Shon Gerber

Shon Gerber Email and Phone Number

Partner @ Next Peak
Wichita, KS, US
Shon Gerber's Location
Wichita, Kansas Metropolitan Area, United States, United States
About Shon Gerber

Experienced security professional with a demonstrated history of working in the chemicals industry. Skilled in Operations Management, Electronic Data Interchange (EDI), Vulnerability Management, Cyber Legislation, Risk Management and Computer Forensics. Strong entrepreneurial mindset and drive resulting in the creation of one of two US Air Force Red Teams.

Shon Gerber's Current Company Details
Next Peak

Next Peak

View
Partner
Wichita, KS, US
Shon Gerber Work Experience Details
  • Next Peak
    Partner
    Next Peak
    Wichita, Ks, Us
  • Next Peak
    Cyber Security Consultant
    Next Peak Mar 2024 - Present
    San Antonio, Texas, Us
    Providing services to national and international security organizations and global companies in cyber defense, strategic planning, crisis management, risk management, capacity building, policy, training, exercises, and operations.
  • Reduce Cyber Risk Llc
    Founder And Ceo
    Reduce Cyber Risk Llc Jan 2021 - Present
    Reduce Cyber Risk specializes in empowering professionals and organizations with the knowledge and skills needed to tackle the complex challenges of cybersecurity. Our expert-led CISSP training courses are designed to cover a broad spectrum of cybersecurity domains, ensuring that our clients are well-prepared to earn the globally recognized CISSP certification.Our Services:CISSP Training: Comprehensive courses that delve into the eight domains of cybersecurity, equipping candidates with the technical and managerial knowledge required for certification success.Cybersecurity Consulting: Tailored consulting services that address the unique security needs of businesses, especially those operating within critical infrastructure sectors.Key Features:Industry Expertise: Our trainers and consultants are seasoned professionals with deep experience in both the technical and legislative aspects of cybersecurity.Customized Solutions: We understand that each business has unique risks and requirements, especially when it comes to critical infrastructure. Our services are customized to meet these specific needs.Global Compliance: With a keen eye on global regulatory security requirements, we guide businesses through the complexities of cybersecurity compliance, including MTSA, CFATS, and international cyber legislation.Commitment to Excellence:Reduce Cyber Risk is committed to delivering excellence in cybersecurity education and consulting. Our goal is to enhance the security posture of our clients and ensure they are equipped to protect their most valuable assets in an ever-evolving digital landscape.
  • Invista
    Chief Information Security Officer (Ciso)
    Invista Mar 2015 - Mar 2024
    Wichita, Kansas, Us
    Led with a dual focus on safeguarding intellectual property and fortifying business against evolving cyber threats. My comprehensive approach to cybersecurity risk management is complemented by a robust strategy for business resiliency, ensuring uninterrupted operations and compliance with global regulatory security requirements such as MTSA, CFATS, and cybersecurity legislations in Europe and China.
  • Wichita State University
    Adjunct Professor (Cyber Risk - Cyber Physical Systems Security)
    Wichita State University Aug 2021 - May 2023
    Wichita, Ks, Us
    As a seasoned CISSP-certified professional with over 20 years in cybersecurity, I've developed and taught two advanced 400-level courses on cyber risk and Cyber-Physical Systems (CPS). Leveraging a diverse range of instructional methods, including lectures, case studies, and hands-on exercises, I've created an engaging learning environment where students gain practical skills and theoretical knowledge. By integrating real-world examples and cutting-edge research, I've equipped students with the expertise needed to address emerging threats in CPS and business environments. Through rigorous assessment and personalized feedback, I've ensured students' comprehension and professional development. Overall, my courses contribute to shaping the next generation of cybersecurity professional's adept at securing various environments in today's digital age.
  • Koch Business Holdings
    Chief Information Security Officer (Ciso)
    Koch Business Holdings Apr 2014 - Mar 2015
    Served as Chief Information Security Officer, bringing a wealth of expertise in cybersecurity and strategic risk management tailored to the unique needs of high-net-worth family enterprises. Role was pivotal in implementing a resilient security posture that protects sensitive assets while accommodating the flexible and often discrete nature of family office operations.
  • Koch Business Solutions (Kbs)
    Security Operations Center Supervisor
    Koch Business Solutions (Kbs) Mar 2014 - Mar 2015
    Wichita, Kansas, Us
  • Koch Business Solutions (Kbs)
    Sr. It Security Architect
    Koch Business Solutions (Kbs) Jun 2011 - Jun 2014
    Wichita, Kansas, Us
  • Koch Business Solutions (Kbs)
    Architect
    Koch Business Solutions (Kbs) 2012 - 2013
    Wichita, Kansas, Us
  • 184Th Wing, Kansas Air National Guard
    Commander - 177Th Information Aggressor Squadron
    184Th Wing, Kansas Air National Guard Feb 2010 - Sep 2011
    Mcconnell Afb, Ks, Us
    As an Air Force Red Team Commander, I led a highly skilled team of cybersecurity experts tasked with conducting simulated attacks on military systems to identify vulnerabilities and assess security measures. With a background in cyber warfare and extensive training in offensive tactics, I orchestrate complex penetration tests and adversary simulations to mimic real-world threats and assess the resilience of our defense systems. Collaborating closely with intelligence analysts and technical specialists, we developed sophisticated attack strategies and exploit techniques to challenge our defenses and uncover weaknesses before malicious actors do. Through meticulous planning and execution, I ensured that our Red Team exercises provide actionable insights and recommendations to enhance our cybersecurity posture and safeguard critical assets against evolving threats. As a leader, I fostered a culture of innovation, professionalism, and continuous learning within the team, empowering individuals to excel in their roles and contribute effectively to our mission of defending the nation's interests in cyberspace.
  • 184Th Wing, Kansas Air National Guard
    Director Of Operations - 177Th Information Aggressor Squadron
    184Th Wing, Kansas Air National Guard Feb 2009 - Feb 2010
    Mcconnell Afb, Ks, Us
    As the Air Force Red Team Director of Operations, I oversaw all aspects of planning, coordination, and execution of offensive cyber operations aimed at testing and improving the security posture of military systems. Drawing upon my extensive experience in cyber warfare and leadership roles, I led a team of skilled professionals in conducting simulated attacks to identify vulnerabilities and assess defensive capabilities. My responsibilities included developing strategic objectives, allocating resources, and ensuring compliance with operational protocols and legal guidelines. Through effective communication and collaboration with stakeholders across different military branches and government agencies, I facilitated the exchange of intelligence and best practices to enhance our collective cyber defense capabilities. Additionally, I provided guidance and mentorship to junior team members, fostering their professional development and cultivating a culture of excellence within the organization. By leveraging innovative technologies and adaptive methodologies, I enabled the Red Team to stay ahead of emerging threats and deliver actionable insights to decision-makers, ultimately strengthening the resilience of our nation's cyber infrastructure.
  • Kansas Air National Guard (Topeka)
    177Th Information Aggressor Squadron (Information Security Training Manager)
    Kansas Air National Guard (Topeka) Feb 2008 - Feb 2009
    Topeka, Kansas, Us

Shon Gerber Skills

Security Information Security Computer Security Cissp Program Management Network Security Information Security Management Information Assurance Information Technology Management Operations Management Computer Forensics Project Management Strategic Planning Networking Disaster Recovery Incident Response Vulnerability Assessment Change Management Security Architecture Design Leadership Vulnerability Management It Management Executive Management Security Audits Training Customer Service Negotiation Quality Management Virtual Teams Ddos Mitigation Vendor Relationships Cyberlaw Critical Infrastructure Protection Team Leadership Employee Training Cloud Security Perimeter Security Edi Security Clearance Strategy Military Team Building Integration Chinese Cybersecurity Law Agile Methodologies Blockchain Risk Management Risk Assessment

Shon Gerber Education Details

  • University Of North Dakota
    University Of North Dakota
    Aeronautical Studies
  • Cissp
    Cissp
    Certified Information Systems Security Professional
  • Sans Leg 523 - Law Of Data Security And Investigations
    Sans Leg 523 - Law Of Data Security And Investigations
    Cyber/Computer Forensics And Counterterrorism
  • University Of North Dakota
    University Of North Dakota
    General

Frequently Asked Questions about Shon Gerber

What company does Shon Gerber work for?

Shon Gerber works for Next Peak

What is Shon Gerber's role at the current company?

Shon Gerber's current role is Partner.

What is Shon Gerber's email address?

Shon Gerber's email address is sh****@****ail.com

What is Shon Gerber's direct phone number?

Shon Gerber's direct phone number is +131682*****

What schools did Shon Gerber attend?

Shon Gerber attended University Of North Dakota, Cissp, Sans Leg 523 - Law Of Data Security And Investigations, University Of North Dakota.

What skills is Shon Gerber known for?

Shon Gerber has skills like Security, Information Security, Computer Security, Cissp, Program Management, Network Security, Information Security Management, Information Assurance, Information Technology, Management, Operations Management, Computer Forensics.

Free Chrome Extension

Find emails, phones & company data instantly

Find verified emails from LinkedIn profiles
Get direct phone numbers & mobile contacts
Access company data & employee information
Works directly on LinkedIn - no copy/paste needed
Get Chrome Extension - Free

Aero Online

Your AI prospecting assistant

Download 750 million emails and 100 million phone numbers

Access emails and phone numbers of over 750 million business users. Instantly download verified profiles using 20+ filters, including location, job title, company, function, and industry.