Cybersecurity Training

Learn to recognize, report and mitigate real cyber attacks.

Learn More

Vulnerability Management

Learn systematic review of security weaknesses

Learn More

Risk Assessment & Management

Assess, analyze, prioritize, and make a strategy to mitigate threats to the organization

Learn More

Incident Response Planning

Create the set of procedures to detect, respond to, and limit consequences of a malicious cyber attacks

Learn More

Identity & Access Management

Ensure that the right people and job roles in the organization can access the tools they need to do their work

Learn More

Monitoring and Auditing

Review, watch and report security-related activities for an organization

Learn More
J.P.

Professor Robertson took a very complicated subject and made it much easier. He describes complex material in a down to earth, understandable way. He was also very approachable and responsive when I had questions. And I had a lot of questions.

L.T.

In working with Jeff for nearly 8 years, I was always impressed with his technical knowledge and willingness to put in the extra effort to provide quality support services for our customers. Jeff’s technical knowledge served him well.

P.A.

I have worked with Jeff over the last 5 years in his capacity as Director of Information Services. During that time, I have found Jeff to be an exceptional leader and IT Director. Jeff is an extremely professional and energetic individual who demands the most from himself, his employees, and his company’s vendors. I have enjoyed my professional relationship with Jeff.

Latest Articles

Assets, Assets Everywhere

What’s the point of an information security program? The simple answer is to protect all the data from being stolen, misused or compromised. Most business units, when talking about info security, simply state “protect everything all the time”. The question is – how do you know what “everything” is? Hardware is pretty simple. There’s a …

Read More

IT Takes a Village

Stop me if you’ve heard this before – INFORMATION SECURITY IS NOT SOLELY THE RESPONSIBILITY OF THE IT DEPARTMENT. Thanks, I had to get that off my chest. But it’s true. Information security affects everyone no matter what their station or position in an organization. And when it comes to a mature Information Security program, …

Read More

Vulnerability Management

Let’s talk a little about the importance of vulnerability management. As I’ve mentioned in other posts, data has value. For some organizations, their data and intellectual property is the only item of value (that and their people). So it makes sense to do everything conceivable to keep that data as safe as possible. Bad guys …

Read More
See More Posts

Want to Learn Cybersecurity?

Learn more about learning more! See Jeff's Teachable course offerings here.