{"id":38,"date":"2022-07-14T14:27:32","date_gmt":"2022-07-14T14:27:32","guid":{"rendered":"https:\/\/jrobertsonsecurity.com\/?page_id=38"},"modified":"2026-04-02T18:51:30","modified_gmt":"2026-04-02T18:51:30","slug":"about-me","status":"publish","type":"page","link":"https:\/\/jrobertsonsecurity.com\/?page_id=38","title":{"rendered":"About Me"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-page\" data-elementor-id=\"38\" class=\"elementor elementor-38\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-2ae5d85e elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"2ae5d85e\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-4e154017\" data-id=\"4e154017\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-13291e62 elementor-widget elementor-widget-text-editor\" data-id=\"13291e62\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\n<h2 class=\"wp-block-heading\">I&#8217;ve Spent 30+ Years Making Cybersecurity Work for Real People.<\/h2>\n\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<p class=\"has-text-align-left\">Cybersecurity has a communication problem. The field is filled with acronyms, frameworks, and technical language that can make even smart, capable people feel like outsiders. I built my career around fixing that.<\/p>\n\n<p class=\"\">I&#8217;m Jeff Robertson \u2014 cybersecurity practitioner, university instructor, and consultant with over three decades of experience in IT and cybersecurity. I&#8217;ve led enterprise security programs, served as Director of Information Security and Compliance, and spent years in the university classroom teaching cybersecurity at the graduate and undergraduate level at Saint Louis University and the University of Missouri-St. Louis.<\/p>\n<\/div>\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<figure class=\"wp-block-image size-large is-resized\"><img fetchpriority=\"high\" decoding=\"async\" width=\"997\" height=\"1024\" class=\"wp-image-40 aligncenter\" style=\"width: 349px; height: 358px;\" src=\"https:\/\/jrobertsonsecurity.com\/wp-content\/uploads\/2022\/07\/PXL_20220708_003401166_2-997x1024.jpg\" alt=\"\" srcset=\"https:\/\/jrobertsonsecurity.com\/wp-content\/uploads\/2022\/07\/PXL_20220708_003401166_2-997x1024.jpg 997w, https:\/\/jrobertsonsecurity.com\/wp-content\/uploads\/2022\/07\/PXL_20220708_003401166_2-292x300.jpg 292w, https:\/\/jrobertsonsecurity.com\/wp-content\/uploads\/2022\/07\/PXL_20220708_003401166_2-768x789.jpg 768w, https:\/\/jrobertsonsecurity.com\/wp-content\/uploads\/2022\/07\/PXL_20220708_003401166_2-1496x1536.jpg 1496w, https:\/\/jrobertsonsecurity.com\/wp-content\/uploads\/2022\/07\/PXL_20220708_003401166_2-58x60.jpg 58w, https:\/\/jrobertsonsecurity.com\/wp-content\/uploads\/2022\/07\/PXL_20220708_003401166_2.jpg 1852w\" sizes=\"(max-width: 997px) 100vw, 997px\" \/>\n<figcaption class=\"wp-element-caption\">Jeff Robertson<\/figcaption>\n<\/figure>\n\n<p class=\"\">\u00a0<\/p>\n<\/div>\n<\/div>\n\n<p class=\"\">Along the way I discovered something important: most people don&#8217;t struggle with cybersecurity because it&#8217;s impossible \u2014 they struggle because it&#8217;s often explained poorly. My courses and consulting work focus on how cybersecurity actually works in the real world \u2014 not just the theory, not just the frameworks, but the practical thinking and decision-making that separates a strong security posture from a paper one.<\/p>\n<hr class=\"wp-block-separator has-alpha-channel-opacity\" \/>\n<h3 class=\"wp-block-heading\">How I&#8217;m Different<\/h3>\n\n<p class=\"\"><strong>Real-World First.<\/strong> Everything I teach is grounded in how cybersecurity actually operates inside organizations \u2014 not how textbooks say it should. I bring decades of practitioner experience into every course and engagement.<\/p>\n\n<p class=\"\"><strong>Depth Without the Complexity.<\/strong> I don&#8217;t simplify cybersecurity. I make it <em>accessible<\/em>. There&#8217;s a difference. You&#8217;ll walk away with real understanding, not a surface-level overview that falls apart the moment you try to apply it.<\/p>\n\n<p class=\"\"><strong>People and Paper.<\/strong> Technology alone doesn&#8217;t make you secure. The policies, procedures, and frameworks that govern how your people behave are just as critical as any tool you deploy. That&#8217;s my specialty \u2014 and where most organizations have the biggest gaps.<\/p>\n\n<p class=\"\"><strong>Flexible Formats.<\/strong> Whether you prefer self-paced online learning through Teachable or a direct consulting or coaching engagement, I offer multiple ways to work together based on what fits your situation.<\/p>\n\n<h2 class=\"wp-block-heading\">Ready to Learn from Someone Who&#8217;s Actually Done the Work?<\/h2>\n\n<div class=\"wp-block-buttons is-layout-flex wp-block-buttons-is-layout-flex\">\n<div class=\"wp-block-button\"><a class=\"wp-block-button__link wp-element-button\">Browse my courses<\/a><\/div>\n\n<div class=\"is-style-fill wp-block-button\"><a class=\"wp-block-button__link wp-element-button\">Get in touch<\/a><\/div>\n<\/div>\n\n<p class=\"\">\u00a0<\/p>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>I&#8217;ve Spent 30+ Years Making Cybersecurity Work for Real People. Cybersecurity has a communication problem. The field is filled with acronyms, frameworks, and technical language that can make even smart,\u2026<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"nf_dc_page":"","footnotes":""},"class_list":["post-38","page","type-page","status-publish","hentry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>About Me - JRobertson Security<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/jrobertsonsecurity.com\/about-me\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"About Me - JRobertson Security\" \/>\n<meta property=\"og:description\" content=\"I&#8217;ve Spent 30+ Years Making Cybersecurity Work for Real People. Cybersecurity has a communication problem. The field is filled with acronyms, frameworks, and technical language that can make even smart,\u2026\" \/>\n<meta property=\"og:url\" content=\"https:\/\/jrobertsonsecurity.com\/about-me\/\" \/>\n<meta property=\"og:site_name\" content=\"JRobertson Security\" \/>\n<meta property=\"article:modified_time\" content=\"2026-04-02T18:51:30+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/jrobertsonsecurity.com\/wp-content\/uploads\/2022\/07\/PXL_20220708_003401166_2-997x1024.jpg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/jrobertsonsecurity.com\\\/about-me\\\/\",\"url\":\"https:\\\/\\\/jrobertsonsecurity.com\\\/about-me\\\/\",\"name\":\"About Me - JRobertson Security\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/jrobertsonsecurity.com\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/jrobertsonsecurity.com\\\/about-me\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/jrobertsonsecurity.com\\\/about-me\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/jrobertsonsecurity.com\\\/wp-content\\\/uploads\\\/2022\\\/07\\\/PXL_20220708_003401166_2-997x1024.jpg\",\"datePublished\":\"2022-07-14T14:27:32+00:00\",\"dateModified\":\"2026-04-02T18:51:30+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/jrobertsonsecurity.com\\\/about-me\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/jrobertsonsecurity.com\\\/about-me\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/jrobertsonsecurity.com\\\/about-me\\\/#primaryimage\",\"url\":\"https:\\\/\\\/jrobertsonsecurity.com\\\/wp-content\\\/uploads\\\/2022\\\/07\\\/PXL_20220708_003401166_2.jpg\",\"contentUrl\":\"https:\\\/\\\/jrobertsonsecurity.com\\\/wp-content\\\/uploads\\\/2022\\\/07\\\/PXL_20220708_003401166_2.jpg\",\"width\":1852,\"height\":1902},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/jrobertsonsecurity.com\\\/about-me\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/jrobertsonsecurity.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"About Me\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/jrobertsonsecurity.com\\\/#website\",\"url\":\"https:\\\/\\\/jrobertsonsecurity.com\\\/\",\"name\":\"JRobertson Security\",\"description\":\"Expert Instruction on Cybersecurity\",\"publisher\":{\"@id\":\"https:\\\/\\\/jrobertsonsecurity.com\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/jrobertsonsecurity.com\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/jrobertsonsecurity.com\\\/#organization\",\"name\":\"JRobertson Security\",\"url\":\"https:\\\/\\\/jrobertsonsecurity.com\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/jrobertsonsecurity.com\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/i0.wp.com\\\/jrobertsonsecurity.com\\\/wp-content\\\/uploads\\\/2022\\\/10\\\/jrs_logo_fc-copy.png?fit=1128%2C191&ssl=1\",\"contentUrl\":\"https:\\\/\\\/i0.wp.com\\\/jrobertsonsecurity.com\\\/wp-content\\\/uploads\\\/2022\\\/10\\\/jrs_logo_fc-copy.png?fit=1128%2C191&ssl=1\",\"width\":1128,\"height\":191,\"caption\":\"JRobertson Security\"},\"image\":{\"@id\":\"https:\\\/\\\/jrobertsonsecurity.com\\\/#\\\/schema\\\/logo\\\/image\\\/\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"About Me - JRobertson Security","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/jrobertsonsecurity.com\/about-me\/","og_locale":"en_US","og_type":"article","og_title":"About Me - JRobertson Security","og_description":"I&#8217;ve Spent 30+ Years Making Cybersecurity Work for Real People. Cybersecurity has a communication problem. The field is filled with acronyms, frameworks, and technical language that can make even smart,\u2026","og_url":"https:\/\/jrobertsonsecurity.com\/about-me\/","og_site_name":"JRobertson Security","article_modified_time":"2026-04-02T18:51:30+00:00","og_image":[{"url":"https:\/\/jrobertsonsecurity.com\/wp-content\/uploads\/2022\/07\/PXL_20220708_003401166_2-997x1024.jpg","type":"","width":"","height":""}],"twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/jrobertsonsecurity.com\/about-me\/","url":"https:\/\/jrobertsonsecurity.com\/about-me\/","name":"About Me - JRobertson Security","isPartOf":{"@id":"https:\/\/jrobertsonsecurity.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/jrobertsonsecurity.com\/about-me\/#primaryimage"},"image":{"@id":"https:\/\/jrobertsonsecurity.com\/about-me\/#primaryimage"},"thumbnailUrl":"https:\/\/jrobertsonsecurity.com\/wp-content\/uploads\/2022\/07\/PXL_20220708_003401166_2-997x1024.jpg","datePublished":"2022-07-14T14:27:32+00:00","dateModified":"2026-04-02T18:51:30+00:00","breadcrumb":{"@id":"https:\/\/jrobertsonsecurity.com\/about-me\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/jrobertsonsecurity.com\/about-me\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/jrobertsonsecurity.com\/about-me\/#primaryimage","url":"https:\/\/jrobertsonsecurity.com\/wp-content\/uploads\/2022\/07\/PXL_20220708_003401166_2.jpg","contentUrl":"https:\/\/jrobertsonsecurity.com\/wp-content\/uploads\/2022\/07\/PXL_20220708_003401166_2.jpg","width":1852,"height":1902},{"@type":"BreadcrumbList","@id":"https:\/\/jrobertsonsecurity.com\/about-me\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/jrobertsonsecurity.com\/"},{"@type":"ListItem","position":2,"name":"About Me"}]},{"@type":"WebSite","@id":"https:\/\/jrobertsonsecurity.com\/#website","url":"https:\/\/jrobertsonsecurity.com\/","name":"JRobertson Security","description":"Expert Instruction on Cybersecurity","publisher":{"@id":"https:\/\/jrobertsonsecurity.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/jrobertsonsecurity.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/jrobertsonsecurity.com\/#organization","name":"JRobertson Security","url":"https:\/\/jrobertsonsecurity.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/jrobertsonsecurity.com\/#\/schema\/logo\/image\/","url":"https:\/\/i0.wp.com\/jrobertsonsecurity.com\/wp-content\/uploads\/2022\/10\/jrs_logo_fc-copy.png?fit=1128%2C191&ssl=1","contentUrl":"https:\/\/i0.wp.com\/jrobertsonsecurity.com\/wp-content\/uploads\/2022\/10\/jrs_logo_fc-copy.png?fit=1128%2C191&ssl=1","width":1128,"height":191,"caption":"JRobertson Security"},"image":{"@id":"https:\/\/jrobertsonsecurity.com\/#\/schema\/logo\/image\/"}}]}},"_links":{"self":[{"href":"https:\/\/jrobertsonsecurity.com\/index.php?rest_route=\/wp\/v2\/pages\/38","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/jrobertsonsecurity.com\/index.php?rest_route=\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/jrobertsonsecurity.com\/index.php?rest_route=\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/jrobertsonsecurity.com\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/jrobertsonsecurity.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=38"}],"version-history":[{"count":5,"href":"https:\/\/jrobertsonsecurity.com\/index.php?rest_route=\/wp\/v2\/pages\/38\/revisions"}],"predecessor-version":[{"id":168,"href":"https:\/\/jrobertsonsecurity.com\/index.php?rest_route=\/wp\/v2\/pages\/38\/revisions\/168"}],"wp:attachment":[{"href":"https:\/\/jrobertsonsecurity.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=38"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}