Albert E. Whale Email and Phone Number
Albert E. Whale work email
- Valid
- Valid
- Valid
- Valid
- Valid
- Valid
Albert E. Whale personal email
Albert E. Whale phone numbers
I am a thought leader, team builder, and creator of Products and Services for Businesses and Clients. My goal is to save clients from breaches and embarrassments of poor security.I am a Certified Global Coach at Napoleon Hill Institute, where I support others in their personal development to live their dreams. With over 20 years of experience in cybersecurity, IT security, and entrepreneurship, I have a unique perspective and skill set to help clients achieve their goals and overcome challenges. I am also a #1 International Best Selling Author of the sequel book #HACKED2, written with 12 esteemed cybersecurity professionals who offer their views and insights on how to protect personal and business information from cyber threats. I am passionate about sharing my knowledge and experience with others, and I regularly speak at events, webinars, podcasts, and media outlets on topics related to cybersecurity, personal development, and entrepreneurship.
Founder Institute Pittsburgh
View-
DirectorFounder Institute Pittsburgh Nov 2024 - PresentFounder Institute is a Business Accelerator designed for entrepreneurs with a defined idea who want to start their own business. The Institute meets weekly and supports the development and introduction of new businesses globally.The Founders Institute is supported by other entrepreneurs with a passion for innovation and helping other startups succeed. Pittsburgh’s FI meets Tuesday evenings from 6:00 to 8:00pm. -
Senior Cyber Security Assurance And Design ConsultantConfidential Jul 2024 - Present▪ Responsible for advising security engineering teams on best practices and ensuring technology initiatives are implemented within the framework to make premise and cloud environments more secure. ▪ Accountable for securing enterprise information by identifying network and application security requirements, and planning, implementing, and testing security controls and procedures across multiple projects. ▪ Communicating the various ways in which information can be exfiltrated from the internal network. ▪ Consulted on the use of cryptographic keys and storage. ▪ Design the protection of sensitive information in the internal network and to outside third parties.
-
Certified Global CoachNapoleon Hill Institute Mar 2023 - PresentI am supporting others in their personal development to live their dreams. You can have anything that you desire. Are you ready? -
Sr Security Consultant, Founder & CeoIt Security Solutions, Inc. Jun 2018 - PresentPittsburgh, Pennsylvania, UsI created IT Security Solutions to bring about a change in the cyber security industry. In doing so, I developed a new product called the ITS Safe(TM) security appliance. ITS Safe Detects, Protects, and Destroys intruders.Our Passion is about the protection of companies, and making them more secure, productive, and cost effective. If your organization has not had a security assessment recently, I recommend that you to get one, so that you can prevent the breach, rather than have additional costs associated with the cleanup afterwards.My question to you is this, if your systems were vulnerable or compromised, would you want to know? From a trusted adviser, or from the attacker within? Get ITS Safe(TM), so that we can help you be safe. -
Startup MentorFounder Institute Jan 2022 - Nov 2024Palo Alto, Ca, UsFounder Institute is known globally as the leader in launching entrepreneurs to successful businesses. Not every entrepreneur is accepting into Founder Institute, they must first pass a personality test. From there, they are offered admission, and from there the education begins. Not everyone graduates, for many reasons. But the concept of fail fast, fail early enables these members to regroup and start again.I was a member of the First Cohort in Pittsburgh. I am told that 50+ entrepreneurs applied, 25 passed the test and were offered access to the program. When the program started, on;ly 17 were in the class, and 7 companies made it to the graduation.I want to see as many complete the program as possible so I am giving back to my community. This is my personal effort to build back better. -
Sr. Security Manager - Security ArchitectCapgemini Sep 2019 - Apr 2024Paris, France, FrAs a cybersecurity architect, I developed security solutions for both public and private organizations to enhance their protection. I contributed to new product development at Capgemini, focusing on the DevSecOps, CMMC, and Zero Trust initiatives. Our mission was to deliver greater value using fewer resources. My mission was to improve organizations and leave them better than when I started with them. -
Adjunct Faculty InstructorCommunity College Of Allegheny County Aug 2019 - Sep 2019Pittsburgh, Pa, UsSharing my technical knowledge always pays off in dividends. I started this fall to teach the CIT-100 class, who knows what the future will bring. -
President / Chief Information Security Officer (Ciso)It Security, Inc. Jul 2013 - Sep 2019Pittsburgh, Pa, UsVeterans still serving America.IT Security, Inc. provides it's Clients with confidential solutions in security designed to meet each clients business need. While IT Security strives to promote a Proactive Security solution to protect the enterprise, IT Security is also able to active or previous security solutions to deliver the proper solution(s) to meet the client's security needs. Whether your Organization follows NIST, FISMA, HIPAA, SOX or OWASP, our experienced professionals are ready to work with your security needs to implement proactive and reactive solutions. Relating NIST 800-171, NIST 800-53 and ISO 27001 controls.Our use of Lean production methodologies enables us to benefit the client with more efficient and improved security. Our understanding of Blockchain provides a structured environment for facilitating the records of the environment in a distributed manner. We also employ Micro Token Exchange - MTE for the protection of Data at Rest and in Motion.IT Security delivers Products, Services, Training and Managed services to support our clients. We offer Source code review, Static and Dynamic Analysis, Website vulnerability scanning, network analysis, penetration testing, and network architecture review. IT Security is online at http://www.IT-Security-inc.com -
MentorDuquesne University Sep 2018 - Oct 2018I have been asked to become one of the Mentors of the Freshmen class for the for the Innovation Experience. Looking forward to an amazing semester. This is one class for the economic improvement of properties in the Pittsburgh area. Freshman class project.
-
Sr Security Consultant - Eh Team & Appsec CoeBny Mellon 2013 - Aug 2017New York, Ny, UsWorking On/Off site for BNY Mellon in Pittsburgh, PA Performing the following: Conduct Penetration tests Identify vulnerabilities in systems Analyze risks and recommend measures to control vulnerable areas Simulate breaches to network security Develop measures to lock down risk areas Training of Development / Architecture Teams to prevent attacks Penetration Testing / Ethical Hacking tools and forms of attack and associated tools Hacker exploit scripts/programs to test whether vendor/developer patches operate as intended and fix the identified vulnerability or identify the malicious code Intrusion Detection Environments and forms of attack with the ability to perform analysis of the systems and application logs for Intrusion signs Create new environments to facilitate both distributed and Mobile applications testing. Improve the overall efficiencies in the reporting and communications of the Security Teams and the developers to improve the remediation of the security issues. Improved the overall Secure SDLC program with updates driven through the Security Team. -
Cyber Security Solutions - Sr. ConsultantLynx Technology Partners, Inc. Jun 2013 - May 2015New York,, Ny, UsMr. Whale is providing Technical expertise in the Manual Ethical Hacks, and Technical Risk Management departments of BNY Mellon. My efforts in the team include the Manual Testing of Web App security vulnerabilities, Mobile App vulnerabilities, and working with the Application Teams to discuss the issues with the applications.Additionally, Albert is scoping project work efforts in the Network and Application Penetration Testing services being provided by Lynx Technology Partners. This includes the Testing and Remediation efforts for both Web and Mobile based applications.Albert's technical expertise assists Major corporations in determining their risk exposure, and scoping the effort to secure network infrastructures, as well as software applications which run on them. -
Cyber Security ConsultantCigital Apr 2012 - Jun 2013Specialized in supporting the ASACoE program for the Air Force. Worked as the lead training for Attack & Defense, HP Fortify and with IBM AppScan (Source and Standard Editions), as well as Application Security's AppDetective Pro. There are NEW Tools coming out which will enhance your application software security levels. Delivered training for a variety of customers, including: BAE Systems, Boeing, Booz Allen Hamilton, CACI, DISA, General Dynamics, L-3/Engility, Lincoln Labs, Lockhead Martin, MACE, Mitre, Northrop Grumman, SAIC, SRA, SOCOM, SRC, SPAWAR and more. Training is the start, understand moved this forward, and implementation keeps the ball rolling.The ASACoE Program is just one of the programs in which we promote the BSIMM model for building in the benefits of Software Assurance by implementing Information Security Controls in the Software Development Life Cycle (SDLC).Building security into the software is the simplest method for improving our Nations Critical Infrastructure, and making it more resilient to cyber attacks.
-
Senior Security & Technology DirectorAbs Computer Technology, Inc. Jul 1997 - Dec 2012ABS Computer Technology was focused on the development of the Security Solutions for its clients. Utilizing the HIPAA, SOX, and PCI regulatory compliance guidelines to assist clients for improving their overall security.ABS worked with both Network, and Host based security, as well as implementing updates for WAF to improved web security as well.
-
Information Assurance Lead/ManagerL-3 Communications Nov 2011 - Apr 2012New York, Ny, UsImplementing Information Security with an Agile approach (instead of a Compliance Model), saving time, money, and effort. We are putting security into the application, as it is being built.Lead of the team and managing the project for L3 as the main contractor for the VBMS project for the Dept of Veteran Affairs. -
Vp Technical SecurityEthical Intruder Apr 2010 - Apr 2011Pittsburgh, Pa, UsETHICAL INTRUDER specializes in Business Vulnerability Evaluations that protect our clients from both internal and external malicious intruders (hackers) and reduces the risk of suffering reputation and financial harm. Many of today’s IT organizations are spending heavily on regulatory, audit and compliance standards. While those approaches are often necessary, those precautions alone do not answer many important questions:Are my organizations digital assets and IP really safe?Am I protected from a breach in my customer, patient or employee data (PII)?Are my commercial IT products creating vulnerabilities for my clients?
Albert E. Whale Skills
Albert E. Whale Education Details
-
Penn State UniversityElectrical Engineering -
Alts Capital OnlinePrinciples Of Corporate Finance -
Founder InstituteEntrepreneurial And Small Business Operations -
Sba Emerging Leaders ProgramGeneral
Frequently Asked Questions about Albert E. Whale
What company does Albert E. Whale work for?
Albert E. Whale works for Founder Institute Pittsburgh
What is Albert E. Whale's role at the current company?
Albert E. Whale's current role is CYBERSECURITY OVERSIGHT LEADER | Leader in Quantum, AI, and Zero Trust | Award-Winning International Author | Speaker.
What is Albert E. Whale's email address?
Albert E. Whale's email address is al****@****inc.com
What is Albert E. Whale's direct phone number?
Albert E. Whale's direct phone number is +141243*****
What schools did Albert E. Whale attend?
Albert E. Whale attended Penn State University, Alts Capital Online, Founder Institute, Sba Emerging Leaders Program.
What skills is Albert E. Whale known for?
Albert E. Whale has skills like Security, Information Security, Computer Security, Information Technology, Leadership, Penetration Testing, Networking, Network Security, Information Security Management, Integration, Sdlc, Enterprise Software.
Free Chrome Extension
Find emails, phones & company data instantly
Aero Online
Your AI prospecting assistant
Select data to include:
0 records × $0.02 per record
Download 750 million emails and 100 million phone numbers
Access emails and phone numbers of over 750 million business users. Instantly download verified profiles using 20+ filters, including location, job title, company, function, and industry.
Start your free trial