BOGT Interviews Dr. Eric Cole, Founder of Secure Anchor

Blue Ocean Global Technology Interviews Dr. Eric Cole | Founder of Secure Anchor

About Dr. Eric Cole

Dr. Eric Cole is a renowned cybersecurity expert, entrepreneur, and best-selling author with over 30 years of industry experience. Known for his work in advancing cybersecurity and his dedication to making the digital world a safer place, Dr. Cole has a unique background that includes working as a professional hacker for the CIA to advise some of the world’s top companies.

As America’s Cybersecurity Czar, Dr. Cole’s life mission is clear: to make cyberspace a safe place to work and do business in. While he started his career on the offense, he is now fully dedicated to understanding the adversary so he can provide cost-effective solutions and help businesses implement smarter and safer processes. As a pioneer in the area of cybersecurity, he has been inducted into the Infosec Hall of Fame, and awarded the Cyber Wingman Award from the US Air Force. He has also received multiple accommodations from the CIA, and was part of the commission on cybersecurity for President Obama. He has been the featured speaker at many security events and is an in-demand expert for national media outlets such as CNN, CBS News, FOX News and 60 Minutes.

What initially drew you to this field and what continues to fuel your passion for doing it?

Back in high school during the ’80s, I was fascinated by how things worked-architecture, structures, systems. A family friend suggested I look into a new field called computer science. He said, “Everything’s going to run on computers, and with that degree, you can do anything-architecture, accounting, you name it.”

So I studied computer science at New York Tech, though at the time it leaned more toward electrical engineering. I realized I didn’t enjoy that side of it. I was drawn to programming. One rainy afternoon, I felt a gut instinct to visit the co-op office. It turned out the CIA was coming to campus the next day, and they had two interview slots left. I showed up to the interview relaxed (probably too relaxed), in a brand-new suit I’d just bought. Somehow, that worked in my favor. I got the job.

I started at the CIA in 1990 as an AI programmer, working with the Counterterrorist Center on neural networks to predict terrorist behavior. AI wasn’t new; even then it was all about data. In a meeting, I once asked how we knew a system was secure. No one could answer. That question led me to research cybersecurity- and I discovered my superpower: pattern analysis. I could spot vulnerabilities in systems quickly and design solutions fast. That launched my path as an ethical hacker.

Eventually, I moved into the private sector, joined startups, became CTO, and focused on building intellectual property and company valuation. I’ve also worked with McAfee, built out the cyber defense curriculum at SANS, trained over 40,000 professionals, and wrote books like Online Danger and Network Security Bible.

Today, what drives me is protecting people. Most don’t realize how vulnerable they are- families, kids, businesses. The rise of deepfakes and cyber abuse has real, tragic consequences. I’m passionate about making cyberspace safer and helping people understand tech risks in plain English. That’s my other superpower-translating complex cybersecurity issues so everyone can understand and act.

eric-cole

What does a typical day look like for you?

I usually wake up around 4 or 5 a.m. Health, fitness, and mindset are non-negotiables for me-if you’re not operating at your physical and mental best, you can’t deliver on your purpose. That starts with sleep. I don’t use an alarm clock because I believe in waking naturally-when your body completes its cycle, you wake up sharper and more focused. I’m usually asleep by 8 or 9 p.m. so that I can wake up early. 

I avoid tech for the first 30 minutes of the day. No phones, no social media. I start with affirmations, which I generate using AI the night before. I read them out loud in the mirror-it’s grounding. Then I head to my office, meditate, journal, and hit the gym by 5:30 or 6:00 a.m. My workouts are about an hour, followed by either an ice bath or cryotherapy, then 30 minutes in an infrared sauna.

After that, I plan my day. From 8 to 10 a.m., I enter a deep “flow state”-no tech, just pencil and paper. I get more done in those two hours than most people do all day. This morning, for example, I wrote a full campaign and five blog posts.

Late morning is for podcasts or meetings, client calls over lunch, and organizational meetings in the afternoon. I usually wrap up by 6 p.m., then evaluate the day and plan ahead using AI tools.

In the evening, I might do hyperbaric oxygen therapy, ozone treatments, or NAD IVs for recovery. I’m home around 7 p.m., wind down with dinner, some reading, and sleep prep using delta wave frequencies and affirmations before calling it a night.

Which emerging trends in cybersecurity most excite you? Are there any new technologies or shifts that you believe are shaping the future of the field?

The biggest game-changer right now is Artificial Intelligence. It’s transforming cybersecurity on both sides-how we defend and how attackers operate. But AI is still a tool. It can mimic human behavior, but it can’t feel. It doesn’t have emotion, creativity, or empathy. That’s what makes us human. So if we let AI fully replace human interaction, we risk becoming obsolete. That’s a danger I take seriously and actively work to address.

Another fascinating area is digital rights. Ownership of content-data, ideas, knowledge-is becoming blurred. Once something is fed into an AI or shared online, it’s hard to claim it as yours. I’m helping companies figure out how to navigate the ethical and legal dimensions of this. It’s especially tricky when institutions, like universities, ban AI for assignments-not because it’s illegal, but because they’ve decided it’s morally wrong. That kind of inconsistency is worth challenging.

The third trend is the rise of cybercrime as a business. Many cybercriminal groups operate openly in countries where hacking the West isn’t even a crime-China, Russia, Iran, North Korea. These aren’t lone actors; they’re companies with offices, staff, even HR departments. And because there are no extradition treaties, we can’t touch them legally. That’s why educating and preparing organizations is more important than ever-because they will be targeted. It’s no longer a matter of if, but when.

eric-cole

Can you walk us through any particular challenging case that you’ve had and how you handle it? What was your strategy for resolving it?

I work on a lot of expert witness cases, especially around intellectual property. One of the biggest misconceptions in these cases is that intent matters-it doesn’t. A company might independently create a technology, invest millions in R&D, and have no idea a patent exists, but if that patent predates their work, they’re still in violation. That’s always a tough realization for clients who feel they’ve done everything “right.”

Another major challenge is explaining highly technical issues to judges and jurors who aren’t technical at all. I rely heavily on analogies and visuals to bridge that gap. I believe true experts can explain complex ideas simply. One story I always come back to is the Challenger shuttle disaster. It wasn’t until an engineer used a piece of foam and a glass of ice water to demonstrate how the cold made a critical seal brittle that Congress-and the public-really understood what happened. That’s the power of simplifying without oversimplifying.

In data breach cases, another challenge is defining what’s “reasonable.” Security isn’t one-size-fits-all-it varies by company size, industry, revenue, and risk profile. I often serve as an expert on both sides of these cases, so consistency is critical. I need to make sure that if I say a policy was reasonable in one case, I can clearly explain why a similar policy wasn’t in another-based on its elements, not just its existence.

Ultimately, my strategy is to create clear, defensible methodologies in areas where there often aren’t any. That way, my testimony remains consistent, credible, and resilient-even under Daubert scrutiny. It’s all about being meticulous, objective, and able to explain the why behind every opinion.

What distinct values do you bring to your clients, especially in high-stake situations?

The biggest value I bring is solutions. A lot of cybersecurity professionals are great at pointing out vulnerabilities-but stop there. That’s like a doctor telling you you’re sick and walking out without offering treatment. My job isn’t just to diagnose problems, it’s to fix them-and fix the root cause, not just the symptoms.

That’s how I approach both cybersecurity and life. I don’t believe in masking issues-whether it’s with painkillers or temporary tech patches. I go deep to uncover what’s actually wrong and design solutions that are sustainable.

I also let data drive decisions, not emotion. Too often, people panic about risks without really understanding them. I help clients evaluate the facts and make informed choices. I’ll never say “you have to fix this.” I’ll say, “Here’s a risk with an 80% chance of costing you $5 million. It’ll cost $300K to fix. You decide.” If they accept the risk because of current priorities, that’s fine. My role is to educate-not to pressure.

Another value I bring is clear communication. I translate cybersecurity risks into business terms. It’s not about “yes” or “no” to a tool or strategy-it’s about understanding: What’s the risk? What’s the reward? Is the risk worth the benefit?

Take Alexa, for example. I didn’t tell people to avoid it. I simply explained the risk-that it’s always listening, often recording, and those recordings can even be used in court. When people understood the exposure, they made their own decisions. That’s what effective cybersecurity is-giving people the insight to act wisely.

In high-stakes environments, clients need clarity, not fear. They need someone who sees the full picture, offers real solutions, and respects their right to make decisions based on facts. That’s what I bring to the table every time.

What are some frequent myths about the field of cybersecurity?

Well, first off-yes, we do wear black. That’s practically the unofficial dress code. But one big myth is that cybersecurity professionals are all introverted, socially awkward nerds who’d rather talk to machines than people. That’s just not true. I call myself one of the fittest geeks on the planet-I hit the gym, eat clean, and wear tailored clothes. People are often surprised when they find out I’m in cybersecurity because I don’t “look the part.” But that’s the point-there is no one look. We’re not all hoodie-wearing loners hunched over a keyboard.

Another myth? That cybersecurity experts only speak in tech jargon. A lot of CEOs dread security meetings because they expect 30-slide decks full of binary and acronyms. But good cybersecurity professionals speak business. I can read a P&L, talk EBITDA, and help align security strategies with revenue goals. We’re not just techies-we can be entrepreneurs, communicators, and company builders.

One more misconception is that cybersecurity is all about stopping things-blocking access, slowing systems down, or making life harder for the business. In reality, when done right, cybersecurity is a business enabler. It protects your operations, builds trust, and can actually boost profitability. It’s not about saying “no”-it’s about making smarter, safer “yes” decisions that help companies grow.

eric-cole

Can you tell us how you and your team continue to innovate and stay ahead in such a fast moving and competitive industry?

It is a simple act: think like the adversary. Even though we’re defenders, we constantly study offensive tactics-how hackers think, how they operate, what motivates them. By understanding their mindset, we can anticipate their moves and build smarter defenses.

Beyond that, we focus on patterns and root causes. While exploits evolve, the fundamentals of how systems get breached haven’t changed. An attacker still needs an exposed IP, an open port, a vulnerable service-it’s always some version of that. So instead of chasing every new tactic, we stay ahead by addressing the core vulnerabilities that make those attacks possible in the first place. If you’re only reacting to symptoms, you’ll always be behind. But if you solve the root issues, you’re leading the game.

Is there a guiding principle or philosophy or quotes that has influenced your life or career and career?

Absolutely-have a plan for your life. I operate on a 15-year plan. I know who I want to be and where I want to be in 15 years, and every day I evaluate whether my actions are moving me closer to that version of myself. If something doesn’t align, I cut it out.

Most people drift through life without direction, wasting time on distractions like social media. Five minutes here and there can add up to hours. At the end of the day, I ask myself: “Did that time make me better? Did it get me closer to my goal? If the answer is no, I stop doing it.”

When you have a clear long-term vision and use it to guide your daily choices, everything becomes more focused, more intentional-and far more fulfilling.

Conclusion

Dr. Eric Cole’s aspirational journey reveals how he rightfully earned his title as an entrepreneur, author, and a true leader. His expertise and passion for cybersecurity highlights his determination to endure and thrive through challenging environments. 

Do you have a personal or professional story that can inspire other people into becoming the best version of themselves?

You are welcome to share your journey with our audience.

Scroll to Top

"*" indicates required fields

Privacy Policy

Download PDF File here

Please provide your information below to receive the white paper.

"*" indicates required fields

Privacy Policy

Error: Contact form not found.

[showchatbox]

Brittney Bagiardi

Business Development & Marketing Manager at Butler Weihmuller Katz Craig LLP February 4, 2020

The Legal Marketing Association's Tampa City Group was honored to have Sameer come to speak with us regarding Online Reputation Management. Sameer is an energetic presenter who took the time to answer each and every one of our questions. His expertise was evident in his polished presentation, and our members were engaged thoroughly. All communications leading up to the event were timely and friendly, and I have enjoyed my time working with Sameer on this speaking engagement.

Tamie Maffeo

Marketing Manager at NEIRG Wealth Management. & Business Succession Advisers, LLC

Working with Sameer and the team at Blue Ocean Global Technology has been such a positive experience! The ongoing communication combined with the efficiency of work of the team is very much appreicated. Sameer is quick to respond to any questions we may have. He and his team is quick to to resolve any questions that arise. They go above and beyond for us no matter what day or time we reach out. I have had many dissapointing engagements over the years with similar firms but must say that this is a refreshing experience. I am in a niche business with complicated regulations surronding our marketing platform. Having the peace of mind that the team at Blue Ocean is there to impliment and guide our firm gives me great satisfation. That being said, I give them my highest reccomendations and would gladly speak with anyone who has any questions regarding my experience.

Jay Chong

EVP, Head of e-Mobility Group at SK Group

I had a chance to work with Sameer for several months, and he has been one of the most transparent and responsible people I have ever worked with. He has been highly responsive, always responding within a day despite the time zone difference, and thoughtful, which was a big relief for me as some I worked with in the past were "Catch Me if You Can". He has delivered all his promises and more. He has been genuine and results oriented. It has been a pleasure working with him, and I highly recommend his service.

Vern Hayden

Client Advocate at Sovereign Financial Group, Inc

Sameer lives outside the cliche’s of life. Let me put it this way:

If you were looking for someone totally committed to helping in a mission, a cause, or company you would want Sameer.

If you were looking for someone who would drop everything to help you, who knows the best and worst about you, someone with empathy and understanding, in short someone you call a “true friend” , you would want Sameer.

If you want someone who has aligned themselves with the great causes of women you will want Sameer. If you want someone who gives a damn about kids that are abused,misplaced,without direction,kicked to the curb, and need help get Sameer.

If you want someone to give a mesmerizing presentation get Sameer. He will stay up all night doing relentless research on the subject and the audience and inspire your audience to action.

If you want someone with a consistent well defined philosophy of life combined with a remarkable code of ethics you want Sameer.

If you want a leader with emotional and academic intelligence combined with magnetic charisma check in with Sameer.

If you want a team player who has been in the trenches as well as the mountain tops Sameer has been there.

If you want someone to help stabilize your business and take it to greater fulfillment Sameer will be there for you.

If you need a George Gilder tech genius as a resource., Sameer knows the best and can bring innovative solutions to your challenges. ( the right wing radio host Rush Limbaugh said if he could choose another brain it would be Gilder’s.)
If you need someone to trust with integrity and accountability you need to meet Sameer. I could go on but I think you know how I feel about this guy now. I have known and been a friend for over two decades.

Najah A. Edmondson

Marketing professional at National Center For College & Career Transitions (NC3T), The TASA Group and ASK For Tutoring

Sameer Somal is a personality you cannot forget! I met Sameer one year exhibiting at the Delaware Valley Legal Expo in King of Prussia, PA. It was the end of the night and he came over to introduce himself to me and my colleague. We engaged in an amazing conversation about The TASA Group and about relationship management. He helped us take our belongings to the car at the end of the night. We all left with a new connection and a lifelong friend. So excited with meeting Sameer, we immediately figured out how we could work together - webinars, articles and in-person presentations to some of the organizations we are partnered with. It's been a few years since we met and Sameer continues to thrive in his field and in his expertise. The light he exudes is both infectious and comforting. I would recommend Sameer for any job!

Walt Wiesenhutter

Certified Small Business Mentor at SCORE Mentors Philadelphia. Taught at Harvard University Executive MBA & at Columbia Executive MBA & Northwestern Executive MBA

My name is Walter J. Wiesenhutter and I am loyal client of Sameer Somal’s and Blue Ocean Global Technology. I founded Jay Associates in 1984 and served as president of our consulting company for several decades. Regretfully, our offices were in the World Trade Center in 9/11 and we lost key team members as a result of those tragic events. We persevered for the next few years to replace the seemingly unreplaceable. I met Sameer, one of the co-founders of Blue Ocean Global Technology in 2005. I was immediately impressed with his genuine character and commitment to serving others. The emergence of the internet and digital technology changed our business so much and our meeting couldn’t have been more serendipitous. I was quite fortunate to learn of this company’s world-class resources. Over the years, they were instrumental in improving our stellar reputation and building a digital presence that reflected the trust we had with our clients offline. As business partners, clients, and friends complained about their Google presence, disappointing web development projects, and digital marketing companies over promising and under delivering, I referred them directly to Sameer and his team at Blue Ocean Global Technology. Their needs and requirements were always handled with care; the feedback is always exceptional because they deliver results based on exactly what the companies want to help them grow. When Blue Ocean Global Tech did not feel they could provide the best service or guidance on a particular situation, Sameer and his colleagues are honest with me or anyone from my network. They then took the time to find resources and partners within their trusted network that were a better fit. Today, at 75, I am delighted to share and document my successful experiences with this team of excellent professionals. If you are looking for a global team that is diligent, honest, and transparent, you have found the right company in Blue Ocean Global Technology. Not only do I give them my highest and best recommendation, I feel fortunate to call many of their global team members my friends!