logo
episode-header-image
Sep 2024
30m 59s

World War III CyberWar

Dr. Eric Cole
About this episode

In the latest episode of Life of a CISO, Dr. Eric Cole reflects on the importance of challenge and growth in both personal and professional life. He compares humans to lions, emphasizing that just as lions are not meant for captivity, humans are not meant to settle into comfortable routines. Instead, we thrive on the excitement of pursuing new goals and pushing ourselves beyond the status quo. Dr. Cole urges listeners to evaluate their own lives, asking whether they've allowed themselves to get too comfortable or if they're actively pursuing the next level of growth and success.

He also introduces a powerful analogy, comparing the current state of cybersecurity to World War III. Dr. Cole argues that cyberattacks across the globe, targeting individuals and organizations, represent a form of warfare. Many are unaware of the severity of these attacks, which gives adversaries a significant advantage. By acknowledging the reality of these threats, individuals and businesses can take stronger defensive measures to protect themselves. Dr. Cole’s message serves as both a call to action for personal development and a wake-up call for cybersecurity professionals to remain vigilant in the face of modern cyber warfare.

 

Up next
Jul 3
How a Hacker Became Twitter’s First CISO | Michael Coates on Cybersecurity’s Future
In this episode of Life of a CISO, Dr. Eric Cole welcomes Michael Coates, a seasoned cybersecurity expert with over 20 years of experience. Michael shares his journey from working as a legal hacker to becoming Twitter’s first Chief Information Security Officer (CISO), and later f ... Show More
33m 4s
Jun 26
The Cyber War Has Already Started – Are You Ready?
You’re living in a time where science fiction is quickly becoming your reality. In this high-impact episode of Life of a CISO, Dr. Eric Cole breaks down the current state of cybersecurity—from nation-state attacks and massive password breaches to the hidden threats living on your ... Show More
30m 51s
Jun 19
CISO Leadership, Trust & Non-Negotiables with Dan Lohrmann
In this episode of Life of a CISO, Dr. Eric Cole welcomes a true cybersecurity trailblazer: Dan Lohrmann. With a career that spans the NSA, Lockheed Martin, the State of Michigan, and now Presidio, Dan brings a rare depth of experience in both government and the private sector. A ... Show More
33m 43s
Recommended Episodes
Nov 2024
Cyber Espionage and Financial Crime: North Korea’s Double Threat
In this episode of Threat Vector, host David Moulton speaks with Assaf Dehan, Director of Threat Research at Palo Alto Networks’ Cortex team, about the rising cyber threat from North Korea. Dehan, a cybersecurity expert with over 18 years of experience, discusses the nation's str ... Show More
33m 28s
Mar 2025
Understanding Insider Threats With Eran Barak, CEO of MIND: Cyber Security Today for March 8, 2025
Understanding Insider Threats in Cybersecurity with Eran Barak Join host Jim Love as he discusses the critical issue of insider threats in cybersecurity with Eran Barak, CEO of MIND, a data security firm. In this episode, they explore the various types of insider threats, from in ... Show More
35m 49s
Apr 2024
World War III: Potential Outcomes
In this episode which was first aired on Whatifalthist’s podcast, Rudyard Lynch explores the hypothetical scenario of World War III, analyzing potential winners, front lines, and geopolitical alliances.---SPONSOR: NETSUITE | SHOPIFY | ORACLEMore than 40,000 businesses have alread ... Show More
35m 22s
Jul 2024
2975: AI in Cybersecurity: Balancing Innovation and Risk
Are you prepared for the ever-evolving cybersecurity threats that challenge today's businesses? In this episode of Tech Talks Daily, we sit down with Dave Merkel, CEO of Expel, to delve into the dynamic world of cybersecurity. With threats becoming more sophisticated and frequent ... Show More
24m 29s
Jun 10
Jedai tricks, human risks.
An unsecured Chroma database exposes personal information of Canva Creators. A researcher brute-forces Google phone numbers. Five zero-day vulnerabilities in Salesforce Industry Cloud are uncovered. Librarian Ghouls target Russian organizations with stealthy malware. SAP releases ... Show More
33m 59s
May 29
Risk, Resilience and Real Talk with Sam Ainscow
In this episode of Threat Vector, host David Moulton speaks with Sam Ainscow, Group Chief Security Officer at Hill & Smith PLC. With over 20 years in cybersecurity, Sam shares his deep insights into cyber resilience, risk assessment, and incident response. He explains why a busi ... Show More
37m 45s
Dec 2024
How Cybercriminals Leverage Disruption for Maximum Impact [Encore]
In this episode of Threat Vector, David Moulton, Director of Thought Leadership at Unit 42, sits down with Wendi Whitmore, Senior Vice President of Unit 42, to discuss the increasing speed and sophistication of cyber attacks. Wendi shares her extensive expertise, highlighting the ... Show More
25 m
May 2024
Privacy Imperatives in the New Age of Data Wealth
The challenges of a modern, data-driven enterprise demand modern tools capable of dealing with the volume and, more importantly, the diverse uses of personal data. In addition, the pace at which modern privacy regulations are proposed and adopted has continued to accelerate. This ... Show More
36m 20s
Jun 2021
Nobelium is back. A signed driver is gamer-focused malware. Idle hands. Third-party cloud risk. Bad practices. A net assessment of national cyber power.
The SVR’s Nobelium appears to be back, this time with a less-than-fully successful cyberespionage campaign. The Netfilter driver is assessed as malware. Idle hands seem to make for more attacks against online gaming. Mercedes-Benz USA reports a data exposure incident. CISA starts ... Show More
28m 18s