👉🏼 Gerald Auger, Ph.D.

👉🏼 Gerald Auger, Ph.D.

Charleston County, South Carolina, United States
67K followers 500+ connections

About

💥 Follow me to make your career transition into #cybersecurity as smooth as possible!…

Articles by 👉🏼 Gerald

See all articles

Contributions

Activity

Join now to see all activity

Experience & Education

  • Simply Cyber

View 👉🏼 Gerald’s full experience

See their title, tenure and more.

or

By clicking Continue to join or sign in, you agree to LinkedIn’s User Agreement, Privacy Policy, and Cookie Policy.

Licenses & Certifications

Publications

  • Cybersecurity Career Master Plan

    Packt Publishing

    Cybersecurity is an emerging career trend and will continue to become increasingly important. Despite the lucrative pay and significant career growth opportunities, many people are unsure of how to get started.

    This book is designed by leading industry experts to help you enter the world of cybersecurity with confidence, covering everything from gaining the right certification to tips and tools for finding your first job. The book starts by helping you gain a foundational understanding…

    Cybersecurity is an emerging career trend and will continue to become increasingly important. Despite the lucrative pay and significant career growth opportunities, many people are unsure of how to get started.

    This book is designed by leading industry experts to help you enter the world of cybersecurity with confidence, covering everything from gaining the right certification to tips and tools for finding your first job. The book starts by helping you gain a foundational understanding of cybersecurity, covering cyber law, cyber policy, and frameworks. Next, you'll focus on how to choose the career field best suited to you from options such as security operations, penetration testing, and risk analysis. The book also guides you through the different certification options as well as the pros and cons of a formal college education versus formal certificate courses. Later, you'll discover the importance of defining and understanding your brand. Finally, you'll get up to speed with different career paths and learning opportunities.

    By the end of this cyber book, you will have gained the knowledge you need to clearly define your career path and develop goals relating to career progression.

    Other authors
    See publication
  • Flashlight in a Dark Room Theory

    Beadle Scholar

    Gerald Auger's PhD Dissertation Research Paper:

    Abstract:
    Healthcare providers have a responsibility to protect patient’s privacy and a business motivation to properly secure their assets. These providers encounter barriers to achieving these objectives and limited academic research has been conducted to examine the causes and strategies to overcome them. A subset of this demographic, businesses with less than 10 providers, compose a majority 57% of provider organizations in the…

    Gerald Auger's PhD Dissertation Research Paper:

    Abstract:
    Healthcare providers have a responsibility to protect patient’s privacy and a business motivation to properly secure their assets. These providers encounter barriers to achieving these objectives and limited academic research has been conducted to examine the causes and strategies to overcome them. A subset of this demographic, businesses with less than 10 providers, compose a majority 57% of provider organizations in the United States. This grounded theory study provides exploratory findings, discovering these small healthcare provider organizations (SHPO) have limited knowledge on information technology (IT) and information security that results in assumptions and misappropriations of information security implementation, who is responsible for security, and what the scope of security is to address organizational cyber risk. A theory conveying the interrelationship among concepts, illustrating these barriers, is visually communicated. This research can be leveraged by researchers to further understand the dimensions of the identified barriers and by practitioners to develop strategies to improve organizational information security for this demographic. The study’s findings may apply to SHPOs in other states as the criteria of South Carolina based SHPOs did not seem to influence the findings.

    Intensive interviewing was conducted on nine SHPOs in the state of South Carolina to elicit their thoughts and perspectives on information security at their business, how decisions are made regarding information security, how threats and risks to their business are perceived, and to understand financial activities associated with providing information security at their organization.

    <Follow link for continuation>

    See publication
  • The Cybersecurity Risks, Challenges and Opportunities for Small Businesses

    Better Business Bureau

    Cybercrime continues to grow rapidly around the world, with annual costs to the global economy estimated to reach over US$2 trillion by 2019. Small businesses are becoming more and more aware of cyberthreats, continue to be concerned about cyber risks, and are taking some proactive security steps. Yet, there is still much that can be done to educate, support, and empower smaller businesses to be cyber secure, to dispel misconceptions, and to help make cybersecurity a priority for smaller…

    Cybercrime continues to grow rapidly around the world, with annual costs to the global economy estimated to reach over US$2 trillion by 2019. Small businesses are becoming more and more aware of cyberthreats, continue to be concerned about cyber risks, and are taking some proactive security steps. Yet, there is still much that can be done to educate, support, and empower smaller businesses to be cyber secure, to dispel misconceptions, and to help make cybersecurity a priority for smaller organizations. This report provides insights to help increase awareness and advance cybersecurity efforts among smaller businesses. (https://www.bbb.org/stateofcybersecurity/ 11/2017)

    Other authors
    See publication
  • Ignorance is Not a Defense: Using Cloud Software Securely

    SC Lawyer

    White paper targeting South Carolina lawyer population for proper usage and considerations of cloud software platforms to support their practices.

    Other authors
    See publication
  • Black Box FISMA-based Security Control Assessment of Public Cloud Providers

    2016 Information Security Research and Education (INSuRE) Conference (INSuRECon-16)

    Public cloud computing solutions are desirable for business and government agencies to outsource infrastructure technology requirements. This decision transfers the responsibility of certain security controls to the cloud provider, and impacts the ability for system owner oversight of security. Government agencies are required by law to conform to the Federal Information Security Management Act of 2002 (FISMA) that outlines a collection of security controls that must be implemented. Cloud…

    Public cloud computing solutions are desirable for business and government agencies to outsource infrastructure technology requirements. This decision transfers the responsibility of certain security controls to the cloud provider, and impacts the ability for system owner oversight of security. Government agencies are required by law to conform to the Federal Information Security Management Act of 2002 (FISMA) that outlines a collection of security controls that must be implemented. Cloud service providers therefore have to implement these controls, at a minimum, to be valid for government usage. Given the known library of controls that must be implemented by the Cloud service provider, this paper identifies 9% of FISMA-based NIST 800-53 security controls can be validated externally by an end-user of a cloud service provider with confidence.

    Keywords: FISMA; cloud-computing; FedRAMP; security assessment; black-box; NIST

    Proceedings: https://sites.google.com/a/uah.edu/insurecon16/proceedings

    Other authors
    See publication

Courses

  • Advanced Malware Analysis

    CSC-846

  • Advanced Reverse Engineering

    CSC-844

  • Advanced Software Exploitation

    CSC-848

  • Collaborative Cyber Security Research - Public Cloud Security

    CSC-791

  • Cybersecurity Research

    CSC-807

  • Design Research Methods

    INFS-805

  • Full Scope Security Testing

    CSC-840

  • Introduction to Cyber Security Research

    CSC-803

  • Security Tool Development

    CSC-842

Recommendations received

More activity by 👉🏼 Gerald

View 👉🏼 Gerald’s full profile

  • See who you know in common
  • Get introduced
  • Contact 👉🏼 Gerald directly
Join to view full profile

Other similar profiles

Explore collaborative articles

We’re unlocking community knowledge in a new way. Experts add insights directly into each article, started with the help of AI.

Explore More

Add new skills with these courses