Christina Stokes Profile Pic.png

Ph.D Student, Intelligence & Global Security M.S. Cybersecurity & M.B.A.

<aside> <img src="https://i.pinimg.com/736x/92/d1/db/92d1db1521d374335498624cc95e9554.jpg" alt="https://i.pinimg.com/736x/92/d1/db/92d1db1521d374335498624cc95e9554.jpg" width="40px" /> LinkedIn: xTinaStokes

</aside>

<aside> <img src="/icons/globe_gray.svg" alt="/icons/globe_gray.svg" width="40px" /> Website: christinastokes.com

</aside>

Get in touch

<aside> <img src="/icons/mail_gray.svg" alt="/icons/mail_gray.svg" width="40px" /> Email

</aside>

<aside> <img src="/icons/computer_gray.svg" alt="/icons/computer_gray.svg" width="40px" /> Instagram

</aside>


Education


<aside> <img src="/icons/arrow-right_gray.svg" alt="/icons/arrow-right_gray.svg" width="40px" /> Ph.D. Intel & Global Sec — Expected 2028 Captiol Technology University NSA DHS CAE-IA/CD

<aside> <img src="/icons/arrow-right_gray.svg" alt="/icons/arrow-right_gray.svg" width="40px" /> M.B.A., 2021 UMGC NSA DHS CAE Dual-Degree w M.S.

</aside>

<aside> <img src="/icons/arrow-right_gray.svg" alt="/icons/arrow-right_gray.svg" width="40px" /> B.A. Communications UMUC, Europe ( Italy )

</aside>

<aside> <img src="/icons/arrow-right_gray.svg" alt="/icons/arrow-right_gray.svg" width="40px" /> M.S. Cybersecurity Policy, 2018 UMGC NSA DHS CAE Dual-Degree w/ MBA

</aside>

<aside> <img src="/icons/arrow-right_gray.svg" alt="/icons/arrow-right_gray.svg" width="40px" /> A.A. Education UMUC, Europe ( Italy )

</aside>


Deep Dives, Work, Research Areas:


<aside> <img src="/icons/arrow-right_gray.svg" alt="/icons/arrow-right_gray.svg" width="40px" /> Cybersecurity Laws, Regulations & Compliance

</aside>

<aside> <img src="/icons/arrow-right_gray.svg" alt="/icons/arrow-right_gray.svg" width="40px" /> AI & Quantum Emerging Tech Laws, Regulations, & Compliance

</aside>

<aside> <img src="/icons/arrow-right_gray.svg" alt="/icons/arrow-right_gray.svg" width="40px" /> International & Domestic Cybersecurity Threat Landscapes & Protections

</aside>


Orgs & Volunteer


Data


Projects


Projects


Hobbies


About Me


Hello! I’m Christina Stokes. I am a cybersecurity professional aiming to leverage my cybersecurity skills and technical understanding to help organizations fortify digital landscapes through strategic GRC and policy implementation, ensuring resilient, compliant cybersecurity postures that enable objectives and foster trust. I am driven to learn and work hard to exhibit a solid understanding and expertise in the industry.

Currently, I work as a vCISO and I am a Ph.D Student in Intelligence and Global Security working on AI Cybersecurity & Quantum Cybersecurity. My past professional experience includes work for several years on a joint U.S. Naval / NATO base in Italy. After relocating to the U.S. I worked as a freelance web developer. After managing an ISO 27001 Audit re-certification in a cross-functional role for a multi-national company I earned a dual-Masters’ degree in Cybersecurity Policy and an MBA and have continued to work in cybersecurity.

Areas


🌐 Cybersecurity & Cybersecurity Policy

🌐 Frameworks, Laws, & GRC

🌐 AI & Quantum Security

🌐 Data Privacy & Safety

🌐 Cybersecurity Awareness


Current

<aside> <img src="/icons/briefcase_gray.svg" alt="/icons/briefcase_gray.svg" width="40px" /> vCISO & Founder Narito Cyber (2018 - Present)

I provide clients with expertise in delivering comprehensive cybersecurity services, including risk assessments, policy development, strategy formulation, and incident response planning. I posses a strong technical acumen, I excel at providing advanced technical support, developing and delivering impactful cybersecurity awareness training programs, and driving optimization of security, privacy, and data processes through standardization, implementation, management, and seamless integration of cutting-edge tools and procedures, including in the realm of cybersecurity and AI. I am experienced in generating insightful IT and cybersecurity reports, proactively identifying vulnerabilities, architecting and implementing robust security solutions, and conducting thorough security audits. I am adept at at mapping complex regulations and compliance requirements to specific business and technical needs, I am a skilled communicator and listener, capable of effectively engaging with diverse technical and non-technical stakeholders at all organizational levels. Furthermore, I actively lead and contribute to critical research projects, producing high-quality cybersecurity, quantum, and AI-focused content, including technical documentation and compelling presentations.

</aside>

<aside> <img src="/icons/briefcase_gray.svg" alt="/icons/briefcase_gray.svg" width="40px" /> Salt Cybersecurity On Cyber & AI Podcast ITSP Magazine Podcast Network (2021 - 2022)

I conducted comprehensive cybersecurity assessments and developed tailored cybersecurity programs and policies for organizations across diverse industries and various stages of growth. I collaborated effectively with teams, engineers, CISOs and executive leadership on critical risk and security posture matters, and communicated risk levels, implemented controls, and established processes with clarity and precision. My technical expertise encompassed collaborating with engineering teams and providing expert technical instruction in leading cloud platforms including Azure, AWS, Microsoft Cloud, and Google Cloud, complemented by practical experience in penetration testing, vulnerability scanning, and the implementation of remediation strategies. Beyond my technical proficiencies, I leveraged strong business acumen by developing the company's website, defining operational strategies and processes, driving marketing initiatives, managing vendor relationships, and successfully onboarding new vCISOs into the organization and client pipelines.

</aside>

<aside> <img src="/icons/briefcase_gray.svg" alt="/icons/briefcase_gray.svg" width="40px" /> Security/ Technical Consultant, Web Developer Freelance Consultant (2012 - 2014)

As a freelance consultant, I developed websites with intricate technical configurations, managing domains, DNS, and email setups for a wide array of clients and agencies across numerous industries, including B2B. My approach extended beyond mere implementation; I actively listened to client needs to develop tailored digital and social media strategies, complete with comprehensive annual editorial planning, ensuring their online presence aligned perfectly with their business goals. Furthermore, I developed security plans and meticulously configured user roles for company employees. This included establishing clear Standard Operating Procedures (SOPs) and implementing efficient data management, document management, and standardization processes, all while providing responsive technical assistance and support to ensure smooth operations. Recognizing the growing need for personal security in the digital age, I also conducted thorough OSINT/SOCMINT investigations, delivering insightful reports and actionable remediation strategies for the personal security of private and executive clients. My commitment to understanding and addressing client needs extended beyond technical execution, fostering long-term partnerships built on trust and tangible results. Additionally, I contracted as a technical and executive recruiter for various companies, successfully sourcing talent for roles in software engineering, Natural Language Processing/ Machine Learning (NLP/ ML ), and mid to executive management.

</aside>

<aside> <img src="/icons/briefcase_gray.svg" alt="/icons/briefcase_gray.svg" width="40px" /> ISO 27001 Audit Manager On Cyber & AI (2014 - 2014)

I developed and managed a comprehensive ISO 27001 audit program and associated procedures for a multi-national organization. This involved the creation of Standard Operating Procedures (SOPs) and extensive documentation, achieved through close collaboration with multiple departments, senior management, and the executive team. I expertly mapped and defined appropriate security controls and implemented new procedures and improvements across various departments to ensure adherence to stringent regulatory standards and meet all criteria for the ISO 27001 audit, encompassing technical, non-technical, and physical security domains. Furthermore, I developed and meticulously managed all necessary documentation and records for each department to support ongoing compliance. My contributions also included defining and implementing robust security measures and controls that demonstrably improved the overall security posture of the company.

</aside>



Highlights


Untitled