Thomas Stamulis Email and Phone Number
Thomas Stamulis work email
- Valid
- Valid
- Valid
Thomas Stamulis personal email
- Valid
Thomas Stamulis phone numbers
Cybersecurity thought leader with over 30 years’ experience in information security for commercial industries and government and a 20-year veteran as a US Army counterintelligence agent. Collaboratively works with Board of Directors and C-level executives to identify high-risk processes and develop appropriate mitigation controls in a timely and cost-effective manner. A skilled self-starter with executive, departmental and team management experience delivering governance, risk & compliance aligning with ISO-27002, NIST, FFIEC, GLB, NYDFS, HIPAA, SOX-404, COBIT, PCI, and FISMA regulatory requirements to fortune 500 organizations and the Federal Government.
-
Adjunct ProfessorBlue Ridge Community And Technical CollegeWinchester, Va, Us -
Ceo & PresidentTrue North Group Aug 2018 - PresentWinchester, Virginia, UsTrue North Group is a Service Disabled Veteran Owned Business (SDVOB) dedicated to reducing risk, solving compliance requirements and mitigating cybersecurity issues. We accomplish this through promoting the understanding and acceptance of prudent information security measures. Our experience in network and computer security spans across all industry verticals, state and federal government, with a single focus of providing realistic solutions to the challenges facing today’s small and medium companies. -
Senior DirectorAlvarez & Marsal Nov 2015 - Jul 2018New York, Ny, UsA&M is a leading global professional services firm that delivers performance improvement, turnaround management and business advisory services to organizations seeking to transform operations, catapult growth and accelerate results through decisive action. Our senior professionals are experienced operators, world-class consultants and industry veterans who draw upon the firm's restructuring heritage to help leaders turn change into a strategic business asset, manage risk and unlock value at every stage. -
Director, Security Management Program, Verizon Security ServicesVerizon Enterprise Solutions Jul 2007 - Nov 2015Basking Ridge, Nj, UsManage delivery of the Verizon Security Management Program (SMP), which is an industry recognized enterprise-wide risk and security control assessment and validation program. SMP is founded on ISO/IEC 27001 and 27002 assessing client information security management systems from network and system analysis to physical infrastructure and policy inspection reducing security risks, improving overall security posture and enabling customers to meet compliance requirements with the Verizon Enterprise Security Certification.• Manage over 6.7 million dollars of recurring revenue delivering SMP to over 75 multi-national companies in diverse industries and multiple technology environments• Continually deliver a 70% profit margin since 2006Lead a team of 7-10 security professionals and continuously improve of Ellucian’s information security program• Lead a team of 18 Security Professionals delivering multiple security services to over 350 global sites maintaining risk methodologies across the client’s organization.• Prepare and deliver high level trending analysis reports on technology risks for clients’ C-Level executive, Senior Management and Audit Committees• Developed an updated delivery process assessment tool identifying manual processes, which was the foundation for a new Risk & Compliance console reducing delivery time and increasing profits -
PrincipalCybertrust (Acquired By Verizon In July 2007) Feb 2006 - Jul 2007UsCybertrust is a global information security services specialist partnering with customers to align their information security to their business using the people, technologies and budgets already in place.Responsibilities focused on designing, supervising and delivering a structured security management program to multiple clients in diverse industry’s, lines of business and across multiple technology environments working closely with Corporate Compliance, Internal Audit, Corporate Risk Management and various technical teams.Accomplishments:- Develop and maintain methodology for evaluating risk across the client’s organization- Analyze corporate networks, evaluate network designs and exploit security vulnerabilities through network testing against numerous types of hardware appliances- Document technology risk management policy, standards and processes for assessment, monitoring, reporting, escalation and remediation -
Manager, BridgemarkBdo Sep 2005 - Feb 2006Helsinki, FiBridgeMark, a division of BDO Seidman, LLP, provides Risk Consulting and Advisory Services to companies in the financial, bio-tech and technology industries.Responsibilities focused on designing, supervising and executing programs for SOX 404, audit, regulatory compliance and risk assessment activities across multiple technology environments working closely with Corporate Compliance, Internal Audit, Corporate Risk Management and various technical teams. -
Senior ConsultantKpmg Llp May 2001 - Sep 2005New York, Ny, UsKPMG is a global network of professional services firms providing Audit, Tax and Advisory services that operate in 148 countries and have 6,500 partners and 70,000 client service professionals. Responsibilities focused on providing security knowledge and expertise to benefit the client and their capital markets. This was achieved through a consistent set of multidisciplinary advisory services based on deep industry knowledge. -
Senior Intelligence Systems Architect, C-2 IntelligenceUnited States Army Reserve Feb 2003 - Mar 2004Fort Liberty, Nc, UsManaged 14 joint service personnel as NCOIC of C2 (Intelligence) Network Operations, Intelligence Systems Division, Combined Joint Task Force - Seven (CJTF-7), Camp Victory, Baghdad, Iraq in direct support of combat operation during Operation Iraqi Freedom (OIF)Architected the transition from a single tactical intelligence communication network to a commercial multi-faceted supported network, allowing the CJTF-7 commanding general to allocate tactical intelligence assets in support of OIF Ensured uninterrupted delivery of critical network services on six data networks & two satellite feeds to the Coalition Analytical Control Element, Tactical Sensitive Compartmented Information Facility and Intelligence Fusion Center, facilitating timely intelligence reportingArchitected and directed migration of over 350 user accounts & 115 computers from the Army's tactical Secure Internet Protocol Routed Network (SIPRNET) to CJTF-7's highly reliable strategic SIPRNET environment -
Ncoic, Automated Information Systems Investigative Support TeamUs Army Nov 1998 - Nov 2000Arlington, Virginia, UsManaged all aspects of information security, developing and implementing an investigative support team for a 300+ person military intelligence organization, which included offices in Kuwait City, Kuwait and Doha, QatarPlanned and participate in counterespionage investigations of actual or suspected intrusions into classified and unclassified systems and networksImplemented Department of Defense security policies, trained organizational personnel in information system security and oversaw equipment accreditation for U.S. Army offices in Southwest AsiaConducted network vulnerability assessments and recommended solutionsProvided technical support for multi-discipline counterintelligence (CI) operations and investigations to include information warfareAnalyzed computer software/media to determine evidence of intelligence or criminal activitiesResearched evolving intrusion methodologies to determine intelligence and criminal threat to operating systems and networks -
Ncoic, B Co, 2D Plt, 202D Military Intelligence BattalionUs Army Nov 1997 - Oct 1998Arlington, Virginia, UsManaged 29 special agents supporting the U.S. Army Intelligence and Security Command and U.S. Forces CommandTrained, prepared and deployed 18 agents for six-month rotations to five countries in support of real world intelligence operationsMaintained and accounted for over $500,000 in sensitive classified intelligence equipment and vehicles -
Special Agent In ChargeU.S. Army Central Command, Doha, Qatar Mar 1997 - Oct 1997Established the first functioning CI office in Qatar, providing aggressive, proactive and accurate force protection support and intelligence to the regional commander.
-
Student (Arabic Language)Defense Language Institute Sep 1995 - Feb 1997
-
Counterintelligence AgentU.S. Army, Heidelberg Resident Office, Germany Sep 1994 - Aug 1995Led a four person team, which supported the U.S. Army Intelligence and Security Command’s mission to conduct personnel security investigations, vulnerability assessments and counterespionage training.
-
Counterintelligence AgentDetachment 4, Co A, 18Th Military Intelligence Bn. Sep 1992 - Aug 1994Supported the U.S. Army Intelligence and Security Command’s mission to conduct personnel security investigations, vulnerability assessments and counterespionage investigations.
-
Combat Signal Team ChiefHhc, 2D Brigade, 24Th Id Sep 1987 - Jan 1989
Thomas Stamulis Skills
Thomas Stamulis Education Details
-
University Of Maryland Global CampusCybersecurity Policy And Management -
Salem State UniversityBusiness Management -
SansExploits & Incident Handling -
SansHardening Windows 2000 -
St. Johns Preparatory SchoolGeneral Education
Frequently Asked Questions about Thomas Stamulis
What company does Thomas Stamulis work for?
Thomas Stamulis works for Blue Ridge Community And Technical College
What is Thomas Stamulis's role at the current company?
Thomas Stamulis's current role is Adjunct Professor.
What is Thomas Stamulis's email address?
Thomas Stamulis's email address is ts****@****sal.com
What is Thomas Stamulis's direct phone number?
Thomas Stamulis's direct phone number is +120268*****
What schools did Thomas Stamulis attend?
Thomas Stamulis attended University Of Maryland Global Campus, Salem State University, Sans, Sans, St. Johns Preparatory School.
What skills is Thomas Stamulis known for?
Thomas Stamulis has skills like Security, Information Security, Information Security Management, Vulnerability Assessment, Network Security, Computer Security, Program Management, Leadership, Cloud Computing, Governance, Risk Management, Management.
Free Chrome Extension
Find emails, phones & company data instantly
Aero Online
Your AI prospecting assistant
Select data to include:
0 records × $0.02 per record
Download 750 million emails and 100 million phone numbers
Access emails and phone numbers of over 750 million business users. Instantly download verified profiles using 20+ filters, including location, job title, company, function, and industry.
Start your free trial