​Cyber Security Due Diligence

Cyber security due diligence is no longer an option in today’s world. ​​​​Let our professional cyber consulting team help!

​​Better Information​... Better Decisions.

​Our team will conduct a thorough due diligence risk assessment that measures ​​cyber security maturity. We then zero in on ​the most serious cyber security risks and deliver discrete recommendations ​on how to best reduce the risks and take control​.


​We ​Do ​An Assessment

Our ​consulting team will review all current security policies, procedures, and plans. We dig deep into the global network foot​print.


​We ​Deliver Results​

We deliver an executive summary ​along with two reports that ​detail ​our findings and ​quantify security risk into actual dollar​s.


​​Decisions Are Made

​​With dollar quantifiable information ​in front of you, important decisions ​can be made to reduce the security risks that threaten your bottom line​​.

​Now for the technical stuff we do...

  • ​Active and Passive Device Discovery
  • ​Remote Network Scans
  • ​Automated Software Inventory
  • ​Automated Account Inventory
  • ​Automated Vulnerability Scan
  • ​Privilege Review
  • ​Domain Configuration Analysis
  • ​Network Infrastructure Analysis
  • ​Network Security Traffic Analysis
  • Social Engineering
  • ​Phishing (Email)
  • ​Study Previous Assessments
  • Incident Response Plans
  • Disaster Recovery Plans
  • Business Continuity Plans
  • Log Analysis
  • OWASP Top 10*
  • Training Records
  • ​​Configurations
  • Network and System Diagrams
  • Study Previous Audits
  • System Inventories
  • Instructions & Procedures
  • ​Global Network Foot

Our team of cyber security consultants dig deep and find the information you need to make good decisions.

​Company Leadership

​Our Leaders Have Decades of Experience

John Gerdes

John Gerdes

Chief Operating Officer

John Gerdes (CISSP, Associate HCISPP, GCED) has years of experience solving organization-level problems in cyber security risk management and regulatory compliance. John leads Secure Merger’s cyber risk assessments and compliance audits, breaking down organizations’ cyber risk.

Leighton Johnson

Leighton Johnson

Chief ​Security Officer

Leighton Johnson (CISSP, CISA, CISM, CIFI, CAS-CTR, CRISC, C|CISO, FITSP, ISSEP, ISSMP, CIOTP) has over 35 years experience in computer security, cyber security and software development. Specialties include: digital forensics, risk assessments, incident response team management and secure code reviews. Leighton leads the Secure Merger M&A team.

​We ​have the latest industry certifications.

  • ​​(​ISC)2 Certified Information Systems Security Professional (CISSP)
  • ​​(ISC)2 Certified Information Systems Security Management Professional (CISSP-ISSMP)
  • ​​(ISC)2 Certified Information Systems Security Engineering Professional (CISSP-ISSEP)
  • ​​​​(ISC)2 Healthcare Certified Information Security and Privacy Practitioner (HCISPP)
  • ​​ISACA Certified Information Systems Auditor (CISA)
  • ​​ISACA Certified Information Security Manager (CISM)
  • ​​ISACA Certified in Risk and Information Systems Control (CRISC)
  • ​​ISACA Cyber Security Fundamentals Certificate (CSX-F)
  • ​​ATAB Certified Anti-Terrorism Specialist-Cyber Terrorism Responder (CAS-CTR)
  • ​​GIAC Certified Incident Handler (GCIH)
  • ​​GIAC Certified Enterprise Defender (GCED)
  • ​​GIAC Security Essentials (GSEC)
  • ​​IISFA Certified Information Forensics Investigator (CIFI)
  • ​​​EC-Council Certified Chief Information Security Officer (C|CISO)
  • ​​EC-Council Certified Ethical Hacker (C|EH)
  • ​​EC-Council Computer Hacking Forensic Investigator (C|HFI)
  • ​​EC-Council Emergency Disaster Recovery Professional (E|DRP)
  • ​​Cisco Certified Network Associate Route & Switch (CCNA R&S)
  • ​​CompTIA Security+ CE
  • ​​CompTIA Network+ CE
  • ​​CompTIA A+ CE

Phone Call

​Contact Us To Get Started: