Albert E. Whale
Pittsburgh, Pennsylvania, United States
28K followers
500+ connections
About
As an Executive Cybersecurity Leader, I have 20+ years of experience driving enterprise…
Services
Articles by Albert E.
Activity
Experience
-
Practical Security
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
Education
Licenses & Certifications
-
CHS
American College of Forensics Examiners International
Issued -
CISA
ISSA
IssuedCredential ID 436881 -
CISSP
(ISC)2
IssuedCredential ID 28730 -
Honored Listee
Marquis Who's Who
Issued ExpiresCredential ID bbf39fa8de1b4e5e9f0e1d5fdac4f4da6614f51fd6e84496a8c2c63e5c2eae35
Volunteer Experience
-
Board Member
McKnight Village Board of Directors
- Present 13 years 8 months
I am supporting my Local community by assisting on the Board of Directors for the McKnight Civic Association. This is my second term as a Board member, and I am looking forward to supporting the community, its fund raising and activities.
-
IT Advisory Board Member
Pittsburgh Technical College
- Present 9 years 6 months
Science and Technology
IT Advisory Board members work to improve the experience of the Cyber Security professionals, new students and promoting additional cyber security professionals for the Public and Private sector.
-
Supporting Member
OWASP Foundation
- Present 12 years
The OWASP Foundation is an excellent opportunity for organizations to begin to understand the concept of security defects. The classifications are easy to use/employ/understand, and while not completely comprehensive, will get them started in understanding the issues with application security.
-
Cybersecurity presenter
ASIS International
- Present 8 years 7 months
Science and Technology
The presentation was titled, is a Firewall enough security for my business?
-
Advisory Board Member
EC-Council
- Present 8 years 7 months
Science and Technology
The EC-Council University Advisory Council is a group of volunteer cyber security technology and education experts who advise the Academic/Administrative Team of EC- Council University with regard to policies, procedures, programs and practices of the University. They serve on a pro bono basis at the invitation of the EC-Council President.
-
Advisory Board Member
EC-Council University
- Present 8 years 7 months
Science and Technology
EC-Council University is dedicated to creating superior educational programs enabling graduates to be equipped to face the latest IT security risks and lead their colleagues in strategically handling those challenges.
Through quality distance educational programs, excellence in teaching and research, and direct connections to the Cyber Security industry EC-Council University aspires to be an educational leader in cyber security. Our students of today will become the cyber security…EC-Council University is dedicated to creating superior educational programs enabling graduates to be equipped to face the latest IT security risks and lead their colleagues in strategically handling those challenges.
Through quality distance educational programs, excellence in teaching and research, and direct connections to the Cyber Security industry EC-Council University aspires to be an educational leader in cyber security. Our students of today will become the cyber security leaders of tomorrow.
https://www.eccu.edu/about-eccu/advisory-council/
-
Director
Founder Institute - Pittsburgh
- Present 1 year 7 months
i18n_veterans
Founder Institute is a Business Accelerator designed for entrepreneurs with a defined idea who want to start their own business. The Institute meets weekly and supports the development and introduction of new businesses globally.
The Founders Institute is supported by other entrepreneurs with a passion for innovation and helping other startups succeed. Pittsburgh’s FI meets Tuesday evenings from 6:00 to 8:00pm. -
Certified Global Coach
Napoleon Hill Institute
- Present 3 years 3 months
Education
I am supporting others in their personal development to live their dreams. You can have anything that you desire. Are you ready?
I am supporting others in their personal development to live their dreams. You can have anything that you desire. Are you ready?
Skills: Microsoft Excel · Issue Identification · Microsoft Office · Building Key Relationships · Outside Sales · Microsoft PowerPoint · IT Leadership · Business Acumen · Presentations · Data Privacy · Interpersonal Skills · Leveraging…I am supporting others in their personal development to live their dreams. You can have anything that you desire. Are you ready?
I am supporting others in their personal development to live their dreams. You can have anything that you desire. Are you ready?
Skills: Microsoft Excel · Issue Identification · Microsoft Office · Building Key Relationships · Outside Sales · Microsoft PowerPoint · IT Leadership · Business Acumen · Presentations · Data Privacy · Interpersonal Skills · Leveraging Relationships · Communication · Strategic Thinking · Financial Literacy · Cyber · Reporting Metrics · Office Application · Reasoning Skills · Interpersonal Communication · Conflict Management · Problem Solving · Support Services · Confidentiality · Cross-functional Team Leadership
Publications
-
#HACKED2 Practical Guidance for Dealing with Threats to Your Business and Privacy
10-10-10 Publishing
We have become so dependent with technology that it is important the we begin to understand what it is that is helping us, and what needs to be worked on in order to better protect us.
The current state of endpoint security is reactive and relies on signature-based detection techniques. These techniques are ineffective against modern malware that is designed to evade detection. Additionally, the increasing use of mobile devices and the cloud create new security challenges that are not…We have become so dependent with technology that it is important the we begin to understand what it is that is helping us, and what needs to be worked on in order to better protect us.
The current state of endpoint security is reactive and relies on signature-based detection techniques. These techniques are ineffective against modern malware that is designed to evade detection. Additionally, the increasing use of mobile devices and the cloud create new security challenges that are not currently addressed by traditional security solutions.
The perimeter is no longer effective in deterring or preventing cyberattacks?
Cybersecurity attacks are up more than 80%
How comfortable are you with your ability to detect and respond before damage is done?
Protecting your Data (both business and personal) is the issue that is top of mind. Protecting you and keeping the attacker out, is essential to everyone. That’s what we will discuss to help you protect yourself from getting #HACKED! #HACKED2 delivers the experience of the Author and 12 Exceptional Cybersecurity Professionals all in one location.
#HACKED2
Practical Guidance for Dealing with Threats to Your Business and Privacy
By Albert E. Whale
CEH, CHS, CISA, CISSP, BSEE, CMMC-RP
With
Thomas Albert
Chuck Brooks
David Brown
Dr. Chase Cunningham (aka Dr. Zero Trust)
Maggie Dillon
Alan Elliott
Kevin Harding
Robert Kost
Nathan Kunst
Kevin Love
Michael Nash
Arnold H. Webster (Ph.D. Candidate)Other authorsSee publication -
#HACKED - 10 Tips to Protect Your Personal and Business Information.
10-10-10 Publishing
See publicationThe #HACKED book is the perfect resource for anyone looking to learn about cybersecurity. Written by leading experts in the field, this book provides in-depth coverage of all aspects of cybersecurity. Whether you're a business owner, student, or just someone who wants to stay safe online, The #HACKED book has everything you need to know.
Our lives are growing more connected every day. Each gadget we add multiplies the risk of a cyber attack and an invasion of our privacy.
Cyber…The #HACKED book is the perfect resource for anyone looking to learn about cybersecurity. Written by leading experts in the field, this book provides in-depth coverage of all aspects of cybersecurity. Whether you're a business owner, student, or just someone who wants to stay safe online, The #HACKED book has everything you need to know.
Our lives are growing more connected every day. Each gadget we add multiplies the risk of a cyber attack and an invasion of our privacy.
Cyber criminals are collecting data from our computers, phones, cars, and appliances. They can also gain access to our credit card information by hacking point-of-sale (POS) systems at our local stores.
Our information is at great risk of anyone accessing it. We can close these security holes by using tips from the book #HACKED.
Buy your copy of the book #HACKED, with 10 Tips for Business and Personal use. Bonus Tips are available online at https://TheHackedBook.com -
CEH v8 - Technical Editor
WIley
See publicationProviding Technical review of the CEH v8 Study Guide. Sean-Philip Oriyano, Author.
-
Homeland Security – Reducing the Threat from Attack
Pen Test Magazine
See publicationAbstract – This article is written to describe the changes being made in the Homeland Security activities for new software in development, and how they are improving our overall security. The reader may also find which activities can fit into their Software Development Lifecycle (SDLC) programs to further benefit other organizations as well. This is not an offensive approach to Cyber Security, but an improved defensive approach.
-
Malicous Code Detection, Breaking BRIC through Static Code Analysis
Marina Khainson, Cigital
See publicationMalicious Code Detection or BRIC Breaking Through Static Analysis: As organizations outsource development to less trustworthy providers malware becomes as much a problem as introduction of honest vulnerability by one's own development shop. Assessment practices currently look for vulnerability within source code and a running systems but these are but a few of windows of opportunity for malware introduction. This presentation demonstrates an approach for augmenting an existing security practice…
Malicious Code Detection or BRIC Breaking Through Static Analysis: As organizations outsource development to less trustworthy providers malware becomes as much a problem as introduction of honest vulnerability by one's own development shop. Assessment practices currently look for vulnerability within source code and a running systems but these are but a few of windows of opportunity for malware introduction. This presentation demonstrates an approach for augmenting an existing security practice with the capability to detect potentially malicious code through secure code review. First, we show how to break malicious intent--often quite subtle--into concrete patterns we can reliably detect. The framework then demonstrates how to build suspicion around reliance of particular patterns' use in concert which, increasingly, imply malicious intent. These techniques will be explained through a demonstration in a real world application.
Bio Masha (a.k.a Marina) has dreamed of becoming a security consultant before she ever knew what a ballerina was, and that's a good thing - because she does not intend her talk to be a ballet recital. Having been in software security for over seven years, Ms. Khainson has delivered Architecture Risk Assessment, Secure Code Review, and Ethical Hacking on many architectures, platforms and technologies. Marina has also developed training materials for clients and led remediation assistance teams.
Additional Authors Marina Khainson & John Stevens.
Honors & Awards
-
Phi Beta Cyber Society
Cybersecurity Ventures
Phi Beta Cyber honors outstanding men and women who have devoted their careers to cyber defending and protecting the United States and its citizens, businesses, educational institutions, and organizations of all types.
Membership is by Invitation, and review of candidate submissions. Selection criteria includes academic achievement, certifications and ongoing training, years of cyber defense experience (preferably 15+ years), and work history. Published works, patents, and relevant…Phi Beta Cyber honors outstanding men and women who have devoted their careers to cyber defending and protecting the United States and its citizens, businesses, educational institutions, and organizations of all types.
Membership is by Invitation, and review of candidate submissions. Selection criteria includes academic achievement, certifications and ongoing training, years of cyber defense experience (preferably 15+ years), and work history. Published works, patents, and relevant accomplishments are considered.
The Society’s primary initiative is informing U.S. high school students on cybersecurity, higher education programs, and career opportunities in the field. Phi Beta Cyber members pledge to speak at local high schools — in order to raise awareness around cybercrime, cyberwarfare, and the importance of cyber defense. The goal is to help generate more of our nation’s future cyber fighters.
There are no membership dues or profit motives in connection with The Phi Beta Cyber Society.
Our members receive benefits which include private networking, other opportunities to volunteer, and a quarterly newsletter. Members may proudly display their inclusion in the Society, and they are recognized in the Phi Beta Cyber directory. -
DoD "Hack the Pentagon", Bug Bounty program 2016
DoD & Hackerone
Recognized for my involvement of the "Hack the Pentagon" Bug Bounty Program. Ask me about my White Paper on the project.
-
US Navy Veteran - USS Chicago CG-11
Honorable Discharge
Languages
-
German
-
-
Papiamento
-
Recommendations received
-
LinkedIn User
16 people have recommended Albert E.
Join now to viewMore activity by Albert E.
-
Took some time off… Much needed… Italy is a beautiful place if you ever get to go. Take time while you can and enjoy it. You earned it and once…
Took some time off… Much needed… Italy is a beautiful place if you ever get to go. Take time while you can and enjoy it. You earned it and once…
Liked by Albert E. Whale
Other similar profiles
Explore top content on LinkedIn
Find curated posts and insights for relevant topics all in one place.
View top content