SlideShare une entreprise Scribd logo
1  sur  2
Web Profile – Dr. Eric Cole<br />Dr. Cole is a global industry expert with breadth and depth experience across integrated cyber security. His focus is assisting enterprises by creating, enhancing and growing technology and teams to bridge the gap between business and technology – with a focus on security and innovation.<br />Cole is the founder and CEO of Secure Anchor Consulting Services, working with Fortune 50 companies, financial institutions, and the federal government. Previously, Cole was Senior Vice President and Chief Technology Officer (CTO) for McAfee, Chief Scientist for Lockheed Martin, and CTO for The Sytex Group.  Cole’s additional expertise was honed as CIO for the American Institutes for Research, as VP of Enterprise Security Services for Vista Information Technologies, and Director of Security for Teligent.<br />As Dean of Faculty for the SANS Institute, he led the effort for the Institute to become certified by the State of Maryland and developed Master’s degree programs. He was also Director of the Institute’s Cyber Defense Initiative.<br />Dr. Cole holds a Doctorate degree in Network Security from Pace University, and a B.S. and M.S. in Computer Science from the New York Institute of Technology.  He is an adjunct professor at the latter, and at Georgetown University.<br />Specialties: information and network security, cloud computing, business technology strategy<br />Prior Experience:<br />SVP, CTO McAfee<br />Chief Scientist and Senior Fellow, Lockheed Martin<br />CTO The Sytex Group<br />Dean of Faculty, SANS Institute<br />CIO American Institutes of Research<br />Director of Security Teligent<br />Education:<br />Ph.D. Network Security Pace University<br />B.S., M.S. Computer Science New York Institute of Technology<br />Highlights:Member of IEEE<br />Member ICSA<br />Member CSI Computer Security Institute<br />Adjunct faculty, Pace University and Georgetown University<br />Publications:<br />Insider Threat, Eric Cole and Sandy Ring, 2005<br />The Network Security Bible, Eric Cole, Ron Krutz, and Jim Conley, 2005<br />Hiding in Plain Sight: Steganography and the Art of Covert Communication, Eric Cole, 2003<br />Hackers Beware, the Ultimate Guide to Network Security, Eric Cole, 2001<br />Links: (blog he wrote for Nuuko- on the current site)<br />Cyber Anarchists: Living in the Clouds Has Earthly Implications<br />30 Things Every Manager Should Know (same doc we are linking to from the Communications landing page) http://www.securityhaven.com/docs/30_Things_Every_Manager_Should_Know.pdf<br />
Web profile

Contenu connexe

Tendances

Getting Started in Information Security
Getting Started in Information SecurityGetting Started in Information Security
Getting Started in Information SecurityDennis Maldonado
 
Cybersaftey (1)
Cybersaftey (1)Cybersaftey (1)
Cybersaftey (1)ABELANIL1
 
STAYING SAFE AND SECURED ON TODAY AND TOMORROW’S AFRICA CYBERSPACE WORKSHOP 2017
STAYING SAFE AND SECURED ON TODAY AND TOMORROW’S AFRICA CYBERSPACE WORKSHOP 2017STAYING SAFE AND SECURED ON TODAY AND TOMORROW’S AFRICA CYBERSPACE WORKSHOP 2017
STAYING SAFE AND SECURED ON TODAY AND TOMORROW’S AFRICA CYBERSPACE WORKSHOP 2017Maurice Dawson
 
Get training in cyber security &amp; place yourself in good companies through...
Get training in cyber security &amp; place yourself in good companies through...Get training in cyber security &amp; place yourself in good companies through...
Get training in cyber security &amp; place yourself in good companies through...CCI Training Center
 
Infomation security
Infomation securityInfomation security
Infomation securityMeet Soni
 
Alloy Cybersecurity Intro
Alloy Cybersecurity IntroAlloy Cybersecurity Intro
Alloy Cybersecurity IntroMark Stockman
 
Psychological Security: Introducing the PsySec Field
Psychological Security: Introducing the PsySec FieldPsychological Security: Introducing the PsySec Field
Psychological Security: Introducing the PsySec FieldZach(ary) Eikenberry
 
Cyber Security Professionals Viewed via Supply Chain
Cyber Security Professionals Viewed via Supply ChainCyber Security Professionals Viewed via Supply Chain
Cyber Security Professionals Viewed via Supply Chainaletarw
 
Cv fabio ghezzi en ext
Cv fabio ghezzi en extCv fabio ghezzi en ext
Cv fabio ghezzi en extFabio Ghezzi
 
Ethical Hacking Workshop is an essential for hackers
Ethical Hacking Workshop is an essential for hackersEthical Hacking Workshop is an essential for hackers
Ethical Hacking Workshop is an essential for hackerstechnoxian
 
1st Russian CSO Summit Trends 2008
1st Russian CSO Summit Trends 20081st Russian CSO Summit Trends 2008
1st Russian CSO Summit Trends 2008Anton Chuvakin
 
Cybersecurity pathways event by The TechForce Cyber
Cybersecurity pathways event by The TechForce CyberCybersecurity pathways event by The TechForce Cyber
Cybersecurity pathways event by The TechForce CyberJai Aenugu
 
Panel 3: Security and Privacy in Practice
Panel 3: Security and Privacy in PracticePanel 3: Security and Privacy in Practice
Panel 3: Security and Privacy in PracticePacificResearchPlatform
 
Become a Cyber Security Professional at Our Oklahoma Trade Schools
Become a Cyber Security Professional at Our Oklahoma Trade SchoolsBecome a Cyber Security Professional at Our Oklahoma Trade Schools
Become a Cyber Security Professional at Our Oklahoma Trade SchoolsMetro Technology Centers
 

Tendances (20)

Getting Started in Information Security
Getting Started in Information SecurityGetting Started in Information Security
Getting Started in Information Security
 
Malcolm Boston Resume
Malcolm Boston ResumeMalcolm Boston Resume
Malcolm Boston Resume
 
Cybersaftey (1)
Cybersaftey (1)Cybersaftey (1)
Cybersaftey (1)
 
Network security
Network securityNetwork security
Network security
 
STAYING SAFE AND SECURED ON TODAY AND TOMORROW’S AFRICA CYBERSPACE WORKSHOP 2017
STAYING SAFE AND SECURED ON TODAY AND TOMORROW’S AFRICA CYBERSPACE WORKSHOP 2017STAYING SAFE AND SECURED ON TODAY AND TOMORROW’S AFRICA CYBERSPACE WORKSHOP 2017
STAYING SAFE AND SECURED ON TODAY AND TOMORROW’S AFRICA CYBERSPACE WORKSHOP 2017
 
Cybersecurity
CybersecurityCybersecurity
Cybersecurity
 
Network Security Terminologies
Network Security TerminologiesNetwork Security Terminologies
Network Security Terminologies
 
Get training in cyber security &amp; place yourself in good companies through...
Get training in cyber security &amp; place yourself in good companies through...Get training in cyber security &amp; place yourself in good companies through...
Get training in cyber security &amp; place yourself in good companies through...
 
Infomation security
Infomation securityInfomation security
Infomation security
 
Alloy Cybersecurity Intro
Alloy Cybersecurity IntroAlloy Cybersecurity Intro
Alloy Cybersecurity Intro
 
Psychological Security: Introducing the PsySec Field
Psychological Security: Introducing the PsySec FieldPsychological Security: Introducing the PsySec Field
Psychological Security: Introducing the PsySec Field
 
Cyber Security Professionals Viewed via Supply Chain
Cyber Security Professionals Viewed via Supply ChainCyber Security Professionals Viewed via Supply Chain
Cyber Security Professionals Viewed via Supply Chain
 
Data security training
Data security trainingData security training
Data security training
 
Cv fabio ghezzi en ext
Cv fabio ghezzi en extCv fabio ghezzi en ext
Cv fabio ghezzi en ext
 
Ethical Hacking Workshop is an essential for hackers
Ethical Hacking Workshop is an essential for hackersEthical Hacking Workshop is an essential for hackers
Ethical Hacking Workshop is an essential for hackers
 
1st Russian CSO Summit Trends 2008
1st Russian CSO Summit Trends 20081st Russian CSO Summit Trends 2008
1st Russian CSO Summit Trends 2008
 
Cybersecurity pathways event by The TechForce Cyber
Cybersecurity pathways event by The TechForce CyberCybersecurity pathways event by The TechForce Cyber
Cybersecurity pathways event by The TechForce Cyber
 
Panel 3: Security and Privacy in Practice
Panel 3: Security and Privacy in PracticePanel 3: Security and Privacy in Practice
Panel 3: Security and Privacy in Practice
 
Steganography
SteganographySteganography
Steganography
 
Become a Cyber Security Professional at Our Oklahoma Trade Schools
Become a Cyber Security Professional at Our Oklahoma Trade SchoolsBecome a Cyber Security Professional at Our Oklahoma Trade Schools
Become a Cyber Security Professional at Our Oklahoma Trade Schools
 

Similaire à Web profile

UMUC Cyber Day Program
UMUC Cyber Day  ProgramUMUC Cyber Day  Program
UMUC Cyber Day ProgramTroy Thompson
 
Testimony of Terry V. Benzel, University of Southern California Information S...
Testimony of Terry V. Benzel, University of Southern California Information S...Testimony of Terry V. Benzel, University of Southern California Information S...
Testimony of Terry V. Benzel, University of Southern California Information S...DETER-Project
 
2011 lecture ia orientation
2011 lecture ia orientation2011 lecture ia orientation
2011 lecture ia orientation2b3d
 
CWC FiresideChat Slides.pptx
CWC FiresideChat Slides.pptxCWC FiresideChat Slides.pptx
CWC FiresideChat Slides.pptxCapitolTechU
 
MIT ILP STEX Cybersecurity Workshop 5.28.15
MIT ILP STEX Cybersecurity Workshop 5.28.15MIT ILP STEX Cybersecurity Workshop 5.28.15
MIT ILP STEX Cybersecurity Workshop 5.28.15MIT Startup Exchange
 
All About Network Security & its Essentials.pptx
All About Network Security & its Essentials.pptxAll About Network Security & its Essentials.pptx
All About Network Security & its Essentials.pptxInfosectrain3
 
Cyber security for Developers
Cyber security for DevelopersCyber security for Developers
Cyber security for Developerstechtutorus
 
Why MSc is Right Choice
Why MSc is Right ChoiceWhy MSc is Right Choice
Why MSc is Right ChoiceEmma Thompson
 
Hakin9 interview w Prof Sood
Hakin9 interview w Prof SoodHakin9 interview w Prof Sood
Hakin9 interview w Prof SoodZsolt Nemeth
 
Ethical Hacking Certification Path You Should Follow
Ethical Hacking Certification Path You Should FollowEthical Hacking Certification Path You Should Follow
Ethical Hacking Certification Path You Should FollowMercury Solutions Limited
 
Charleston R!OT IoT Applications for Defense Workshop
Charleston R!OT IoT Applications for Defense WorkshopCharleston R!OT IoT Applications for Defense Workshop
Charleston R!OT IoT Applications for Defense WorkshopJoseph Hirl
 
Module 1 (legality)
Module 1 (legality)Module 1 (legality)
Module 1 (legality)Wail Hassan
 
Cybersecurity, Emerging Tech, and Risk Management - compiled media and writin...
Cybersecurity, Emerging Tech, and Risk Management - compiled media and writin...Cybersecurity, Emerging Tech, and Risk Management - compiled media and writin...
Cybersecurity, Emerging Tech, and Risk Management - compiled media and writin...Chuck Brooks
 
Cyber terrorism.. sir summar
Cyber terrorism.. sir summarCyber terrorism.. sir summar
Cyber terrorism.. sir summarmanailmalik
 
[CB16] Using the CGC’s fully automated vulnerability detection tools in secur...
[CB16] Using the CGC’s fully automated vulnerability detection tools in secur...[CB16] Using the CGC’s fully automated vulnerability detection tools in secur...
[CB16] Using the CGC’s fully automated vulnerability detection tools in secur...CODE BLUE
 

Similaire à Web profile (20)

UMUC Cyber Day Program
UMUC Cyber Day  ProgramUMUC Cyber Day  Program
UMUC Cyber Day Program
 
Testimony of Terry V. Benzel, University of Southern California Information S...
Testimony of Terry V. Benzel, University of Southern California Information S...Testimony of Terry V. Benzel, University of Southern California Information S...
Testimony of Terry V. Benzel, University of Southern California Information S...
 
2011 lecture ia orientation
2011 lecture ia orientation2011 lecture ia orientation
2011 lecture ia orientation
 
CWC FiresideChat Slides.pptx
CWC FiresideChat Slides.pptxCWC FiresideChat Slides.pptx
CWC FiresideChat Slides.pptx
 
Secure Web Apps Training at Corporate College
Secure Web Apps Training at Corporate CollegeSecure Web Apps Training at Corporate College
Secure Web Apps Training at Corporate College
 
Security Firm Program - Corporate College
Security Firm Program - Corporate CollegeSecurity Firm Program - Corporate College
Security Firm Program - Corporate College
 
MIT ILP STEX Cybersecurity Workshop 5.28.15
MIT ILP STEX Cybersecurity Workshop 5.28.15MIT ILP STEX Cybersecurity Workshop 5.28.15
MIT ILP STEX Cybersecurity Workshop 5.28.15
 
Dr. Charles Pak
Dr. Charles PakDr. Charles Pak
Dr. Charles Pak
 
All About Network Security & its Essentials.pptx
All About Network Security & its Essentials.pptxAll About Network Security & its Essentials.pptx
All About Network Security & its Essentials.pptx
 
Cyber security for Developers
Cyber security for DevelopersCyber security for Developers
Cyber security for Developers
 
Tim Nolan
Tim NolanTim Nolan
Tim Nolan
 
Why MSc is Right Choice
Why MSc is Right ChoiceWhy MSc is Right Choice
Why MSc is Right Choice
 
Hakin9 interview w Prof Sood
Hakin9 interview w Prof SoodHakin9 interview w Prof Sood
Hakin9 interview w Prof Sood
 
Ethical Hacking Certification Path You Should Follow
Ethical Hacking Certification Path You Should FollowEthical Hacking Certification Path You Should Follow
Ethical Hacking Certification Path You Should Follow
 
Charleston R!OT IoT Applications for Defense Workshop
Charleston R!OT IoT Applications for Defense WorkshopCharleston R!OT IoT Applications for Defense Workshop
Charleston R!OT IoT Applications for Defense Workshop
 
Module 1 (legality)
Module 1 (legality)Module 1 (legality)
Module 1 (legality)
 
Alloy Cybersecurity
Alloy CybersecurityAlloy Cybersecurity
Alloy Cybersecurity
 
Cybersecurity, Emerging Tech, and Risk Management - compiled media and writin...
Cybersecurity, Emerging Tech, and Risk Management - compiled media and writin...Cybersecurity, Emerging Tech, and Risk Management - compiled media and writin...
Cybersecurity, Emerging Tech, and Risk Management - compiled media and writin...
 
Cyber terrorism.. sir summar
Cyber terrorism.. sir summarCyber terrorism.. sir summar
Cyber terrorism.. sir summar
 
[CB16] Using the CGC’s fully automated vulnerability detection tools in secur...
[CB16] Using the CGC’s fully automated vulnerability detection tools in secur...[CB16] Using the CGC’s fully automated vulnerability detection tools in secur...
[CB16] Using the CGC’s fully automated vulnerability detection tools in secur...
 

Plus de Nuuko, Inc.

Nuuko Enterprise Optimizer
Nuuko Enterprise OptimizerNuuko Enterprise Optimizer
Nuuko Enterprise OptimizerNuuko, Inc.
 
Dr. Eric Cole - 30 Things Every Manager Should Know
Dr. Eric Cole - 30 Things Every Manager Should KnowDr. Eric Cole - 30 Things Every Manager Should Know
Dr. Eric Cole - 30 Things Every Manager Should KnowNuuko, Inc.
 
DOE Loans for Renewable Generation, Transmission Doubtful After September
DOE Loans for Renewable Generation, Transmission Doubtful After SeptemberDOE Loans for Renewable Generation, Transmission Doubtful After September
DOE Loans for Renewable Generation, Transmission Doubtful After SeptemberNuuko, Inc.
 
Managed care feb2009a article
Managed care feb2009a articleManaged care feb2009a article
Managed care feb2009a articleNuuko, Inc.
 
Nuuko enterprise optimizer case studies
Nuuko enterprise optimizer case studiesNuuko enterprise optimizer case studies
Nuuko enterprise optimizer case studiesNuuko, Inc.
 
Jerry tarasofsky for web 8.8
Jerry tarasofsky for web 8.8Jerry tarasofsky for web 8.8
Jerry tarasofsky for web 8.8Nuuko, Inc.
 
It's not about jobs jobs jobs
It's not about jobs jobs jobs It's not about jobs jobs jobs
It's not about jobs jobs jobs Nuuko, Inc.
 
Social media bootcamp presentation 071311.final
Social media bootcamp presentation 071311.finalSocial media bootcamp presentation 071311.final
Social media bootcamp presentation 071311.finalNuuko, Inc.
 
The death of the company
The death of the companyThe death of the company
The death of the companyNuuko, Inc.
 
Comm media advisory 6 14 final
Comm media advisory 6 14 finalComm media advisory 6 14 final
Comm media advisory 6 14 finalNuuko, Inc.
 
C suite clusters ppt for landing page
C suite clusters ppt for landing pageC suite clusters ppt for landing page
C suite clusters ppt for landing pageNuuko, Inc.
 
C suite clusters ppt for landing page
C suite clusters ppt for landing pageC suite clusters ppt for landing page
C suite clusters ppt for landing pageNuuko, Inc.
 
Communications cluster ppt 6.01
Communications cluster ppt 6.01Communications cluster ppt 6.01
Communications cluster ppt 6.01Nuuko, Inc.
 
Downstream org structure.refining ind
Downstream org structure.refining indDownstream org structure.refining ind
Downstream org structure.refining indNuuko, Inc.
 
Understanding pr tsa
Understanding pr  tsaUnderstanding pr  tsa
Understanding pr tsaNuuko, Inc.
 
About us poretz profile-1
About us   poretz profile-1About us   poretz profile-1
About us poretz profile-1Nuuko, Inc.
 
Shelbybio for web
Shelbybio for webShelbybio for web
Shelbybio for webNuuko, Inc.
 
John caswell for web
John caswell for webJohn caswell for web
John caswell for webNuuko, Inc.
 

Plus de Nuuko, Inc. (20)

Nuuko Enterprise Optimizer
Nuuko Enterprise OptimizerNuuko Enterprise Optimizer
Nuuko Enterprise Optimizer
 
Dr. Eric Cole - 30 Things Every Manager Should Know
Dr. Eric Cole - 30 Things Every Manager Should KnowDr. Eric Cole - 30 Things Every Manager Should Know
Dr. Eric Cole - 30 Things Every Manager Should Know
 
DOE Loans for Renewable Generation, Transmission Doubtful After September
DOE Loans for Renewable Generation, Transmission Doubtful After SeptemberDOE Loans for Renewable Generation, Transmission Doubtful After September
DOE Loans for Renewable Generation, Transmission Doubtful After September
 
Managed care feb2009a article
Managed care feb2009a articleManaged care feb2009a article
Managed care feb2009a article
 
Nuuko enterprise optimizer case studies
Nuuko enterprise optimizer case studiesNuuko enterprise optimizer case studies
Nuuko enterprise optimizer case studies
 
Jerry tarasofsky for web 8.8
Jerry tarasofsky for web 8.8Jerry tarasofsky for web 8.8
Jerry tarasofsky for web 8.8
 
It's not about jobs jobs jobs
It's not about jobs jobs jobs It's not about jobs jobs jobs
It's not about jobs jobs jobs
 
Social media bootcamp presentation 071311.final
Social media bootcamp presentation 071311.finalSocial media bootcamp presentation 071311.final
Social media bootcamp presentation 071311.final
 
The death of the company
The death of the companyThe death of the company
The death of the company
 
Comm media advisory 6 14 final
Comm media advisory 6 14 finalComm media advisory 6 14 final
Comm media advisory 6 14 final
 
C suite clusters ppt for landing page
C suite clusters ppt for landing pageC suite clusters ppt for landing page
C suite clusters ppt for landing page
 
C suite clusters ppt for landing page
C suite clusters ppt for landing pageC suite clusters ppt for landing page
C suite clusters ppt for landing page
 
Communications cluster ppt 6.01
Communications cluster ppt 6.01Communications cluster ppt 6.01
Communications cluster ppt 6.01
 
Downstream org structure.refining ind
Downstream org structure.refining indDownstream org structure.refining ind
Downstream org structure.refining ind
 
Curtis robinson
Curtis robinsonCurtis robinson
Curtis robinson
 
Understanding pr tsa
Understanding pr  tsaUnderstanding pr  tsa
Understanding pr tsa
 
About us poretz profile-1
About us   poretz profile-1About us   poretz profile-1
About us poretz profile-1
 
Bio for web
Bio for webBio for web
Bio for web
 
Shelbybio for web
Shelbybio for webShelbybio for web
Shelbybio for web
 
John caswell for web
John caswell for webJohn caswell for web
John caswell for web
 

Dernier

Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Alkin Tezuysal
 
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfIngrid Airi González
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Mark Goldstein
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demoHarshalMandlekar2
 
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality AssuranceInflectra
 
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentEmixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentPim van der Noll
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...Scott Andery
 
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfNeo4j
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityIES VE
 
Scale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterScale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterMydbops
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxLoriGlavin3
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Strongerpanagenda
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersNicole Novielli
 

Dernier (20)

Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
 
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdf
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demo
 
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
 
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentEmixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
 
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdf
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a reality
 
Scale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterScale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL Router
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software Developers
 

Web profile

  • 1. Web Profile – Dr. Eric Cole<br />Dr. Cole is a global industry expert with breadth and depth experience across integrated cyber security. His focus is assisting enterprises by creating, enhancing and growing technology and teams to bridge the gap between business and technology – with a focus on security and innovation.<br />Cole is the founder and CEO of Secure Anchor Consulting Services, working with Fortune 50 companies, financial institutions, and the federal government. Previously, Cole was Senior Vice President and Chief Technology Officer (CTO) for McAfee, Chief Scientist for Lockheed Martin, and CTO for The Sytex Group. Cole’s additional expertise was honed as CIO for the American Institutes for Research, as VP of Enterprise Security Services for Vista Information Technologies, and Director of Security for Teligent.<br />As Dean of Faculty for the SANS Institute, he led the effort for the Institute to become certified by the State of Maryland and developed Master’s degree programs. He was also Director of the Institute’s Cyber Defense Initiative.<br />Dr. Cole holds a Doctorate degree in Network Security from Pace University, and a B.S. and M.S. in Computer Science from the New York Institute of Technology. He is an adjunct professor at the latter, and at Georgetown University.<br />Specialties: information and network security, cloud computing, business technology strategy<br />Prior Experience:<br />SVP, CTO McAfee<br />Chief Scientist and Senior Fellow, Lockheed Martin<br />CTO The Sytex Group<br />Dean of Faculty, SANS Institute<br />CIO American Institutes of Research<br />Director of Security Teligent<br />Education:<br />Ph.D. Network Security Pace University<br />B.S., M.S. Computer Science New York Institute of Technology<br />Highlights:Member of IEEE<br />Member ICSA<br />Member CSI Computer Security Institute<br />Adjunct faculty, Pace University and Georgetown University<br />Publications:<br />Insider Threat, Eric Cole and Sandy Ring, 2005<br />The Network Security Bible, Eric Cole, Ron Krutz, and Jim Conley, 2005<br />Hiding in Plain Sight: Steganography and the Art of Covert Communication, Eric Cole, 2003<br />Hackers Beware, the Ultimate Guide to Network Security, Eric Cole, 2001<br />Links: (blog he wrote for Nuuko- on the current site)<br />Cyber Anarchists: Living in the Clouds Has Earthly Implications<br />30 Things Every Manager Should Know (same doc we are linking to from the Communications landing page) http://www.securityhaven.com/docs/30_Things_Every_Manager_Should_Know.pdf<br />