People the DATASHIELD Differentiator - Learn More About Our Personnel Here
Chris is the Head of Marketing at DATASHIELD and leads the efforts in branding, digital demand generation and overall company presentation.
Chris has an extensive background in sales & marketing having successfully ran an SME marketing agency and start-up / tech consulting firm. Chris has a strong focus on content marketing and Search Engine Optimization (SEO) as a long term growth strategy for web penetration. He also brings the added marketing focus on email campaigns, PPC, niche landing pages, collateral creation and event coordination.
Outside of Chris's Marketing role he supports sales and customer success at DATASHIELD with process creation and system automation. He also produces and hosts DATASHIELD's podcast "The Hash-Time Show" as well as the Sales / Marketing Training Series dubbed "The Quaff and Pony Show."
When Chris is not at DATASHIELD he manages a long running network of automative websites that offer community and classifieds resources to consumers for niche cars and RVs. He uses these websites as a test bed for SEO and marketing strategies. Chris also is an avid guitar player and pursues creating music as a hobby.
The early days of tackling cyber threats involved a team of crack detectives diving through thousands of alerts produced by traditional firewall tools and log analyzers to pinpoint threats to networks. This method was similar to finding the...Read More
Most places of business require that employees access that facility by using a key or keycard. In many ways, passwords are the keys by which employees access their workplace network. With physical office keys or card readers, proper policies and...Read More
As far as data breaches go, 2019 is shaping up to be a landmark year based on the findings of the 2019 MidYear QuickView report published by Risk Based Security. According to the report, breaches in 2019 were 52% higher than what was recorded in 2018...Read More
This Hash-Time Breakdown focuses on cyber security solution scoping, specifically, when deciding if you need a Security Information and Event Management (SIEM) device or not. Also which SIEM should you choose for your environment.Listen & Read More
Measuring ROI in Cybersecurity, human augmentation and stories about insurance. All this and more including taking a phone call from a listener, designed to illustrate a real-life phishing / social engineering situation. Dave and Jeff prepare for their talk on emerging trends for RSA TechFest and Chris ponders replacing his hands.Listen & Read More
Data privacy issues including news about Google paying $170 million for violating children’s privacy on YouTube and Twitter CEO Jack Dorsey hacked via SMS Tweeting. Also discussion around cyber security acquisitions including Palo Alto Networks acquiring Zingbox for IoT security. Breach of the week surrounding an Android Trojan called Joker and a preview of Dave & Jeff (DATASHIELD) at RSA TechFestListen & Read More
Ransomware themed show along with an in-depth conversation about the problems with sales in cyber security. Feature dumping, vendor bias, sales person technical expertise and more. Dave, Chris and Jeff welcome guest DJ Jones Director of Sales for DATASHIELD.Listen & Read More
Physical Pentesting, Spotsylvania Phishing Attack, Second Life, DEF CON and New Wardialing Variations. Dave, Chris, Jeff and guest Ben Johnson talk about these topics and more hot cybersecurity news. Beach of the week: Forbes.com report on exposed fingerprints and facial recognition data.Listen & Read More
This week the Hash-Time hosts welcome Chase Hall to discuss Gerrymandering, Election Fraud, Voter Hacking, Cybersecurity Movies and News of the Week.Listen & Read More
On this week's show the Hash-Time hosts welcome Joel Menk to discuss the last 10 years of cybersecurity along with news of the week and play the IT Search Term Game.Listen & Read More
On today's show the Hash-Time hosts discuss the one thing you would change about the internet and whether or not the perimeter is dead. Also cybersecurity news and breaches for the week.Listen & Read More
This week the Hash-Time hosts discuss news of the week, and that time the SOC had a gun threat.Listen & Read More
On today's show the Hash-Time hosts cover cybersecurity tool development, what every InfoSec employee needs to know and dive into the anatomy of a ransomware attack.Listen & Read More
On today's show your Hash-Time hosts cover topics including Artificial Intelligence, Automation, Machine Learning as well as try to figure out if Google is Skynet. Plus hot cybersecurity news for the week.Listen & Read More
The Insight Partners acquisition of Recorded Future for $780 Million plus Digital Shadows research uncovers over 2.3 billion files exposed across misconfigured online file storage technologies. The Hash-Time Hosts cover DATASHIELD’s participation at the 2019 Rocky Mountain Information Security Conference (RMISC). All this and, Chris Vincent (Marketing) reads real cyber security targeted sales emails to Jeff Marshall (CISO) & Dave Norlin (SOC Director), both trained and tenured security professionals.Listen & Read More
What is your key marker for business success? How do you develop employee's growth? How do you track personal growth? These questions plus news of the week including Baltimore Bitcoin Ransomware, Spoofing DuckDuckGo and the Cyber No-Fly list. The Hash-Time hosts also cover the history of Security Information and Event Management (SIEM).Listen & Read More
BlueKeep Remote Desktop Exploits, Equifax outlook downgraded because of cyber attack and WannaCry-Infested Laptop starts at $1.13M in art auction. These news stories plus The Hash-Time Show hosts cover their biggest professional challenges and theorize about cloning a top security analyst.Listen & Read More
The Trend Micro Hack & Symantec Denies Claims of “Fxmsp” Breach plus ranking the best and worst hacking movies of all time. Including discussion of the following films: The Matrix (1999), Hackers (1995), WarGames (1983), Swordfish (2001), Ghost in the Shell (1996), Live Free or Die Hard (2007), Blackhat (2015), AntiTrust (2001), Johnny Mneomic (1995), The Net (1995).Listen & Read More
The White House cyber-workforce initiative, one-ring phone scams and Mirrorthief cybercrime group target online campus stores with card skimming malware. These cyber security news stories plus a deep dive into the Packet Advantage.Listen & Read More
Cyber Security News discussing cybersecurity programs on college campuses, FBI director Wray phishing campaign, Docker breach and how Blue Team cyber detectives take a bite out of crime.Listen & Read More
DATASHIELD an ADT Company is seeking a motivated candidate to support both marketing and demand generation. The Digital Marketing Specialist will help develop, structure, execute, oversee, and analyze campaign performance across a wide range of digital channels. The ideal candidate understands best practices in the fields of SEO, SEM, Nurture Campaigns, A/B Testing, User Experience, Content Marketing and a growing list of related fields.
One-part marketer, one-part business growth-driver, and one-part technical communicator, this role is responsible for planning campaign architecture, designing/delivering briefs for creative and production teams, regularly monitoring campaign and platform health, and producing and delivering analyses to both internal and client-side stakeholders.