Chris McNab

Chris McNab

Drives fast and makes a mean yorkshire pudding.

  • @chrisforce1

London, England

Areas of Expertise:

  • computer security
  • penetration testing
  • incident response
  • secure architecture
  • security analytics
  • consulting
  • speaking
  • programming
  • training
  • writing

Chris McNab is the author of Network Security Assessment and founder of CloudSOC, a security analytics software company with offices in the United States and United Kingdom. Chris has presented at events including FIRST, OWASP, InfoSecurity Europe, InfoSec World, and the Cloud Security Alliance Congress, and works with client organizations around the world to understand and mitigate vulnerabilities within their environments.

During 2012 and 2013, Chris performed incident response and forensics work for organizations targeted by Alexsey Belan, who occupies the top spot on the FBI's Cyber Most Wanted list and is currently on the run in Europe. In 2011, Chris worked closely with the Attorney General of Guatemala under a United States Agency for International Development (USAID) project to secure the computer systems that underpin the legal system within the country.

Network Security Assessment Network Security Assessment
by Chris McNab
Second Edition November 2007
Print: $49.99
Ebook: $39.99

Network Security Assessment Network Security Assessment
by Chris McNab
March 2004
Ebook: $27.99

"While the book is quite technical, it is also very readable. This text is best used in the hands of your company’s network and security administrators. Once they finish reading it, your network security will improve."
--Ben Rothke, CPP, Security Management

"Two key characteristics set this book apart from others. First, the author never claims that following the steps he lays out will make your network secure or hacker-proof. Instead, his goal is to give you the tools to assess the security of your network. Second, the book covers various tools, discussing what information each tool can provide and what this information means."
--James Mohr, Linux Magazine

"The author provides access to all of the weapons used by hackers and others who seek to attack and disable networks. Providing a knowledge of these tactics will help network administrators to deploy tools and implement techniques and good practices to thwart malicious threats."
--Michael Kleper, The Kleper Report