Our team will review your current security policies and processes for effectiveness and efficiency. We will then custom-design processes to fit your organization and achieve your security goals. Your business will grow more secure as we help you best use your people and resources.
We Do Our Review
Our professional team will review all of your current security policies, procedures, and plans.
We Custom-design Processes
We will then design and implement custom plans and policies to help achieve your security goals.
Your Business Is More Secure
Implementing the changes reduces the security risks that threaten your bottom line.
Our Team Leaders Have Decades of Experience
Chief Technology Officer
Robert Busby (CISSP, GCIH, CEH, CHFI) has over 20 years experience in computers, digital forensics and Cyber Incident Response. Robert leads the Secure Merger team of incident response handlers as they respond to cyber incidents to retain critical information and rapidly restore normal operations on the clients network.
Chief Operating Officer
John Gerdes (CISSP, Associate HCISPP, GCED) has years of experience solving organization-level problems in cyber security risk management and regulatory compliance. John leads Secure Merger’s cyber risk assessments and compliance audits, breaking down organizations’ cyber risk.
Chief Security Officer
Leighton Johnson (CISSP, CISA, CISM, CIFI, CAS-CTR, CRISC, C|CISO, FITSP, ISSEP, ISSMP, CIOTP) has over 35 years experience in computer security, cyber security and software development. Specialties include: digital forensics, risk assessments, incident response team management and secure code reviews. Leighton leads the Secure Merger M&A team.