With more than 20 years of hands-on technical and executive leadership experience in IT security architecture & technology, Security Operations Centres, Managed Security Services (MSSP), and Industrial Control security, Gert is convinced that you can make your cybersecurity work for you as a gain instead of a pain.
He has always advocated for IT security solutions that are business-aligned, focused, and cost-effective. Hence, he founded together with Tom Van den Eynde Cybervalue. We are passionate about security solutions that provide value to an organization’s performance, reliability, agility, and its reputation.
Before his current role, Gert was CTO at a dedicated security ‘scale-up’ in London focused on providing Managed Detection and Response services. Before that, Gert acted as Verizon’s Subject Matter Expert in security analytics, SOC, and SCADA/ICS protection and led a global team of Practice Leaders focused on designing and delivering threat management solutions.
What does Gert do?
At Cybervalue, Gert advises customers on their cyber security strategy by looking at what security controls and risks they have today and help create a security roadmap in line with their security requirements and desired risk posture. He also helps customers with the acquisition and implementation of these security solutions and services. Besides that, Gert and Tom help customers prepare for and respond to cyber incidents, help improve security in industrial control environments and serve as CISO-ad-interim.
Next to helping end-customers, we advice service providers on improving their security offering and provide due-diligence to venture capital firms that are looking to invest in service providers.
Gert at the Data Protection Institute
Gert has a deep technical and strategical understanding in cybersecurity topics which means he can bring real hands-on experience in the courses he deliver for DPI along with his colleague Tom Van den Eynde.
Quote
“He who defends everything, defends nothing” is a quote by Frederik The Great. For us it means no IT Security team can monitor every application, network, system and information asset that a company has, no incident response team can follow up on every alert and security event, and no manager has the budget for every new security technology that is announced. At Cybervalue we focus on those risks that are critical for your organisation by applying the following methodology.
“Knowing what you have before you can protect it” is the foundation of our successful approach, combined with a risk-based prioritisation of your information assets. Based upon this, controls need to be implemented or existing ones optimised that consider the asset’s importance and risks, resulting in the right protection level.
Gert as a teacher
Besides the theoretical frameworks, it’s important that students get guidance on how to use these frameworks in a practical manner so that they are effectively improving cybersecurity in their organizations.
Stay informed via our newsletter
Stay connected with our latest news, offers and available training.