Cybersecurity, Networking, Computer and IT Expert Witness
Dr. Cole's expert involvement in the information technology industry is demonstrated by his appointment as the commissioner on cybersecurity for the 44th president, holding a position as a senior fellow at SANS, and being elected to the Purdue University Executive Advisory Board. The accomplishments he has earned include an induction into the Information Security Hall of Fame, and he has been awarded as a Cyber Wingman from the US Air Force. Aside from his seasoned technical expertise, he is an author of various publications, like his recently released book, Cyber Crisis, which debuted at #1 on the Wall Street Journal's Best-Sellers List. Dr. Cole's expertise and experience includes working with both plaintiff and defense counsel as a cybersecurity, networking, computer, and IT expert.
As an industry-recognized expert, with over 30 years of firsthand experience, he has built a solid background and knowledgeable insight in several areas of technology. Below is a list of selected, sample areas of expertise:
• Operating Systems
• Web Technologies
• Protocols and Communications
Litigation Support Services
As an expert witness, Dr. Cole provides valuable insights and technical expertise for several types of cases. Below is a list of selected, sample case types:
• Infringement & Non-Infringement
• Validity & Invalidity
• Trade Secrets
• Data Breaches
Areas of Expertise
Web Technologies, Apportionment, Networking, Network Security, Operating Systems, Protocols and Communications.
Dr. Eric Cole, Ph.D. in the Social NetworksFacebook Twitter LinkedIn
Secure Anchor Consulting Services: 2005-Present
Founder and CEO
Provides consulting services to Fortune 500, Fortune 50, financial institutions, international organizations, and the federal government. Employs innovative technology and technical components (network security, network architecture, and incident response, NOC/SOC design) to provide security solutions.
Serves as an expert witness for a variety of litigation involving government and commercial companies.
SANS (Sysadmin Audit Network Security): 1999-2019
Director of the Cyber Defense Initiative
Lead instructor and course developer for several security courses, including the top selling courses. One of the highest rated instructors and one of the few instructors teaching a variety of courses. Executed and contributed to the development of several of the GIAC certifications including GIAC Certified Security Essentials (GSEC), GIAC Certified Advanced Incident Handling Analysts (GCIH) and GIAC Certified Firewall Analysts (GCFW). Responsible for staying up on technology and developing new course material covering the state of the art in networking, information technology, and security. Created and led several key efforts including the Level One Notebook, Top 10/20 Vulnerability List, and the Cyber Defense Initiative, which included authoring the Critical Controls for Effective Cyber Defense. Developed business plans and created new technological initiatives. Constantly researched, assessed, and evaluated new security products and research efforts.
STI (SANS Technology Institute): 1999-2015
Dean of Faculty
A member of a five-person team tasked with creating a degree-granting educational institution and obtaining certification from the state of Maryland. Offered two master's degree programs focused on technical people needing managerial skills and managers needing technical skills. Designed and implemented curriculum and provided leadership to faculty. STI successfully received accreditation from the state of Maryland.
SVP, CTO of the Americas
As McAfee's visionary and evangelist, responsible for strongly influencing the company's strategic and technical direction, development, and growth as the global leader in digital security solutions. Key leader in the execution of technology strategy for platforms, partnerships, and external relationships. Worked closely with CEO, EVP of Product Operations, and other key stakeholders to establish a product vision and road map to achieve McAfee's goals and focused on identifying and capturing intellectual property and driving innovation across the company.
Lockheed Martin: 2005-2009
IS&GS Chief Scientist LM Senior Fellow
The Sytex Group, Inc. (TSGI) was acquired by Lockheed Martin with a key component being the intellectual property created under the CTO leadership. Dr. Cole was selected by Lockheed Martin for its prestigious fellowship program, an award it makes to less than 1% of its 130,000 employees. As a Lockheed Martin Senior Fellow (the first Fellow within Lockheed Martin's Information Technology Division), he was a frequently invited speaker at a variety of conferences and security events. As Lockheed Martin Chief Scientist, performed research and development to advance the state-of-the art in information systems security. Specialized in secure network design, perimeter defense, vulnerability discovery, penetration testing, and intrusion detection systems. Played a lead technical advisory role in many high-profile, security-focused projects for Federal clients to include civil, Intel and Department of Defense, including the FBI Sentinel, DHS Eagle, JPL, Hanford, and FBI IATI programs.
The Sytex Group, Inc. (TSGI): 2001-2005
Chief Technology Officer (CTO)
Positioned the company to achieve corporate growth and meet financial targets by utilizing and enhancing technology. Worked as an executive team member to determine and implement technical direction and focus of company. Experience with running projects including managing development efforts to exceed client requirements. Created an intellectual property portfolio that included patents, journals, books, and white papers, resulting in an overall increase in market value and customer engagement. The efforts of the research team's intellectual property increased advertising, market share and customer satisfaction through conferences, proposals, and magazine articles. Maintained full accountability for revenue of $55 million and was indirectly involved in revenue of over $80 million. Provided continuous leadership to a research team of over twenty people creating intellectual property that surpassed teams twenty times their size. Yearly patents were in line with the top one thousand producing patent companies in the United States.
Developed and executed creative techniques for influx of technology into non-technical business units to drive revenue and profit. Interfaced with government officials, including the Pentagon, The White House and Capitol Hill, and corporate executives to identify critical network security problems that needed to be addressed and researched.
Chief Security Officer (CSO)
Designed and executed strategy for establishing GraceIC as a leader in the network security arena. Developed the product line and built the services. Managed and directed security employees. Provided leadership and implemented internal security infrastructure, such as secure email, proper protection of data and security policies. Presented at national and international conferences and authored several articles. Performed and documented research into the area of future applications and solutions to the network security problem existing in the current market. Trained salespeople, program managers and engineers on how to sell, manage, and deliver security services. Maintained a
pulse on technology in the marketplace to produce market plans.
American Institutes for Research: 1999-2000
Chief Information Officer (CIO)
Brought in to fix and revamp the entire IT infrastructure based on the organization having experienced several security breaches, virus outbreaks and unreliable performance on the network. Within three months, stabilized the entire IT infrastructure and within nine months rebuilt the entire infrastructure. Designed the network to achieve a balance between functionality and security while minimizing the monetary impact to the organization. After one year, there were no severe security breaches, and all attempted breaches were contained prior to causing any significant monetary loss. Virus problems were contained and controlled, and network uptime was 99.999%. Security and performance increased while overall IT costs were reduced by 15%. In addition, provided technical support for DARPA-sponsored research projects. Helped invent technology and innovation that lead to a spin-off company, Pynapse, which created a state-of-the-art intrusion detection system known as Checkmate that was later sold to SAIC.
Vista Information Technologies: 1998-1999
VP of Enterprise Security Services
Developed the Enterprise Security Services Group and was responsible for all internal and external security issues. Tracked and managed separate profit and loss center for security. Grew the team from one person to over twelve people and executed several million in annual revenue in less than a year. Set up the security and other monitoring services for the NOC/SOC. Created all security services offerings and generated all necessary marketing and sales material. Followed and assured compliance with business plan and financial tracking of security group. Performed security assessments and consulted on all areas of security. Designed, implemented, and monitored security solutions including firewall design, intrusion detection, vulnerability assessment and penetration testing. Performed evaluation and analysis of security tools and provided technical recommendations and product improvements for VC funded startups. Key presenter at Cisco sponsored security seminars around the country and performed partnership activities with Fortune 500 organizations.
Director of Security
Created and managed IT Corporate Security Department. Pivotal point of contact for al l security concerns. Evaluated strategic plans and operational activities by performing risk assessment and determining how it might impact corporate security. Designed security solutions to meet operational needs. Integrated security and helped create NOC to provide proper monitoring of network. Developed the company's security policy and all required security guidelines. Set up lab to accurately assess and enhance the security features of the network. Performed and executed several computer investigations. Assisted and advised the legal department on laws, regulations, and policies relating to computer and information security. Evaluated several secure email solutions and installed PGP company wide. Established and set up web traffic monitoring and password tracking systems.
Central Intelligence Agency: 1991-1996
Program Manager / Technical Director for the Internet Program Team with the Office of Technical Services
A Senior Officer of the agency that implemented the Internet Program Team that specialized in rapid development and in exploiting the latest Internet technologies to meet customers' requirements. The team designed, developed, assessed, and deployed products over three-to-six-month intervals. Designed and developed several secure communication systems. Responsible for providing technical direction, technical design, security assessment, and programming modules. Secured internal servers, continually performed intrusion detection, and reviewed audit logs. Performed independent security reviews and penetration testing of Internet servers (World Wide Web) for other offices. Identified several weaknesses and devised ways to fix those problems and secure the system. Received letter of appreciation from the Director of Central Intelligence (DCI) and six Exceptional Performance Awards.
Computer Engineer with Office of Security
Member of the information security assessment team. Evaluated and performed security assessment of network operating systems. Identified potential vulnerabilities and ways to secure the holes. Designed a large-scale auditing system with automated review capability. Worked on several virus investigations.
Certified Information Systems Security Professional (CISSP)
Created several of the Global Information Assurance Certification (GIAC) programs and exams.
Association for Computing Machinery (ACM)
Institute of Electrical and Electronics Engineers (IEEE)
Computer Security Institute (CSI)
Information Systems Security Association (ISSA)
International Computer Security Association (ICSA)
International Who's Who in Information Technology Common Vulnerability and Exposures (CVE)
1. Eric Cole. Cyber Crisis. BenBella Books, 2021.
2. Eric Cole. Online Danger: How to Protect Yourself and Your Loved Ones from the Evil Side of the Internet. Morgan James Publishing, 2018.
3. Eric Cole. Advanced Persistent Threat: Understanding the Danger and How to Protect Your Organization. Syngress, 2012.
4. Eric Cole. Network Security Bible.2nd Edition. Wiley, 2009.
5. Eric Cole, Ronald L. Krutz, James Conley, Brian Reisman, Mitch Ruebush, Dieter Gollman, and Rachelle Reese. Wiley Pathways Network Security Fundamentals Project Manual. Wiley, 2007.
6. Eric Cole and Sandra Ring. Insider Threat: Protecting the Enterprise from Sabotage, Spying, and Theft. Syngress, 2006.
7. Eric Cole. Hiding in Plain Sight: Steganography and the Art of Covert Communication. Wiley, 2003.
8. Eric Cole. Hackers Beware: The Ultimate Guide to Network Security. New Riders/Sams Publishing, 2001.
Doctorate in Network Security, Pace University - 2004
M.S., New York Institute of Technology - 1994
Major: Computer Science
Honors: Harry Schure Graduate Memorial Award (awarded to one graduating senior)
B.S., New York Institute of Technology - 1993
Major: Computer Science
Honors: Graduated Magna Cum Laude, Dorothy Schure Memorial Award, Jules Singer Award, Grace Hopper Award from Computer Associates, Presidential Academic Award (4.0 all semesters), Presidential Service Award, Dean's List, Member of Who's Who Among Students in American Universities, and Member of Nu Ypsilon Tau Honor Society.