Christopher Hodson work email
- Valid
Christopher Hodson personal email
- Valid
Christopher Hodson phone numbers
I help cybersecurity startups build and sell products that customers want to buy and investors want to fund.10 YEARS IN VENDOR WORLD⌛️ Over the past decade, I’ve helped startups raise over $400M in venture capital with several achieving multi-billion dollar valuations. As a four-time CISO and product specialist, it is awesome to have contributed to creating some of the industry’s most impactful cybersecurity solutions - building, securing, and scaling products that resonate with customers and investors alike.BEFORE STARTUP LIFE 🏦 Before jumping into the startup world, I spent 12 years in senior security roles covering strategy, architecture, engineering, and GRC across financial services and retail. I was the one in the trenches - evaluating, buying, and implementing the very solutions vendors were pitching.Not many security and product leaders can say they’ve been on the other side of the table for over a decade, giving me a unique perspective. I know firsthand which problems need solving, why they matter, and how to tackle them in a no-nonsense way that works.WHY CONNECT: HOW I HELP CYBERSECURITY STARTUPS AND LEADERS ACHIEVE THEIR GOALS 🚀After a decade in Silicon Valley, I now focus on helping Go-to-Market (GTM) and R&D teams build and sell cybersecurity products that reduce pain for security functions.If you’re in any of the categories below, let's connect:- Investors: If you need help with due diligence on cybersecurity investments or support for your portfolio’s GTM or R&D efforts, I can help you cut through the noise and distinguish a polished pitch from a truly viable business.- GTM Leaders: Are you struggling to accelerate sales and build lasting relationships with security buyers? I’ll help you fine-tune your ICP and craft sales strategies that resonate with security decision-makers.- Founders & PMs: Whether it’s getting product-market fit, sharpening your product strategy, or planning your roadmap, I’ve been in your shoes and can provide actionable advice that helps you build solutions to alleviate customer pain.- Marketers: Want to boost your startup’s industry presence in cybersecurity without falling prey to snake oil or vaporware? I can help you build credibility and stand out for the right reasons.- CEOs and Boards: Unsure about hiring your first dedicated security leader? I’ll help you develop a strategy that dramatically increases your chances of bringing in the right talent and building a security program that fits your risk profile.
-
FounderStealth StartupReading, Pa, Us -
FounderStealth Startup Aug 2024 - PresentMountain View, Wy, Us -
Author: 'Cyber Risk Management: Prioritise Threats, Identify Vulnerabilities, Apply Controls'Kogan Page Jan 2019 - PresentLondon, GbAuthor of Amazon Best Seller 'Cyber Risk Management'.Most organizations are undergoing a digital transformation of some sort and are looking to embrace innovative technology, but new ways of doing business inevitably lead to new threats which can cause irreparable financial, operational and reputational damage. In an increasingly punitive regulatory climate, organizations are also under pressure to be more accountable and compliant. Cyber Risk Management clearly explains the importance of implementing a cybersecurity strategy and provides practical guidance for those responsible for managing threat events, vulnerabilities and controls, including malware, data leakage, insider threat and Denial-of-Service.Examples and cases 'from the field', including the Equifax and TalkTalk breaches, add context throughout and emphasize the importance of communicating security and risk effectively, while implementation review checklists bring together key points at the end of each chapter. Cyber Risk Management analyzes the innate human factors around risk and how they affect cyber awareness and employee training, along with the need to assess the risks posed by third parties. Including an introduction to threat modelling, this book presents a data-centric approach to cyber risk management based on business impact assessments, data classification, data flow modelling and assessing return on investment. It covers pressing developments in artificial intelligence, machine learning, big data and cloud mobility, and includes advice on responding to risks which are applicable for the environment and not just based on media sensationalism. -
Cyber Council: AdvisorCrane Venture Partners May 2024 - PresentLondon, GbThe Crane Cyber Advisory Council is a community for select CISOs from some of the world’s most innovative and demanding companies. We’ve carefully hand-picked the advisors through our existing relationships at Crane. Advisors are tenured CISOs at financial services, legal and technology companies who are forward thinkers. -
Design PartnerYeshid Sep 2022 - PresentDenver, Us -
Investor And Board AdvisorAppsec Phoenix Sep 2022 - PresentLondon, England, GbThe AppSec Phoenix platform enables organizations to scale application security programmes and cloud security programmes by contextualizing, selecting and risk assessing the infrastructure, cloud and application security vulnerability with the patent-pending Phoenix Framework -
Executive MemberCyberedboard Community Jun 2021 - PresentPrinceton, New Jersey, UsCyberEdBoard is designed to foster critical peer to peer connectivity for CISOs and senior security stakeholders from the largest and most recognisable organisations globally. -
Chief Product OfficerCyberhaven Oct 2023 - Aug 2024Palo Alto, California(Ca), UsChris Hodson holds the Chief Product Officer (CPO) role at Cyberhaven, directing product strategy and development. In his capacity as CPO, Chris takes the lead in shaping and enhancing Cyberhaven's product offerings to meet the needs of its customers and support the organisation's growth. His responsibilities encompass driving innovation, product vision and defining product roadmap(s). -
Chief Security OfficerCyberhaven Jan 2023 - Aug 2024Palo Alto, California(Ca), UsChris Hodson is Chief Security Officer for Cyberhaven where he oversees all facets of security to protect Cyberhaven customers and employees, including cloud and application security, security operations, and risk management. -
Executive MemberData Security Maturity Model (Dsmm) Jan 2023 - Jul 2024The Comprehensive Cyber Capabilities Working Group (C3WG) was launched to explore what cybersecurity capabilities are needed to protect the assets of an organization against today’s threats. Data is one of the most important assets and existing models and frameworks for data security are not well developed. The group will define a complete set of data security capabilities, which will be published in the industry-first Data Security Maturity Model (DSMM). The risks to enterprise data are undergoing massive changes. Enterprise data is far more decentralized, shared, and at-risk than ever before due to the megatrends of cloud adoption, hybrid work, and ransomware. Enterprises have a need and opportunity to rethink their approach to data security and transform their security operations to protect what matters most. The DSMM will be a framework for security leaders to evaluate their data security program, establish a common language with all constituents, and prioritize their roadmap to align with the unique needs of their organization. The Data Security Maturity Model (DSMM) will align to the NIST Cybersecurity Framework and the Cyber Defense Matrix. It will give security leaders a comprehensive list of capabilities needed to secure data across five key functions:Identify & Classify: Find and classify all data covered by the data security program.Protect: Minimize the exposure of sensitive data by controlling how it is accessed, used, and retained.Detect: Collect and analyze data risk to identify data-related security events or policy violations that were not stopped by the “Protect” function.Respond: Establish immediate, short-term actions to be taken upon detection of a potential incident.Recover & Improve: Determine actions needed to not only restore normal operations (as they pertain specifically to data), but also to build back stronger. -
Board AdvisorCybrary May 2019 - Jan 2024Riverdale, Maryland, UsCybrary is a cybersecurity and IT workforce development platform. Its ecosystem of people, companies, content, and technologies converge to create an ever-growing catalog of online courses and experiential tools that provide IT and cybersecurity learning opportunities to anyone, anywhere, anytime. Cybrary has received industry recognition since its 2015 founding, often being named as an innovator and pioneer in cyber and IT development. Since January 2015, Cybrary has grown its user base to over 2.6 million and has 96% of Fortune 1000 companies learning on their platform* Executive advisor: Go to market and industry trends* Course creator: 'Cybersecurity Strategy'* Working with the Cybrary team and members of the Cybrary community to continually deliver top of the line mentorship* Help students figure out career goals, which certifications to take, and more! -
InvestorLumos Dec 2022 - Dec 2023Silicon Valley, California, UsLumos is the internal AppStore for companies. Accelerate access requests, access reviews and license management through self-service. -
CisoContentful Jul 2021 - Jan 2023Berlin, DeI had the privilege of joining Contentful prior to its successful completion of a $175 million Series F funding round. I was entrusted with planning, budgeting, and architecting a cross-functional security organization that aligns seamlessly with the company's rapid growth trajectory. Additionally, I established an executive and board reporting structure that provides transparent insights into our security initiatives.The Security team at Contentful is accountable for cyber and physical security, ensuring that capabilities and competencies exist in all areas of our business. The team follows a holistic and collaborative approach to ensure the confidentiality, availability, and integrity of customer data. -
Global CisoTanium Feb 2020 - Jul 2021Kirkland, Wa, UsAs Chief Information Security Officer for Tanium, I oversee a global team whose charter includes cybersecurity architecture & engineering, product security, security operations and technology risk management. I am responsible for Tanium’s cybersecurity strategy, and execution of security initiatives across corporate and customer-facing environments.Team responsibilities:✓ Cybersecurity strategy & architecture✓ Product security✓ Incident response✓ Security operations✓ Regulatory compliance and data privacy✓ Application security✓ Cyber risk management✓ DevSecOps✓ Business continuity planning✓ Cloud security✓ Threat modelling✓ Supply chain security and vendor security assessment -
Chief Information Security Officer (Ciso) — Office Of The CisoTanium Oct 2018 - Mar 2020Kirkland, Wa, UsThe Office of the CISO (OCISO) engages with cybersecurity and IT executives, addressing risks and strategies with respect to cybersecurity, IT operations and business resilience. The Office of the CISO is staffed with cybersecurity and IT leaders from industry, bringing real-world experience to a variety of risk management and cybersecurity challenges for Tanium customers.My team will work with customers to define best practices and discuss a variety of issues specific to an organisation, using the experiences of applying robust cybersecurity across not only Tanium but decades of cumulative experience in the field.OCISO expertise areas:• Cybersecurity and IT reference architecture• Risk reduction measures• Cloud-native technologies — containers, CI/CD, automation and orchestration• Incident response and threat modelling processes• Industrialising and operationalising cybersecurity controls• Compliance, privacy and regulatory concerns• Effective metrics consultancy/C-suite reporting -
Curriculum Advisor, Speaker And WriterComptia Mar 2017 - May 2021Downers Grove, Il, UsThe CompTIA Cybersecurity Advisory Board (CCAB) addresses many of the most pressing cybersecurity concerns facing business and government. The CCAB consists of cybersecurity professionals from a variety of disciplines to ensure well-rounded discussions and outcomes. The board works to identify opportunities for CompTIA to develop cybersecurity initiatives that advance our nation’s cybersecurity readiness. In addition, the CCAB assesses current CompTIA activities relating to cybersecurity and recommends how to integrate those efforts with other thought leaders on the topic while also identifying gaps in the cybersecurity ecosystem that CompTIA might consider filling.✓ Blockchain Programme - analysis of all aspects of blockchain, smart contracts and cryptocurrency in preparation for RSA Conference 2018 presentation✓ Blog author and webinar attendee giving a ‘view from the chief information security officer’✓Advisory panel member – working with peers in the industry to ensure that CompTIA exams are relevant for the contemporary cybersecurity landscape -
Non-Executive Director (Ned)/Board MemberChartered Institute Of Information Security Feb 2017 - Jan 2021GbThe Chartered Institue of Information Security Professionals (CIISec) is an independent, non-profit body governed by its members, with the principal objective of advancing the professionalism of information security practitioners and thereby the professionalism of the industry as a whole.The Institute is Company limited by Guarantee, with a Board of Directors elected from our membership. The Board provides governance, oversight and direction for the Institute. I have served as a CIISec board member for the past three years taking responsibility for member education and career development through the CIISec Masterclass and Associate Development Programmes.✓ IISP Masterclass Curator: Strategy & Architecture | The Role of the CISO ✓ Host: IISP Live 2018✓ Strategic planning of IISP Chapter Meetings✓ Regular author: IISP Pulse Magazine✓ Congress Speaker: Challenges of the Chief Information Security Officer✓ Blockchain Workshops: Implementation, technologies and use cases -
Chief Information Security Officer (Ciso), Emea | Global Data Protection Officer (Dpo)Zscaler May 2016 - Sep 2018San Jose, California, UsI served as the Global Data Protection Officer (DPO) and CISO for Zscaler's EMEA region.The Zscaler Office of the CISO has worked with security executives in leading organisations around the world, helping to identify and address their complex security challenges. Each organisation's problems are unique, but we all face similar threats. By working together, we'll be better positioned to counter escalating threats and meet our organisations' strategic goals. As EMEA CISO, I worked closely with CISOs to reduce risk and improve the efficacy of their cybersecurity capabilities through the following activities: ✓ Cybersecurity strategy development: peer review, advice and recommendations.✓ Assisting customers with threat and information-centric approaches to risk management.✓ Data privacy and information management: consultation and policy guidance✓ A trusted advisor to customers in the definition and implementation of logical security architecture and operational cyber capability.✓ Workshop and roundtable discussion: Reporting to the C-suite - meaningful metrics and board engagement.✓ Frameworks for Incident response, cyber intelligence and security orchestration. I provide subject matter expertise and thought leadership through speaking engagements, blogging and media collaboration.✓ Writer - IDG CISO 2.0 Website: https://www.csoonline.com/blog/ciso-20/✓ Emerging technologies: specialising across Blockchain implementations and IoT✓ International keynote speaker -
Head Of Information Security And Business Continuity Architecture (Itl6)Waitrose Jan 2015 - May 2016Bracknell, Berkshire, GbThe Information Security and Business Continuity function provide the strategic leadership and planning that ensure Waitrose has a fit-for-purpose security architecture, an appropriate information risk management framework and the cyber resilience needed to deliver reliable services across an omnichannel retail ecosystem:✓ Greenfield creation of Information Security Strategy, Architecture & Design function within Waitrose✓ Production of the Waitrose Information and Cybersecurity Vision and Strategy✓ Leadership of the Waitrose IT Business Continuity function✓ Introduction of an information and cybersecurity risk management framework based on ISF IRAM2; working with senior leaders across the John Lewis Partnership to determine acceptable levels of risk for the organisation and develop a strategic roadmap for security and risk management.✓ Establishment of an information security governance framework providing divisional consensus on responsibilities relating to cybersecurity: COBIT5/ISO27001 aligned.✓ Establishment of key performance indicators and key risk indicators for division-wide C-level reporting and risk management.✓ Directing security-focused change programmes within Waitrose✓ Forecasting the required resources needed to support current and pipeline security demand from projects and programmes; and individual business lines.✓ Accountable for the identification and delivery of information security capabilities in support of the business strategy.✓ Membership of British Retail Consortium Heads of Cyber/Chief Information Security Officer Working Group. -
Cyber Security Senior Manager/Head Of Corporate It SecurityVisa Europe Apr 2012 - Jan 2015Foster City, California, UsThe Cyber Security Manager (CSM) is tasked with ensuring that Visa Europe (VE) Return on Investment (RoI) of operational security solutions is maximised. The CSM is required to ensure that Cyber Security cross-team relationships are productive and cohesive, to ensure that all Cyber service offerings are consistently presented and support business requirements, the cybersecurity vision and Visa Europe core values. The CSM must ensure that VE operational security services are aligned to required security capabilities and keep up-to-date with industry movement, vendor roadmaps, malware trends and publicised incidents and breaches:✓ Cybersecurity Leadership of the Corporate IT Business Unit✓ Measurable improvement of the business perception of cybersecurity through improved service wrappers, a customer-focused attitude, service-orientated operational framework and project engagement process✓ Introduction of a Visa Europe Cybersecurity Innovation Practice: Proactive and predictive capability analysis based on industry trends and threat landscape✓ Ownership and development of a Cybersecurity Operational Services Capability Model✓ Definition and implementation of Visa Europe Cybersecurity Capabilities Reference Architecture ✓ Creation and implementation of the strategy for IT Security Policy Standards, guidelines and associated frameworks – Liaison at the executive level to ensure the vision is understood and sponsored✓ Drive and support the implementation of procedural, operational and technical Security enhancements✓ Service owner and IT Security vendor manager for client and server endpoint security contracts✓ Security representative for Corporate IT Managed Service contract renewal — inclusion of a security services practice framework✓ Introduction and management of IT Security Task Force: A bespoke team constructed to reduce risk and remove audit points. -
Security Architect: Divestment ProgrammeLloyds Banking Group Nov 2011 - Apr 2012London, Uk, GbThe European Commission (EC) required Lloyds Banking Group to create an independent UK banking business as a consequence of receiving state aid. The goal of the Verde Programme was to establish and manage all the activities required to divest the relevant areas of the business to deliver on the group's commitments to HM Treasury and the EC. As a key contributor to the successful delivery of LBG Integration, LBG requested that I rejoin the group resourced across the programme initiation phase ensuring that business strategies for divestment considered the requirements for the protection of LBG information assets and systems.✓ Production of architectural artefacts detailing the divestment approach; ensuring that all designs considered the secure segregation of the retained/divested banking eco-system✓ Security Management Lead across key 'IT Enabler' workstreams - providing core infrastructure services, to be consumed securely across divestment: Directory Services, Messaging, Collaboration, printing.✓ Development of IT strategies for secure data migration across divestment transition phases✓ The identification of Information Security risks — ensuring these are tracked, raised to the appropriate business representatives and mitigated in a cost-effective, pragmatic fashion. -
Information Security ArchitectCentrica Aug 2011 - Oct 2011Windsor, Berkshire, GbCentrica Energy (CE) sources gas and electricity to supply residential and industrial customers in Great Britain and continental Europe. The requirement arose for a fixed-term project, an Information Security Architect to join the organisation and provide consultancy across several business-critical programmes:✓ Information Security Management across the Data Centre Migration Programme — Data Classification work-stream; providing business stakeholders with data de-sensitisation/obfuscation strategies, which facilitated that confidential data storage was kept to a minimum✓ Information Risk Management: Management of information risk across the CE division. Ensuring information and the cyber risk was understood inside and outside of IT and providing risk analysis, treatment and mitigation guidance to business stakeholders. -
It Security ArchitectTesco Apr 2011 - Oct 2011Welwyn Garden City, Hertfordshire, GbTesco PLC is the third-largest retailer in the world with a presence in 14 countries across Asia, Europe and North America. A group-wide Payments Card Data Security Programme drove-out the requirement for experienced Security Architects to join Tesco and provide IT Security services across many business-critical projects:✓ Security authority across international IT infrastructure design and restructuring projects✓ Author of logical/technical security patterns across core security domains: Infrastructure, Application, Identity & Access Management and Cryptography✓ Author of an internationally circulated 'Tesco Security Standard for PCI-DSS Compliance' document which provided a pragmatic, business-driven approach to IT security & risk reduction -
Solutions Architect: SecurityLloyds Bank Oct 2009 - May 2011London, England, GbLloyds TSB Group plc was renamed Lloyds Banking Group (LBG) following the acquisition of Halifax Bank of Scotland (HBOS) plc. A group-wide integration initiative was undertaken to synergise business services from both heritages; this drove out a requirement for experienced Solution Architects across Enterprise Architecture & Design (EAD). The Solution Architect is required to design solutions for projects, through expert knowledge translate high-level business requirements into technology architectures that align to divisional strategic architecture.✓ Security Authority assigned to ~40 integration projects providing end-to-end consultancy across Retail, Wholesale, LP&I and Wealth divisions to ensure all project designs adhered to the Lloyds IT Security Policies, Standards and Patterns; highlighting areas of non-compliance and providing compensating / mitigating controls where applicable.✓ Senior Security Architect resourced to business-critical integration projects: Successful delivery of a combined-bank messaging and directory services platform.✓ Author of logical/technical patterns published to the LBG Artefact Repository and leveraged by projects throughout the integration✓ Design approval authority of Security Low-Level Designs (SLLDs), providing design assurance/implementation steer where required. -
Security ArchitectRoyal Bank Of Scotland: Worldpay Aug 2009 - Oct 2009Gogarburn, GbRBS WorldPay is the payment processing business of The Royal Bank of Scotland Group, one of the largest banks in the world and a leading global brand.The RBS group required an experienced security architect, with a history of regulatory compliance projects, to join their PCI-DSS compliance project team. The role required subject matter expert (SME) security experience to facilitate the implementation of infrastructure solutions that adhered to the PCI-DSS standard. Joining RBS during the latter stages of the project, gap analysis of existing architecture was required; recommending cost-effective solutions where necessary, before external audit:✓ Design of Role-Based Access Control (RBAC) for desktop/server platforms (UNIX / Windows) as mandated by the PCI-DSS standard.✓ Author of PCI-DSS network zoning and cross-boundary communication pattern streamlining compliance attestation period and maximising security value.✓ End to end design documentation, across core distributed infrastructure, for external PCI-DSS audit.✓ OS deployment design catering for heterogeneous hardware/software and global deployment.✓ High Availability file server design -
Technical Information Security Officer (Contract)Deutsche Bank Ag Aug 2007 - Jul 2009Frankfurt Am Main, Hessen, DeDeutsche Bank (DB) is a market-leading, global investment bank with over 80,000 users in more than 127 offices. The bank required the services of an IT Security Officer to assist with compliance of Windows / Unix Infrastructure concerning both internal and Sarbanes Oxley (SOx) audits. Reporting to the Global TISO and working directly with application owners, IT Project Managers (ITPMs), Business Information Security Officers (BISOs) and IT Risk and Compliance (ITRC), the ISO was instructed to advise on methods of reducing audit points and mitigating risk through well designed, fully documented IT security solutions.✓ IT security policy documentation (ISO 27001 Framework / SOx Compliance) for external audit purposes.✓ Deutsche Bank Operations BCP/DR planning and testing incorporating ISO principals.✓ Data Classification Project: Ensuring security controls commensurate with data classification and information risk strategies.✓ Application profiling: security vulnerability analysis which facilitated a 40% decrease in application-based security alerts.✓ Project management and coordination of UK-based Windows Security (WinSec) deliverables. -
Technical Architect (Contract)Simmons & Simmons Dec 2005 - Aug 2007London, GbSimmons & Simmons (S&S) is a leading international law firm with over 2,500 employees, and 20 offices, located in major business and financial centres throughout Europe, the Middle East and Asia. In December 2005, S&S embarked on a global IT infrastructure overhaul; named Programme Vanilla. During the programme, I was employed as a technical design architect, brought on board to implement a worldwide desktop and server solution. Working as the lead in the desktop deployment workstream, it was my task to recommend a deployment solution that would be cost-effective, adaptable for hub and satellite sites and modular in design. I have been employed by the firm through all phases of the programme, from gathering business requirements, high/low-level designs and into proof of concept/pilot. Due to the number of employees working full time on the project, my skills were also called upon for IT Security hardening and good practice recommendations. -
Technical EngineerCyberview Technology Dec 2004 - Dec 2005GbCyberview Technology is the world leader in downloadable gaming technology, with activities in the USA, Europe and Asia. During my time with Cyberview, I was based in both London and Prague working on creating and fully documenting Operating System Builds, Developing applications for engineers with Visual Studio, systems management and directory services design. During my time with the firm, I was thoroughly schooled in embedded software architecture, developing & securing OS builds for gaming machines. -
Wintel Consultant (Contract)Ipc Media Jun 2002 - Dec 2004London, GbPart of the AOL-Time Warner business partnership, IPC Media is the largest magazine publisher in Europe – Working out of Kings Reach Tower offices in London, I was employed as part of the Systems Development department (directory services design and deployment, software packaging, scripting), as a technical lead.
Christopher Hodson Skills
Christopher Hodson Education Details
-
Royal Holloway, University Of LondonComputer And Information Systems Security/Information Assurance -
National It Learning CentreIt Security -
Peterborough CollegeComputer Programming
Frequently Asked Questions about Christopher Hodson
What company does Christopher Hodson work for?
Christopher Hodson works for Stealth Startup
What is Christopher Hodson's role at the current company?
Christopher Hodson's current role is Founder.
What is Christopher Hodson's email address?
Christopher Hodson's email address is ch****@****ail.com
What is Christopher Hodson's direct phone number?
Christopher Hodson's direct phone number is +44 075389*****
What schools did Christopher Hodson attend?
Christopher Hodson attended Royal Holloway, University Of London, National It Learning Centre, Peterborough College.
What skills is Christopher Hodson known for?
Christopher Hodson has skills like Security, Information Security, Information Security Management, Security Architecture Design, Cissp, Network Security, Information Technology, Pci Dss, Business Continuity, Itil, Enterprise Architecture, Computer Security.
Free Chrome Extension
Find emails, phones & company data instantly
Aero Online
Your AI prospecting assistant
Select data to include:
0 records × $0.02 per record
Download 750 million emails and 100 million phone numbers
Access emails and phone numbers of over 750 million business users. Instantly download verified profiles using 20+ filters, including location, job title, company, function, and industry.
Start your free trial