SlideShare une entreprise Scribd logo
1  sur  2
Web Profile – Dr. Eric Cole<br />Dr. Cole is a global industry expert with breadth and depth experience across integrated cyber security. His focus is assisting enterprises by creating, enhancing and growing technology and teams to bridge the gap between business and technology – with a focus on security and innovation.<br />Cole is the founder and CEO of Secure Anchor Consulting Services, working with Fortune 50 companies, financial institutions, and the federal government. Previously, Cole was Senior Vice President and Chief Technology Officer (CTO) for McAfee, Chief Scientist for Lockheed Martin, and CTO for The Sytex Group.  Cole’s additional expertise was honed as CIO for the American Institutes for Research, as VP of Enterprise Security Services for Vista Information Technologies, and Director of Security for Teligent.<br />As Dean of Faculty for the SANS Institute, he led the effort for the Institute to become certified by the State of Maryland and developed Master’s degree programs. He was also Director of the Institute’s Cyber Defense Initiative.<br />Dr. Cole holds a Doctorate degree in Network Security from Pace University, and a B.S. and M.S. in Computer Science from the New York Institute of Technology.  He is an adjunct professor at the latter, and at Georgetown University.<br />Specialties: information and network security, cloud computing, business technology strategy<br />Prior Experience:<br />SVP, CTO McAfee<br />Chief Scientist and Senior Fellow, Lockheed Martin<br />CTO The Sytex Group<br />Dean of Faculty, SANS Institute<br />CIO American Institutes of Research<br />Director of Security Teligent<br />Education:<br />Ph.D. Network Security Pace University<br />B.S., M.S. Computer Science New York Institute of Technology<br />Highlights:Member of IEEE<br />Member ICSA<br />Member CSI Computer Security Institute<br />Adjunct faculty, Pace University and Georgetown University<br />Publications:<br />Insider Threat, Eric Cole and Sandy Ring, 2005<br />The Network Security Bible, Eric Cole, Ron Krutz, and Jim Conley, 2005<br />Hiding in Plain Sight: Steganography and the Art of Covert Communication, Eric Cole, 2003<br />Hackers Beware, the Ultimate Guide to Network Security, Eric Cole, 2001<br />Links: (blog he wrote for Nuuko- on the current site)<br />Cyber Anarchists: Living in the Clouds Has Earthly Implications<br />30 Things Every Manager Should Know (same doc we are linking to from the Communications landing page) http://www.securityhaven.com/docs/30_Things_Every_Manager_Should_Know.pdf<br />
Web profile

Contenu connexe

Tendances

Getting Started in Information Security
Getting Started in Information SecurityGetting Started in Information Security
Getting Started in Information SecurityDennis Maldonado
 
Cybersaftey (1)
Cybersaftey (1)Cybersaftey (1)
Cybersaftey (1)ABELANIL1
 
STAYING SAFE AND SECURED ON TODAY AND TOMORROW’S AFRICA CYBERSPACE WORKSHOP 2017
STAYING SAFE AND SECURED ON TODAY AND TOMORROW’S AFRICA CYBERSPACE WORKSHOP 2017STAYING SAFE AND SECURED ON TODAY AND TOMORROW’S AFRICA CYBERSPACE WORKSHOP 2017
STAYING SAFE AND SECURED ON TODAY AND TOMORROW’S AFRICA CYBERSPACE WORKSHOP 2017Maurice Dawson
 
Get training in cyber security &amp; place yourself in good companies through...
Get training in cyber security &amp; place yourself in good companies through...Get training in cyber security &amp; place yourself in good companies through...
Get training in cyber security &amp; place yourself in good companies through...CCI Training Center
 
Infomation security
Infomation securityInfomation security
Infomation securityMeet Soni
 
Alloy Cybersecurity Intro
Alloy Cybersecurity IntroAlloy Cybersecurity Intro
Alloy Cybersecurity IntroMark Stockman
 
Psychological Security: Introducing the PsySec Field
Psychological Security: Introducing the PsySec FieldPsychological Security: Introducing the PsySec Field
Psychological Security: Introducing the PsySec FieldZach(ary) Eikenberry
 
Cyber Security Professionals Viewed via Supply Chain
Cyber Security Professionals Viewed via Supply ChainCyber Security Professionals Viewed via Supply Chain
Cyber Security Professionals Viewed via Supply Chainaletarw
 
Cv fabio ghezzi en ext
Cv fabio ghezzi en extCv fabio ghezzi en ext
Cv fabio ghezzi en extFabio Ghezzi
 
Ethical Hacking Workshop is an essential for hackers
Ethical Hacking Workshop is an essential for hackersEthical Hacking Workshop is an essential for hackers
Ethical Hacking Workshop is an essential for hackerstechnoxian
 
1st Russian CSO Summit Trends 2008
1st Russian CSO Summit Trends 20081st Russian CSO Summit Trends 2008
1st Russian CSO Summit Trends 2008Anton Chuvakin
 
Cybersecurity pathways event by The TechForce Cyber
Cybersecurity pathways event by The TechForce CyberCybersecurity pathways event by The TechForce Cyber
Cybersecurity pathways event by The TechForce CyberJai Aenugu
 
Panel 3: Security and Privacy in Practice
Panel 3: Security and Privacy in PracticePanel 3: Security and Privacy in Practice
Panel 3: Security and Privacy in PracticePacificResearchPlatform
 
Become a Cyber Security Professional at Our Oklahoma Trade Schools
Become a Cyber Security Professional at Our Oklahoma Trade SchoolsBecome a Cyber Security Professional at Our Oklahoma Trade Schools
Become a Cyber Security Professional at Our Oklahoma Trade SchoolsMetro Technology Centers
 

Tendances (20)

Getting Started in Information Security
Getting Started in Information SecurityGetting Started in Information Security
Getting Started in Information Security
 
Malcolm Boston Resume
Malcolm Boston ResumeMalcolm Boston Resume
Malcolm Boston Resume
 
Cybersaftey (1)
Cybersaftey (1)Cybersaftey (1)
Cybersaftey (1)
 
Network security
Network securityNetwork security
Network security
 
STAYING SAFE AND SECURED ON TODAY AND TOMORROW’S AFRICA CYBERSPACE WORKSHOP 2017
STAYING SAFE AND SECURED ON TODAY AND TOMORROW’S AFRICA CYBERSPACE WORKSHOP 2017STAYING SAFE AND SECURED ON TODAY AND TOMORROW’S AFRICA CYBERSPACE WORKSHOP 2017
STAYING SAFE AND SECURED ON TODAY AND TOMORROW’S AFRICA CYBERSPACE WORKSHOP 2017
 
Cybersecurity
CybersecurityCybersecurity
Cybersecurity
 
Network Security Terminologies
Network Security TerminologiesNetwork Security Terminologies
Network Security Terminologies
 
Get training in cyber security &amp; place yourself in good companies through...
Get training in cyber security &amp; place yourself in good companies through...Get training in cyber security &amp; place yourself in good companies through...
Get training in cyber security &amp; place yourself in good companies through...
 
Infomation security
Infomation securityInfomation security
Infomation security
 
Alloy Cybersecurity Intro
Alloy Cybersecurity IntroAlloy Cybersecurity Intro
Alloy Cybersecurity Intro
 
Psychological Security: Introducing the PsySec Field
Psychological Security: Introducing the PsySec FieldPsychological Security: Introducing the PsySec Field
Psychological Security: Introducing the PsySec Field
 
Cyber Security Professionals Viewed via Supply Chain
Cyber Security Professionals Viewed via Supply ChainCyber Security Professionals Viewed via Supply Chain
Cyber Security Professionals Viewed via Supply Chain
 
Data security training
Data security trainingData security training
Data security training
 
Cv fabio ghezzi en ext
Cv fabio ghezzi en extCv fabio ghezzi en ext
Cv fabio ghezzi en ext
 
Ethical Hacking Workshop is an essential for hackers
Ethical Hacking Workshop is an essential for hackersEthical Hacking Workshop is an essential for hackers
Ethical Hacking Workshop is an essential for hackers
 
1st Russian CSO Summit Trends 2008
1st Russian CSO Summit Trends 20081st Russian CSO Summit Trends 2008
1st Russian CSO Summit Trends 2008
 
Cybersecurity pathways event by The TechForce Cyber
Cybersecurity pathways event by The TechForce CyberCybersecurity pathways event by The TechForce Cyber
Cybersecurity pathways event by The TechForce Cyber
 
Panel 3: Security and Privacy in Practice
Panel 3: Security and Privacy in PracticePanel 3: Security and Privacy in Practice
Panel 3: Security and Privacy in Practice
 
Steganography
SteganographySteganography
Steganography
 
Become a Cyber Security Professional at Our Oklahoma Trade Schools
Become a Cyber Security Professional at Our Oklahoma Trade SchoolsBecome a Cyber Security Professional at Our Oklahoma Trade Schools
Become a Cyber Security Professional at Our Oklahoma Trade Schools
 

Similaire à Web profile

UMUC Cyber Day Program
UMUC Cyber Day  ProgramUMUC Cyber Day  Program
UMUC Cyber Day ProgramTroy Thompson
 
Testimony of Terry V. Benzel, University of Southern California Information S...
Testimony of Terry V. Benzel, University of Southern California Information S...Testimony of Terry V. Benzel, University of Southern California Information S...
Testimony of Terry V. Benzel, University of Southern California Information S...DETER-Project
 
2011 lecture ia orientation
2011 lecture ia orientation2011 lecture ia orientation
2011 lecture ia orientation2b3d
 
CWC FiresideChat Slides.pptx
CWC FiresideChat Slides.pptxCWC FiresideChat Slides.pptx
CWC FiresideChat Slides.pptxCapitolTechU
 
MIT ILP STEX Cybersecurity Workshop 5.28.15
MIT ILP STEX Cybersecurity Workshop 5.28.15MIT ILP STEX Cybersecurity Workshop 5.28.15
MIT ILP STEX Cybersecurity Workshop 5.28.15MIT Startup Exchange
 
All About Network Security & its Essentials.pptx
All About Network Security & its Essentials.pptxAll About Network Security & its Essentials.pptx
All About Network Security & its Essentials.pptxInfosectrain3
 
Cyber security for Developers
Cyber security for DevelopersCyber security for Developers
Cyber security for Developerstechtutorus
 
Why MSc is Right Choice
Why MSc is Right ChoiceWhy MSc is Right Choice
Why MSc is Right ChoiceEmma Thompson
 
Hakin9 interview w Prof Sood
Hakin9 interview w Prof SoodHakin9 interview w Prof Sood
Hakin9 interview w Prof SoodZsolt Nemeth
 
Ethical Hacking Certification Path You Should Follow
Ethical Hacking Certification Path You Should FollowEthical Hacking Certification Path You Should Follow
Ethical Hacking Certification Path You Should FollowMercury Solutions Limited
 
Charleston R!OT IoT Applications for Defense Workshop
Charleston R!OT IoT Applications for Defense WorkshopCharleston R!OT IoT Applications for Defense Workshop
Charleston R!OT IoT Applications for Defense WorkshopJoseph Hirl
 
Module 1 (legality)
Module 1 (legality)Module 1 (legality)
Module 1 (legality)Wail Hassan
 
Cybersecurity, Emerging Tech, and Risk Management - compiled media and writin...
Cybersecurity, Emerging Tech, and Risk Management - compiled media and writin...Cybersecurity, Emerging Tech, and Risk Management - compiled media and writin...
Cybersecurity, Emerging Tech, and Risk Management - compiled media and writin...Chuck Brooks
 
Cyber terrorism.. sir summar
Cyber terrorism.. sir summarCyber terrorism.. sir summar
Cyber terrorism.. sir summarmanailmalik
 
[CB16] Using the CGC’s fully automated vulnerability detection tools in secur...
[CB16] Using the CGC’s fully automated vulnerability detection tools in secur...[CB16] Using the CGC’s fully automated vulnerability detection tools in secur...
[CB16] Using the CGC’s fully automated vulnerability detection tools in secur...CODE BLUE
 

Similaire à Web profile (20)

UMUC Cyber Day Program
UMUC Cyber Day  ProgramUMUC Cyber Day  Program
UMUC Cyber Day Program
 
Testimony of Terry V. Benzel, University of Southern California Information S...
Testimony of Terry V. Benzel, University of Southern California Information S...Testimony of Terry V. Benzel, University of Southern California Information S...
Testimony of Terry V. Benzel, University of Southern California Information S...
 
2011 lecture ia orientation
2011 lecture ia orientation2011 lecture ia orientation
2011 lecture ia orientation
 
CWC FiresideChat Slides.pptx
CWC FiresideChat Slides.pptxCWC FiresideChat Slides.pptx
CWC FiresideChat Slides.pptx
 
Secure Web Apps Training at Corporate College
Secure Web Apps Training at Corporate CollegeSecure Web Apps Training at Corporate College
Secure Web Apps Training at Corporate College
 
Security Firm Program - Corporate College
Security Firm Program - Corporate CollegeSecurity Firm Program - Corporate College
Security Firm Program - Corporate College
 
MIT ILP STEX Cybersecurity Workshop 5.28.15
MIT ILP STEX Cybersecurity Workshop 5.28.15MIT ILP STEX Cybersecurity Workshop 5.28.15
MIT ILP STEX Cybersecurity Workshop 5.28.15
 
Dr. Charles Pak
Dr. Charles PakDr. Charles Pak
Dr. Charles Pak
 
All About Network Security & its Essentials.pptx
All About Network Security & its Essentials.pptxAll About Network Security & its Essentials.pptx
All About Network Security & its Essentials.pptx
 
Cyber security for Developers
Cyber security for DevelopersCyber security for Developers
Cyber security for Developers
 
Tim Nolan
Tim NolanTim Nolan
Tim Nolan
 
Why MSc is Right Choice
Why MSc is Right ChoiceWhy MSc is Right Choice
Why MSc is Right Choice
 
Hakin9 interview w Prof Sood
Hakin9 interview w Prof SoodHakin9 interview w Prof Sood
Hakin9 interview w Prof Sood
 
Ethical Hacking Certification Path You Should Follow
Ethical Hacking Certification Path You Should FollowEthical Hacking Certification Path You Should Follow
Ethical Hacking Certification Path You Should Follow
 
Charleston R!OT IoT Applications for Defense Workshop
Charleston R!OT IoT Applications for Defense WorkshopCharleston R!OT IoT Applications for Defense Workshop
Charleston R!OT IoT Applications for Defense Workshop
 
Module 1 (legality)
Module 1 (legality)Module 1 (legality)
Module 1 (legality)
 
Alloy Cybersecurity
Alloy CybersecurityAlloy Cybersecurity
Alloy Cybersecurity
 
Cybersecurity, Emerging Tech, and Risk Management - compiled media and writin...
Cybersecurity, Emerging Tech, and Risk Management - compiled media and writin...Cybersecurity, Emerging Tech, and Risk Management - compiled media and writin...
Cybersecurity, Emerging Tech, and Risk Management - compiled media and writin...
 
Cyber terrorism.. sir summar
Cyber terrorism.. sir summarCyber terrorism.. sir summar
Cyber terrorism.. sir summar
 
[CB16] Using the CGC’s fully automated vulnerability detection tools in secur...
[CB16] Using the CGC’s fully automated vulnerability detection tools in secur...[CB16] Using the CGC’s fully automated vulnerability detection tools in secur...
[CB16] Using the CGC’s fully automated vulnerability detection tools in secur...
 

Plus de Nuuko, Inc.

Nuuko Enterprise Optimizer
Nuuko Enterprise OptimizerNuuko Enterprise Optimizer
Nuuko Enterprise OptimizerNuuko, Inc.
 
Dr. Eric Cole - 30 Things Every Manager Should Know
Dr. Eric Cole - 30 Things Every Manager Should KnowDr. Eric Cole - 30 Things Every Manager Should Know
Dr. Eric Cole - 30 Things Every Manager Should KnowNuuko, Inc.
 
DOE Loans for Renewable Generation, Transmission Doubtful After September
DOE Loans for Renewable Generation, Transmission Doubtful After SeptemberDOE Loans for Renewable Generation, Transmission Doubtful After September
DOE Loans for Renewable Generation, Transmission Doubtful After SeptemberNuuko, Inc.
 
Managed care feb2009a article
Managed care feb2009a articleManaged care feb2009a article
Managed care feb2009a articleNuuko, Inc.
 
Nuuko enterprise optimizer case studies
Nuuko enterprise optimizer case studiesNuuko enterprise optimizer case studies
Nuuko enterprise optimizer case studiesNuuko, Inc.
 
Jerry tarasofsky for web 8.8
Jerry tarasofsky for web 8.8Jerry tarasofsky for web 8.8
Jerry tarasofsky for web 8.8Nuuko, Inc.
 
It's not about jobs jobs jobs
It's not about jobs jobs jobs It's not about jobs jobs jobs
It's not about jobs jobs jobs Nuuko, Inc.
 
Social media bootcamp presentation 071311.final
Social media bootcamp presentation 071311.finalSocial media bootcamp presentation 071311.final
Social media bootcamp presentation 071311.finalNuuko, Inc.
 
The death of the company
The death of the companyThe death of the company
The death of the companyNuuko, Inc.
 
Comm media advisory 6 14 final
Comm media advisory 6 14 finalComm media advisory 6 14 final
Comm media advisory 6 14 finalNuuko, Inc.
 
C suite clusters ppt for landing page
C suite clusters ppt for landing pageC suite clusters ppt for landing page
C suite clusters ppt for landing pageNuuko, Inc.
 
C suite clusters ppt for landing page
C suite clusters ppt for landing pageC suite clusters ppt for landing page
C suite clusters ppt for landing pageNuuko, Inc.
 
Communications cluster ppt 6.01
Communications cluster ppt 6.01Communications cluster ppt 6.01
Communications cluster ppt 6.01Nuuko, Inc.
 
Downstream org structure.refining ind
Downstream org structure.refining indDownstream org structure.refining ind
Downstream org structure.refining indNuuko, Inc.
 
Understanding pr tsa
Understanding pr  tsaUnderstanding pr  tsa
Understanding pr tsaNuuko, Inc.
 
About us poretz profile-1
About us   poretz profile-1About us   poretz profile-1
About us poretz profile-1Nuuko, Inc.
 
Shelbybio for web
Shelbybio for webShelbybio for web
Shelbybio for webNuuko, Inc.
 
John caswell for web
John caswell for webJohn caswell for web
John caswell for webNuuko, Inc.
 

Plus de Nuuko, Inc. (20)

Nuuko Enterprise Optimizer
Nuuko Enterprise OptimizerNuuko Enterprise Optimizer
Nuuko Enterprise Optimizer
 
Dr. Eric Cole - 30 Things Every Manager Should Know
Dr. Eric Cole - 30 Things Every Manager Should KnowDr. Eric Cole - 30 Things Every Manager Should Know
Dr. Eric Cole - 30 Things Every Manager Should Know
 
DOE Loans for Renewable Generation, Transmission Doubtful After September
DOE Loans for Renewable Generation, Transmission Doubtful After SeptemberDOE Loans for Renewable Generation, Transmission Doubtful After September
DOE Loans for Renewable Generation, Transmission Doubtful After September
 
Managed care feb2009a article
Managed care feb2009a articleManaged care feb2009a article
Managed care feb2009a article
 
Nuuko enterprise optimizer case studies
Nuuko enterprise optimizer case studiesNuuko enterprise optimizer case studies
Nuuko enterprise optimizer case studies
 
Jerry tarasofsky for web 8.8
Jerry tarasofsky for web 8.8Jerry tarasofsky for web 8.8
Jerry tarasofsky for web 8.8
 
It's not about jobs jobs jobs
It's not about jobs jobs jobs It's not about jobs jobs jobs
It's not about jobs jobs jobs
 
Social media bootcamp presentation 071311.final
Social media bootcamp presentation 071311.finalSocial media bootcamp presentation 071311.final
Social media bootcamp presentation 071311.final
 
The death of the company
The death of the companyThe death of the company
The death of the company
 
Comm media advisory 6 14 final
Comm media advisory 6 14 finalComm media advisory 6 14 final
Comm media advisory 6 14 final
 
C suite clusters ppt for landing page
C suite clusters ppt for landing pageC suite clusters ppt for landing page
C suite clusters ppt for landing page
 
C suite clusters ppt for landing page
C suite clusters ppt for landing pageC suite clusters ppt for landing page
C suite clusters ppt for landing page
 
Communications cluster ppt 6.01
Communications cluster ppt 6.01Communications cluster ppt 6.01
Communications cluster ppt 6.01
 
Downstream org structure.refining ind
Downstream org structure.refining indDownstream org structure.refining ind
Downstream org structure.refining ind
 
Curtis robinson
Curtis robinsonCurtis robinson
Curtis robinson
 
Understanding pr tsa
Understanding pr  tsaUnderstanding pr  tsa
Understanding pr tsa
 
About us poretz profile-1
About us   poretz profile-1About us   poretz profile-1
About us poretz profile-1
 
Bio for web
Bio for webBio for web
Bio for web
 
Shelbybio for web
Shelbybio for webShelbybio for web
Shelbybio for web
 
John caswell for web
John caswell for webJohn caswell for web
John caswell for web
 

Dernier

IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 

Dernier (20)

IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 

Web profile

  • 1. Web Profile – Dr. Eric Cole<br />Dr. Cole is a global industry expert with breadth and depth experience across integrated cyber security. His focus is assisting enterprises by creating, enhancing and growing technology and teams to bridge the gap between business and technology – with a focus on security and innovation.<br />Cole is the founder and CEO of Secure Anchor Consulting Services, working with Fortune 50 companies, financial institutions, and the federal government. Previously, Cole was Senior Vice President and Chief Technology Officer (CTO) for McAfee, Chief Scientist for Lockheed Martin, and CTO for The Sytex Group. Cole’s additional expertise was honed as CIO for the American Institutes for Research, as VP of Enterprise Security Services for Vista Information Technologies, and Director of Security for Teligent.<br />As Dean of Faculty for the SANS Institute, he led the effort for the Institute to become certified by the State of Maryland and developed Master’s degree programs. He was also Director of the Institute’s Cyber Defense Initiative.<br />Dr. Cole holds a Doctorate degree in Network Security from Pace University, and a B.S. and M.S. in Computer Science from the New York Institute of Technology. He is an adjunct professor at the latter, and at Georgetown University.<br />Specialties: information and network security, cloud computing, business technology strategy<br />Prior Experience:<br />SVP, CTO McAfee<br />Chief Scientist and Senior Fellow, Lockheed Martin<br />CTO The Sytex Group<br />Dean of Faculty, SANS Institute<br />CIO American Institutes of Research<br />Director of Security Teligent<br />Education:<br />Ph.D. Network Security Pace University<br />B.S., M.S. Computer Science New York Institute of Technology<br />Highlights:Member of IEEE<br />Member ICSA<br />Member CSI Computer Security Institute<br />Adjunct faculty, Pace University and Georgetown University<br />Publications:<br />Insider Threat, Eric Cole and Sandy Ring, 2005<br />The Network Security Bible, Eric Cole, Ron Krutz, and Jim Conley, 2005<br />Hiding in Plain Sight: Steganography and the Art of Covert Communication, Eric Cole, 2003<br />Hackers Beware, the Ultimate Guide to Network Security, Eric Cole, 2001<br />Links: (blog he wrote for Nuuko- on the current site)<br />Cyber Anarchists: Living in the Clouds Has Earthly Implications<br />30 Things Every Manager Should Know (same doc we are linking to from the Communications landing page) http://www.securityhaven.com/docs/30_Things_Every_Manager_Should_Know.pdf<br />