About Zeina Zakhour


Fellow, Global Chief Technical Officer, Digital security, Atos and member of the Scientific Community

Zeina Zakhour is Vice-president, Global CTO for Digital Security in Atos. Zeina has twenty years of experience in the Cybersecurity field covering the end-to-end spectrum of cybersecurity from security advisory, to security integration, Managed security services/Managed Detection and Response, to securing digital innovations (Cloud, IoT, Edge, AI etc…) as well as risk management, compliance and privacy. She holds a Bachelor of Engineering in C.C.E from Notre Dame University Lebanon, a M. Sc. From Telecom SudParis and an Executive MBA focused on Innovation & Entrepreneurship from HEC School of Management. Zeina is a member of the Atos Scientific community and a Fellow in cybersecurity. She is also a Certified Information Systems Security Professional (CISSP) and a certified ISO 27005 Risk Manager. She was the recipient of Atos Innovation trophy in 2013, was named in 2019 among the “100 fascinating Females Fighting cybercrime”, was listed in the CTO/CIO/CDO French top 10 influencers and was recognized as 2020 Cyber security leader by the Cyber Security Observatory.




Follow or contact Zeina


Articles posted by Zeina Zakhour

Security by design: the new cyber security paradigm

We are living in remarkable times as ongoing digitalization transforms the world in which we live. It is estimated that by 2025, an average person will interact with connected devices around 4,800 times per day – that’s one interaction every 18 seconds. This speed of innovation is, however, also expanding the ‘attack surface’ and creating opportunities for threat…

Tech a minute video: How can AI help fight cyberthreats

Last November, two hospitals in Ohio and West Virginia turned patients away due to a ransomware attack. At the time, many asked what the hospitals could have done to prevent this. Many organizations are starting to adopt artificial intelligence (AI) to allow them to remain secure. Research shows that 60% think AI has the ability to find attacks…

Prescriptive security: using the haystack to find the needle

In our increasingly data-driven world, organizations are engaged in a race to gather operational and customer data and apply analytics to transform that data into valuable business insights. Yet one important application that is still rarely addressed is cybersecurity data analytics. From proactive to prescriptive We regularly hear about major cybersecurity breaches and wonder whether they…

What does the future of privacy hold?

In 10 years, will privacy be dead as Cassandras have been predicting? Has the volume of private data shared / used / overused exceeded the tipping point that, unless you were born in 2018 or living in a deserted island without internet connection, you cannot pretend to have any privacy left? Or are we at a critical crossroads where…

Data Privacy Day: Searching for the Lost Trust

A commemoration of what could have been? Or a celebration of trust reborn? Today, the 28th of January, is International Data Privacy Day. 11 years after its creation, countries and organizations have come together to put trust back at the core of the digital revolution. 2018 was indeed the year where personal data protection moved at the top…

“We are dealing with a hostage situation” - Could your city be held hostage by hackers?

“We are dealing with a hostage situation” were the words used by Mayor Keisha Lance Bottoms in a statement in March of this year. The city of Atlanta had suffered a major ransomware attack which crippled computers and wireless networks and blocked access to important data.…

Facebook and Cambridge Analytica: Is this the data wake-up call we’ve all needed?

There has been a cultural shift in the last week with regards to our personal data. Suddenly we all feel vulnerable, exposed and maybe slightly regretful. Perhaps even Mark Zuckerberg. We’re now beginning to realize that we’ve been willing participants in what has turned into a huge social experiment…

8 lessons learned from CloudHopper, WannaCry, NotPetya, BadRabbit

Since 2016 with CloudHopper, then WannaCry, NotPetya and BadRabbit more recently in 2017, cybercrime has risen in volume and sophistication but what are the lessons learned from the biggest ransomware attacks of these last couple of years? Take a look at our graphic below to show you our vision on how to protect your business from any attack……

Prescriptive Security: the journey to self-learning cyber security

In June 2017, over 200 million records were publicly leaked worldwide, putting sensitive data at risk and undermining trusted relationships between organisations, citizens, partners and other stakeholders. In 2016, 87% of organizations reported at least one cyber attack. With cyber threats expected to continue to grow in size, frequency and complexity, the annual global cost of cybercrime could…

Leading the fightback against ransomware

In a blog post earlier this year, I said that ransomware was a potential goldmine for criminals and that it was urgent for organizations to update their risk assessments and to proactively prepare for an attack. We did not have to wait long to see the threat from ransomware materialize on a global scale. The WannaCry malware attack in May was one…

GDPR, a challenge at the heart of digital transformation

The General Data Protection Regulation (GDPR) adopted on April 27th 2016 by the European Parliament aims at updating, strengthening and harmonizing the personal data protection framework. Starting May 25th 2018, all companies - with over 250 employees handling personal data (physical, cultural, social…) of European citizens, whether they are customers, suppliers or employees - will have to adopt it.…

How to Deal With Advanced Persistent Threats

As organizations become more digitally focused, the question of cybersecurity becomes even more pertinent. Not only are systems more complex, heterogeneous, decentralised, and therefore difficult to protect, but their increasing value makes them of increasing interest to cybercriminals leading to a corresponding increase in attacks. Most worrying of all is a rise in Advanced Persistent Threats (APTs). Unlike traditional…

Under Threat: Why Your Organization is at risk

In honour of International Data Protection Day I have been looking at the security implications of Big Data: the challenges and possible solutions for businesses. Today I’ll be looking ahead; here are the malicious techniques and tools that future hackers will use to target your business… When it comes to cybersecurity, there are two types of organizations: those…

No Compromise: Securing Big Data

Big Data platforms have become increasingly important to an organization’s daily operations. IT departments must quickly adapt, ensuring that the platforms are optimised for users as well as managed efficiently and in line with the continuously changing demands of IT infrastructure. One aspect, however, must remain constant during all the change: there can be no compromises when it comes to security. Whether…