Christopher Hodson

Christopher Hodson

Greater Reading Area
13K followers 500+ connections

About

I help cybersecurity startups build and sell products that customers want to buy and…

Articles by Christopher

See all articles

Activity

Join now to see all activity

Experience

  • Stealth Startup Graphic

    Stealth Startup

    Greater London, England, United Kingdom

  • -

    London, United Kingdom

  • -

    London Area, United Kingdom

  • -

    United States

  • -

    London, England, United Kingdom

  • -

Licenses & Certifications

Join now to see all certifications

Publications

  • Challenges for EMEA CISOs

    Professional Security Magazine

    Each year brings a new set of challenges for CISOs. Whether they’re in retail, manufacturing, financial services or public sector, a lot of CISOs are facing the same challenges. GDPR fuels several of them, as does the continuing shift to the cloud and the march towards encryption. Here from from Chris Hodson, EMEA CISO at Zscaler, a cloud security product company, are six key challenges that should be on everyone’s radar throughout the year.

    See publication
  • Engaging with the C Suite on Cyber Risk Management

    IDG: CSO Magazine

    In the first and second parts of our series on engaging with boards on cyber risk management, we explained what today’s boards needed to know about security. In this article, we’ll deep dive into some of the metrics associated with our four-step methodology for qualifying threats and prioritizing risk (see details in part 2). The ultimate goal of metrics and controls – and of the entire security organization – is to lower risk to a palatable level for the business.

    See publication
  • Penetration Testing in the Cloud

    SC Magazine

    Chris Hodson analyses the security testing landscape today and why it remains crucial to businesses across the globe.

    See publication
  • A CISO Perspective: Penetration Testing 2.0

    Penetration Testing Magazine

    Feature article for Pen Test Magazine: My views on the role of penetration testing in our cloud first, agile world. Article available upon request

    See publication
  • The EMEA InfoSec Landscape

    SC Magazine

    Chris Hodson outlines his CISO perspective and the challenges he currently faces.

    See publication
  • The EMEA Infosec Landscape: A CISO Perspective

    SC Magazine

    Chris Hodson outlines his CISO perspective and the challenges he currently faces.

    We all know that the role of the CISO is changing; we're expected to have the professional toolkit of an astute business leader, technical guru and possess a PhD in PowerPoint. That's all adding to the less well-documented challenges we face daily, irrespective of industry.

    See publication
  • Yahoo faces questions after hack of half a billion accounts

    The Guardian

    Chris Hodson commentary on The Guardian Data Breach Yahoo article

    See publication
  • Alleged Hacker Lauri Love can be Extradited to US, Court Rules

    Information Security Magazine

    Interview with InfoSec magazine regarding Lauri Love's extradition.

    See publication
  • Gugi Banking Trojan Outwits Security Features of Android 6

    SC Magazine

    Malware bypasses security measures to steal user credentials and sniff out banking details of naive users that grant permission without realising what they've done

    See publication
  • Rio 2016: Cyber and Information Security Considerations - a CISO View

    TechWeek Europe

    Brits are expected to watch up an average of 6 hours on corporate networks during Rio 2016. Should IT departments ban live streaming at Rio 2016?

    The Olympic Games might only take place every four years but it can be a headache for IT departments. Just like Euro 2016 earlier this summer, many employees will want to watch events while at work and on the corporate network.

    See publication
Join now to see all publications

Honors & Awards

  • CSO 50 Award Winner: Tanium Security Team

    CSO Magazine: CSO Top 50

    https://www.csoonline.com/uk/cso/detail/105/145244/1

    Burnout is a costly, systemic problem in the field of cybersecurity. To counter this, the Tanium team set out to improve quality and effectiveness by leveraging the Agile philosophy and development practices that made its software engineering teams successful, specifically the Kanban Method, which increased productivity by reducing the efficiency losses resulting from frequent context switching. In planning its work more strategically…

    https://www.csoonline.com/uk/cso/detail/105/145244/1

    Burnout is a costly, systemic problem in the field of cybersecurity. To counter this, the Tanium team set out to improve quality and effectiveness by leveraging the Agile philosophy and development practices that made its software engineering teams successful, specifically the Kanban Method, which increased productivity by reducing the efficiency losses resulting from frequent context switching. In planning its work more strategically and proactively, the cybersecurity team can achieve more without devoting more hours or sacrificing quality.

  • FCIIS

    Chartered Institute of Information Security Professionals

    Fellow is the highest level of attainment in the Chartered Institute of Information Security’s (CIISec) membership levels and is there to:

    Recognise industry leaders in the information/cyber security profession.

    Meet the aspirations for recognition of achievement and contribution to the profession, within the current membership body.

    Attract those in the profession with higher levels of skills, experience, respect and attainment.

  • Global Cybersecurity Leader

    Cybersecurity Observatory

    The Observatory represents our research of the cybersecurity market providing a high level analysis of the state-of-the-art of cybersecurity innovation, showcasing innovative companies and products, interviewing prominent industry leaders and sharing relevant up-to-date cybersecurity insight.

  • Amazon Number 1 Best Seller: Computer and Security

    Amazon

    Amazon Number 1 Best-Seller: Computer and Security - Amazon
    Jun 2019

    Author of Amazon Best Seller 'Cyber Risk Management'.

    Most organizations are undergoing a digital transformation of some sort and are looking to embrace innovative technology, but new ways of doing business inevitably lead to new threats which can cause irreparable financial, operational and reputational damage. In an increasingly punitive regulatory climate, organizations are also under pressure to be more…

    Amazon Number 1 Best-Seller: Computer and Security - Amazon
    Jun 2019

    Author of Amazon Best Seller 'Cyber Risk Management'.

    Most organizations are undergoing a digital transformation of some sort and are looking to embrace innovative technology, but new ways of doing business inevitably lead to new threats which can cause irreparable financial, operational and reputational damage. In an increasingly punitive regulatory climate, organizations are also under pressure to be more accountable and compliant. Cyber Risk Management clearly explains the importance of implementing a cybersecurity strategy and provides practical guidance for those responsible for managing threat events, vulnerabilities and controls, including malware, data leakage, insider threat and Denial-of-Service.

  • MSc Distinction and Thesis Award Winner

    Computer Weekly

    Cloud computing is a growing trend in all industry verticals. Multi-tenant solutions often provide
    cost savings whilst supporting digital transformation initiatives; but what about the security considerations? Are cloud architectures inherently less secure than systems we build within our
    own datacenters? Does cloud introduce a new set of threats and vulnerabilities? In his thesis,
    Chris Hodson looks into the constituent components of public cloud ecosystems and assesses
    the service…

    Cloud computing is a growing trend in all industry verticals. Multi-tenant solutions often provide
    cost savings whilst supporting digital transformation initiatives; but what about the security considerations? Are cloud architectures inherently less secure than systems we build within our
    own datacenters? Does cloud introduce a new set of threats and vulnerabilities? In his thesis,
    Chris Hodson looks into the constituent components of public cloud ecosystems and assesses
    the service models, deployment options, threats and good practice considerations.

Organizations

  • CompTIA Cyber Security Committee

    Committee Member

    - Present
  • Institute of Information Security Professionals

    Director

    - Present

Recommendations received

16 people have recommended Christopher

Join now to view

More activity by Christopher

View Christopher’s full profile

  • See who you know in common
  • Get introduced
  • Contact Christopher directly
Join to view full profile

Other similar profiles

Explore collaborative articles

We’re unlocking community knowledge in a new way. Experts add insights directly into each article, started with the help of AI.

Explore More

Others named Christopher Hodson in United Kingdom

Add new skills with these courses