logo
episode-header-image
Nov 2024
31m 12s

Evangelist

Dr. Eric Cole
About this episode

In this engaging episode of Life of a CISO, Dr. Eric Cole challenges listeners to rethink their relationship with cybersecurity. Whether you’re a seasoned Chief Information Security Officer (CISO), aspiring to the role, or simply working in cybersecurity, the question is: do you like it, love it, or can’t live without it? Dr. Cole emphasizes that treating cybersecurity as just a job might pay the bills, but to achieve greatness, it must become a mission.

Drawing from personal experiences, including a close call with cybercriminals targeting his family, Dr. Cole underscores the importance of vigilance and education. He highlights the growing risks to vulnerable populations, such as seniors, and stresses the need for cybersecurity professionals to serve as evangelists, spreading awareness and fostering a culture of protection. From securing our families to safeguarding entire organizations, Dr. Cole reminds us that the greatest threats often exploit human behavior, making persuasion and education key tools for every CISO.

Tune in to learn how passion, purpose, and leadership can transform cybersecurity into a strategic asset, while also making the digital world a safer place for everyone.

 

Up next
Aug 21
Simplifying Cybersecurity, Time Management & Strategic Playbooks
In this episode of Life of a CISO, Dr. Eric Cole dives deep into simplicity, time management, and the foundations of being a world-class Chief Information Security Officer. He explains how rebooting your life and career—just like you reboot a slow computer—can help clear distract ... Show More
30m 47s
Aug 14
The #1 Skill CISOs Need for Career Acceleration (And How to Master It)
In this episode of Life of a CISO, Dr. Eric Cole dives deep into one of the most important yet often overlooked success principles for security leaders: simplicity. Drawing from decades of experience as one of the first CISOs before the title even existed, Dr. Cole explains why g ... Show More
32m 1s
Aug 7
Building Credibility Before the Crisis: Zachary Lewis on Frameworks & Board Trust
In this inspiring episode of Life of a CISO, Dr. Eric Cole sits down with Zachary Lewis, Chief Information Security Officer at the University of Health Sciences and Pharmacy in St. Louis. With over five years in the CISO seat and a career that spans startups, coal plants, and hig ... Show More
33m 23s
Recommended Episodes
Dec 2024
How Cybercriminals Leverage Disruption for Maximum Impact [Encore]
In this episode of Threat Vector, David Moulton, Director of Thought Leadership at Unit 42, sits down with Wendi Whitmore, Senior Vice President of Unit 42, to discuss the increasing speed and sophistication of cyber attacks. Wendi shares her extensive expertise, highlighting the ... Show More
25 m
Oct 2024
Balancing Security with Usability in Cybersecurity
In this episode of Threat Vector, host David Moulton talks with guest speaker Brian Wrozek, Forrester Principal Analyst in Security & Risk, about the complexities of aligning security strategies across global teams. Brian draws on his extensive experience in cybersecurity, operat ... Show More
41m 41s
Mar 2025
Understanding Insider Threats With Eran Barak, CEO of MIND: Cyber Security Today for March 8, 2025
Understanding Insider Threats in Cybersecurity with Eran Barak Join host Jim Love as he discusses the critical issue of insider threats in cybersecurity with Eran Barak, CEO of MIND, a data security firm. In this episode, they explore the various types of insider threats, from in ... Show More
35m 49s
Jul 2024
Essential Cybersecurity Strategies
Welcome back to another episode of "Accelerate Your Business Growth." I'm your host, Diane Helbig, and today we have a critical and timely discussion lined up for you. We’re joined by Terry Ziemniak, a cybersecurity expert with over 25 years of experience ranging from technical r ... Show More
25m 1s
Jan 2024
2740: Meet the Security Mentalist Helping Organizations Educate Staff About Cybersecurity
Have you ever considered how your workplace educates its staff about cybersecurity? Do they use engaging, even humorous, methods to make the information stick? In a world where compliance training often becomes a forgettable ritual, finding innovative ways to raise awareness abou ... Show More
31m 50s
Dec 2024
Decoding XDR: Allie Mellen on What’s Next [Threat Vector]
While we are on our winter publishing break, please enjoy an episode of our N2K CyberWire network show, Threat Vector by Palo Alto Networks. See you in 2025! Announcement: We are pleased to share an exciting announcement about Cortex XDR at the top of our show. You can learn more ... Show More
39m 59s
Nov 2024
Bridging AI and Cybersecurity Gaps with Mileva Security Labs’ Harriet Farlow
Join us in this episode of Threat Vector as guest host Michael Heller shares his conversation with Harriet Farlow, CEO of Mileva Security Labs and a pioneer in AI security research. With a background spanning AI and national cybersecurity, Harriet shares her journey into adversar ... Show More
27m 17s
Jul 2024
2975: AI in Cybersecurity: Balancing Innovation and Risk
Are you prepared for the ever-evolving cybersecurity threats that challenge today's businesses? In this episode of Tech Talks Daily, we sit down with Dave Merkel, CEO of Expel, to delve into the dynamic world of cybersecurity. With threats becoming more sophisticated and frequent ... Show More
24m 29s
Mar 2025
Unveiling Cyber Security Insights: Research Report with David Shipley
Unveiling Cyber Security Insights with David Shipley: The Truth Behind Phishing and Technology Bias Join Jim Love and cybersecurity expert David Shipley in this insightful episode of 'Cyber Security Today.' They delve into the realities of phishing in the workplace, revealing sur ... Show More
41m 41s
Jun 2021
Role of Top Management in Cybersecurity Governance
The recent ransomware attacks on Colonial Pipeline and JBS are grave reminders that organizations at all levels must constantly be in a high state of cybersecurity readiness and alert. This is no easy task as the points of vulnerabilities are numerous, especially the probability ... Show More
29m 47s