Skip to main content
Home Home
  • Podcasts
  • Tech Articles
  • Top 10s
  • Content
    Topics
    • AI
    • Data
    • Emerging Technologies
    • Infrastructure Management
    • Security
    • In The News
    Media
    • Tech Articles
    • Podcasts
    • Top 10s
    • Whitepapers
    • Press Releases
    • Video Resources
  • Solution Providers
  • Industry Leaders
  • Sign In
  • Join the community
Home
Get Started
  • Access expert IT resources for free
  • Discover actionable insights from industry experts
  • Network with IT professionals and grow your network
  • Unlock exclusive analyst-led content
  • Share your thoughts with our global IT community
Coming Soon...
  • Access free expert IT resources
  • Network with professionals and industry leaders
  • Gain exclusive insights from a global IT community

Or

Sign up with LinkedIn
Sign up with Github
Sign up with Google
Signup as business
Already have account?
Privacy Policy
Contact us
Showing results for
  • Content
  • Industry experts
  • Solution providers
  • Events
No matches found
Explore by topics
Explore by type
No matches found
No matches found
Explore by topics
No matches found
Explore by topics
No result found for
Podcasts
Tech articles
Top 10s
  • AI
  • Data
  • Emerging Technologies
  • Infrastructure Management
  • Security
  • In the news
  • Press release
  • Video resources
  • Whitepapers
Industry Leaders
Media partners
Solution Providers
Events
  • About us
  • Contact us
  • FAQs
em360tech image
Guru

Chris
Steffen

Vice President of Research at Enterprise Management Associates
13 followers
0 following
Message
Follow

Work experience

Enterprise Management Associates
Vice President of Research
( Jan 2020 - Aug 2023 )
DXC Technology
Chief Technical Evangelist
( Nov 2018 - Mar 2019 )
..see more
Cryptzone UK Ltd
Technical Director
( Oct 2016 - Nov 2018 )
Hewlett Packard
Chief Evangelist
( Apr 2015 - Oct 2016 )

Areas of Expertise

  • Security

About

United States
Chris Steffen is the Researching Director for EMA, an analyst firm that looks at how companies manage their IT infrastructure from the data center out to the user environment and into the cloud.

He is an experienced, high-performing information security expert with extensive experience in IT and security management.
...see more

Social media links

Analysts with similar expertise

Ken Buckler
em360tech image

Ken Buckler

Research Director at Enterprise Management Associates
Alejandro Leal
em360tech image

Alejandro Leal

Senior Analyst at KuppingerCole Analysts
Aparna Sundararajan
em360tech image

Aparna Sundararajan

Strategic Advisor - Secure AI at Rain Consulting Services
View more
Read Episode 146 - Demystify Quantum Computing
cybersecurity awesomeness
Security
Episode 146 - Demystify Quantum Computing
15 min
Read Episode 145: The Federal Government’s Approach to Cybersecurity
cybersecurity awesomeness
Security
Episode 145: The Federal Government’s Approach to Cybersecurity
14 min
Read From Data to Insight: How Enterprises Are Making IoT Secure and Actionable
Enterprise IoT devices securely integrated with operational technology in a modern industrial environment
Security
From Data to Insight: How Enterprises Are Making IoT Secure and Actionable
27 min
Read Why Are Vulnerability Backlogs Still Growing Despite Better Detection?
In the latest episode of The Security Strategist podcast, Chris Steffen sat down with John Amaral, Co-Founder and CTO of Root.io, to discuss why shift-left has stalled and why autonomous remediation and “shift-out” security is the best option moving forward in vulnerability management.
Security
Why Are Vulnerability Backlogs Still Growing Despite Better Detection?
25 min
Read EDR, XDR, or MDR — What’s the Real Difference and Why Does It Matter?
In the recent episode of The Security Strategist podcast, Jim Waggoner, VP of Product Strategy at N-able, and Joe Ferla, one of N-able’s Head Nerds, speak to host Chris Steffen, Vice President of Research at Enterprise Management Associates (EMA). They addressed one of cybersecurity’s biggest misconceptions – while organizations might be getting better at spotting threats, most still struggle to respond to them in real time.
Security
EDR, XDR, or MDR — What’s the Real Difference and Why Does It Matter?
29 min
Read Securing Assets in a Complex IT Landscape: Deterministic Automation in ITAM
Syed Ali and Chris Steffen discussing IT asset management and deterministic automation during a Security Strategist podcast recording.
Security
Securing Assets in a Complex IT Landscape: Deterministic Automation in ITAM
21 min
Read Preemptive Defense with AI-powered Deception: Outsmarting the AI-driven Adversary
In the recent episode of The Security Strategist podcast, Chris Steffen, the Vice President of Security Research at Enterprise Management Associates (EMA), sits down with Ram Varadarajan, CEO and Co-founder of Acalvio to talk about how deception is changing threat detection in compromised enterprise environments.
Security
Preemptive Defense with AI-powered Deception: Outsmarting the AI-driven Adversary
30 min
Read Can You Stop an API Business Logic Attack?
can-stop-api-chris-radware
Security
Can You Stop an API Business Logic Attack?
28 min
Read The Critical Role of MDM in Safeguarding Dedicated Devices
cybersecurity podcast with esper's sudhir reddy and chris steffen, ema on em360tech
Security
The Critical Role of MDM in Safeguarding Dedicated Devices
28 min
Read Meeting of the Minds: State of Cybersecurity in 2025 Part II
meeting of the minds state of cybersecurity in 2025 part 2
Security
Meeting of the Minds: State of Cybersecurity in 2025 Part II
45 min
Read Meeting of the Minds: State Of Cybersecurity in 2025
EM360Tech | meeting of the minds state of cybersecurity
Security
Meeting of the Minds: State Of Cybersecurity in 2025
1 min
Read Closing the Cloud Gap: CDR vs. Traditional Security in the Fight for Resilience
Palo Alto Thumbnail
Security
Closing the Cloud Gap: CDR vs. Traditional Security in the Fight for Resilience
19 min
  • Load more
The Compliance Conundrum in the Cloud Era: Governance and Adapting to Regulatory Volatility
em360tech image
Whitepaper
Security

The Compliance Conundrum in the Cloud Era: Governance and Adapting to Regulatory Volatility

by Megan Leanda Berry
4 min

Automate compliance. Strengthen resilience.

Get the new EM360Tech report on cloud and hybrid compliance. Learn how to replace manual audits with continuous assurance, automate evidence collection, and govern controls with confidence in a volatile regulatory landscape.

  • Why manual compliance can’t keep up
  • How automation transforms assurance and reporting
  • Practical governance models for automated controls
  • Managing data sovereignty across jurisdictions
  • Strategies for adapting to regulatory change
Get The Report
EM360Tech Homepage em360tech.com

Access the latest analyst-led podcasts, tech articles, and industry resources as you connect with some of the brightest minds in enterprise tech.

  • x.com
  • LinkedIn
  • YouTube

Topics

  • AI
  • Data
  • Emerging Technologies
  • Infrastructure Management
  • Security

Resources

  • Articles
  • Podcasts
  • Top 10s
  • Videos
  • Whitepapers

Collaborators

  • Events
  • Experts
  • Media Partners
  • Solution Providers

Company

  • About
  • Blogs
  • FAQ
  • Our Services

Subscribe to our Newsletter

  • Contact Us
  • Our Services
  • Blogs
  • Privacy Policy
  • Editorial Policy
  • GDPR Policy
  • Sitemap

All rights reserved. ©2026

Enterprise Management 360