George Bailey

George Bailey

West Lafayette, Indiana, United States
10K followers 500+ connections

About

I am an IT security practitioner specializing in risk assessment/evaluation, education &…

Services

Contributions

Activity

Join now to see all activity

Experience

  • Purdue cyberTAP Graphic

    Purdue cyberTAP

    West Lafayette, Indiana, United States

  • -

    West Lafayette, Indiana

  • -

    West Lafayette, Indiana

  • -

    Indianapolis, Indiana

  • -

    Columbus, Indiana

  • -

    West Lafayette, Indiana

  • -

    West Lafayette, Indiana

  • -

    West Lafayette, Indiana

  • -

    West Lafayette, Indiana

Education

  • Purdue University Graphic

    Purdue University

    -

    Activities and Societies: 60+ credit hours post Masters degree. Life long learner... PhD Candidate in Dec. 2017, then life happened.

  • -

    Activities and Societies: CTF team, NCL 2019 (x2) & CCDC 2019 participation

  • -

    Master of Science in Industrial Technology; Focus area: Technology Management.

    Thesis: Selecting an Optimal Internet Digital Video Format Based on Audience Preference, Content Type, Bandwidth Needs, Disk Space and Encoding Computational Requirements

  • -

  • -

  • -

    Module 1: Introduction to Network Security
    Module 2: Types of Attacks
    Module 3: Fundamentals of Firewalls
    Module 4: Intrusion-Detection Systems
    Module 5: Fundamentals of Encryption
    Module 6: Virtual Private Networks (VPN)
    Module 7: Operating System Hardening
    Module 8: Virus Attacks and How to Defend
    Module 9: Security Policies
    Module 10: Assessing System Security
    Module 11: Security Standards
    Module 12: Physical Security and Recovery
    Module 13: Attackers…

    Module 1: Introduction to Network Security
    Module 2: Types of Attacks
    Module 3: Fundamentals of Firewalls
    Module 4: Intrusion-Detection Systems
    Module 5: Fundamentals of Encryption
    Module 6: Virtual Private Networks (VPN)
    Module 7: Operating System Hardening
    Module 8: Virus Attacks and How to Defend
    Module 9: Security Policies
    Module 10: Assessing System Security
    Module 11: Security Standards
    Module 12: Physical Security and Recovery
    Module 13: Attackers Techniques

  • -

    Virtualization and Private Cloud Security

  • -

    Network, System, and Application security auditing

  • -

    Incident response and Ethical Hacking

  • -

    Penetration testing

Licenses & Certifications

Volunteer Experience

  • Board Member

    Indiana Security & Privacy Network (INSPN)

    - 7 years 1 month

    The Indiana Security & Privacy Network (INSPN) is a volunteer, non-profit organization with a healthcare industry base for organizations, individuals and other parties who are interested in security, privacy and data exchange best practices and how it affects their operations. The objective of the group is to support collaboration and the sharing of information and knowledge of best practices and regulatory compliance issues that affect all Indiana.

    I served as chair, co-chair, past…

    The Indiana Security & Privacy Network (INSPN) is a volunteer, non-profit organization with a healthcare industry base for organizations, individuals and other parties who are interested in security, privacy and data exchange best practices and how it affects their operations. The objective of the group is to support collaboration and the sharing of information and knowledge of best practices and regulatory compliance issues that affect all Indiana.

    I served as chair, co-chair, past chair, and member at large over the years I participated on the Board of Directors. I still attend quarterly meetings and highly recommend this group to any privacy / information security professional in the central Indiana region.

    https://www.inspn.org/

  • Space ISAC Graphic

    Analyst Working Group

    Space ISAC

    - Present 3 years 10 months

    Science and Technology

  • Advisory Board Member

    SecureWold Expo - Indianapolis & Cincinnati

    - Present 11 years 2 months

    Science and Technology

    SecureWorld Expo - Indianapolis and Cincinnati Conferences advisory board member for 2013 - Present

  • Cybersecurity Presenter / Educator

    Safe and Secure Online (ISC2)

    - Present 17 years 6 months

    Children

    (ISC)2 Foundation’s Safe and Secure Online program is the first-of-its-kind, initiative that brings top cyber security professionals from business and government into classrooms for free to teach cyber safety to kids. The Safe and Secure Online program was founded in 2006, with a mission to introduce responsible computing in an early age and improve society by helping kids learn how to protect themselves online.

  • T-Ball Coach

    Wea Summer Rec

    - 3 months

    Children

    Coaching my son's T-Ball team. Anybody experienced with herding cats :-)

    Loved coaching but my son decided he likes soccer better.

  • Highschool Wrestling Coach

    William Harrison Highschool

    - 1 year 6 months

    Education

Publications

  • Panel on Supply Chain Cybersecurity Resources for the US Defense Industrial Base

    CMMC Day

    Sat on a panel to share CMMC resources that are free to low cost for SMBs serving in the DIB to help them along their compliance journey.

    See publication
  • CUI / CMMC Panel Discussion

    Indiana Statewide Cybersecurity Summit

    Moderated a panel of cybersecurity and supply chain SMEs on the pending CMMC regulations.

    See publication
  • Cybersecurity Awareness Resources

    Purdue@Westgate

    Invited presentation regarding how to address cybersecurity readiness training of employees.

  • Interview: What's some issues with Privacy

    VPN Reports

    Decide personally where you are going to draw the line regarding what information you're willing to lose control of, and act accordingly...

    See publication
  • ePHI and cybersecurity

    Formstack

    Other authors
    • Andrew Clarke
    See publication
  • Social Engineerging Threats in Healthcare: Phishing, BEC, and Ransomware!

    Presented at the 2017 HFMA Indiana Winter Institute

    Healthcare organizations are in the mists of a cyberwar and every employee is a fighting solider protecting electronic protected health information (ePHI). The current battle is with Social Engineering and attacks are coming in from all angles. Join PHA's George Bailey to hear about the threat of social engineering; the types active attacks experienced by healthcare organizations; and some strategic and tactical defenses organizations can put in to place to better protect ePHI and financial…

    Healthcare organizations are in the mists of a cyberwar and every employee is a fighting solider protecting electronic protected health information (ePHI). The current battle is with Social Engineering and attacks are coming in from all angles. Join PHA's George Bailey to hear about the threat of social engineering; the types active attacks experienced by healthcare organizations; and some strategic and tactical defenses organizations can put in to place to better protect ePHI and financial assets from hackers.

  • HIPAA 101 for Dental Clinics

    Indiana Dental Association 2016 Conference

    An introduction to HIPAA compliance for dental practices. Presentation covered the Privacy and Security Rules, Breach Notification requirements and Business Associates.

    Other authors
  • What to do if a data breach happens to you

    Behaviorial Healthcare

    I was cited several times in this piece regarding healthcare data breaches.

    See publication
  • Security Safeguards: What to do right now to help protect your business

    Ice Miller - "The 21st Century Imperative: Cybersecurity", Butler University, Indianapolis, IN - Feb. 26, 2016

    Co-presenter at Ice Miller's 21st Century Imperative Cybersecurity.

    Other authors
  • Patient Portal Security

    2015 ISSA International Conference, Chicago, IL

    The national health IT strategy is encouraging the rapid development and deployment of Patient Portals. These tools are fantastic tools to get healthcare consumers engaged with their medical provider; however, there are serious security requirements that need to be considered to keep these systems safe, secure and HIPAA compliant.

  • BYOD: Financial win or loss?

    Presentation given at the 18th Annual Indiana Rural Health Association Conference

  • Data Security Breaches at Target and Neiman Marcus: Could Your Medical Practice Be Next?

    Electronic Health Reporter

    A short article that identifies a few lessons learned from the Target Corp., and Nieman Marcus credit card data breaches for which each healthcare organization may benefit.

    See publication
  • HITECH Security: Too Little, Too Late?

    Journal of Healthcare Information Management (a HIMSS Publication)

    Although the HITECH Act widens the scope of privacy and security protections available under HIPAA, it is unlikely to truly improve the security posture surrounding electronic protected health information (ePHI) housed in America’s collective healthcare system. An analysis of various privacy preserving legislation and regulations, such as HIPAA, HITECH,
    FERPA, PCI-DSS and state breach notification laws will show that the new provisions HITECH requires is not enough to ensure the privacy and…

    Although the HITECH Act widens the scope of privacy and security protections available under HIPAA, it is unlikely to truly improve the security posture surrounding electronic protected health information (ePHI) housed in America’s collective healthcare system. An analysis of various privacy preserving legislation and regulations, such as HIPAA, HITECH,
    FERPA, PCI-DSS and state breach notification laws will show that the new provisions HITECH requires is not enough to ensure the privacy and security of protected health information. This paper will contain a detailed review from a security auditor’s perspective of the HITECH Act’s security and privacy provisions, such as increased enforcement, breach notification requirements, patients’ EHR access rights and improvements in business associate agreements.

    See publication
  • Netflow Forensics: Innocent or guilty?

    Digital Fornesics Magazine

  • Introduction to Digital Forensics

    Digital Forensics Magazine

  • Developing IA Courses Based on the CNSS 4016 Standard

    9th Annual NYS Cyber Security Conference

    Other authors
    See publication

Projects

  • Applied Cybersecurity Essentials

    - Present

    Office of Global and Corporate Partnerships at Purdue University with support from university’s Technical Assistance Program (TAP) developed three training courses designed to take a STEM educated trainee from noob to Cyber ACE in eight weeks. Mat Trampski and George Bailey with help of strategic faculty members from Purdue’s Polytechnic Institute creates 90+ learning objectives and 320 hours of learning content, exercises and lab activities.

    This initial offering morphed into a full…

    Office of Global and Corporate Partnerships at Purdue University with support from university’s Technical Assistance Program (TAP) developed three training courses designed to take a STEM educated trainee from noob to Cyber ACE in eight weeks. Mat Trampski and George Bailey with help of strategic faculty members from Purdue’s Polytechnic Institute creates 90+ learning objectives and 320 hours of learning content, exercises and lab activities.

    This initial offering morphed into a full featured cybersecurity badge program with the help of a passionate cyberTAP instructional team.

    This program and associated badges are offered as in-person, hybrid (in-person & online), and completely online.

    Other creators
    See project
  • Full Disk Encryption

    -

    Conducted market research and product evaluation of PGP Enterprise, Pointsec (now Checkpoint), Safeboot (now McAfee), TrueCrypt.

    Decided on deploying Safeboot as the chosen College standard for full disk encryption. Pilot program was rolled out to 100 latpops running a mix of Windows XP and Windows 7. Project was shelved for more pressing matters in late 2010.

    Other creators
  • SIEM Evaluation and Deployment

    -

    Performed market research and product evaluation of six of the top SIEM products (at the time). Ultimately deployed Network Intelligence's EnVision SIEM solution (later purchased by RSA/EMC).

    Project consisted of consolidating log data from firewalls, IDS sensors, networking gear, Active Directory management systems, RADIUS and DHCP servers.

    Successfully archived a years worth of data online for 512 devices accounting for ~5000 EPS.

    Ultimately decided to replace this…

    Performed market research and product evaluation of six of the top SIEM products (at the time). Ultimately deployed Network Intelligence's EnVision SIEM solution (later purchased by RSA/EMC).

    Project consisted of consolidating log data from firewalls, IDS sensors, networking gear, Active Directory management systems, RADIUS and DHCP servers.

    Successfully archived a years worth of data online for 512 devices accounting for ~5000 EPS.

    Ultimately decided to replace this system with a Q1 Labs SIEM solution when it was EOL in 2010. However, I wasn't able to secure funding since the RSA solution just kept on running!

Honors & Awards

  • Industry Partner of the Year

    K12 Career College Prep

    I was honored as an Industry Partner for the 2023-24 Academic for assisting faculty and students receive scholarships for cybersecurity upskilling and reskilling programs.

  • The Above and Beyond Award

    Purdue University Executive Vice President for Research

    The Above and Beyond Award seeks to highlight the excellence found across all areas and job functions at Purdue University by recognizing extraordinary achievements on every scale. Recognizing employee accomplishments that help Purdue move the world forward is vital to the University's mission and the morale of its faculty and staff.

  • Purdue Acorn Award

    Executive Vice President for Research

    https://youtu.be/tmWVRRDrYAA

    Seed for Success Award is given in recognition of the accomplishments of investigators for their efforts in obtaining an external sponsored award of $1 million or more.

    https://www.purdue.edu/research/awards/research-awards.php

  • The Above and Beyond Award

    Executive Vice President for Research and Partnerships / Purdue University

    The Above and Beyond Award seeks to highlight the excellence found across all areas and job functions at Purdue University by recognizing extraordinary achievements on every scale. Recognizing employee accomplishments that help Purdue move the world forward is vital to the University's mission and the morale of its faculty and staff.

  • SC Magazine May 2015 - Me and My Job spotlight

    SC Magazine

    Spotlight on my role at Purdue Healthcare Advisors - http://media.scmagazine.com/documents/119/0515_online_sc_29692.pdf

Organizations

  • Indiana Rural Health Association (IRHA)

    Member

    - Present

    I am a proud member of the Indiana Rural Health Association. Assisting Indiana's rural healthcare professionals to improve their information security posture. http://www.indianaruralhealth.org/

  • Indiana Hospital Association

    -

    - Present

    I am a proud member of the Indiana Hospital Association. Assisting Indiana's hospitals to improve their information security posture. http://www.ihaconnect.org/

  • InfraGard

    -

    - Present
  • Indiana Security & Privacy Network

    Board Chair, Vice Chair, and Board Member

    -

    The Indiana Security & Privacy Network (INSPN) is a volunteer, non-profit organization with a healthcare industry base for organizations, individuals and other parties who are interested in security, privacy and data exchange best practices and how it affects their operations. The objective of the group is to support collaboration and the sharing of information and knowledge of best practices and regulatory compliance issues that affect all Indiana industries.

Recommendations received

8 people have recommended George

Join now to view

More activity by George

View George’s full profile

  • See who you know in common
  • Get introduced
  • Contact George directly
Join to view full profile

Other similar profiles

Explore collaborative articles

We’re unlocking community knowledge in a new way. Experts add insights directly into each article, started with the help of AI.

Explore More

Others named George Bailey in United States

Add new skills with these courses