logo
episode-header-image
Jun 26
30m 51s

The Cyber War Has Already Started – Are ...

Dr. Eric Cole
About this episode

You’re living in a time where science fiction is quickly becoming your reality. In this high-impact episode of Life of a CISO, Dr. Eric Cole breaks down the current state of cybersecurity—from nation-state attacks and massive password breaches to the hidden threats living on your mobile device. You’ll hear Dr. Cole’s unfiltered take on a breach that exposed billions of credentials, why changing your password isn’t enough, and how an old app could be your biggest risk.

Dr. Cole challenges you to see yourself not just as a security expert, but as a business leader with the power to make lives better. That mindset shift is everything. From the practical impact of multi-factor authentication to his radical but simple “delete an app a day” campaign, Dr. Cole shares tools you can implement right now. This episode isn’t just about defense—it’s about stepping up, thinking strategically, and leading the way forward.

Up next
Jul 3
How a Hacker Became Twitter’s First CISO | Michael Coates on Cybersecurity’s Future
In this episode of Life of a CISO, Dr. Eric Cole welcomes Michael Coates, a seasoned cybersecurity expert with over 20 years of experience. Michael shares his journey from working as a legal hacker to becoming Twitter’s first Chief Information Security Officer (CISO), and later f ... Show More
33m 4s
Jun 19
CISO Leadership, Trust & Non-Negotiables with Dan Lohrmann
In this episode of Life of a CISO, Dr. Eric Cole welcomes a true cybersecurity trailblazer: Dan Lohrmann. With a career that spans the NSA, Lockheed Martin, the State of Michigan, and now Presidio, Dan brings a rare depth of experience in both government and the private sector. A ... Show More
33m 43s
Jun 12
From Pen Testing to Purpose: Jane Frankland on Cyber, Burnout, & Reinvention
In this special episode of Life of a CISO, I sit down with the brilliant Jane Frankland, MBE—an internationally recognized thought leader in cybersecurity with over 28 years of experience. Jane shares her unexpected journey into the field, starting not from a tech background but ... Show More
35m 12s
Recommended Episodes
Nov 2024
Maintain Your "Cyber Hygiene": How to Protect Precious Personal Data From The Growing Danger of Cyber Attacks
Tresa Stephens, North American Head of Cyber at Allianz Global Corporate & Specialty (AGCS), joins the show to discuss why personal data is precious to hackers, how to lower the risk of cybercrime and maintain your "cyber hygiene", and why ransomware continues to be a threat. Hos ... Show More
12m 35s
Jan 2022
Saving the Day: Becoming a Cybersecurity Superhero
You’ve probably got a security system for your building, with locks on your doors and safes for your important documents. But criminals don’t just try to take what’s in your cash register anymore. As the world shifts increasingly online, there are more and more opportunities for ... Show More
23m 10s
Jul 2020
Hackers for hire
How much do you trust your personal data on the internet? How much do you trust your personal information with your best friend? A global pandemic has forced millions out of work, and with an increase in hacking activity that's not just overseas, Ex-hacker and Brand Ambassador fo ... Show More
20m 14s
Jun 2019
Cyber risk considerations for new and growing businesses
How do you keep your data secured when starting and growing a new business? Reformed Hacker Bastien Treptel and Chief Cyber Risk Officer Fergus Brooks provide actionable steps you can take to ensure you keep your new business venture and all of its important data out of the wrong ... Show More
21m 47s
Apr 30
When Hackers Hijack Your Factory Floor
In the future, hackers will have many new vulnerabilities to exploit, especially as industries move from legacy IT to state-of-the-art digital systems. BCG’s Vanessa Lyon looks at how cyber-attacks are likely to evolve over the next ten years, and what business leaders need to do ... Show More
29m 25s
Apr 22
Stopping Social Engineered Vishing Attacks Before They Start
Social engineering continues to be the primary gateway for cyberattacks, responsible for nearly 80% of fraud and ransomware incidents. And notably, 1 in 4 of these social engineering attacks originate via phone calls. Yet many enterprises continue to leave their phone systems exp ... Show More
41m 52s
Jan 2025
National security in the digital age.
A draft cybersecurity executive order from the Biden administration seeks to bolster defenses. Researchers identify a “mass exploitation campaign” targeting Fortinet firewalls. A Chinese-language illicit online marketplace is growing at an alarming rate. CISA urges patching of a ... Show More
35m 20s
Nov 2024
151: Chris Rock
Chris Rock is known for being a security researcher. But he’s also a black hat incident responder. He tells us about a job he did in the middle east.https://x.com/chrisrockhackerSponsorsSupport for this show comes from Varonis. Do you wonder what your company’s ransomware blast r ... Show More
57m 57s
Jul 2024
Essential Cybersecurity Strategies
Welcome back to another episode of "Accelerate Your Business Growth." I'm your host, Diane Helbig, and today we have a critical and timely discussion lined up for you. We’re joined by Terry Ziemniak, a cybersecurity expert with over 25 years of experience ranging from technical r ... Show More
25m 1s
Jun 2024
Inside the top-secret bunker where your most sensitive data is held
Have you ever thought about the physical places where our most sensitive and private digital information is stored?  Around Australia lie ultra-secure databases that host everything from your medical records and internet passwords to our governments' records and national secrets. ... Show More
12m 21s