About
Articles by Greg
Activity
-
Gratitude, Growth & New Beginnings After nearly 4 rewarding years at Cybereason, my journey has come to an end. What began as building from the…
Gratitude, Growth & New Beginnings After nearly 4 rewarding years at Cybereason, my journey has come to an end. What began as building from the…
Liked by Greg Day
-
Congratulations to Haider Pasha! Proud of our leadership team at Palo Alto Networks. Michael Kelley Thierry Karsenti Raphael Marichez Jesper Bork…
Congratulations to Haider Pasha! Proud of our leadership team at Palo Alto Networks. Michael Kelley Thierry Karsenti Raphael Marichez Jesper Bork…
Liked by Greg Day
-
When I moved from San Diego to NYC, everyone told me the tech and startup community here was different. A year in, they weren't lying. I moved to…
When I moved from San Diego to NYC, everyone told me the tech and startup community here was different. A year in, they weren't lying. I moved to…
Liked by Greg Day
Experience & Education
Licenses & Certifications
Volunteer Experience
-
Hackers and Threats program committee member
RSA Conference
Science and Technology
Been very privileged in 2017, 2018, 2019, 2020, 2021, 2022, 2023, 2024 & 2025 to help identify speakers & review their submissions from the wealth of amazing submissions to speak at the conference.
-
CohortMentor
CyLon
- Present 6 years 8 months
Science and Technology
Mentor new technology startup companies.
https://cylonlab.com
Patents
-
Identifying malware infected reply messages
Issued US US 7,900,254 B1
A technique for identifying reply mailer computer program viruses detects whether a reply message is generated in less than a threshold reply time and whether or not the reply message includes an attachment. The generation of a reply message in less than a threshold reply time and including an attachment is deemed indicative of an infected reply message and accordingly that message will be quarantined, deleted, disinfect ted or the like. The mail server using the present technique maintains a…
A technique for identifying reply mailer computer program viruses detects whether a reply message is generated in less than a threshold reply time and whether or not the reply message includes an attachment. The generation of a reply message in less than a threshold reply time and including an attachment is deemed indicative of an infected reply message and accordingly that message will be quarantined, deleted, disinfect ted or the like. The mail server using the present technique maintains a temporary log of the email message sent, including the sender, the recipient, and the time of sending. The log is used to identify replies and determine whether or not those replies have been received in less than the reply time threshold.
Organizations
-
I-4
vice Chair of Members Advisory Committee (MAC)
- PresentSince its launch in 1986, i-4 has consistently strived to be the world’s leading forum for senior information security professionals. Many members hold senior roles within large, global organizations across a diverse range of industries, with a common dependence upon IT along with sophisticated risk management and security operations.
-
Europol
Internet Security Advisory Group member
- PresentEstablished by the Head of EC3 and reporting to him, dedicated advisory groups have been created in order to foster closer cooperation with its leading non-law enforcement partners. They help to strengthen practical cooperation between law enforcement and key domains, such as internet security, telecommunications and financial services.
-
UK NCCU Industry Strategic Cyber Industry Group (SCIG)
Member
-the National Cyber Crime Unit (NCCU) of the NCA and private sector organisations work in partnership to: coordinate joint activity against cyber crime, identify intelligence gaps and improve intelligence sharing, understand the capabilities available in law enforcement and industry, and steer the activities of Virtual Task Forces and ad hoc working groups
-
World Economic Forum - Centre for CyberSecurity
Member
-The World Economic Forum Centre for Cybersecurity will: Establish, activate and coordinate global public-private partnerships to encourage intelligence sharing and the development of cyber norms Collectively develop, test and implement cutting-edge knowledge and tools to foresee and protect against cyberattacks, current and future Implement global capacity-building and training programmes to produce the next generation of cybersecurity professionals Establish, coordinate and facilitate a…
The World Economic Forum Centre for Cybersecurity will: Establish, activate and coordinate global public-private partnerships to encourage intelligence sharing and the development of cyber norms Collectively develop, test and implement cutting-edge knowledge and tools to foresee and protect against cyberattacks, current and future Implement global capacity-building and training programmes to produce the next generation of cybersecurity professionals Establish, coordinate and facilitate a Global Rapid-Reaction Cybersecurity Task Force comprised of experts from our partner community to help mitigate the negative impact of severe global cyberattacks.
-
I-4
Chair of Members Advisory commitee (MAC)
-Since its launch in 1986, i-4 has consistently strived to be the world’s leading forum for senior information security professionals. Many members hold senior roles within large, global organizations across a diverse range of industries, with a common dependence upon IT along with sophisticated risk management and security operations.
-
I-4
Vice Chair of the Members Advisory Committee (MAC)
-Since its launch in 1986, i-4 has consistently strived to be the world’s leading forum for senior information security professionals. Many members hold senior roles within large, global organizations across a diverse range of industries, with a common dependence upon IT along with sophisticated risk management and security operations.
-
CISP (Cyber Information Sharing Parntership) - Now part of the NCSC
Original working groups to define requirements
-The Cyber Security Information Sharing Partnership (CiSP) is a joint industry and government initiative set up to exchange cyber threat information in real time, in a secure, confidential and dynamic environment, increasing situational awareness and reducing the impact on UK business.
-
Council of Europe Cybercrime convention commitee
Member
-The Council of Europe helps to protect societies worldwide from the threat of cybercrime through the Convention on Cybercrime and its Protocol on Xenophobia and Racism, the Cybercrime Convention Committee (T-CY) and the technical cooperation programmes on cybercrime.
-
Intellect/TechUK
Vice chair of the Cyber Security group
-The Cyber security group has been formed to provide a coherent voice for industry working in "high threat" areas - including defence, national security and resilience, the protection of critical national infrastructure, intelligence and organised crime. The group provides a channel for government, industry and the wider stakeholder community to discuss policy, strategy and implementation issues.
Recommendations received
22 people have recommended Greg
Join now to viewMore activity by Greg
-
After 18 months, I’m wrapping up my time at Palo Alto Networks. It’s been a whirlwind—full of learning, new relationships, and plenty of challenges…
After 18 months, I’m wrapping up my time at Palo Alto Networks. It’s been a whirlwind—full of learning, new relationships, and plenty of challenges…
Liked by Greg Day
-
Brilliant day supporting White Hat Ball and NSPCC for the Cyder Cup! Thank you to 🔵 Ryan Surry @ Intaso and Oliver Newbury @Luke kinder at #Halcyon…
Brilliant day supporting White Hat Ball and NSPCC for the Cyder Cup! Thank you to 🔵 Ryan Surry @ Intaso and Oliver Newbury @Luke kinder at #Halcyon…
Liked by Greg Day
-
Today was like no other and our IPO a fantastic milestone for Netskope !! Witnessing this after so many efforts from so many Netskopers is a proud…
Today was like no other and our IPO a fantastic milestone for Netskope !! Witnessing this after so many efforts from so many Netskopers is a proud…
Liked by Greg Day
-
I’m grateful to share a bit of good news: Power of SURGE was named a Distinguished Favorite in the 2025 NYC Big Book Award this week. This nichey…
I’m grateful to share a bit of good news: Power of SURGE was named a Distinguished Favorite in the 2025 NYC Big Book Award this week. This nichey…
Liked by Greg Day
Other similar profiles
-
Neil Thacker
Neil Thacker
-
Sian John MBE
Sian John MBE
-
Nadav Shatz
Nadav Shatz
-
James Hanlon
James Hanlon
-
Federico Charosky
Federico Charosky
-
Ivan Ristić
Ivan Ristić
-
Shah Sheikh
Shah Sheikh
-
Chris Woods
Chris Woods
-
Kevin Tongs
Kevin Tongs
-
Fabian Libeau
Fabian Libeau
Explore collaborative articles
We’re unlocking community knowledge in a new way. Experts add insights directly into each article, started with the help of AI.
Explore More