Geoff Wilson

Geoff Wilson is an innovative cybersecurity thought leader with deep experience in defensive cybersecurity strategies. Having studied at Carnegie Mellon University and trained at the National Security Agency, Geoff brings 19 years of cybersecurity experience to your organization.
In his many cybersecurity roles, Geoff has been an IT Auditor, Penetration Tester, Risk Assessor, Forensic Analyst, SOC Engineer, Information Security Officer, Software Developer, Author, University Professor, and Consultant.
Geoff is a business leader having founded Go Security Pro in early 2019 with his co-founder Susan Wilson. Geoff regularly speaks at conferences, presents to executive leadership and boards, and can get in the technical weeds with IT professionals.
Geoff treats every engagement as a knowledge transfer opportunity and every client with the utmost care. He is ready to assist you with your cybersecurity challenges.
Big Challenges We Solve Include:
2. How can I quickly become compliant?
If any of these challenges resonate with you, I would like to walk you through how I have solved these challenges across industries and with companies of all sizes. Contact Geoff today.
Susan Wilson

Hi, I'm Susan Wilson, Co-founder and President of Go Security Pro LLC.
I have a Juris Doctorate from The George Washington University Law School and have passed the bar exam in Oklahoma and Maryland. Being a lawyer and a cybersecurity executive strengthens our business relationships, informs every customer engagement, and ensures we deliver a superior product.
I graduated from the University of Oklahoma in 2003 with a Bachelor’s with special distinction and Phi Beta Kappa in Geography.
Executives, IT teams, and security leaders often struggle to keep up with the changing threat landscape and how it applies to their business.
At Go Security Pro we study cybersecurity data breaches to understand how companies like yours are getting hacked.
We get to know your technology stack and unique business needs to help you identify your most likely data breach vectors.
Then we collaboratively build a plan that is right sized for your business risk appetite and resources.
I look forward to working with you and your team.