Our Authors
Cyber Protection Magazine works with many distinguished experts and professionals.
We are always looking for contributors to Cyber Protection Magazine. Do you work in the cybersecurity industry and have an interesting topic to discuss? Are you researching a particular topic on Cybersecurity and would like to see this topic better represented? Do you want to comment on a current topic in the area of cybersecurity?
Whatever your motives, feel free to contact us with a short abstract of your topic. If it meets the requirements, we are happy to publish your article!
We would like to recognize and thank all of the contributors to Cybersecurity Magazine. Here is a list of our contributing authors:
Chris is Cyber Security Practice Director at Six Degrees. He is responsible for evolving Six Degrees’ end-to-end cyber security portfolio – ensuring clients can use cyber security innovatively to support, grow and enhance their businesses.
Previously a Head of Information Risk Management (IRM) and Global Cyber Security Strategy Lead, Chris is an experienced cyber security expert with qualifications including Fellow of the Chartered Institute of Information Security (FCIIS), Certified Information Security Manager (CISM) and Fellow of the British Computer Society (FBCS).
Chris has a degree in Computer Systems and Networks, and he has a keen focus on contributing to broader cyber security knowledge. His outreach activities include membership of the Cyber Security Alliance Council and the Chartered Institute of Information Security’s Accreditation Committee. He also acts as a Cyber Security Advisor to ISACA.
Chris Storey currently serves as the Director of Business Development at Qriar, a company known for its expertise in implementing, integrating, and customizing cybersecurity products and services, spanning EDR, Attack Surface Management, Privileged Access Management, Identity Governance and Administration, SIEM, and Secure API Management. He brings over eight years of experience in business development, sales, and account management, with a specialized focus on cybersecurity solutions. His passion is rooted in delivering exceptional customer service and cultivating enduring client relationships. Chris possesses a knack for unraveling complex issues and fashioning tailored solutions. Certified in Identity and Access Management, Privileged Access Management, and Threat and Vulnerability Management, he blends innovation with time-tested approaches. Chris's ultimate aim is to be a dedicated cybersecurity partner and advocate, helping companies fulfill their security and business objectives.
Christie Simon is a writer based in Canada. She writes articles with a focus on marketing and cybersecurity for a variety of businesses. Some of her favourite pieces can be found on the Constant C Technology Group's website.
Christoph Nagy has 20 years of working experience within the SAP industry. He has utilized this knowledge as a founding member and CEO at SecurityBridge–a global SAP security provider, serving many of the world's leading brands and now operating in the U.S. Through his efforts, the SecurityBridge Platform for SAP has become renowned as a strategic security solution for automated analysis of SAP security settings, and detection of cyber-attacks in real-time. Prior to SecurityBridge, Nagy applied his skills as a SAP technology consultant at Adidas and Audi.
The creator of Physical Presence technology, I start in the US Army as a Cartographic Draftsman. Honing my precision and attention to detail, I then shifted his focus to the world of software programming and would work as a Systems Analyst. With entrepreneurial flames burning, I then work as a software engineering consultant before taking the leap into my own venture. It was at this point when I first developed a method to prove presence on the internet by creating a digital state-of-existence.
Cindy is a solutions strategist with a focus on cyber security and experience as an IT leader and a developer. She's passionate about making application security mainstream by changing the market: how app sec tools are used, by whom, and what outcome is expected. Ask her about pragmatic steps to truly integrate security into DevOps using workflows that are more effective, efficient, and transparent.
Her book, "10 steps every CISO should take to secure next generation software" is intended to help security professionals understand how software development is changing and the impact upon security programs. Application security especially must evolve if it is to be effective and relevant amongst DevOps, containers, orchestrators and micro services.
Claus Nielsen joined Holm Security as Chief Marketing Officer in December 2021 and leads the global go-to-market strategy, positioning, and value propositions development, as well as marketing activities in all markets. He has over 20 years of global executive experience across North America, Asia, and Europe. Claus’ previous roles include Chief Operating & Marketing Officer at KebNi and Global Vice President of Marketing at Neural Technologies Group, where he was responsible for the go-to-market strategy, positioning, and value propositions of all products and solutions. He was previously Director of Mobile Strategy for TATA Communications and spent over five years in various positions at Nokia. Claus graduated from the DTU Technical University of Denmark with a bachelor’s degree in electrical engineering.
The Computing Technology Industry Association (CompTIA) is an American non-profit trade association, issuing professional certifications for the information technology (IT) industry. It is considered one of the IT industry's top trade associations. Based in Downers Grove, Illinois, CompTIA issues vendor-neutral professional certifications in over 120 countries. The organization releases over 50 industry studies annually to track industry trends and changes. Over 2.2 million people have earned CompTIA certifications since the association was established.








