need to assess the influx of increasingly massive amounts of data for risk in real time. -
There is no cloud, it’s just someone else’s computer.
musings...
Let’s face it, the cloud is everywhere, but if you ask five different people what the cloud is, you’ll get five different answers. The fact of the matter is; There is no cloud, it’s just someone else’s computer.
-
Big Data Under Attack
Huffington Post
Once again, everybody is talking about China. On Feb. 19, Mandiant, an American security company issued a startling report -- the result of a six-year investigation -- that makes the claim that the United Sates is in a cyber war with a 12-story building in Shanghai. The private security analyst concluded that the building is home of China's stealth cyber war division, the People's Liberation Army Unit 61398.
If this sounds like the movie, War Games, make no mistake - this is real…Once again, everybody is talking about China. On Feb. 19, Mandiant, an American security company issued a startling report -- the result of a six-year investigation -- that makes the claim that the United Sates is in a cyber war with a 12-story building in Shanghai. The private security analyst concluded that the building is home of China's stealth cyber war division, the People's Liberation Army Unit 61398.
If this sounds like the movie, War Games, make no mistake - this is real. According to Mandiant, for the last seven years, Chinese hackers have stolen data from at least 141 companies across 20 major industries, including critical infrastructure sectors like energy and telecommunications. At least 115 of the companies were in the United States. Sen. Dianne Feinstein (D-CA) chairwoman of the Senate Intelligence Committee said classified intelligence documents support Mandiant's claim.
Last year, we proclaimed this the Era of Big Data, and, in light of the dramatic events of the last few weeks, we thought it was an appropriate time to consider what's happened since. In order to understand this from the inside, we invited a leading big data expert, Brian Greenberg, VP of Technology Operations at Total Attorneys and Founder of General System Dynamics, to help us parse fact from fiction or fantasy.Other authorsSee publication -
Stop write protecting your backup tapes.
General System Dynamics
Want to know how to save yourself a lot of money and grief? Stop write protecting your backup tapes.
It seems that there are a lot of people with relatively old knowledge about backup technology. There is an outmoded belief at many IT organizations that if you restore data from tape, you have to write protect the tape before you put the tape in the drive (or tape library), for fear that you might overwrite the data by accident. This belief has caused a great deal of trouble in lost…Want to know how to save yourself a lot of money and grief? Stop write protecting your backup tapes.
It seems that there are a lot of people with relatively old knowledge about backup technology. There is an outmoded belief at many IT organizations that if you restore data from tape, you have to write protect the tape before you put the tape in the drive (or tape library), for fear that you might overwrite the data by accident. This belief has caused a great deal of trouble in lost time, increased grief, and lost budgetary dollars.
This article explores why IT Departments continue to write protect backup tapes, the history behind the behavior, how to increase efficiency, reducing costs, and protecting your organizations data with modern backup systems.
-
Are your backup systems secure?
InfoSec
Backup and documentation are together the most-often neglected facets of IT operational management. Why? Backups usually don’t contribute directly to revenue generation. But this is a fatal mistake: ignoring backup and documentation can cost a corporation millions of dollars, even in typical litigation or disaster recovery scenarios. In this article, you will learn:
— Factors to consider before you move to a tapeless data backup system
— Encryption challenges and…Backup and documentation are together the most-often neglected facets of IT operational management. Why? Backups usually don’t contribute directly to revenue generation. But this is a fatal mistake: ignoring backup and documentation can cost a corporation millions of dollars, even in typical litigation or disaster recovery scenarios. In this article, you will learn:
— Factors to consider before you move to a tapeless data backup system
— Encryption challenges and opportunities-related to keeping your off-site data secure
— Approaches for backup tape reduction and legacy storage technology elimination
By addressing backup challenges systemically in the context of the entire organization, you will see that running effective, efficient and secure backup operations is an opportunity to effectively contribute to the success of a company, even beyond protecting from financial risk. This perspective will help you to:
— coherently manage data security
— control data and data storage growth
— reduce data storage costs
— ensure business continuity
— recover from disasters
— provide effective reporting and data visualization of systems
— automate processes to reduce data exposure, fine-tuning backup coverage and identifying security vulnerabilities
-
Seven questions every CIO should be able to answer about eDiscovery and legal holds.
General System Dynamics
Electronic Discovery, eDiscovery, Legal Holds, Electronically Stored Information (ESI) and Data Preservation are just a few of an increasing family of terms that CIO's and IT Managers are hearing more and more every day. Particularly since the new Federal Rules of Civil Procedure (FRCP) came about at the end of 2006 have internal legal counsel and IT departments started a new dialogue as to what responsibilities, and capabilities an organization has in regards to preserving data required for…
Electronic Discovery, eDiscovery, Legal Holds, Electronically Stored Information (ESI) and Data Preservation are just a few of an increasing family of terms that CIO's and IT Managers are hearing more and more every day. Particularly since the new Federal Rules of Civil Procedure (FRCP) came about at the end of 2006 have internal legal counsel and IT departments started a new dialogue as to what responsibilities, and capabilities an organization has in regards to preserving data required for legal discovery. Even more challenging are the tasks IT staff are being asked to perform in terms of actually doing the electronic preservation.
What we have seen in recent years is where the necessity of data preservation is driving organizations to create new processes and procedures as well as vendors to develop new technologies that allow companies to preserve data in systems that otherwise never had been designed to conduct legal holds. Considering the scores of systems that we find throughout a company, to discuss the risks and challenges of data preservation of each type of system would be far too much to encompass in just one article. However, I will cover the most common and important aspects of data preservation and electronic discovery that companies have to address with particular emphasis on backup systems. Backup systems, as you will see, pose some of the most significant challenges and risks, in both financial and legal spaces when it comes to managing legal holds. Effective solutions for managing legal holds is currently provided by only a couple vendors for this complex and all too often, over-looked high risk area. -
A Cost Analysis of Media Consumption using System Dynamics Modeling in a Data Storage Backup Environment
General System Dynamics
Using computer tape for data storage has a long and established history going back to the early 1950’s. Today there are newer, heavily marketed and overly hyped disk storage technologies and even more advanced tape technology for the consumer to consider. Among these technologies are disk targets such as multi-tier virtual tape libraries and disk storage units. Additionally, there are MAID (massive array of idle disks), deduplication and single instance storage options. Assessing the options…
Using computer tape for data storage has a long and established history going back to the early 1950’s. Today there are newer, heavily marketed and overly hyped disk storage technologies and even more advanced tape technology for the consumer to consider. Among these technologies are disk targets such as multi-tier virtual tape libraries and disk storage units. Additionally, there are MAID (massive array of idle disks), deduplication and single instance storage options. Assessing the options available and trying to figure out the costs of replacing tape with disk is not a simple one. Exploring the myriad of technologies, storage architectures and operational criteria such as performance, risk assessment, RTO (recovery time objective) and RPO (recovery point objectives) as well as the businesses data protection policies and legal requirements can bewilder even the most seasoned professionals. Particularly difficult is calculating the costs of these storage architectures which requires an understanding of data growth, storage density and calculating media consumption in a backup system with variable schedules, backup levels, data and media growth rates as well as activities involving data migration and moving media to an off-site location.
In this paper, I present a unique approach to predict and model media consumption within production backup environments in various industries using either disk or tape as a backup target. The configurations and architectures of backup environments analyzed was done for the first time utilizing system dynamics modeling. By developing these models I was able to run backup system simulations over a span of years that provided data on media consumption for both disk and tape. I was also able to incorporate leveraging technologies such as de-duplication or single instance storage into the models to analyze the correlating cost differences potentially affecting the total cost of ownership for each architecture.
Courses
-
Acting
-
-
Creating a Culture of Design
-
-
Creating a Professional Community I & II
-
-
Designing with/in Community
-
-
Entrepreneurial Studies
-
-
Immersion into Whole Systems Design
-
-
Improv
Levels 1 - 5
-
Notational Design
-
-
Storytelling
-
-
System Dynamics Modeling
-
-
Systems Theory
-
-
Systems study abroad — Bali 2000
-
-
Systems study abroad — Egypt 1999
-
-
The Second City -- Improvisation
Levels A-E
-
Whole Systems Design Labs [I, II, III, IV]
-
Projects
-
Social Subject Matter Expert (SME)
- Present
Recognized as a Subject Matter Expert on IT Operations, Data Centers, and Enterprise Systems Architecture and hand selected by Dell leaders to participate in an elite Social SME Activation Program. Completed comprehensive training workshops to become an official thought leader on behalf of Dell in social media. Manage key influencer/customer relationships and share my expertise in relevant online communities to impact Dell’s overall credibility, share of voice, search engine rankings and online…
Recognized as a Subject Matter Expert on IT Operations, Data Centers, and Enterprise Systems Architecture and hand selected by Dell leaders to participate in an elite Social SME Activation Program. Completed comprehensive training workshops to become an official thought leader on behalf of Dell in social media. Manage key influencer/customer relationships and share my expertise in relevant online communities to impact Dell’s overall credibility, share of voice, search engine rankings and online revenue.
Honors & Awards
-
Business of IT Advocate Award
Think IT Association
-
Business of IT Facilitator of the Year Award
Think IT Association
-
Guest Lecturer
Roosevelt University
Business Communications — Improv skills for enhanced communication and collaboration.
-
Dell Champions Ambassador
Dell
-
Dell Champion
Dell
Languages
-
English
Native or bilingual proficiency
-
BASH
Native or bilingual proficiency
-
Python
Full professional proficiency
-
SQL
Professional working proficiency
-
Swift
Elementary proficiency
Organizations
-
Literacy Rescue
Board Member, CIO, IT Committee Chair
- Present -
Resilience
Director, IT Committee Chair
- Present -
InfraGard
Chicago FBI Infragard Member
- Present -
Private Directors Association
Member
- Present -
Forbes Technology Council
Contributor and Council Member
- Present -
Turnaround Management Association (TMA)
Member
- Present -
AITP (Association of Information Technology Professionals) & CompTIA
Member
- Present -
Illinois Junior Academy of Science (IJAS)
Judge
- Present -
WSDA — Whole Systems Design Association
Founder
- Present -
Association of Computing Machinery (ACM)
Member
- Present -
Executives' Club of Chicago
Member
- -
Think IT Association
Member, Board of Advisors
- -
EcoMyths Alliance
CTO, Board Member, Executive Committee, Treasure, Communications Committee
-
Recommendations received
57 people have recommended Brian
Join now to viewMore activity by Brian
-
This is a "PATCH RIGHT NOW" patch. It has scored almost a perfect 10.0 from CVSS! Everyone. Right now.
This is a "PATCH RIGHT NOW" patch. It has scored almost a perfect 10.0 from CVSS! Everyone. Right now.
Liked by Brian Greenberg
-
🚨 @Microsoft Zero-click vulnerability for #Windows users.. TCP/IP RCE impacts all systems with IPv6 enabled, patch now‼️#security #privacy #cloud…
🚨 @Microsoft Zero-click vulnerability for #Windows users.. TCP/IP RCE impacts all systems with IPv6 enabled, patch now‼️#security #privacy #cloud…
Shared by Brian Greenberg
-
One of the greatest compliments we can receive at Motum is a referral from a valued client. This week, we were honored to receive such a referral…
One of the greatest compliments we can receive at Motum is a referral from a valued client. This week, we were honored to receive such a referral…
Liked by Brian Greenberg
-
💡 Did you know FAT32, the file system introduced 25 years ago, still has a 32GB partition limit on Windows 11? Not any longer! 2TB! 😮 While it was…
💡 Did you know FAT32, the file system introduced 25 years ago, still has a 32GB partition limit on Windows 11? Not any longer! 2TB! 😮 While it was…
Shared by Brian Greenberg
-
Mysterious family of malware hid in Google Play for years #security #privacy #cloud #cyber #cybersecurity #infosec https://lnkd.in/gNhByB4r
Mysterious family of malware hid in Google Play for years #security #privacy #cloud #cyber #cybersecurity #infosec https://lnkd.in/gNhByB4r
Shared by Brian Greenberg
-
We had a great "triple table" discussion on The Next IT Outage and How to be Resilient. Thank you to Darin Hurd for hosting us and leading the…
We had a great "triple table" discussion on The Next IT Outage and How to be Resilient. Thank you to Darin Hurd for hosting us and leading the…
Liked by Brian Greenberg
-
How do companies ship code to production? . . The diagram below illustrates the typical workflow. Step 1: The process starts with a product owner…
How do companies ship code to production? . . The diagram below illustrates the typical workflow. Step 1: The process starts with a product owner…
Liked by Brian Greenberg
-
2.9 billion records possibly leaked in data breach: Protect yourself #security #privacy #cloud #cyber #cybersecurity #infosec https://buff.ly/3X3HlXR
2.9 billion records possibly leaked in data breach: Protect yourself #security #privacy #cloud #cyber #cybersecurity #infosec https://buff.ly/3X3HlXR
Shared by Brian Greenberg
Other similar profiles
Explore collaborative articles
We’re unlocking community knowledge in a new way. Experts add insights directly into each article, started with the help of AI.
Explore MoreOthers named Brian Greenberg in United States
74 others named Brian Greenberg in United States are on LinkedIn
See others named Brian Greenberg