Ihab Shraim is the chief technology officer (CTO) at CSC, responsible for the vision, innovation, and product revenue growth within our company’s cyber security, domain security, fraud protection, and brand protection lines of business.
Ihab has a proven track record in devising business strategies to consistently deliver strategic growth through focused technology innovation, go-to-market product strategies, and customer service excellence. His background includes strong expertise in facilitating the alignment of corporate business vision with information technology strategies to achieve measurable results with successful outcomes. Ihab has developed cutting-edge, patented disruptive technologies and services to deliver consistent year-over-year product revenue growth. Additionally, he is named as a primary inventor on 10 U.S. patents. Prior to joining CSC, Ihab was on the Board of Binary Guard while also serving as their CTO. Prior to that role, he was the general manager for Presidio’s managed security service, and the vice president of engineering (anti-fraud) and chief information security officer at Mark Monitor (Clarivate Analytics).
Ihab is a graduate of George Washington University and holds a BS in electrical engineering and computer science.
As with any high-stakes event, elections have become a prime target for cybercriminals seeking to exploit public trust through impersonation, misinformation, and scams. CSC's comprehensive research about the 2024 U.S. Election reveals the alarming role of dormant domains, which have the potential to be exploited for launching cyber attacks against political campaigns, organizations, and constituents. more
I recently had the opportunity to speak on a podcast with Dave Bittner at CyberWire to discuss how .AI is giving cybercriminals a new avenue to take advantage of some of the largest companies in the world based on research findings from CSC's 2023 Domain Security Report. Below is a summary of the key points discussed during this podcast. more
Hackers are using company domain names for malicious attacks more than ever before. Established research shows that phishing and related malware attacks most commonly occur from a compromised or hijacked legitimate domain name, a maliciously registered, confusingly similar domain name, or via email header spoofing. Domain security intelligence is the first line of defense in preventing domain cyberattacks. more