Chris Kirsch

Chris Kirsch

Boston, Massachusetts, United States
8K followers 500+ connections

About

I’m a go-to-market executive turned marketing consultant with 25+ years of experience in…

Activity

Join now to see all activity

Experience & Education

  • Cyber Marketing Clinic

View Chris’s full experience

See their title, tenure and more.

or

By clicking Continue to join or sign in, you agree to LinkedIn’s User Agreement, Privacy Policy, and Cookie Policy.

Licenses & Certifications

Volunteer Experience

  • Social Engineering Community Graphic

    Volunteer, Judge, CFP Reviewer

    Social Engineering Community

    - Present 2 years 3 months

    Science and Technology

    Supporting the Social Engineering Community at DEF CON, the world's largest hacker conference in various roles, including judge, CFP reviewer, and room monitor.

  • BSidesNYC Graphic

    CFP Selection Committee Member for Entrepreneur Track

    BSidesNYC

    - Present 4 months

    Science and Technology

    Reviewing talk submissions for the BSidesNYC entrepreneur track.

  • National Child Protection Task Force (NCPTF) Graphic

    Advisor

    National Child Protection Task Force (NCPTF)

    - 8 months

    Children

    Advising the NCPTF on social engineering and OSINT techniques to train law enforcement on how to find missing children and identify predators.

  • Big Brothers Big Sisters of America Graphic

    Big Brother (Mentor)

    Big Brothers Big Sisters of America

    - 8 years 6 months

    Children

    Mentoring a child for personal growth.

Publications

  • Database Encryption and Key Management for Microsoft SQL Server 2008

    CreateSpace

    This technical book for database administrators and IT security experts demonstrates how you can protect your sensitive data with the native database encryption functions of Microsoft SQL Server 2008, such as cell-level encryption and Transparent Data Encryption, and manage and protect encryption keys with hardware security modules (HSMs). After an introduction to encryption technology, you'll learn about these new security features of Microsoft SQL Server 2008. You'll be able to choose the…

    This technical book for database administrators and IT security experts demonstrates how you can protect your sensitive data with the native database encryption functions of Microsoft SQL Server 2008, such as cell-level encryption and Transparent Data Encryption, and manage and protect encryption keys with hardware security modules (HSMs). After an introduction to encryption technology, you'll learn about these new security features of Microsoft SQL Server 2008. You'll be able to choose the right approach to protecting your data and understand Extensible Key Management and HSMs. Many practical examples and T-SQL listings show the different ways in which you can encrypt your database and centrally manage keys. After completing this book, you'll be able to make an informed decision about how to encrypt your databases and manage and protect your encryption keys.

    Other authors
    See publication

Patents

  • Methods and systems for passively detecting security levels in client devices

    Filed US US20140137190 A1

    Embodiments of the present teachings relate to systems and methods for testing and analyzing the security of a target computing device. The method can include providing, to a server via a network, a security tool operable to be associated with a webpage accessible by a target computing device through the server, wherein security tool is operable to be executable by the target computing device and operable to collect one or more security metrics of the target computing device; receiving, from…

    Embodiments of the present teachings relate to systems and methods for testing and analyzing the security of a target computing device. The method can include providing, to a server via a network, a security tool operable to be associated with a webpage accessible by a target computing device through the server, wherein security tool is operable to be executable by the target computing device and operable to collect one or more security metrics of the target computing device; receiving, from the server, the one or more security metrics of the target computing device; comparing the one or more security metrics with a security vulnerability database; and determining a level of security vulnerability for the target computing device based on comparing the one or more security metrics with the security vulnerability database.

    Other inventors
    See patent

Courses

  • Building Your Emotional Intelligence

    SkillPath Training

  • Effective Negotiating, Karrass, 2012

    Certificate of Completion

  • Effective Product Marketing

    Pragmatic Marketing

  • Exceptional Presentations (Certificate)

    Baker Communications

  • Judgment and Decision Making, Harvard Extension School, 2012, non-credit/auditing

    MGMT E-5800

  • Leadership Process: Motivating Achievement (LPMA) (Certificate)

    Spencer/Shenk/Capers & As

  • Managing Multiple Projects, Objectives and Deadlines

    SkillPath Training

  • MassTLC Board-Ready Bootcamp

    -

  • Precision Thinking and Problem-Solving Skills

    SkillPath Training

  • Product Launch Essentials

    Pragmatic Marketing

  • Verhandeln und Argumentieren (Negotiation and Debating) at Technische Universität Darmstadt, 2004

    Certificate of Completion

Projects

  • Rapid7 Higher Education Program

    - Present

    Up to one million information-security staff and managers are needed to fill the current global demand, as estimated by the Cisco's 2014 Annual Security Report. The Rapid7 Higher Education Program is committed to addressing this global issue by helping universities and other educational institutions train the next generation of cyber-security professionals. The program provides free software licenses, training materials, and discounted professional certifications to eligible organizations.

    Other creators
    See project

Honors & Awards

  • DEF CON 25 Black Badge - Social Engineering CTF Winner

    DEF CON

  • The Veracode Way Award

    Veracode

  • Veracode Product Impact Award 2016

    Veracode

  • Vanguard Award

    Rapid7

  • Vanguard Award

    Rapid7

  • Edison Award for Innovation

    Rapid7

Languages

  • English

    Native or bilingual proficiency

  • German

    Native or bilingual proficiency

  • French

    Limited working proficiency

  • Italian

    Elementary proficiency

  • Mandarin Chinese

    Elementary proficiency

Recommendations received

26 people have recommended Chris

Join now to view

More activity by Chris

View Chris’ full profile

  • See who you know in common
  • Get introduced
  • Contact Chris directly
Join to view full profile

Other similar profiles

Explore collaborative articles

We’re unlocking community knowledge in a new way. Experts add insights directly into each article, started with the help of AI.

Explore More

Others named Chris Kirsch in United States

Add new skills with these courses