SlideShare uma empresa Scribd logo
1 de 2
Web Profile – Dr. Eric Cole<br />Dr. Cole is a global industry expert with breadth and depth experience across integrated cyber security. His focus is assisting enterprises by creating, enhancing and growing technology and teams to bridge the gap between business and technology – with a focus on security and innovation.<br />Cole is the founder and CEO of Secure Anchor Consulting Services, working with Fortune 50 companies, financial institutions, and the federal government. Previously, Cole was Senior Vice President and Chief Technology Officer (CTO) for McAfee, Chief Scientist for Lockheed Martin, and CTO for The Sytex Group.  Cole’s additional expertise was honed as CIO for the American Institutes for Research, as VP of Enterprise Security Services for Vista Information Technologies, and Director of Security for Teligent.<br />As Dean of Faculty for the SANS Institute, he led the effort for the Institute to become certified by the State of Maryland and developed Master’s degree programs. He was also Director of the Institute’s Cyber Defense Initiative.<br />Dr. Cole holds a Doctorate degree in Network Security from Pace University, and a B.S. and M.S. in Computer Science from the New York Institute of Technology.  He is an adjunct professor at the latter, and at Georgetown University.<br />Specialties: information and network security, cloud computing, business technology strategy<br />Prior Experience:<br />SVP, CTO McAfee<br />Chief Scientist and Senior Fellow, Lockheed Martin<br />CTO The Sytex Group<br />Dean of Faculty, SANS Institute<br />CIO American Institutes of Research<br />Director of Security Teligent<br />Education:<br />Ph.D. Network Security Pace University<br />B.S., M.S. Computer Science New York Institute of Technology<br />Highlights:Member of IEEE<br />Member ICSA<br />Member CSI Computer Security Institute<br />Adjunct faculty, Pace University and Georgetown University<br />Publications:<br />Insider Threat, Eric Cole and Sandy Ring, 2005<br />The Network Security Bible, Eric Cole, Ron Krutz, and Jim Conley, 2005<br />Hiding in Plain Sight: Steganography and the Art of Covert Communication, Eric Cole, 2003<br />Hackers Beware, the Ultimate Guide to Network Security, Eric Cole, 2001<br />Links: (blog he wrote for Nuuko- on the current site)<br />Cyber Anarchists: Living in the Clouds Has Earthly Implications<br />30 Things Every Manager Should Know (same doc we are linking to from the Communications landing page) http://www.securityhaven.com/docs/30_Things_Every_Manager_Should_Know.pdf<br />
Global cyber expert Dr Eric Cole

Mais conteúdo relacionado

Mais procurados

Getting Started in Information Security
Getting Started in Information SecurityGetting Started in Information Security
Getting Started in Information SecurityDennis Maldonado
 
Cybersaftey (1)
Cybersaftey (1)Cybersaftey (1)
Cybersaftey (1)ABELANIL1
 
STAYING SAFE AND SECURED ON TODAY AND TOMORROW’S AFRICA CYBERSPACE WORKSHOP 2017
STAYING SAFE AND SECURED ON TODAY AND TOMORROW’S AFRICA CYBERSPACE WORKSHOP 2017STAYING SAFE AND SECURED ON TODAY AND TOMORROW’S AFRICA CYBERSPACE WORKSHOP 2017
STAYING SAFE AND SECURED ON TODAY AND TOMORROW’S AFRICA CYBERSPACE WORKSHOP 2017Maurice Dawson
 
Get training in cyber security &amp; place yourself in good companies through...
Get training in cyber security &amp; place yourself in good companies through...Get training in cyber security &amp; place yourself in good companies through...
Get training in cyber security &amp; place yourself in good companies through...CCI Training Center
 
Infomation security
Infomation securityInfomation security
Infomation securityMeet Soni
 
Alloy Cybersecurity Intro
Alloy Cybersecurity IntroAlloy Cybersecurity Intro
Alloy Cybersecurity IntroMark Stockman
 
Psychological Security: Introducing the PsySec Field
Psychological Security: Introducing the PsySec FieldPsychological Security: Introducing the PsySec Field
Psychological Security: Introducing the PsySec FieldZach(ary) Eikenberry
 
Cyber Security Professionals Viewed via Supply Chain
Cyber Security Professionals Viewed via Supply ChainCyber Security Professionals Viewed via Supply Chain
Cyber Security Professionals Viewed via Supply Chainaletarw
 
Cv fabio ghezzi en ext
Cv fabio ghezzi en extCv fabio ghezzi en ext
Cv fabio ghezzi en extFabio Ghezzi
 
Ethical Hacking Workshop is an essential for hackers
Ethical Hacking Workshop is an essential for hackersEthical Hacking Workshop is an essential for hackers
Ethical Hacking Workshop is an essential for hackerstechnoxian
 
1st Russian CSO Summit Trends 2008
1st Russian CSO Summit Trends 20081st Russian CSO Summit Trends 2008
1st Russian CSO Summit Trends 2008Anton Chuvakin
 
Cybersecurity pathways event by The TechForce Cyber
Cybersecurity pathways event by The TechForce CyberCybersecurity pathways event by The TechForce Cyber
Cybersecurity pathways event by The TechForce CyberJai Aenugu
 
Panel 3: Security and Privacy in Practice
Panel 3: Security and Privacy in PracticePanel 3: Security and Privacy in Practice
Panel 3: Security and Privacy in PracticePacificResearchPlatform
 
Become a Cyber Security Professional at Our Oklahoma Trade Schools
Become a Cyber Security Professional at Our Oklahoma Trade SchoolsBecome a Cyber Security Professional at Our Oklahoma Trade Schools
Become a Cyber Security Professional at Our Oklahoma Trade SchoolsMetro Technology Centers
 

Mais procurados (20)

Getting Started in Information Security
Getting Started in Information SecurityGetting Started in Information Security
Getting Started in Information Security
 
Malcolm Boston Resume
Malcolm Boston ResumeMalcolm Boston Resume
Malcolm Boston Resume
 
Cybersaftey (1)
Cybersaftey (1)Cybersaftey (1)
Cybersaftey (1)
 
Network security
Network securityNetwork security
Network security
 
STAYING SAFE AND SECURED ON TODAY AND TOMORROW’S AFRICA CYBERSPACE WORKSHOP 2017
STAYING SAFE AND SECURED ON TODAY AND TOMORROW’S AFRICA CYBERSPACE WORKSHOP 2017STAYING SAFE AND SECURED ON TODAY AND TOMORROW’S AFRICA CYBERSPACE WORKSHOP 2017
STAYING SAFE AND SECURED ON TODAY AND TOMORROW’S AFRICA CYBERSPACE WORKSHOP 2017
 
Cybersecurity
CybersecurityCybersecurity
Cybersecurity
 
Network Security Terminologies
Network Security TerminologiesNetwork Security Terminologies
Network Security Terminologies
 
Get training in cyber security &amp; place yourself in good companies through...
Get training in cyber security &amp; place yourself in good companies through...Get training in cyber security &amp; place yourself in good companies through...
Get training in cyber security &amp; place yourself in good companies through...
 
Infomation security
Infomation securityInfomation security
Infomation security
 
Alloy Cybersecurity Intro
Alloy Cybersecurity IntroAlloy Cybersecurity Intro
Alloy Cybersecurity Intro
 
Psychological Security: Introducing the PsySec Field
Psychological Security: Introducing the PsySec FieldPsychological Security: Introducing the PsySec Field
Psychological Security: Introducing the PsySec Field
 
Cyber Security Professionals Viewed via Supply Chain
Cyber Security Professionals Viewed via Supply ChainCyber Security Professionals Viewed via Supply Chain
Cyber Security Professionals Viewed via Supply Chain
 
Data security training
Data security trainingData security training
Data security training
 
Cv fabio ghezzi en ext
Cv fabio ghezzi en extCv fabio ghezzi en ext
Cv fabio ghezzi en ext
 
Ethical Hacking Workshop is an essential for hackers
Ethical Hacking Workshop is an essential for hackersEthical Hacking Workshop is an essential for hackers
Ethical Hacking Workshop is an essential for hackers
 
1st Russian CSO Summit Trends 2008
1st Russian CSO Summit Trends 20081st Russian CSO Summit Trends 2008
1st Russian CSO Summit Trends 2008
 
Cybersecurity pathways event by The TechForce Cyber
Cybersecurity pathways event by The TechForce CyberCybersecurity pathways event by The TechForce Cyber
Cybersecurity pathways event by The TechForce Cyber
 
Panel 3: Security and Privacy in Practice
Panel 3: Security and Privacy in PracticePanel 3: Security and Privacy in Practice
Panel 3: Security and Privacy in Practice
 
Steganography
SteganographySteganography
Steganography
 
Become a Cyber Security Professional at Our Oklahoma Trade Schools
Become a Cyber Security Professional at Our Oklahoma Trade SchoolsBecome a Cyber Security Professional at Our Oklahoma Trade Schools
Become a Cyber Security Professional at Our Oklahoma Trade Schools
 

Semelhante a Global cyber expert Dr Eric Cole

UMUC Cyber Day Program
UMUC Cyber Day  ProgramUMUC Cyber Day  Program
UMUC Cyber Day ProgramTroy Thompson
 
Testimony of Terry V. Benzel, University of Southern California Information S...
Testimony of Terry V. Benzel, University of Southern California Information S...Testimony of Terry V. Benzel, University of Southern California Information S...
Testimony of Terry V. Benzel, University of Southern California Information S...DETER-Project
 
2011 lecture ia orientation
2011 lecture ia orientation2011 lecture ia orientation
2011 lecture ia orientation2b3d
 
CWC FiresideChat Slides.pptx
CWC FiresideChat Slides.pptxCWC FiresideChat Slides.pptx
CWC FiresideChat Slides.pptxCapitolTechU
 
MIT ILP STEX Cybersecurity Workshop 5.28.15
MIT ILP STEX Cybersecurity Workshop 5.28.15MIT ILP STEX Cybersecurity Workshop 5.28.15
MIT ILP STEX Cybersecurity Workshop 5.28.15MIT Startup Exchange
 
All About Network Security & its Essentials.pptx
All About Network Security & its Essentials.pptxAll About Network Security & its Essentials.pptx
All About Network Security & its Essentials.pptxInfosectrain3
 
Cyber security for Developers
Cyber security for DevelopersCyber security for Developers
Cyber security for Developerstechtutorus
 
Why MSc is Right Choice
Why MSc is Right ChoiceWhy MSc is Right Choice
Why MSc is Right ChoiceEmma Thompson
 
Hakin9 interview w Prof Sood
Hakin9 interview w Prof SoodHakin9 interview w Prof Sood
Hakin9 interview w Prof SoodZsolt Nemeth
 
Ethical Hacking Certification Path You Should Follow
Ethical Hacking Certification Path You Should FollowEthical Hacking Certification Path You Should Follow
Ethical Hacking Certification Path You Should FollowMercury Solutions Limited
 
Charleston R!OT IoT Applications for Defense Workshop
Charleston R!OT IoT Applications for Defense WorkshopCharleston R!OT IoT Applications for Defense Workshop
Charleston R!OT IoT Applications for Defense WorkshopJoseph Hirl
 
Module 1 (legality)
Module 1 (legality)Module 1 (legality)
Module 1 (legality)Wail Hassan
 
Cybersecurity, Emerging Tech, and Risk Management - compiled media and writin...
Cybersecurity, Emerging Tech, and Risk Management - compiled media and writin...Cybersecurity, Emerging Tech, and Risk Management - compiled media and writin...
Cybersecurity, Emerging Tech, and Risk Management - compiled media and writin...Chuck Brooks
 
Cyber terrorism.. sir summar
Cyber terrorism.. sir summarCyber terrorism.. sir summar
Cyber terrorism.. sir summarmanailmalik
 
[CB16] Using the CGC’s fully automated vulnerability detection tools in secur...
[CB16] Using the CGC’s fully automated vulnerability detection tools in secur...[CB16] Using the CGC’s fully automated vulnerability detection tools in secur...
[CB16] Using the CGC’s fully automated vulnerability detection tools in secur...CODE BLUE
 

Semelhante a Global cyber expert Dr Eric Cole (20)

UMUC Cyber Day Program
UMUC Cyber Day  ProgramUMUC Cyber Day  Program
UMUC Cyber Day Program
 
Testimony of Terry V. Benzel, University of Southern California Information S...
Testimony of Terry V. Benzel, University of Southern California Information S...Testimony of Terry V. Benzel, University of Southern California Information S...
Testimony of Terry V. Benzel, University of Southern California Information S...
 
2011 lecture ia orientation
2011 lecture ia orientation2011 lecture ia orientation
2011 lecture ia orientation
 
CWC FiresideChat Slides.pptx
CWC FiresideChat Slides.pptxCWC FiresideChat Slides.pptx
CWC FiresideChat Slides.pptx
 
Secure Web Apps Training at Corporate College
Secure Web Apps Training at Corporate CollegeSecure Web Apps Training at Corporate College
Secure Web Apps Training at Corporate College
 
Security Firm Program - Corporate College
Security Firm Program - Corporate CollegeSecurity Firm Program - Corporate College
Security Firm Program - Corporate College
 
MIT ILP STEX Cybersecurity Workshop 5.28.15
MIT ILP STEX Cybersecurity Workshop 5.28.15MIT ILP STEX Cybersecurity Workshop 5.28.15
MIT ILP STEX Cybersecurity Workshop 5.28.15
 
Dr. Charles Pak
Dr. Charles PakDr. Charles Pak
Dr. Charles Pak
 
All About Network Security & its Essentials.pptx
All About Network Security & its Essentials.pptxAll About Network Security & its Essentials.pptx
All About Network Security & its Essentials.pptx
 
Cyber security for Developers
Cyber security for DevelopersCyber security for Developers
Cyber security for Developers
 
Tim Nolan
Tim NolanTim Nolan
Tim Nolan
 
Why MSc is Right Choice
Why MSc is Right ChoiceWhy MSc is Right Choice
Why MSc is Right Choice
 
Hakin9 interview w Prof Sood
Hakin9 interview w Prof SoodHakin9 interview w Prof Sood
Hakin9 interview w Prof Sood
 
Ethical Hacking Certification Path You Should Follow
Ethical Hacking Certification Path You Should FollowEthical Hacking Certification Path You Should Follow
Ethical Hacking Certification Path You Should Follow
 
Charleston R!OT IoT Applications for Defense Workshop
Charleston R!OT IoT Applications for Defense WorkshopCharleston R!OT IoT Applications for Defense Workshop
Charleston R!OT IoT Applications for Defense Workshop
 
Module 1 (legality)
Module 1 (legality)Module 1 (legality)
Module 1 (legality)
 
Alloy Cybersecurity
Alloy CybersecurityAlloy Cybersecurity
Alloy Cybersecurity
 
Cybersecurity, Emerging Tech, and Risk Management - compiled media and writin...
Cybersecurity, Emerging Tech, and Risk Management - compiled media and writin...Cybersecurity, Emerging Tech, and Risk Management - compiled media and writin...
Cybersecurity, Emerging Tech, and Risk Management - compiled media and writin...
 
Cyber terrorism.. sir summar
Cyber terrorism.. sir summarCyber terrorism.. sir summar
Cyber terrorism.. sir summar
 
[CB16] Using the CGC’s fully automated vulnerability detection tools in secur...
[CB16] Using the CGC’s fully automated vulnerability detection tools in secur...[CB16] Using the CGC’s fully automated vulnerability detection tools in secur...
[CB16] Using the CGC’s fully automated vulnerability detection tools in secur...
 

Mais de Nuuko, Inc.

Nuuko Enterprise Optimizer
Nuuko Enterprise OptimizerNuuko Enterprise Optimizer
Nuuko Enterprise OptimizerNuuko, Inc.
 
Dr. Eric Cole - 30 Things Every Manager Should Know
Dr. Eric Cole - 30 Things Every Manager Should KnowDr. Eric Cole - 30 Things Every Manager Should Know
Dr. Eric Cole - 30 Things Every Manager Should KnowNuuko, Inc.
 
DOE Loans for Renewable Generation, Transmission Doubtful After September
DOE Loans for Renewable Generation, Transmission Doubtful After SeptemberDOE Loans for Renewable Generation, Transmission Doubtful After September
DOE Loans for Renewable Generation, Transmission Doubtful After SeptemberNuuko, Inc.
 
Managed care feb2009a article
Managed care feb2009a articleManaged care feb2009a article
Managed care feb2009a articleNuuko, Inc.
 
Nuuko enterprise optimizer case studies
Nuuko enterprise optimizer case studiesNuuko enterprise optimizer case studies
Nuuko enterprise optimizer case studiesNuuko, Inc.
 
Jerry tarasofsky for web 8.8
Jerry tarasofsky for web 8.8Jerry tarasofsky for web 8.8
Jerry tarasofsky for web 8.8Nuuko, Inc.
 
It's not about jobs jobs jobs
It's not about jobs jobs jobs It's not about jobs jobs jobs
It's not about jobs jobs jobs Nuuko, Inc.
 
Social media bootcamp presentation 071311.final
Social media bootcamp presentation 071311.finalSocial media bootcamp presentation 071311.final
Social media bootcamp presentation 071311.finalNuuko, Inc.
 
The death of the company
The death of the companyThe death of the company
The death of the companyNuuko, Inc.
 
Comm media advisory 6 14 final
Comm media advisory 6 14 finalComm media advisory 6 14 final
Comm media advisory 6 14 finalNuuko, Inc.
 
C suite clusters ppt for landing page
C suite clusters ppt for landing pageC suite clusters ppt for landing page
C suite clusters ppt for landing pageNuuko, Inc.
 
C suite clusters ppt for landing page
C suite clusters ppt for landing pageC suite clusters ppt for landing page
C suite clusters ppt for landing pageNuuko, Inc.
 
Communications cluster ppt 6.01
Communications cluster ppt 6.01Communications cluster ppt 6.01
Communications cluster ppt 6.01Nuuko, Inc.
 
Downstream org structure.refining ind
Downstream org structure.refining indDownstream org structure.refining ind
Downstream org structure.refining indNuuko, Inc.
 
Understanding pr tsa
Understanding pr  tsaUnderstanding pr  tsa
Understanding pr tsaNuuko, Inc.
 
About us poretz profile-1
About us   poretz profile-1About us   poretz profile-1
About us poretz profile-1Nuuko, Inc.
 
Shelbybio for web
Shelbybio for webShelbybio for web
Shelbybio for webNuuko, Inc.
 
John caswell for web
John caswell for webJohn caswell for web
John caswell for webNuuko, Inc.
 

Mais de Nuuko, Inc. (20)

Nuuko Enterprise Optimizer
Nuuko Enterprise OptimizerNuuko Enterprise Optimizer
Nuuko Enterprise Optimizer
 
Dr. Eric Cole - 30 Things Every Manager Should Know
Dr. Eric Cole - 30 Things Every Manager Should KnowDr. Eric Cole - 30 Things Every Manager Should Know
Dr. Eric Cole - 30 Things Every Manager Should Know
 
DOE Loans for Renewable Generation, Transmission Doubtful After September
DOE Loans for Renewable Generation, Transmission Doubtful After SeptemberDOE Loans for Renewable Generation, Transmission Doubtful After September
DOE Loans for Renewable Generation, Transmission Doubtful After September
 
Managed care feb2009a article
Managed care feb2009a articleManaged care feb2009a article
Managed care feb2009a article
 
Nuuko enterprise optimizer case studies
Nuuko enterprise optimizer case studiesNuuko enterprise optimizer case studies
Nuuko enterprise optimizer case studies
 
Jerry tarasofsky for web 8.8
Jerry tarasofsky for web 8.8Jerry tarasofsky for web 8.8
Jerry tarasofsky for web 8.8
 
It's not about jobs jobs jobs
It's not about jobs jobs jobs It's not about jobs jobs jobs
It's not about jobs jobs jobs
 
Social media bootcamp presentation 071311.final
Social media bootcamp presentation 071311.finalSocial media bootcamp presentation 071311.final
Social media bootcamp presentation 071311.final
 
The death of the company
The death of the companyThe death of the company
The death of the company
 
Comm media advisory 6 14 final
Comm media advisory 6 14 finalComm media advisory 6 14 final
Comm media advisory 6 14 final
 
C suite clusters ppt for landing page
C suite clusters ppt for landing pageC suite clusters ppt for landing page
C suite clusters ppt for landing page
 
C suite clusters ppt for landing page
C suite clusters ppt for landing pageC suite clusters ppt for landing page
C suite clusters ppt for landing page
 
Communications cluster ppt 6.01
Communications cluster ppt 6.01Communications cluster ppt 6.01
Communications cluster ppt 6.01
 
Downstream org structure.refining ind
Downstream org structure.refining indDownstream org structure.refining ind
Downstream org structure.refining ind
 
Curtis robinson
Curtis robinsonCurtis robinson
Curtis robinson
 
Understanding pr tsa
Understanding pr  tsaUnderstanding pr  tsa
Understanding pr tsa
 
About us poretz profile-1
About us   poretz profile-1About us   poretz profile-1
About us poretz profile-1
 
Bio for web
Bio for webBio for web
Bio for web
 
Shelbybio for web
Shelbybio for webShelbybio for web
Shelbybio for web
 
John caswell for web
John caswell for webJohn caswell for web
John caswell for web
 

Último

My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAndikSusilo4
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 

Último (20)

My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & Application
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 

Global cyber expert Dr Eric Cole

  • 1. Web Profile – Dr. Eric Cole<br />Dr. Cole is a global industry expert with breadth and depth experience across integrated cyber security. His focus is assisting enterprises by creating, enhancing and growing technology and teams to bridge the gap between business and technology – with a focus on security and innovation.<br />Cole is the founder and CEO of Secure Anchor Consulting Services, working with Fortune 50 companies, financial institutions, and the federal government. Previously, Cole was Senior Vice President and Chief Technology Officer (CTO) for McAfee, Chief Scientist for Lockheed Martin, and CTO for The Sytex Group. Cole’s additional expertise was honed as CIO for the American Institutes for Research, as VP of Enterprise Security Services for Vista Information Technologies, and Director of Security for Teligent.<br />As Dean of Faculty for the SANS Institute, he led the effort for the Institute to become certified by the State of Maryland and developed Master’s degree programs. He was also Director of the Institute’s Cyber Defense Initiative.<br />Dr. Cole holds a Doctorate degree in Network Security from Pace University, and a B.S. and M.S. in Computer Science from the New York Institute of Technology. He is an adjunct professor at the latter, and at Georgetown University.<br />Specialties: information and network security, cloud computing, business technology strategy<br />Prior Experience:<br />SVP, CTO McAfee<br />Chief Scientist and Senior Fellow, Lockheed Martin<br />CTO The Sytex Group<br />Dean of Faculty, SANS Institute<br />CIO American Institutes of Research<br />Director of Security Teligent<br />Education:<br />Ph.D. Network Security Pace University<br />B.S., M.S. Computer Science New York Institute of Technology<br />Highlights:Member of IEEE<br />Member ICSA<br />Member CSI Computer Security Institute<br />Adjunct faculty, Pace University and Georgetown University<br />Publications:<br />Insider Threat, Eric Cole and Sandy Ring, 2005<br />The Network Security Bible, Eric Cole, Ron Krutz, and Jim Conley, 2005<br />Hiding in Plain Sight: Steganography and the Art of Covert Communication, Eric Cole, 2003<br />Hackers Beware, the Ultimate Guide to Network Security, Eric Cole, 2001<br />Links: (blog he wrote for Nuuko- on the current site)<br />Cyber Anarchists: Living in the Clouds Has Earthly Implications<br />30 Things Every Manager Should Know (same doc we are linking to from the Communications landing page) http://www.securityhaven.com/docs/30_Things_Every_Manager_Should_Know.pdf<br />