Skip to content
  • 2023 Program
    • Registration
    • Call For Papers
    • Keynote Speakers
    • Briefings
    • Workshops
    • Contests
  • Events
    • EVENTS
    • Social Speak Easy
    • VIP & Speaker Social (Exclusive)
    • Contests
    • Villages
    • Workshop Registration
    • Code of Conduct
  • Sponsors
    • Business Hall
    • Become a Sponsor
    • Code of Conduct
    • 2022 Sponsors
    • 2021 Sponsors
  • About
    • 2021 Speakers
    • 2022 Speakers
    • Volunteer
    • CPE Credit
    • Mission
    • Covid Status
    • Privacy Policy
  • Virtual Summit 2023
    • Virtual Briefings
    • Virtual Workshop
    • Hands on vLabs
    • Virtual Demo Labs
    • Virtual Keynotes
    • Career Fair
Menu
  • 2023 Program
    • Registration
    • Call For Papers
    • Keynote Speakers
    • Briefings
    • Workshops
    • Contests
  • Events
    • EVENTS
    • Social Speak Easy
    • VIP & Speaker Social (Exclusive)
    • Contests
    • Villages
    • Workshop Registration
    • Code of Conduct
  • Sponsors
    • Business Hall
    • Become a Sponsor
    • Code of Conduct
    • 2022 Sponsors
    • 2021 Sponsors
  • About
    • 2021 Speakers
    • 2022 Speakers
    • Volunteer
    • CPE Credit
    • Mission
    • Covid Status
    • Privacy Policy
  • Virtual Summit 2023
    • Virtual Briefings
    • Virtual Workshop
    • Hands on vLabs
    • Virtual Demo Labs
    • Virtual Keynotes
    • Career Fair
  • On Twitter
  • On Linkedin

Gerard Johansen

Manager, Incident Handling RedCanary
  • Agent Nic: @IrProactive
  • What City where you born?:
  • What is the name of your favorite pet?:
  • What is your mothers maiden name?:
  • What was the make of your first Car?:
  • What is your favorite color?:
  • What high school did you attend?:
  • Where did you meet your spouse?:
  • What was your high school mascot?:
Gerard Johansen is an cyber security professional with over decade of experience in security operations, incident response and threat intelligence. He is currently an Incident Handling Manager at a Managed Detection and Response provider working directly with customers and incident handlers in identifying and responding to cyber incidents Prior to moving into the private sector, Gerard spent ten years in law enforcement at both the state and federal level with considerable time investigating cyber crime. Over the course of his career, Gerard has obtained a number of industry certifications including the CISSP and several SANS digital forensics certifications. Gerard has also obtained a masters degree in Information Assurance from Norwich University along with a masters certificate in Monitoring, Surveillance and Intelligence Operations from Utica University. Gerard has been privileged to speak at a number of conferences including SANS DFIR and CTI as well as Techno Security and HTCIA. Furthermore, he has had the opportunity to publish articles in eForensics magazine as well as writing several books, most notably the third edition of Digital Forensics and Incident Response through Packt publishing.

Obtained the Certified Information System Security Professional Certification
– Completed a Masters of Science in Information Assurance from a National Security Agency Center of Academic Excellence in Information Assurance Education
– Served as Special Deputy United States Marshal for the Federal Bureau of Investigations Connecticut Computer Crimes Task Force
– Assigned as a Certification and Accreditation Analyst for a federal government inter-agency unit
– Conducted technical and non-technical vulnerability assessments for financial and government organizations
– Extensive training and experience in Digital Forensics and Computer Security Incident Response
– Developed and maintained industry and personnel relationships gained through continual development related to security spanning business functions
– Frequently requested to conduct Information Security related seminars and workplace programs to educate and train a wide variety of personnel

Specialties:
• Risk Assessment / Mitigation
• Cyber Threat Intelligence
• Computer Security Incident Response
• Vulnerability Assessment and Penetration Testing
• Digital Forensics / e-Discovery
• Decision Support Alternative Analysis
• Threat emulation and Redteaming
• Corporate Counter Intelligence / Counter Espionage
• Threat Source Intelligence
• Cloud Security Challenges
• Insider Threat Assessment / Mitigation
• Executive Protection

Schedules:

Privacy  |  Disclaimer

© 2022 TexasCyber, All Rights Reserved.