Stephen G. Email and Phone Number
Stephen G. personal email
- Valid
When I’m not busily running my own businesses, I’m occasionally an advisor to various companies and other privately owned corporations.With over 20 years experience in Internet technology I pioneered many advances in Cyber Security, driving at the bleeding edge of the industry Team Cymru for a decade. Prior to that, served in a high capacity at other organizations such as IBM and Cisco. 💪🏻 My passion for innovation has led to running several successful businesses across a variety fields with the effective use of methodical, scaleable approaches to growth. 💡I'm an investor, entrepreneur, strategist, inventor, deal maker, and innovator.💎 I help businesses solve problems, communicate more effectively, think differently, and execute brilliantly. “Some day I will retire from being retired.” — R.B., 1922-2018Some words of wisdom:Surround yourself with exceptional people and listen intently.Be creative, curious, and persistent.Fail early, fail often, fail forward.Love your neighbor as yourself.Attend fewer meetings.Question Everything.Pursue the WHY.Innovate.👇👇Email me via russellholdings.com to get in touch!
-
Founder And CeoRussell Holdings Apr 2015 - PresentNew York, New York, UsRussell Holdings is a unique privately owned company that grows businesses through mentoring, partnership, sweat equity, and at times, strategic investment. We partner with a variety of companies across a broad range of industries looking for recession resistant opportunities in uncorrelated markets, identifying their strengths and potentials for success. Areas of experience in Cyber Security include but are not limited to: Cyber Threat Intelligence, Risk Monitoring, Passive DNS, Domain Intelligence, Cybercrime, Cyber Espionage, Advanced Persistent Threats, Malware, Internet Architecture, Traceback and Attribution, Dark Web. We love to innovate and solve problems across a broad spectrum of industries.Motto:Think Different. Be Different.https://russellholdings.com -
AdvisorBinarly, Inc. Sep 2021 - PresentSanta Monica, California, UsBinarly is a cutting edge company that protects devices from emerging firmware and hardware threats. They provide an advanced analytics platform with proactive and reactive solutions for Security Operations Centers and Incident Response teams to enhance visibility into their enterprise device infrastructure. Binarly is uniquely positioned to address the firmware supply chain security issues like no other company. -
AdvisorPolyswarm Jun 2018 - PresentSan Diego, California, UsPolySwarm is the first decentralized marketplace where security experts build anti-malware engines that compete to protect you.Raised $26M in funding at launch. Think Bitcoin, but instead of mining, a global community of anti-malware experts compete to best detect today’s threats.https://polyswarm.io -
AdvisorResecurity Aug 2018 - 2021Los Angeles, California, UsResecurity, a California-based cybersecurity company, focused on next-generation endpoint protection and intelligence-driven cybersecurity solutions. Resecurity combines robust protection stack to identify security anomalies with investigation and remediation capabilities. Upcoming flagship products are EPP (Endpoint Protection Platform), Risk (SaaS for Digital Risk Monitoring) and Context (Cyber Threat Intelligence Platform). -
AdvisorMeasuredrisk May 2018 - Apr 2019Washington Dc, UsMeasuredRisk enables leaders to see and anticipate digital risk. Patent pending software uses AI to determine the potential for attack, and the conditions which are driving that potential, in real-time. The team is comprised of serial entrepreneurs, educators, ethical hackers and business leaders all focused on risk. MeasuredRisk aims to remove the noise, and provide decision support for leaders steeped in responsibility, with clarity and precision. -
Co-Founder, Chief Scientist, And FellowTeam Cymru Mar 2005 - Apr 2015Lake Mary, Fl, UsServed as Co-Founder, Fellow, and Chief Scientist of Team Cymru, an intelligence company whose technology has scaled to helping millions of users, many Tier 1 ISPs, NSPs, and governments in the fight against cyber crime world-wide. Our Mission: Saving and Improving Human Lives. Spent over 12 years deeply entrenched in the bowels of the Internet down to its base protocols and those that leverage it for good and for bad. The Who and the Why were subjects of deep ongoing investigation and research.Succeeded in expansive miscreant attribution and subversion.Stephen conceived and developed many of the technologies that help set Team Cymru apart and be recognized as the top most influential leaders in the world of Internet Security. Developed cutting edge technologies done by no one else in the world to save and improve human lives - literally. Pioneered many innovative aspects of Cyber Security within the company, many techniques which remain in use to this day. Some of that time spent in: Extensive Data Mining, BGP, SQL, TCP/IP, Netflow, Advanced Persistent Treats, Underground Economy, Malware Homology, Miscreant Attribution, Critical Infrastructure Support, Triangulation, Cyberwarfare, etc. Notable partnerships: Interpol, FBI, USSS, The US Treasury, US Air Force, UK GCHQ, DHS, Polish Police, NHTCU, IMF, AUS-CERT, CNCERT, RU-CERT, CERT/CC, JPCERT, US-CERT, REN-ISAC, thousands of others and too many to list. -
Co-Founder And ModeratorNsp-Sec 2002 - Jun 2014"Cyber defenders, ever vigilant, ever responsive." -Marjorie Gilbert, 2003 The nsp-security forum is a volunteer international incident response group, which coordinates the interaction between ISPs, NSPs, and critical infrastructure in near real-time and tracks exploits and compromised systems as well as mitigates the effects of those exploits on ISP networks. The list has helped mitigate countless attacks, infections, and botnets.
-
Member Of Technical Advisory Group (Tag)Ren-Isac 2006 - 2011Bloomington, Indiana, UsResearch and Education Network (REN‐ISAC) is an integral part of higher education's strategy to improve network security through information collection, analysis, dissemination, early warning, and response. REN‐ISAC services and products are specifically designed to support the unique environment and needs of organizations connected to served higher education and research networks, and supports efforts to protect the national cyber infrastructure by participating in the formal U.S. ISAC structure. -
Senior Network ScientistCisco 2003 - 2005San Jose, Ca, UsPart of a tight-knit elite think tank hired on by Cisco Systems as a private research branch segregated from the rest of the business seeking to develop new and innovative ideas and technologies pertaining to the Internet, Complex Inter Networking, Data Analysis, and of course people - the purveyors of doom.Translation: get paid to work from home and do cool stuff with 100% autonomy. -
Technical AnalystVanco 2002 - 2003UsWas chosen out of nearly 1000 applicants to help build out Vanco US and carry on the networking and security practice of a UK based powerhouse in the IT and networking industry. -
Senior Security ConsultantReliance Globalcom Limited 2001 - 2001Formerly FLAG Telecom.
-
Senior Security ConsultantCenturylink 2001 - 2001Monroe, La, UsGlobal Crossing Telecommunications, Inc was Acquired by Level 3 Communications which was acquired by CenturyLink -
Senior Network EngineerGreenwich Technology Partners 2000 - 2001UsPerformed consulting for GTP in network design and security. Worked closely with companies such as Global Crossing in Arizona and Flag Telecom in the UK implementing high end firewall technologies, network strategy and design with Juniper, and server consulting. -
Network Design And Wan Administrator.Dantis 2000 - 2000Short stint at a startup in downtown Chicago who tried to get into the Colo hosting business.Was spared from all the layoffs until the company finally closed up for good.
-
Senior Network EngineerIbm 1998 - 2000Armonk, New York, Ny, UsServed various positions including:Tier 4 Network Design & ArchitectureTier 3 Network EngineerLevel 2 Network EngineerLogical Build OperatorPioneered the datacenter server hosting business before it ever was mainstream. Notables: Hosted Victoria's Secret, Solomon Smith Barney, and the FBI.gov website among hundreds of others.
Stephen G. Skills
Stephen G. Education Details
-
Wheaton CollegeMathematics And Computer Science
Frequently Asked Questions about Stephen G.
What company does Stephen G. work for?
Stephen G. works for Russell Holdings
What is Stephen G.'s role at the current company?
Stephen G.'s current role is CEO, Russell Holdings | Investor | Builder | Advisor.
What is Stephen G.'s email address?
Stephen G.'s email address is gi****@****ail.com
What schools did Stephen G. attend?
Stephen G. attended Wheaton College.
What are some of Stephen G.'s interests?
Stephen G. has interest in Table Tennis, Road Biking, Investing, Politics, Problem Solving, Science And Technology, Digital Photography.
What skills is Stephen G. known for?
Stephen G. has skills like Angel Investing, Entrepreneurship, Business Strategy, Start Ups, Real Estate, Management, Advertising, Strategy, Strategic Planning, Network Security, Marketing, Online Advertising.
Free Chrome Extension
Find emails, phones & company data instantly
Aero Online
Your AI prospecting assistant
Select data to include:
0 records × $0.02 per record
Download 750 million emails and 100 million phone numbers
Access emails and phone numbers of over 750 million business users. Instantly download verified profiles using 20+ filters, including location, job title, company, function, and industry.
Start your free trial