{"id":391,"date":"2024-11-05T18:27:09","date_gmt":"2024-11-05T18:27:09","guid":{"rendered":"https:\/\/www.enterprisemanagement.com\/?post_type=es_team&#038;p=391"},"modified":"2025-08-12T18:58:46","modified_gmt":"2025-08-12T18:58:46","slug":"chris-steffen","status":"publish","type":"es_team","link":"https:\/\/www.enterprisemanagement.com\/team\/chris-steffen\/","title":{"rendered":"Chris Steffen"},"content":{"rendered":"\n<p>Chris leads the information security, risk and compliance management practice for EMA, focusing on IT management\/leadership, cloud security, and regulatory compliance.<\/p>\n\n\n\n<p>Chris has over 25 years of industry experience as a noted information security executive, technical evangelist and presenter, focusing on IT and information security management\/leadership, cloud security and regulatory compliance. He has had a variety of non-technical professional roles, with his technical career starting in the financial services sector at a credit reporting company, building the technical operations group and the security\/compliance practices before leaving as the Principal Technical Architect. He has been the Director of Information Technology for a manufacturing company and the Chief Evangelist for several large technical companies, focusing on cloud security and cloud application transformation. Chris also held the position of CIO of a financial services firm, overseeing the technology-related functions of the enterprise.&nbsp;<\/p>\n\n\n\n<p>Chris holds over a dozen technical certifications, including Certified Information Systems Security Professional (CISSP), Certified Information Systems Auditor (CISA) and the Certificate of Competence in Zero Trust (CCZT). He has also received the Microsoft Most Valuable Professional Award five times for virtualization and cloud and data center management (CDM). He holds a Bachelor of Arts (Summa Cum Laude) from the Metropolitan State College of Denver.<\/p>\n\n\n\n<p>Chris is an avid science fiction fan and yo-yo enthusiast. He splits living between Wisconsin and Colorado with his wife.&nbsp;<\/p>\n\n\n\n<p>B.A., Political Science (Summa Cum Laude), Metropolitan State College of Denver<\/p>\n\n\n\n<p>CISSP, CISA, CCZT<\/p>\n\n\n<div class=\"gb-container gb-container-4879c867 section-my alignwide\">\n<div class=\"gb-container gb-container-5441d648\">\n\n<p class=\"has-text-align-center h6 has-white-color has-text-color has-link-color wp-elements-bba5437013e17de02a0898820293de55\"><strong>Primary Coverage<\/strong>: <\/p>\n\n\n\n<p class=\"has-text-align-center h6 has-white-color has-text-color has-link-color wp-elements-1c0455d3e1ad978c2e616583b998ceb7\" style=\"padding-right:40px;padding-left:40px\"><a href=\"https:\/\/www.enterprisemanagement.com\/coverage-area\/#security\">Information Security (in general), Data Security \/ DSPM, Risk \/ Compliance Management, Zero Trust, API Security, Cloud Security, Regulatory \/ Vendor Due Diligence Considerations, Observability \/ SIEM \/ SOAR, Detection and Response Solutions<\/a><\/p>\n\n\n<div class=\"gb-container gb-container-eed405db\">\n\n<p class=\"has-text-align-center\"><strong>Secondary Coverage<\/strong><\/p>\n\n\n<div class=\"gb-container gb-container-28421fba\">\n<div class=\"gb-grid-wrapper gb-grid-wrapper-4e4d394c\">\n<div class=\"gb-grid-column gb-grid-column-66186492\"><div class=\"gb-container gb-container-66186492\">\n<div class=\"gb-container gb-container-52943e38\">\n\n<ul class=\"wp-block-list\">\n<li>Application security<\/li>\n\n\n\n<li>Advanced threat analytics and anomaly detection<\/li>\n\n\n\n<li>Advanced testing attack simulation<\/li>\n\n\n\n<li>Bot detection and protection<\/li>\n\n\n\n<li>Cloud application security management<\/li>\n\n\n\n<li>Cloud access security broker<\/li>\n\n\n\n<li>Cryptography and key management<\/li>\n\n\n\n<li>Container security<\/li>\n\n\n\n<li>Data leak prevention and data classification<\/li>\n\n\n\n<li>Electronic governance risk and compliance<\/li>\n<\/ul>\n\n<\/div>\n<\/div><\/div>\n\n<div class=\"gb-grid-column gb-grid-column-c8205530\"><div class=\"gb-container gb-container-c8205530\">\n<div class=\"gb-container gb-container-72e3ff2e\">\n\n<ul class=\"wp-block-list\">\n<li>Endpoint protection<\/li>\n\n\n\n<li>Hardware security modules<\/li>\n\n\n\n<li>IoT security<\/li>\n\n\n\n<li>Information rights management<\/li>\n\n\n\n<li>Managed security service provider<\/li>\n\n\n\n<li>Patch management<\/li>\n\n\n\n<li>Runtime application security protection<\/li>\n\n\n\n<li>Remote access<\/li>\n\n\n\n<li>Risk management<\/li>\n<\/ul>\n\n<\/div>\n<\/div><\/div>\n\n<div class=\"gb-grid-column gb-grid-column-1fa132d7\"><div class=\"gb-container gb-container-1fa132d7\">\n<div class=\"gb-container gb-container-994bfd47\">\n\n<ul class=\"wp-block-list\">\n<li>Security incident and event management and log management<\/li>\n\n\n\n<li>Security policy orchestration and automation<\/li>\n\n\n\n<li>SSL appliances<\/li>\n\n\n\n<li>Threat intelligence service feeds<\/li>\n\n\n\n<li>Third-party risk management<\/li>\n\n\n\n<li>Anti-phishing<\/li>\n\n\n\n<li>Unified threat management<\/li>\n\n\n\n<li>Vulnerability management<\/li>\n\n\n\n<li>Web application firewall<\/li>\n\n\n\n<li>Workload microsegmentation<\/li>\n\n\n\n<li>Web security gateway<\/li>\n<\/ul>\n\n<\/div>\n<\/div><\/div>\n<\/div>\n<\/div>\n<\/div>\n\n<div class=\"gb-container gb-container-aca77581\">\n\n<p class=\"has-text-align-center\"><strong>Tertiary Coverage<\/strong><\/p>\n\n\n<div class=\"gb-container gb-container-f0ea9ec4\">\n<div class=\"gb-grid-wrapper gb-grid-wrapper-aa5e3220\">\n<div class=\"gb-grid-column gb-grid-column-bb87060a\"><div class=\"gb-container gb-container-bb87060a\">\n<div class=\"gb-container gb-container-837ae491\">\n\n<ul class=\"wp-block-list\">\n<li>Advanced breach detection<\/li>\n\n\n\n<li>Antivirus<\/li>\n\n\n\n<li>Browser isolation<\/li>\n\n\n\n<li>Consumer identity and access management<\/li>\n\n\n\n<li>Distributed denial of service protection<\/li>\n<\/ul>\n\n<\/div>\n<\/div><\/div>\n\n<div class=\"gb-grid-column gb-grid-column-d8842343\"><div class=\"gb-container gb-container-d8842343\">\n<div class=\"gb-container gb-container-3d429ea6\">\n\n<ul class=\"wp-block-list\">\n<li>Deception technology<\/li>\n\n\n\n<li>Digital threat intelligence management<\/li>\n\n\n\n<li>Intrusion detection\/prevention<\/li>\n\n\n\n<li>Mobile security tools<\/li>\n\n\n\n<li>Network admission control<\/li>\n<\/ul>\n\n<\/div>\n<\/div><\/div>\n\n<div class=\"gb-grid-column gb-grid-column-2d628622\"><div class=\"gb-container gb-container-2d628622\">\n<div class=\"gb-container gb-container-71e4324d\">\n\n<ul class=\"wp-block-list\">\n<li>Network APT detection\/analysis<\/li>\n\n\n\n<li>Next-generation endpoint security<\/li>\n\n\n\n<li>Next-generation firewall\/unified threat management<\/li>\n\n\n\n<li>Secure email gateways and services<\/li>\n\n\n\n<li>Security operations automation and orchestration<\/li>\n<\/ul>\n\n<\/div>\n<\/div><\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n\n\n<div class=\"wp-block-group section-my is-layout-constrained wp-block-group-is-layout-constrained\">\n<h2 class=\"wp-block-heading h5\">Coverage Definition<\/h2>\n\n\n\n<div  class=\"es-ema-feature \">\n    <div class=\"es-ema-feature__content\">\n        \n\n<p class=\"mb-0\"><strong>Information security, risk, and compliance management<\/strong> is the process by which organizations predict and manage risk by adhering to boundaries set by a business. The practice area encompasses most of the areas and concepts in information security, risk mitigation, and technology regulatory compliance.<\/p>\n\n\n    <\/div>\n<\/div><\/div>\n\n\n\n<p><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Chris has over 25 years of industry experience as a noted information security executive, technical evangelist and presenter, focusing on IT and information security management\/leadership, cloud security and regulatory compliance. He has had a variety of non-technical professional roles, with his technical career starting in the financial services sector at a credit reporting company, building the technical operations group and the security\/compliance practices before leaving as the Principal Technical Architect. He has been the Director of Information Technology for a manufacturing company and the Chief Evangelist for several large technical companies, focusing on cloud security and cloud application transformation. Chris also held the position of CIO of a financial services firm, overseeing the technology-related functions of the enterprise. <\/p>\n","protected":false},"featured_media":15491,"template":"","team_category":[107,109,108],"team_tag":[],"class_list":["post-391","es_team","type-es_team","status-publish","has-post-thumbnail","hentry","team_category-analyst","team_category-contributor","team_category-team","coverage_area-information-security-risk-and-compliance-management"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.8 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Chris Steffen - Enterprise Management Associates (EMA)<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.enterprisemanagement.com\/team\/chris-steffen\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Chris Steffen - Enterprise Management Associates (EMA)\" \/>\n<meta property=\"og:description\" content=\"Chris has over 25 years of industry experience as a noted information security executive, technical evangelist and presenter, focusing on IT and information security management\/leadership, cloud security and regulatory compliance. He has had a variety of non-technical professional roles, with his technical career starting in the financial services sector at a credit reporting company, building the technical operations group and the security\/compliance practices before leaving as the Principal Technical Architect. He has been the Director of Information Technology for a manufacturing company and the Chief Evangelist for several large technical companies, focusing on cloud security and cloud application transformation. Chris also held the position of CIO of a financial services firm, overseeing the technology-related functions of the enterprise.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.enterprisemanagement.com\/team\/chris-steffen\/\" \/>\n<meta property=\"og:site_name\" content=\"Enterprise Management Associates (EMA)\" \/>\n<meta property=\"article:modified_time\" content=\"2025-08-12T18:58:46+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.enterprisemanagement.com\/wp-content\/uploads\/2024\/11\/chris-steffen.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1065\" \/>\n\t<meta property=\"og:image:height\" content=\"1065\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.enterprisemanagement.com\/team\/chris-steffen\/\",\"url\":\"https:\/\/www.enterprisemanagement.com\/team\/chris-steffen\/\",\"name\":\"Chris Steffen - Enterprise Management Associates (EMA)\",\"isPartOf\":{\"@id\":\"https:\/\/www.enterprisemanagement.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.enterprisemanagement.com\/team\/chris-steffen\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.enterprisemanagement.com\/team\/chris-steffen\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.enterprisemanagement.com\/wp-content\/uploads\/2024\/11\/chris-steffen.jpg\",\"datePublished\":\"2024-11-05T18:27:09+00:00\",\"dateModified\":\"2025-08-12T18:58:46+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/www.enterprisemanagement.com\/team\/chris-steffen\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.enterprisemanagement.com\/team\/chris-steffen\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.enterprisemanagement.com\/team\/chris-steffen\/#primaryimage\",\"url\":\"https:\/\/www.enterprisemanagement.com\/wp-content\/uploads\/2024\/11\/chris-steffen.jpg\",\"contentUrl\":\"https:\/\/www.enterprisemanagement.com\/wp-content\/uploads\/2024\/11\/chris-steffen.jpg\",\"width\":1065,\"height\":1065,\"caption\":\"Chris Steffen\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.enterprisemanagement.com\/team\/chris-steffen\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.enterprisemanagement.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Team\",\"item\":\"https:\/\/www.enterprisemanagement.com\/team\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Chris Steffen\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.enterprisemanagement.com\/#website\",\"url\":\"https:\/\/www.enterprisemanagement.com\/\",\"name\":\"Enterprise Management Associates (EMA)\",\"description\":\"EMA is a leading IT research and consulting firm dedicated to delivering actionable insights across the evolving technology landscape.\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.enterprisemanagement.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Chris Steffen - Enterprise Management Associates (EMA)","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.enterprisemanagement.com\/team\/chris-steffen\/","og_locale":"en_US","og_type":"article","og_title":"Chris Steffen - Enterprise Management Associates (EMA)","og_description":"Chris has over 25 years of industry experience as a noted information security executive, technical evangelist and presenter, focusing on IT and information security management\/leadership, cloud security and regulatory compliance. He has had a variety of non-technical professional roles, with his technical career starting in the financial services sector at a credit reporting company, building the technical operations group and the security\/compliance practices before leaving as the Principal Technical Architect. He has been the Director of Information Technology for a manufacturing company and the Chief Evangelist for several large technical companies, focusing on cloud security and cloud application transformation. Chris also held the position of CIO of a financial services firm, overseeing the technology-related functions of the enterprise.","og_url":"https:\/\/www.enterprisemanagement.com\/team\/chris-steffen\/","og_site_name":"Enterprise Management Associates (EMA)","article_modified_time":"2025-08-12T18:58:46+00:00","og_image":[{"width":1065,"height":1065,"url":"https:\/\/www.enterprisemanagement.com\/wp-content\/uploads\/2024\/11\/chris-steffen.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.enterprisemanagement.com\/team\/chris-steffen\/","url":"https:\/\/www.enterprisemanagement.com\/team\/chris-steffen\/","name":"Chris Steffen - Enterprise Management Associates (EMA)","isPartOf":{"@id":"https:\/\/www.enterprisemanagement.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.enterprisemanagement.com\/team\/chris-steffen\/#primaryimage"},"image":{"@id":"https:\/\/www.enterprisemanagement.com\/team\/chris-steffen\/#primaryimage"},"thumbnailUrl":"https:\/\/www.enterprisemanagement.com\/wp-content\/uploads\/2024\/11\/chris-steffen.jpg","datePublished":"2024-11-05T18:27:09+00:00","dateModified":"2025-08-12T18:58:46+00:00","breadcrumb":{"@id":"https:\/\/www.enterprisemanagement.com\/team\/chris-steffen\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.enterprisemanagement.com\/team\/chris-steffen\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.enterprisemanagement.com\/team\/chris-steffen\/#primaryimage","url":"https:\/\/www.enterprisemanagement.com\/wp-content\/uploads\/2024\/11\/chris-steffen.jpg","contentUrl":"https:\/\/www.enterprisemanagement.com\/wp-content\/uploads\/2024\/11\/chris-steffen.jpg","width":1065,"height":1065,"caption":"Chris Steffen"},{"@type":"BreadcrumbList","@id":"https:\/\/www.enterprisemanagement.com\/team\/chris-steffen\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.enterprisemanagement.com\/"},{"@type":"ListItem","position":2,"name":"Team","item":"https:\/\/www.enterprisemanagement.com\/team\/"},{"@type":"ListItem","position":3,"name":"Chris Steffen"}]},{"@type":"WebSite","@id":"https:\/\/www.enterprisemanagement.com\/#website","url":"https:\/\/www.enterprisemanagement.com\/","name":"Enterprise Management Associates (EMA)","description":"EMA is a leading IT research and consulting firm dedicated to delivering actionable insights across the evolving technology landscape.","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.enterprisemanagement.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"}]}},"_links":{"self":[{"href":"https:\/\/www.enterprisemanagement.com\/wp-json\/wp\/v2\/es_team\/391","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.enterprisemanagement.com\/wp-json\/wp\/v2\/es_team"}],"about":[{"href":"https:\/\/www.enterprisemanagement.com\/wp-json\/wp\/v2\/types\/es_team"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.enterprisemanagement.com\/wp-json\/wp\/v2\/media\/15491"}],"wp:attachment":[{"href":"https:\/\/www.enterprisemanagement.com\/wp-json\/wp\/v2\/media?parent=391"}],"wp:term":[{"taxonomy":"team_category","embeddable":true,"href":"https:\/\/www.enterprisemanagement.com\/wp-json\/wp\/v2\/team_category?post=391"},{"taxonomy":"team_tag","embeddable":true,"href":"https:\/\/www.enterprisemanagement.com\/wp-json\/wp\/v2\/team_tag?post=391"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}