👉🏼 Gerald Auger, Ph.D.
Charleston County, South Carolina, United States
67K followers
500+ connections
About
Articles by 👉🏼 Gerald
-
Cyber Cons Solid Step to Breaking into Industry (and these are free!)
Cyber Cons Solid Step to Breaking into Industry (and these are free!)
By 👉🏼 Gerald Auger, Ph.D.
-
'Simply Cyber' YouTube Channel Launch
'Simply Cyber' YouTube Channel Launch
By 👉🏼 Gerald Auger, Ph.D.
Contributions
-
What are the most important factors in developing a cyber operations program for a government agency?
Government has material cyber control requirements being pushed down, but if the leadership and governance of those requirements are not well established there will be checkbox compliance and absence of true cyber risk reduction. So it’s imperative to a successful cyber risk reducing program to not only implement the controls required but also educate and inform leadership of the threats and risks posed to the agency to “win” over and increase the likelihood of a governance structure that truly appreciates the risks at hand and can ensure the tech stacks, work force, and budget allocation are aligned with securing the mission. (Least based on my experience in federal space) 💙
Activity
-
Yesterday I went to the Texas Workforce Commission. They attempt to help veterans and other with jobs and careers. They couldn't help me with what I…
Yesterday I went to the Texas Workforce Commission. They attempt to help veterans and other with jobs and careers. They couldn't help me with what I…
Liked by 👉🏼 Gerald Auger, Ph.D.
-
You're going to Love this 💙 LEVEL UPGRADE FOR Simply Cyber and #teamSC 💪 Consume 3 actionable cyber tips every Monday morning with the Simply…
You're going to Love this 💙 LEVEL UPGRADE FOR Simply Cyber and #teamSC 💪 Consume 3 actionable cyber tips every Monday morning with the Simply…
Shared by 👉🏼 Gerald Auger, Ph.D.
-
Where is the best place to be every weekday morning? The Daily Cyber Threat Brief from Gerald Auger, Ph.D. and Simply Cyber started at 8 AM EDT but…
Where is the best place to be every weekday morning? The Daily Cyber Threat Brief from Gerald Auger, Ph.D. and Simply Cyber started at 8 AM EDT but…
Shared by 👉🏼 Gerald Auger, Ph.D.
Experience & Education
Licenses & Certifications
Publications
-
Cybersecurity Career Master Plan
Packt Publishing
Cybersecurity is an emerging career trend and will continue to become increasingly important. Despite the lucrative pay and significant career growth opportunities, many people are unsure of how to get started.
This book is designed by leading industry experts to help you enter the world of cybersecurity with confidence, covering everything from gaining the right certification to tips and tools for finding your first job. The book starts by helping you gain a foundational understanding…Cybersecurity is an emerging career trend and will continue to become increasingly important. Despite the lucrative pay and significant career growth opportunities, many people are unsure of how to get started.
This book is designed by leading industry experts to help you enter the world of cybersecurity with confidence, covering everything from gaining the right certification to tips and tools for finding your first job. The book starts by helping you gain a foundational understanding of cybersecurity, covering cyber law, cyber policy, and frameworks. Next, you'll focus on how to choose the career field best suited to you from options such as security operations, penetration testing, and risk analysis. The book also guides you through the different certification options as well as the pros and cons of a formal college education versus formal certificate courses. Later, you'll discover the importance of defining and understanding your brand. Finally, you'll get up to speed with different career paths and learning opportunities.
By the end of this cyber book, you will have gained the knowledge you need to clearly define your career path and develop goals relating to career progression.Other authorsSee publication -
Flashlight in a Dark Room Theory
Beadle Scholar
Gerald Auger's PhD Dissertation Research Paper:
Abstract:
Healthcare providers have a responsibility to protect patient’s privacy and a business motivation to properly secure their assets. These providers encounter barriers to achieving these objectives and limited academic research has been conducted to examine the causes and strategies to overcome them. A subset of this demographic, businesses with less than 10 providers, compose a majority 57% of provider organizations in the…Gerald Auger's PhD Dissertation Research Paper:
Abstract:
Healthcare providers have a responsibility to protect patient’s privacy and a business motivation to properly secure their assets. These providers encounter barriers to achieving these objectives and limited academic research has been conducted to examine the causes and strategies to overcome them. A subset of this demographic, businesses with less than 10 providers, compose a majority 57% of provider organizations in the United States. This grounded theory study provides exploratory findings, discovering these small healthcare provider organizations (SHPO) have limited knowledge on information technology (IT) and information security that results in assumptions and misappropriations of information security implementation, who is responsible for security, and what the scope of security is to address organizational cyber risk. A theory conveying the interrelationship among concepts, illustrating these barriers, is visually communicated. This research can be leveraged by researchers to further understand the dimensions of the identified barriers and by practitioners to develop strategies to improve organizational information security for this demographic. The study’s findings may apply to SHPOs in other states as the criteria of South Carolina based SHPOs did not seem to influence the findings.
Intensive interviewing was conducted on nine SHPOs in the state of South Carolina to elicit their thoughts and perspectives on information security at their business, how decisions are made regarding information security, how threats and risks to their business are perceived, and to understand financial activities associated with providing information security at their organization.
<Follow link for continuation> -
The Cybersecurity Risks, Challenges and Opportunities for Small Businesses
Better Business Bureau
Cybercrime continues to grow rapidly around the world, with annual costs to the global economy estimated to reach over US$2 trillion by 2019. Small businesses are becoming more and more aware of cyberthreats, continue to be concerned about cyber risks, and are taking some proactive security steps. Yet, there is still much that can be done to educate, support, and empower smaller businesses to be cyber secure, to dispel misconceptions, and to help make cybersecurity a priority for smaller…
Cybercrime continues to grow rapidly around the world, with annual costs to the global economy estimated to reach over US$2 trillion by 2019. Small businesses are becoming more and more aware of cyberthreats, continue to be concerned about cyber risks, and are taking some proactive security steps. Yet, there is still much that can be done to educate, support, and empower smaller businesses to be cyber secure, to dispel misconceptions, and to help make cybersecurity a priority for smaller organizations. This report provides insights to help increase awareness and advance cybersecurity efforts among smaller businesses. (https://www.bbb.org/stateofcybersecurity/ 11/2017)
Other authorsSee publication -
Ignorance is Not a Defense: Using Cloud Software Securely
SC Lawyer
White paper targeting South Carolina lawyer population for proper usage and considerations of cloud software platforms to support their practices.
Other authorsSee publication -
Black Box FISMA-based Security Control Assessment of Public Cloud Providers
2016 Information Security Research and Education (INSuRE) Conference (INSuRECon-16)
Public cloud computing solutions are desirable for business and government agencies to outsource infrastructure technology requirements. This decision transfers the responsibility of certain security controls to the cloud provider, and impacts the ability for system owner oversight of security. Government agencies are required by law to conform to the Federal Information Security Management Act of 2002 (FISMA) that outlines a collection of security controls that must be implemented. Cloud…
Public cloud computing solutions are desirable for business and government agencies to outsource infrastructure technology requirements. This decision transfers the responsibility of certain security controls to the cloud provider, and impacts the ability for system owner oversight of security. Government agencies are required by law to conform to the Federal Information Security Management Act of 2002 (FISMA) that outlines a collection of security controls that must be implemented. Cloud service providers therefore have to implement these controls, at a minimum, to be valid for government usage. Given the known library of controls that must be implemented by the Cloud service provider, this paper identifies 9% of FISMA-based NIST 800-53 security controls can be validated externally by an end-user of a cloud service provider with confidence.
Keywords: FISMA; cloud-computing; FedRAMP; security assessment; black-box; NIST
Proceedings: https://sites.google.com/a/uah.edu/insurecon16/proceedingsOther authorsSee publication
Courses
-
Advanced Malware Analysis
CSC-846
-
Advanced Reverse Engineering
CSC-844
-
Advanced Software Exploitation
CSC-848
-
Collaborative Cyber Security Research - Public Cloud Security
CSC-791
-
Cybersecurity Research
CSC-807
-
Design Research Methods
INFS-805
-
Full Scope Security Testing
CSC-840
-
Introduction to Cyber Security Research
CSC-803
-
Security Tool Development
CSC-842
Recommendations received
7 people have recommended 👉🏼 Gerald
Join now to viewMore activity by 👉🏼 Gerald
-
Today is the DAY! Join us for a cosmic rendezvous on Simply Cyber Firesides! 🌌 Hosted by Gerald Auger, Ph.D. and featuring return guest, Henry…
Today is the DAY! Join us for a cosmic rendezvous on Simply Cyber Firesides! 🌌 Hosted by Gerald Auger, Ph.D. and featuring return guest, Henry…
Shared by 👉🏼 Gerald Auger, Ph.D.
-
Be one of the 50! 🙌 Join us for our in-person training in Deadwood. And if you can't join us there... join us online! Virtual training is still…
Be one of the 50! 🙌 Join us for our in-person training in Deadwood. And if you can't join us there... join us online! Virtual training is still…
Liked by 👉🏼 Gerald Auger, Ph.D.
-
Meet Larry 👇 His story will inspire you and crystallizes the reality (and struggle) of breaking into cyber and an effective approach to it. Bonus i…
Meet Larry 👇 His story will inspire you and crystallizes the reality (and struggle) of breaking into cyber and an effective approach to it. Bonus i…
Shared by 👉🏼 Gerald Auger, Ph.D.
Other similar profiles
Explore collaborative articles
We’re unlocking community knowledge in a new way. Experts add insights directly into each article, started with the help of AI.
Explore More