SlideShare a Scribd company logo
1 of 1
Download to read offline
Greg Kinne
Background and Experiences
With over 30 years of information technology experience, Greg has a wealth of
experience in numerous Knowledge Management (KM) disciplines such as; Enterprise
Content Management, Document and Records Management, Advanced Search and
Discovery Systems, Entity Extraction, Business Process Analysis with Automated
Workflow, Software Systems Design and Deployment and Advanced Anomaly Detection
Systems. An expert software designer and programmer, he also sits on the Board of the
International Knowledge Management Institute and is a faculty member with current KM
certifications.
Previously Greg was the Director of KM at the global company AT&T. In a related KM
field of content discovery and threat detection, Greg was the lead architect and scientist
for AT&T’s Advanced Anomaly Detection Framework, an SOA based framework for
massively scalable anomaly detection and threat management. This system integrates
AT&T Research Laboratories’ massively scalable database engine along with advanced
detection algorithms to provide a multi-domain threat detection framework. Greg has
spoken regularly at National Biosurveillance symposiums, Navy and US Coast Guard
Maritime Domain Awareness efforts and to US Leaders on Capitol Hill in Washington
DC. AT&T Research Laboratories & Greg have been awarded a patent on the Multi-
domain anomaly pattern technologies developed by Greg in conjunction with AT&T
Research Scientists and biostatisticians.
Outside of Work
Greg lives outside Denver, Colorado. He enjoys sailing, snow skiing, riding his Harley
and doing research on exo-planets in his backyard telescope observatory.

More Related Content

Similar to Greg Kinne - Bio

New enterprise application and data security challenges and solutions apr 2...
New enterprise application and data security challenges and solutions   apr 2...New enterprise application and data security challenges and solutions   apr 2...
New enterprise application and data security challenges and solutions apr 2...Ulf Mattsson
 
Internet of Things: Government Keynote, Randy Garrett
Internet of Things: Government Keynote, Randy GarrettInternet of Things: Government Keynote, Randy Garrett
Internet of Things: Government Keynote, Randy GarrettGovLoop
 
MITRE_ATTACK_Enterprise_11x17.pdf
MITRE_ATTACK_Enterprise_11x17.pdfMITRE_ATTACK_Enterprise_11x17.pdf
MITRE_ATTACK_Enterprise_11x17.pdfAisyiFree
 
Career guidance talk it makaut_ppt_sabyasachi mukhopadhyay
Career guidance talk it makaut_ppt_sabyasachi mukhopadhyayCareer guidance talk it makaut_ppt_sabyasachi mukhopadhyay
Career guidance talk it makaut_ppt_sabyasachi mukhopadhyaySabyasachi Mukhopadhyay
 
Cloud-native Enterprise Data Science Teams
Cloud-native Enterprise Data Science TeamsCloud-native Enterprise Data Science Teams
Cloud-native Enterprise Data Science TeamsBoston Consulting Group
 
Joe Green Resume_2017 v5
Joe Green Resume_2017 v5Joe Green Resume_2017 v5
Joe Green Resume_2017 v5Joseph Green
 
Artificial Intelligence in Cyber Security Research Paper Writing.pptx
Artificial Intelligence in Cyber Security Research Paper Writing.pptxArtificial Intelligence in Cyber Security Research Paper Writing.pptx
Artificial Intelligence in Cyber Security Research Paper Writing.pptxkellysmith617941
 
How To Become A Blockchain Engineer
How To Become A Blockchain EngineerHow To Become A Blockchain Engineer
How To Become A Blockchain Engineer101 Blockchains
 
[Ai in finance] AI in regulatory compliance, risk management, and auditing
[Ai in finance] AI in regulatory compliance, risk management, and auditing[Ai in finance] AI in regulatory compliance, risk management, and auditing
[Ai in finance] AI in regulatory compliance, risk management, and auditingNatalino Busa
 
Senior level positions in Symantec India
Senior level positions in Symantec IndiaSenior level positions in Symantec India
Senior level positions in Symantec IndiaShyam Vaidyanathan
 
Securing Your Containers is Not Enough: How to Encrypt Container Data
Securing Your Containers is Not Enough: How to Encrypt Container DataSecuring Your Containers is Not Enough: How to Encrypt Container Data
Securing Your Containers is Not Enough: How to Encrypt Container DataMirantis
 
Enterprise Grade Data Labeling - Design Your Ground Truth to Scale in Produ...
Enterprise Grade Data Labeling - Design Your Ground Truth to Scale in Produ...Enterprise Grade Data Labeling - Design Your Ground Truth to Scale in Produ...
Enterprise Grade Data Labeling - Design Your Ground Truth to Scale in Produ...Jai Natarajan
 
Maturing Endpoint Security: 5 Key Considerations
Maturing Endpoint Security: 5 Key ConsiderationsMaturing Endpoint Security: 5 Key Considerations
Maturing Endpoint Security: 5 Key ConsiderationsSirius
 
AI Cybersecurity: Pros & Cons. AI is reshaping cybersecurity
AI Cybersecurity: Pros & Cons. AI is reshaping cybersecurityAI Cybersecurity: Pros & Cons. AI is reshaping cybersecurity
AI Cybersecurity: Pros & Cons. AI is reshaping cybersecurityTasnim Alasali
 
Software Security in the Real World
Software Security in the Real WorldSoftware Security in the Real World
Software Security in the Real WorldMark Curphey
 

Similar to Greg Kinne - Bio (20)

New enterprise application and data security challenges and solutions apr 2...
New enterprise application and data security challenges and solutions   apr 2...New enterprise application and data security challenges and solutions   apr 2...
New enterprise application and data security challenges and solutions apr 2...
 
Internet of Things: Government Keynote, Randy Garrett
Internet of Things: Government Keynote, Randy GarrettInternet of Things: Government Keynote, Randy Garrett
Internet of Things: Government Keynote, Randy Garrett
 
MITRE_ATTACK_Enterprise_11x17.pdf
MITRE_ATTACK_Enterprise_11x17.pdfMITRE_ATTACK_Enterprise_11x17.pdf
MITRE_ATTACK_Enterprise_11x17.pdf
 
Sussman 20140122
Sussman 20140122Sussman 20140122
Sussman 20140122
 
Career guidance talk it makaut_ppt_sabyasachi mukhopadhyay
Career guidance talk it makaut_ppt_sabyasachi mukhopadhyayCareer guidance talk it makaut_ppt_sabyasachi mukhopadhyay
Career guidance talk it makaut_ppt_sabyasachi mukhopadhyay
 
Cloud-native Enterprise Data Science Teams
Cloud-native Enterprise Data Science TeamsCloud-native Enterprise Data Science Teams
Cloud-native Enterprise Data Science Teams
 
Joe Green Resume_2017 v5
Joe Green Resume_2017 v5Joe Green Resume_2017 v5
Joe Green Resume_2017 v5
 
Artificial Intelligence in Cyber Security Research Paper Writing.pptx
Artificial Intelligence in Cyber Security Research Paper Writing.pptxArtificial Intelligence in Cyber Security Research Paper Writing.pptx
Artificial Intelligence in Cyber Security Research Paper Writing.pptx
 
How To Become A Blockchain Engineer
How To Become A Blockchain EngineerHow To Become A Blockchain Engineer
How To Become A Blockchain Engineer
 
[Ai in finance] AI in regulatory compliance, risk management, and auditing
[Ai in finance] AI in regulatory compliance, risk management, and auditing[Ai in finance] AI in regulatory compliance, risk management, and auditing
[Ai in finance] AI in regulatory compliance, risk management, and auditing
 
Senior level positions in Symantec India
Senior level positions in Symantec IndiaSenior level positions in Symantec India
Senior level positions in Symantec India
 
Securing Your Containers is Not Enough: How to Encrypt Container Data
Securing Your Containers is Not Enough: How to Encrypt Container DataSecuring Your Containers is Not Enough: How to Encrypt Container Data
Securing Your Containers is Not Enough: How to Encrypt Container Data
 
Careers in Cyber Security
Careers in Cyber SecurityCareers in Cyber Security
Careers in Cyber Security
 
IAASB & Disruptive Technologies
IAASB & Disruptive TechnologiesIAASB & Disruptive Technologies
IAASB & Disruptive Technologies
 
Enterprise Grade Data Labeling - Design Your Ground Truth to Scale in Produ...
Enterprise Grade Data Labeling - Design Your Ground Truth to Scale in Produ...Enterprise Grade Data Labeling - Design Your Ground Truth to Scale in Produ...
Enterprise Grade Data Labeling - Design Your Ground Truth to Scale in Produ...
 
Dr. Charles Pak
Dr. Charles PakDr. Charles Pak
Dr. Charles Pak
 
Gregory C. Witcher Full CV
Gregory C. Witcher Full CV Gregory C. Witcher Full CV
Gregory C. Witcher Full CV
 
Maturing Endpoint Security: 5 Key Considerations
Maturing Endpoint Security: 5 Key ConsiderationsMaturing Endpoint Security: 5 Key Considerations
Maturing Endpoint Security: 5 Key Considerations
 
AI Cybersecurity: Pros & Cons. AI is reshaping cybersecurity
AI Cybersecurity: Pros & Cons. AI is reshaping cybersecurityAI Cybersecurity: Pros & Cons. AI is reshaping cybersecurity
AI Cybersecurity: Pros & Cons. AI is reshaping cybersecurity
 
Software Security in the Real World
Software Security in the Real WorldSoftware Security in the Real World
Software Security in the Real World
 

Greg Kinne - Bio

  • 1. Greg Kinne Background and Experiences With over 30 years of information technology experience, Greg has a wealth of experience in numerous Knowledge Management (KM) disciplines such as; Enterprise Content Management, Document and Records Management, Advanced Search and Discovery Systems, Entity Extraction, Business Process Analysis with Automated Workflow, Software Systems Design and Deployment and Advanced Anomaly Detection Systems. An expert software designer and programmer, he also sits on the Board of the International Knowledge Management Institute and is a faculty member with current KM certifications. Previously Greg was the Director of KM at the global company AT&T. In a related KM field of content discovery and threat detection, Greg was the lead architect and scientist for AT&T’s Advanced Anomaly Detection Framework, an SOA based framework for massively scalable anomaly detection and threat management. This system integrates AT&T Research Laboratories’ massively scalable database engine along with advanced detection algorithms to provide a multi-domain threat detection framework. Greg has spoken regularly at National Biosurveillance symposiums, Navy and US Coast Guard Maritime Domain Awareness efforts and to US Leaders on Capitol Hill in Washington DC. AT&T Research Laboratories & Greg have been awarded a patent on the Multi- domain anomaly pattern technologies developed by Greg in conjunction with AT&T Research Scientists and biostatisticians. Outside of Work Greg lives outside Denver, Colorado. He enjoys sailing, snow skiing, riding his Harley and doing research on exo-planets in his backyard telescope observatory.