ππΌ Gerald Auger, Ph.D. Email and Phone Number
ππΌ Gerald Auger, Ph.D. work email
- Valid
- Valid
ππΌ Gerald Auger, Ph.D. personal email
- Valid
- Valid
- Valid
ππΌ Gerald Auger, Ph.D. phone numbers
π₯ Follow me to make your career transition into #cybersecurity as smooth as possible! Then stay with me to level up your career like a boss! π2024 SANS Difference Makers Awards "Podcast of the Year" Winner Daily Cyber Threat Briefπ₯° https://simplycyber.io/streams π₯ Come join us LIVE every morning at 8AM EST for a Cybersecurity Threat Briefing hosted by me! π± https://pages.simplycyber.io π± Connect with the Simply Cyber community at and get immediate access to resources, tools, and education. π₯ Cybersecurity is a vast field of study with so much to offer including challenge, community, compensation and satisfaction and folks new to the scene can feel overwhelmed. π Through my SimplyCyber community I share, promote, and curate cybersecurity resources to make it easy for people to make and take a cybersecurity career further, faster. π― Check out simplycyber.io for all the resources or the SimplyCyber YouTube channel for weekly content and livestreams.π Independently, I advise businesses on optimal, cost-effective methods for securing their assets and increasing business resiliency. π₯ I am passionate about information security and believe there is an appropriate, tailored information security program for every organization that reduces cybersecurity risk, increases value and supports the business mission. Through Coastal Information Security Group, I provide large and small organizations my consulting and advisory cyber security services to implement these programs.π₯Letβs Engageπ₯π¬YouTube: https://www.youtube.com/c/GeraldAugerπ Web: SimplyCyber simplycyber.ioπ€Linkedin: https://www.linkedin.com/in/geraldauger/π¦Twitter: https://twitter.com/Gerald_Auger @Gerald_AugerβοΈEmail: Gerald@coastalinfosec.com#Cybersecurity #Infosec #PrivacyπDEGREES πPhD Cyber Operations (2019)MS Information Assurance (2011)MS Computer Science (2008)BS Computer Science (2003)πCERTIFICATIONS πCISSP, HCISPP - Lic: 344804CISM - Lic: 1323801CISA - Lic: 14117435CHPS - Lic: 234726
Kairos Sec
View-
Director Of Strategy At Kairos Sec | Penetration Testing SolutionsKairos SecCharleston, Sc, Us -
Chief Content CreatorSimply Cyber Dec 2019 - Presentπ https://SimplyCyber.ioSimply Cyber is an information security YouTube channel designed to help individuals go further, faster in the information security field. As the chief content creator, I am responsible for audio, video, and content production elements. -
Chief Content OfficerSimply Cyber Academy Oct 2021 - PresentI ensure course curriculum content and practical applicability, instructor experiences, and student experiences are all awesome π€ -
Adjunct ProfessorThe Citadel Jun 2020 - PresentCharleston, South Carolina, UsI adjunct for CSCI 227: Principles and Practices of Cybersecurity at The Citadel.This course provides an introduction to concepts related to Cybersecurity. Students learn safe practices which can be deployed to secure computer systems and gain an understanding of different tools which can be used to defend attacks on computer systems.Major Topics:Introduction to CybersecurityPrinciples of CybersecurityAttacks and Defense MechanismsIntroduction to InternetsInternet Security Risks and Defense MechanismsMobile and Workplace SecuritySecurity PoliciesCyber Terrorism and Information WarfareEncryption -
Conference DirectorSimply Cyber Con Jan 2023 - PresentI champion Simply Cyber Con cybersecurity conference leaders to deliver on excellence. -
Managing PartnerCoastal Information Security Group May 2016 - PresentI partner with small business (SMB) owners to identify their cybersecurity risks and reduce it. The approach is centered around practical security controls over meeting compliance. Many times small businesses rely on outsourced IT staff to support their business and assume implicitly they are providing information security efforts. This is often not the case, and I am able to positively collaborate with these businesses IT staff to understand the greatest risk to business operations. -
Curriculum DeveloperMount Wachusett Community College May 2023 - PresentGardner, Ma, UsI develop cybersecurity curriculum programs to assist students to learn a diverse set of fundamental cybersecurity knowledge, skills, and abilities. -
Advisory Board MemberWhole Cyber Human Initiative Oct 2021 - PresentI provide guidance, thought, and support to WHCI. The Whole Cyber Human Initiative (WCHI) is a means of redefining how we look at and develop talent in Cybersecurity and IT. With a 1.8 million person talent shortage and people struggling to find work in the industry, we look to be the bridge. By looking past the resume and providing free and low-cost trainings, we start to develop the βWhole Cyber Candidateβ. We take the Candidates and secure talent shortages to provide clients results and them experience. -
Advisory Board MemberPanoptcy Security Sep 2023 - PresentI offer perspective and counsel to influence the direction of Panoptcy Security. -
Talk Show HostKnight Studios Feb 2023 - PresentHost of "The Late Show with Gerry", a KnightTV+ exclusive show. #cybersecurity industry talk, engagement, and personality interviews. -
Cybersecurity SmeHaiku, Inc Dec 2022 - Jan 2024Henderson, Nv, UsI get the awesome responsibility of driving practical information security tooling, concepts, and methodologies into the World of Haiku and Haiku Pro platforms. Like a Boss. -
Board MemberHackers For Vets May 2022 - Sep 2023Board member to provide guidance, engagement, and awareness to the Hackers for Vets non-profit organization. Led by Mike Jones, this organization seeks to make positive impact in the cybersecurity and transitioning military community. Very honored to be associated. π
-
Director Of Cybersecurity Education && Cybersecurity Program ManagerThreatgen Mar 2022 - Jun 2022Houston, Texas, UsAccountable (and frankly quite excited about) developing and delivering cybersecurity curriculum and education that applies both lecture and hands-on lab to provide students with actionable, relevant, and practical cybersecurity skills.Since I π cybersecurity I've insisted on also being responsible for the development, implementation, and maturation of the corporate cybersecurity program at the organization ensuring mission critical systems and data are protected commensurate with organizational risk appetite. -
Information Security ArchitectMedical University Of South Carolina Jul 2018 - Apr 2021Charleston, Sc, UsI was responsible for the design, build, and implementation of enterprise-class information security systems and policies across health, academic and research domains that provide value for MUSC and its partners.I'm challenged with setting the information security strategy for MUSC to include developing standards, roadmaps, solution paths. Furthermore I stay informed and incorporate knowledge of emerging threats that help the organization achieve those strategies. -
Senior Information Security AnalystMedical University Of South Carolina Jan 2016 - Jul 2018Charleston, Sc, UsAs a member of the Information Security team at MUSC, I have the professional challenge to bring information security governance, operations and engineering in a unique challenging university medical center enterprise. I am responsible for risk analysis and risk management, security program management, and leadership.Specifically, I ensure that risk associated with MUSC data and data delivery systems are properly assessed, mitigated, and documented to meet regulatory requirements and the enterprise vision. I assist in strategic planning and governance for the Information Security Program, ensuring the security architecture is documented according to policies, standards, procedures and guidelines. Additionally I function as leader to facilitate and achieve information security program initiatives. -
Co HostInfosec Icu Podcast Dec 2017 - Dec 2019Each week, Steve and I discussed Information Security topics relevant to the medical industry and to patients. From the latest hacks and bugs, to changes in the regulatory environment, and tips and tricks to keep your own personal information safe.https://podcast.musc.edu/category/podcast/infosec/ -
Senior Information Security EngineerBooz Allen Hamilton Nov 2010 - Jan 2016Mclean, Va, UsI provided information assurance guidance within the public sector, currently supporting the National Science Foundation (NSF) United States Antarctic Program (USAP). I look at my clients information security problems holistically, objectively addressing the complex interplay of people, process and technology.While being honored and humbled to travel to some of the most remote locations on Earth, I leveraged NIST 800-53 security controls with the Risk Management Framework for mitigating risks and supporting a sound information security program approach. I provided accreditation program support from both a technical, operational and management perspective. I performed enterprise risk assessments for my client in alignment with NIST SP 800-30. I developed system security plans for authorization packages in alignment with NIST SP 800-18. I've analyzed and developed weakness remediation procedures in alignment with NIST SP 800-40 v2. I performed security control assessments testing across multiple sites and multiple technologies leveraging the 53A to assess 800-53 controls for a MODERATE baseline. I performed regular weakness remediation validation to support a continuous monitoring security approach. -
Information Security AnalystHoneywell Nov 2009 - Oct 2010Charlotte, North Carolina, UsI provided client-facing independent analysis, evaluation, and recommendations designed to promote economy, efficiency, and effectiveness in my DoD client's security program, and function as primary liaison with client's project offices' and government agencies in all security matters.I leveraged my education and experience to provide quality consulting relative to security engineering, information assurance policy and procedures, and information assurance management. I leverage knowledge of the DoD 8500 series and the DIACAP process to deliver results. -
ConsultantTbg Security May 2009 - Nov 2009Franklin, Ma, UsTBG Security delivers best-of-breed security technologies for enterprise IT environments, providing services in risk management, security policy, security strategies for compliance, business continuity, network security, managed services, product integration, incident response management, and technical support. I consulted / actively participated in the implementation and configuration of various infrastructure components, including improvements to topology, protocols, policy, device configurations, and network and security management tools for my clients. I provided policy review and recommendations for the clientβs security program. I remediated vulnerabilities and quantifiably demonstrated an improvement in overall security posture. -
ConsultantBearingpoint Aug 2005 - May 2009Amsterdam, NlPerformed and held multitude of roles and responsibilities while at Bearingpoint, including:Sarbanes-Oxley (IT) Auditor 6/2008 - 5/2009System Administrator 2/2007 -12/2008Ops Specialist 8/2006 - 12/2008Management Analyst 8/2005 - 7/2006Leveraged COSO framework for IT Application control testing and COBIT framework for ITGC testing to ensure all SOX processes are followed and all controls are performed from an internal audit standpoint. I conducted documentation, validation, testing, and reporting of SOX IT controls across key applications, including user access, change control, physical access, and configuration management.Lead technologist responsible for mission-critical systems health, determining approach and architecture for developed technical solutions, and providing regular work-in-progress status updates to management. Administered Windows 2003 Server environment and ASP-based Intra-Net Web-based solution.Managed resale transaction requests/orders for technology (hardware & software) procurement related to BearingPoint consulting engagements. Advanced the USMC goal of achieving accurate, timely, reliable and useful financial information. I provided technical advice and direction, as well as, the development of software and solutions. My assignment encompassed business and IS strategies, web development, effectiveness and efficiency studies, development methods and service management. I supported the implementation of a financial management and reporting system based on an Oracle backend with an Oracle Portal front end. I provided direction and knowledge regarding all phases and tasks of the System Development Life Cycle (SDLC). In addition to developing and implementing a Model-View-Control Design Web-based Application, I successfully performed the lead role for the MIS Architecture engagementβs Capability Maturity Model Integration (CMMI) effort.
ππΌ Gerald Auger, Ph.D. Skills
ππΌ Gerald Auger, Ph.D. Education Details
-
Dakota State UniversityCyber Operations -
Dakota State UniversityInformation Assurance -
Bridgewater State UniversityComputer Science -
University Of Massachusetts AmherstComputer Science -
CertificationsCertified Scrummaster
Frequently Asked Questions about ππΌ Gerald Auger, Ph.D.
What company does ππΌ Gerald Auger, Ph.D. work for?
ππΌ Gerald Auger, Ph.D. works for Kairos Sec
What is ππΌ Gerald Auger, Ph.D.'s role at the current company?
ππΌ Gerald Auger, Ph.D.'s current role is Director of Strategy at Kairos Sec | Penetration Testing Solutions.
What is ππΌ Gerald Auger, Ph.D.'s email address?
ππΌ Gerald Auger, Ph.D.'s email address is ge****@****ail.com
What is ππΌ Gerald Auger, Ph.D.'s direct phone number?
ππΌ Gerald Auger, Ph.D.'s direct phone number is +184379*****
What schools did ππΌ Gerald Auger, Ph.D. attend?
ππΌ Gerald Auger, Ph.D. attended Dakota State University, Dakota State University, Bridgewater State University, University Of Massachusetts Amherst, Certifications.
What skills is ππΌ Gerald Auger, Ph.D. known for?
ππΌ Gerald Auger, Ph.D. has skills like Vulnerability Assessment, Security, Cissp, Information Assurance, Computer Security, Information Security, Risk Assessment, Security+, Diacap, Network Security, Dod, Integration.
Free Chrome Extension
Find emails, phones & company data instantly
Aero Online
Your AI prospecting assistant
Select data to include:
0 records Γ $0.02 per record
Download 750 million emails and 100 million phone numbers
Access emails and phone numbers of over 750 million business users. Instantly download verified profiles using 20+ filters, including location, job title, company, function, and industry.
Start your free trial