I've Spent 30+ Years Making Cybersecurity Work for Real People.
Cybersecurity has a communication problem. The field is filled with acronyms, frameworks, and technical language that can make even smart, capable people feel like outsiders. I built my career around fixing that.
I'm Jeff Robertson — cybersecurity practitioner, university instructor, and consultant with over three decades of experience in IT and cybersecurity. I've led enterprise security programs, served as Director of Information Security and Compliance, and spent years in the university classroom teaching cybersecurity at the graduate and undergraduate level at Saint Louis University and the University of Missouri-St. Louis.
Jeff Robertson
Along the way I discovered something important: most people don't struggle with cybersecurity because it's impossible — they struggle because it's often explained poorly. My courses and consulting work focus on how cybersecurity actually works in the real world — not just the theory, not just the frameworks, but the practical thinking and decision-making that separates a strong security posture from a paper one.
How I'm Different
Real-World First. Everything I teach is grounded in how cybersecurity actually operates inside organizations — not how textbooks say it should. I bring decades of practitioner experience into every course and engagement.
Depth Without the Complexity. I don't simplify cybersecurity. I make it accessible. There's a difference. You'll walk away with real understanding, not a surface-level overview that falls apart the moment you try to apply it.
People and Paper. Technology alone doesn't make you secure. The policies, procedures, and frameworks that govern how your people behave are just as critical as any tool you deploy. That's my specialty — and where most organizations have the biggest gaps.
Flexible Formats. Whether you prefer self-paced online learning through Teachable or a direct consulting or coaching engagement, I offer multiple ways to work together based on what fits your situation.
Ready to Learn from Someone Who's Actually Done the Work?
"Jeff Robertson is an excellent instructor who brings deep expertise and real-world insight. He explains complex security concepts in a clear and structured way — his real-world examples and encouragement of analytical thinking greatly enhanced the learning experience. He was always approachable, supportive, and genuinely invested in student understanding and success."
J.P.
Professor Robertson took a very complicated subject and made it much easier. He describes complex material in a down to earth, understandable way. He was also very approachable and responsive when I had questions. And I had a lot of questions.
L.T.
In working with Jeff for nearly 8 years, I was always impressed with his technical knowledge and willingness to put in the extra effort to provide quality support services for our customers. Jeff’s technical knowledge served him well.
P.A.
I have worked with Jeff over the last 5 years in his capacity as Director of Information Services. During that time, I have found Jeff to be an exceptional leader and IT Director. Jeff is an extremely professional and energetic individual who demands the most from himself, his employees, and his company’s vendors. I have enjoyed my professional relationship with Jeff.
Cybersecurity Training
Learn to recognize, report and mitigate real cyber attacks.
What’s the point of an information security program? The simple answer is to protect all the data from being stolen, misused or compromised. Most business units, when talking about info security, simply state “protect everything all the time”. The question is – how do you know what “everything” is? Hardware is pretty simple. There’s a …
Stop me if you’ve heard this before – INFORMATION SECURITY IS NOT SOLELY THE RESPONSIBILITY OF THE IT DEPARTMENT. Thanks, I had to get that off my chest. But it’s true. Information security affects everyone no matter what their station or position in an organization. And when it comes to a mature Information Security program, …
Let’s talk a little about the importance of vulnerability management. As I’ve mentioned in other posts, data has value. For some organizations, their data and intellectual property is the only item of value (that and their people). So it makes sense to do everything conceivable to keep that data as safe as possible. Bad guys …