Virtual CISO Services

​Chief Information Security Officer - We work virtually/remotely with your ​company to develop and implement a cyber security strategy for your business.

​Designing & Implementing Your Cyber Security Program


​Our team will review your current security policies and processes for effectiveness and efficiency. We will then custom-design processes to fit your organization and achieve your security goals. Your business will grow more secure as we help you best use your people and resources.

lightbulb-o

​We ​Do Our Review

Our professional team will review all of your current security policies, procedures, and plans.

keyboard-o

​We Custom-design Processes​

We will then design and implement custom plans and policies to help achieve your security goals.

bolt

​Your Business Is More Secure

​Implementing the changes reduces the security risks that threaten your bottom line​.

What does the Virtual CISO Service included?


  • ​Review Policies and Procedures
  • Review Previous Audits
  • Review Previous Assessments
  • ​​Review Network Diagrams
  • Review System Inventories
  • Review Configurations
  • Review Log Analysis
  • Review Incident Response Plans
  • Review Business Continuity Plans
  • Review Disaster Recovery Plans
  • Review Training Records
  • Develop Security Program
  • ​Develop Configuration Management
  • ​Develop Policy and Procedures
  • ​Develop Vendor Management
  • Develop Log Analysis Solutions
  • Develop Incident Response Plans
  • Develop Business Continuity Plans
  • ​Develop Configuration ​Plans
  • Develop Training
  • HIPAA Compliance Advisement
  • PCI Compliance Advisement
  • Develop Disaster Recovery Plans
  • Develop Vulnerability Management Plan
  • Present "State of Security" to the Executive Team​
  • ​Dedicated Account Manager

​Our team of security experts will build a relationship with you and help you develop your company’s security with confidence.

​MEET THE TEAM


​Our Team Leaders Have Decades of Experience

Robert Busby

Robert Busby

Chief Technology Officer

​Robert Busby ​(CISSP, GCIH, ​CEH, CHFI) has over 20 years experience in computers, digital forensics and Cyber Incident Response. Robert leads ​​the Secure Merger team of ​incident response handlers as they ​respond to cyber incidents to retain ​critical information and rapidly restore normal operations on the clients network.


John Gerdes

John Gerdes

Chief Operating Officer

John Gerdes (CISSP, Associate HCISPP, GCED) has years of experience solving organization-level problems in cyber security risk management and regulatory compliance. John leads Secure Merger’s cyber risk assessments and compliance audits, breaking down organizations’ cyber risk.


Leighton Johnson

Leighton Johnson

Chief ​Security Officer

Leighton Johnson (CISSP, CISA, CISM, CIFI, CAS-CTR, CRISC, C|CISO, FITSP, ISSEP, ISSMP, CIOTP) has over 35 years experience in computer security, cyber security and software development. Specialties include: digital forensics, risk assessments, incident response team management and secure code reviews. Leighton leads the Secure Merger M&A team.

  • ​​(​ISC)2 Certified Information Systems Security Professional (CISSP)
  • ​​(ISC)2 Certified Information Systems Security Management Professional (CISSP-ISSMP)
  • ​​(ISC)2 Certified Information Systems Security Engineering Professional (CISSP-ISSEP)
  • ​​​​(ISC)2 Healthcare Certified Information Security and Privacy Practitioner (HCISPP)
  • ​​ISACA Certified Information Systems Auditor (CISA)
  • ​​ISACA Certified Information Security Manager (CISM)
  • ​​ISACA Certified in Risk and Information Systems Control (CRISC)
  • ​​ISACA Cyber Security Fundamentals Certificate (CSX-F)
  • ​​ATAB Certified Anti-Terrorism Specialist-Cyber Terrorism Responder (CAS-CTR)
  • ​​GIAC Certified Incident Handler (GCIH)
  • ​​GIAC Certified Enterprise Defender (GCED)
  • ​​GIAC Security Essentials (GSEC)
  • ​​IISFA Certified Information Forensics Investigator (CIFI)
  • ​​​EC-Council Certified Chief Information Security Officer (C|CISO)
  • ​​EC-Council Certified Ethical Hacker (C|EH)
  • ​​EC-Council Computer Hacking Forensic Investigator (C|HFI)
  • ​​EC-Council Emergency Disaster Recovery Professional (E|DRP)
  • ​​Cisco Certified Network Associate Route & Switch (CCNA R&S)
  • ​​CompTIA Security+ CE
  • ​​CompTIA Network+ CE
  • ​​CompTIA A+ CE

Phone Call

​Contact Us To Get Started:


  • This field is for validation purposes and should be left unchanged.