“I met George in 2012 through Purdue University as he conducted the security audit for the hospital that I am CIO over. I must say that George is one of a kind. He pays attention to the details of network security where others do not. Even the things I did not understand during the audit, George took the time and had the patience to ensure I understood. George is thorough, intelligent, driven, and a trusted person, thus I will always use George as a network security adviser. After meeting George you know he is passionate about his job and delivers this passion to any organization he works with. Moreover, I have met a lot of Network Security Analyst in my line of business and George ranks at the top.”
About
I am an IT security practitioner specializing in risk assessment/evaluation, education &…
Services
Contributions
Activity
-
By licensing their products under the Powered by Raspberry Pi programme, Industrial Shields® successfully increased their client base and expanded…
By licensing their products under the Powered by Raspberry Pi programme, Industrial Shields® successfully increased their client base and expanded…
Liked by George Bailey
-
STATUS UPDATE: The initial public draft of NIST SP 800-172, Revision 3, Enhanced Security Requirements for Protecting Controlled Unclassified…
STATUS UPDATE: The initial public draft of NIST SP 800-172, Revision 3, Enhanced Security Requirements for Protecting Controlled Unclassified…
Liked by George Bailey
-
Dear #DFIR and #LawEnforcement community. My colleague Steven DeBrota and I are looking forward to presenting our keynote plenary at the Internet of…
Dear #DFIR and #LawEnforcement community. My colleague Steven DeBrota and I are looking forward to presenting our keynote plenary at the Internet of…
Liked by George Bailey
Experience
Education
-
Purdue University
-
Activities and Societies: 60+ credit hours post Masters degree. Life long learner... PhD Candidate in Dec. 2017, then life happened.
-
-
Activities and Societies: CTF team, NCL 2019 (x2) & CCDC 2019 participation
-
-
Master of Science in Industrial Technology; Focus area: Technology Management.
Thesis: Selecting an Optimal Internet Digital Video Format Based on Audience Preference, Content Type, Bandwidth Needs, Disk Space and Encoding Computational Requirements -
-
-
-
-
-
Module 1: Introduction to Network Security
Module 2: Types of Attacks
Module 3: Fundamentals of Firewalls
Module 4: Intrusion-Detection Systems
Module 5: Fundamentals of Encryption
Module 6: Virtual Private Networks (VPN)
Module 7: Operating System Hardening
Module 8: Virus Attacks and How to Defend
Module 9: Security Policies
Module 10: Assessing System Security
Module 11: Security Standards
Module 12: Physical Security and Recovery
Module 13: Attackers…Module 1: Introduction to Network Security
Module 2: Types of Attacks
Module 3: Fundamentals of Firewalls
Module 4: Intrusion-Detection Systems
Module 5: Fundamentals of Encryption
Module 6: Virtual Private Networks (VPN)
Module 7: Operating System Hardening
Module 8: Virus Attacks and How to Defend
Module 9: Security Policies
Module 10: Assessing System Security
Module 11: Security Standards
Module 12: Physical Security and Recovery
Module 13: Attackers Techniques -
-
Virtualization and Private Cloud Security
-
-
Network, System, and Application security auditing
-
-
Incident response and Ethical Hacking
-
-
Penetration testing
Licenses & Certifications
Volunteer Experience
-
Board Member
Indiana Security & Privacy Network (INSPN)
- 7 years 1 month
The Indiana Security & Privacy Network (INSPN) is a volunteer, non-profit organization with a healthcare industry base for organizations, individuals and other parties who are interested in security, privacy and data exchange best practices and how it affects their operations. The objective of the group is to support collaboration and the sharing of information and knowledge of best practices and regulatory compliance issues that affect all Indiana.
I served as chair, co-chair, past…The Indiana Security & Privacy Network (INSPN) is a volunteer, non-profit organization with a healthcare industry base for organizations, individuals and other parties who are interested in security, privacy and data exchange best practices and how it affects their operations. The objective of the group is to support collaboration and the sharing of information and knowledge of best practices and regulatory compliance issues that affect all Indiana.
I served as chair, co-chair, past chair, and member at large over the years I participated on the Board of Directors. I still attend quarterly meetings and highly recommend this group to any privacy / information security professional in the central Indiana region.
https://www.inspn.org/ -
Advisory Board Member
SecureWold Expo - Indianapolis & Cincinnati
- Present 11 years 2 months
Science and Technology
SecureWorld Expo - Indianapolis and Cincinnati Conferences advisory board member for 2013 - Present
-
Cybersecurity Presenter / Educator
Safe and Secure Online (ISC2)
- Present 17 years 6 months
Children
(ISC)2 Foundation’s Safe and Secure Online program is the first-of-its-kind, initiative that brings top cyber security professionals from business and government into classrooms for free to teach cyber safety to kids. The Safe and Secure Online program was founded in 2006, with a mission to introduce responsible computing in an early age and improve society by helping kids learn how to protect themselves online.
-
T-Ball Coach
Wea Summer Rec
- 3 months
Children
Coaching my son's T-Ball team. Anybody experienced with herding cats :-)
Loved coaching but my son decided he likes soccer better. -
Highschool Wrestling Coach
William Harrison Highschool
- 1 year 6 months
Education
Publications
-
Panel on Supply Chain Cybersecurity Resources for the US Defense Industrial Base
CMMC Day
Sat on a panel to share CMMC resources that are free to low cost for SMBs serving in the DIB to help them along their compliance journey.
-
CUI / CMMC Panel Discussion
Indiana Statewide Cybersecurity Summit
Moderated a panel of cybersecurity and supply chain SMEs on the pending CMMC regulations.
-
Cybersecurity Awareness Resources
Purdue@Westgate
Invited presentation regarding how to address cybersecurity readiness training of employees.
-
Interview: What's some issues with Privacy
VPN Reports
Decide personally where you are going to draw the line regarding what information you're willing to lose control of, and act accordingly...
-
Social Engineerging Threats in Healthcare: Phishing, BEC, and Ransomware!
Presented at the 2017 HFMA Indiana Winter Institute
Healthcare organizations are in the mists of a cyberwar and every employee is a fighting solider protecting electronic protected health information (ePHI). The current battle is with Social Engineering and attacks are coming in from all angles. Join PHA's George Bailey to hear about the threat of social engineering; the types active attacks experienced by healthcare organizations; and some strategic and tactical defenses organizations can put in to place to better protect ePHI and financial…
Healthcare organizations are in the mists of a cyberwar and every employee is a fighting solider protecting electronic protected health information (ePHI). The current battle is with Social Engineering and attacks are coming in from all angles. Join PHA's George Bailey to hear about the threat of social engineering; the types active attacks experienced by healthcare organizations; and some strategic and tactical defenses organizations can put in to place to better protect ePHI and financial assets from hackers.
-
What to do if a data breach happens to you
Behaviorial Healthcare
I was cited several times in this piece regarding healthcare data breaches.
-
Patient Portal Security
2015 ISSA International Conference, Chicago, IL
The national health IT strategy is encouraging the rapid development and deployment of Patient Portals. These tools are fantastic tools to get healthcare consumers engaged with their medical provider; however, there are serious security requirements that need to be considered to keep these systems safe, secure and HIPAA compliant.
-
BYOD: Financial win or loss?
Presentation given at the 18th Annual Indiana Rural Health Association Conference
-
Data Security Breaches at Target and Neiman Marcus: Could Your Medical Practice Be Next?
Electronic Health Reporter
A short article that identifies a few lessons learned from the Target Corp., and Nieman Marcus credit card data breaches for which each healthcare organization may benefit.
-
HITECH Security: Too Little, Too Late?
Journal of Healthcare Information Management (a HIMSS Publication)
Although the HITECH Act widens the scope of privacy and security protections available under HIPAA, it is unlikely to truly improve the security posture surrounding electronic protected health information (ePHI) housed in America’s collective healthcare system. An analysis of various privacy preserving legislation and regulations, such as HIPAA, HITECH,
FERPA, PCI-DSS and state breach notification laws will show that the new provisions HITECH requires is not enough to ensure the privacy and…Although the HITECH Act widens the scope of privacy and security protections available under HIPAA, it is unlikely to truly improve the security posture surrounding electronic protected health information (ePHI) housed in America’s collective healthcare system. An analysis of various privacy preserving legislation and regulations, such as HIPAA, HITECH,
FERPA, PCI-DSS and state breach notification laws will show that the new provisions HITECH requires is not enough to ensure the privacy and security of protected health information. This paper will contain a detailed review from a security auditor’s perspective of the HITECH Act’s security and privacy provisions, such as increased enforcement, breach notification requirements, patients’ EHR access rights and improvements in business associate agreements. -
Developing IA Courses Based on the CNSS 4016 Standard
9th Annual NYS Cyber Security Conference
Projects
-
Applied Cybersecurity Essentials
- Present
Office of Global and Corporate Partnerships at Purdue University with support from university’s Technical Assistance Program (TAP) developed three training courses designed to take a STEM educated trainee from noob to Cyber ACE in eight weeks. Mat Trampski and George Bailey with help of strategic faculty members from Purdue’s Polytechnic Institute creates 90+ learning objectives and 320 hours of learning content, exercises and lab activities.
This initial offering morphed into a full…Office of Global and Corporate Partnerships at Purdue University with support from university’s Technical Assistance Program (TAP) developed three training courses designed to take a STEM educated trainee from noob to Cyber ACE in eight weeks. Mat Trampski and George Bailey with help of strategic faculty members from Purdue’s Polytechnic Institute creates 90+ learning objectives and 320 hours of learning content, exercises and lab activities.
This initial offering morphed into a full featured cybersecurity badge program with the help of a passionate cyberTAP instructional team.
This program and associated badges are offered as in-person, hybrid (in-person & online), and completely online.Other creatorsSee project -
Full Disk Encryption
-
Conducted market research and product evaluation of PGP Enterprise, Pointsec (now Checkpoint), Safeboot (now McAfee), TrueCrypt.
Decided on deploying Safeboot as the chosen College standard for full disk encryption. Pilot program was rolled out to 100 latpops running a mix of Windows XP and Windows 7. Project was shelved for more pressing matters in late 2010.Other creators -
SIEM Evaluation and Deployment
-
Performed market research and product evaluation of six of the top SIEM products (at the time). Ultimately deployed Network Intelligence's EnVision SIEM solution (later purchased by RSA/EMC).
Project consisted of consolidating log data from firewalls, IDS sensors, networking gear, Active Directory management systems, RADIUS and DHCP servers.
Successfully archived a years worth of data online for 512 devices accounting for ~5000 EPS.
Ultimately decided to replace this…Performed market research and product evaluation of six of the top SIEM products (at the time). Ultimately deployed Network Intelligence's EnVision SIEM solution (later purchased by RSA/EMC).
Project consisted of consolidating log data from firewalls, IDS sensors, networking gear, Active Directory management systems, RADIUS and DHCP servers.
Successfully archived a years worth of data online for 512 devices accounting for ~5000 EPS.
Ultimately decided to replace this system with a Q1 Labs SIEM solution when it was EOL in 2010. However, I wasn't able to secure funding since the RSA solution just kept on running!
Honors & Awards
-
Industry Partner of the Year
K12 Career College Prep
I was honored as an Industry Partner for the 2023-24 Academic for assisting faculty and students receive scholarships for cybersecurity upskilling and reskilling programs.
-
The Above and Beyond Award
Purdue University Executive Vice President for Research
The Above and Beyond Award seeks to highlight the excellence found across all areas and job functions at Purdue University by recognizing extraordinary achievements on every scale. Recognizing employee accomplishments that help Purdue move the world forward is vital to the University's mission and the morale of its faculty and staff.
-
Purdue Acorn Award
Executive Vice President for Research
https://youtu.be/tmWVRRDrYAA
Seed for Success Award is given in recognition of the accomplishments of investigators for their efforts in obtaining an external sponsored award of $1 million or more.
https://www.purdue.edu/research/awards/research-awards.php -
The Above and Beyond Award
Executive Vice President for Research and Partnerships / Purdue University
The Above and Beyond Award seeks to highlight the excellence found across all areas and job functions at Purdue University by recognizing extraordinary achievements on every scale. Recognizing employee accomplishments that help Purdue move the world forward is vital to the University's mission and the morale of its faculty and staff.
-
SC Magazine May 2015 - Me and My Job spotlight
SC Magazine
Spotlight on my role at Purdue Healthcare Advisors - http://media.scmagazine.com/documents/119/0515_online_sc_29692.pdf
Organizations
-
Indiana Rural Health Association (IRHA)
Member
- PresentI am a proud member of the Indiana Rural Health Association. Assisting Indiana's rural healthcare professionals to improve their information security posture. http://www.indianaruralhealth.org/
-
Indiana Hospital Association
-
- PresentI am a proud member of the Indiana Hospital Association. Assisting Indiana's hospitals to improve their information security posture. http://www.ihaconnect.org/
-
InfraGard
-
- Present -
Indiana Security & Privacy Network
Board Chair, Vice Chair, and Board Member
-The Indiana Security & Privacy Network (INSPN) is a volunteer, non-profit organization with a healthcare industry base for organizations, individuals and other parties who are interested in security, privacy and data exchange best practices and how it affects their operations. The objective of the group is to support collaboration and the sharing of information and knowledge of best practices and regulatory compliance issues that affect all Indiana industries.
Recommendations received
8 people have recommended George
Join now to viewMore activity by George
-
Caption this one for me please. Make me laugh since my stress levels are at an all time high that I can’t think of anything…so comment below to help…
Caption this one for me please. Make me laugh since my stress levels are at an all time high that I can’t think of anything…so comment below to help…
Liked by George Bailey
Other similar profiles
Explore collaborative articles
We’re unlocking community knowledge in a new way. Experts add insights directly into each article, started with the help of AI.
Explore MoreOthers named George Bailey in United States
-
George Bailey
CEO at GLB Stamps, Inc
-
George Bailey
Managing Member at Asset Discovery Group Inc.
-
George Bailey
-
George Bailey
Director of Operations at Industrial Test Systems, Inc. (ITS)
389 others named George Bailey in United States are on LinkedIn
See others named George Bailey