Albert E. Whale

Albert E. Whale

Pittsburgh, Pennsylvania, United States
28K followers 500+ connections

About

As an Executive Cybersecurity Leader, I have 20+ years of experience driving enterprise…

Services

Articles by Albert E.

  • The Technology Horsemen of the Apocalypse

    Pretty sure you’re familiar with the four horsemen of the apocalypse. While I don’t typically focus on negativity, I…

  • Achieving Success with the Certified Global Coach Program from Napoleon Hill Institute

    At some point in our lives, we all struggle with personal and professional goals. We often find ourselves stumbling…

  • Veteran's day, November 11th, 2022

    “We can accomplish much when we learn to expect much from ourselves.” - Napoleon Hill, “Opportunity" From Boot Camp to…

    9 Comments
  • Keep Calm and wash your hands

    There are a lot of sporting activities which have been canceled due to the risk of exposure to the Corona Virus…

  • Accountants are a prime target for Cybercriminals.

    Introduction Cyber security must become a higher priority for accounting firms, they underestimate the threat they face…

    2 Comments
  • Request for a Free VPN app

    Today’s Request for an iPhone app came from my Youngest after arriving at school. Hmm, I wonder what that could be…

    26 Comments
  • Twas the Night before the New Year ...

    John Chambers is quoted as saying that there are two types of companies. Which one are you in? How effective is your…

    15 Comments
  • Don't be Fooled by the Hackers

    I have many connections on LinkedIn, and as an internationally recognized Cybersecurity professional, I am constantly…

    20 Comments
  • Why your firewall is not protecting you.

    Firewalls are a historic defense relic much like a moat around a castle. Firewalls are also needed because they defined…

    30 Comments
  • This Error Message courtesy of ---

    Have you ever wanted to click the Unsubscribe link? Well here's an example of the error messages that I recently…

    12 Comments

Activity

Join now to see all activity

Experience

  • Practical Security

    Pittsburgh

  • -

    Chicago, Illinois, United States

  • -

    Greater Pittsburgh Region

  • -

    Pittsburgh, PA

  • -

    Greater Pittsburgh Area

  • -

    Allegheny Campus

  • -

    Pittsburgh, PA

  • -

  • -

    Pittsburgh, PA

  • -

    Pittsburgh, PA

  • -

    Greater Pittsburgh Area

  • -

    Charleston, South Carolina Area

  • -

Education

  • Penn State University Graphic

    Penn State University

    -

    Activities and Societies: President of the Penn State Engineering Society

  • -

    -

  • -

  • -

Licenses & Certifications

  • CHS

    American College of Forensics Examiners International

    Issued
  • CISA

    ISSA

    Issued
    Credential ID 436881
  • CISSP

    (ISC)2

    Issued
    Credential ID 28730
  • Honored Listee  Graphic

    Honored Listee

    Marquis Who's Who

    Issued Expires
    Credential ID bbf39fa8de1b4e5e9f0e1d5fdac4f4da6614f51fd6e84496a8c2c63e5c2eae35

Volunteer Experience

  • Board Member

    McKnight Village Board of Directors

    - Present 13 years 8 months

    I am supporting my Local community by assisting on the Board of Directors for the McKnight Civic Association. This is my second term as a Board member, and I am looking forward to supporting the community, its fund raising and activities.

  • Pittsburgh Technical College Graphic

    IT Advisory Board Member

    Pittsburgh Technical College

    - Present 9 years 6 months

    Science and Technology

    IT Advisory Board members work to improve the experience of the Cyber Security professionals, new students and promoting additional cyber security professionals for the Public and Private sector.

  • OWASP Foundation Graphic

    Supporting Member

    OWASP Foundation

    - Present 12 years

    The OWASP Foundation is an excellent opportunity for organizations to begin to understand the concept of security defects. The classifications are easy to use/employ/understand, and while not completely comprehensive, will get them started in understanding the issues with application security.

  • ASIS International Graphic

    Cybersecurity presenter

    ASIS International

    - Present 8 years 7 months

    Science and Technology

    The presentation was titled, is a Firewall enough security for my business?

  • EC-Council Graphic

    Advisory Board Member

    EC-Council

    - Present 8 years 7 months

    Science and Technology

    The EC-Council University Advisory Council is a group of volunteer cyber security technology and education experts who advise the Academic/Administrative Team of EC- Council University with regard to policies, procedures, programs and practices of the University. They serve on a pro bono basis at the invitation of the EC-Council President.

  • EC-Council University Graphic

    Advisory Board Member

    EC-Council University

    - Present 8 years 7 months

    Science and Technology

    EC-Council University is dedicated to creating superior educational programs enabling graduates to be equipped to face the latest IT security risks and lead their colleagues in strategically handling those challenges.

    Through quality distance educational programs, excellence in teaching and research, and direct connections to the Cyber Security industry EC-Council University aspires to be an educational leader in cyber security. Our students of today will become the cyber security…

    EC-Council University is dedicated to creating superior educational programs enabling graduates to be equipped to face the latest IT security risks and lead their colleagues in strategically handling those challenges.

    Through quality distance educational programs, excellence in teaching and research, and direct connections to the Cyber Security industry EC-Council University aspires to be an educational leader in cyber security. Our students of today will become the cyber security leaders of tomorrow.

    https://www.eccu.edu/about-eccu/advisory-council/

  • Founder Institute - Pittsburgh Graphic

    Director

    Founder Institute - Pittsburgh

    - Present 1 year 7 months

    i18n_veterans

    Founder Institute is a Business Accelerator designed for entrepreneurs with a defined idea who want to start their own business. The Institute meets weekly and supports the development and introduction of new businesses globally.

    The Founders Institute is supported by other entrepreneurs with a passion for innovation and helping other startups succeed. Pittsburgh’s FI meets Tuesday evenings from 6:00 to 8:00pm.

  • Napoleon Hill Institute Graphic

    Certified Global Coach

    Napoleon Hill Institute

    - Present 3 years 3 months

    Education

    I am supporting others in their personal development to live their dreams. You can have anything that you desire. Are you ready?
    I am supporting others in their personal development to live their dreams. You can have anything that you desire. Are you ready?
    Skills: Microsoft Excel · Issue Identification · Microsoft Office · Building Key Relationships · Outside Sales · Microsoft PowerPoint · IT Leadership · Business Acumen · Presentations · Data Privacy · Interpersonal Skills · Leveraging…

    I am supporting others in their personal development to live their dreams. You can have anything that you desire. Are you ready?
    I am supporting others in their personal development to live their dreams. You can have anything that you desire. Are you ready?
    Skills: Microsoft Excel · Issue Identification · Microsoft Office · Building Key Relationships · Outside Sales · Microsoft PowerPoint · IT Leadership · Business Acumen · Presentations · Data Privacy · Interpersonal Skills · Leveraging Relationships · Communication · Strategic Thinking · Financial Literacy · Cyber · Reporting Metrics · Office Application · Reasoning Skills · Interpersonal Communication · Conflict Management · Problem Solving · Support Services · Confidentiality · Cross-functional Team Leadership

Publications

  • #HACKED2 Practical Guidance for Dealing with Threats to Your Business and Privacy

    10-10-10 Publishing

    We have become so dependent with technology that it is important the we begin to understand what it is that is helping us, and what needs to be worked on in order to better protect us.

    The current state of endpoint security is reactive and relies on signature-based detection techniques. These techniques are ineffective against modern malware that is designed to evade detection. Additionally, the increasing use of mobile devices and the cloud create new security challenges that are not…

    We have become so dependent with technology that it is important the we begin to understand what it is that is helping us, and what needs to be worked on in order to better protect us.

    The current state of endpoint security is reactive and relies on signature-based detection techniques. These techniques are ineffective against modern malware that is designed to evade detection. Additionally, the increasing use of mobile devices and the cloud create new security challenges that are not currently addressed by traditional security solutions.

    The perimeter is no longer effective in deterring or preventing cyberattacks?

    Cybersecurity attacks are up more than 80%
    How comfortable are you with your ability to detect and respond before damage is done?
    Protecting your Data (both business and personal) is the issue that is top of mind. Protecting you and keeping the attacker out, is essential to everyone. That’s what we will discuss to help you protect yourself from getting #HACKED! #HACKED2 delivers the experience of the Author and 12 Exceptional Cybersecurity Professionals all in one location.

    #HACKED2

    Practical Guidance for Dealing with Threats to Your Business and Privacy


    By Albert E. Whale
    CEH, CHS, CISA, CISSP, BSEE, CMMC-RP


    With

    Thomas Albert
    Chuck Brooks
    David Brown
    Dr. Chase Cunningham (aka Dr. Zero Trust)
    Maggie Dillon
    Alan Elliott
    Kevin Harding
    Robert Kost
    Nathan Kunst
    Kevin Love
    Michael Nash
    Arnold H. Webster (Ph.D. Candidate)

    Other authors
    See publication
  • #HACKED - 10 Tips to Protect Your Personal and Business Information.

    10-10-10 Publishing

    The #HACKED book is the perfect resource for anyone looking to learn about cybersecurity. Written by leading experts in the field, this book provides in-depth coverage of all aspects of cybersecurity. Whether you're a business owner, student, or just someone who wants to stay safe online, The #HACKED book has everything you need to know.

    Our lives are growing more connected every day. Each gadget we add multiplies the risk of a cyber attack and an invasion of our privacy.

    Cyber…

    The #HACKED book is the perfect resource for anyone looking to learn about cybersecurity. Written by leading experts in the field, this book provides in-depth coverage of all aspects of cybersecurity. Whether you're a business owner, student, or just someone who wants to stay safe online, The #HACKED book has everything you need to know.

    Our lives are growing more connected every day. Each gadget we add multiplies the risk of a cyber attack and an invasion of our privacy.

    Cyber criminals are collecting data from our computers, phones, cars, and appliances. They can also gain access to our credit card information by hacking point-of-sale (POS) systems at our local stores.

    Our information is at great risk of anyone accessing it. We can close these security holes by using tips from the book #HACKED.

    Buy your copy of the book #HACKED, with 10 Tips for Business and Personal use. Bonus Tips are available online at https://TheHackedBook.com

    See publication
  • CEH v8 - Technical Editor

    WIley

    Providing Technical review of the CEH v8 Study Guide. Sean-Philip Oriyano, Author.

    See publication
  • Homeland Security – Reducing the Threat from Attack

    Pen Test Magazine

    Abstract – This article is written to describe the changes being made in the Homeland Security activities for new software in development, and how they are improving our overall security. The reader may also find which activities can fit into their Software Development Lifecycle (SDLC) programs to further benefit other organizations as well. This is not an offensive approach to Cyber Security, but an improved defensive approach.

    See publication
  • Malicous Code Detection, Breaking BRIC through Static Code Analysis

    Marina Khainson, Cigital

    Malicious Code Detection or BRIC Breaking Through Static Analysis: As organizations outsource development to less trustworthy providers malware becomes as much a problem as introduction of honest vulnerability by one's own development shop. Assessment practices currently look for vulnerability within source code and a running systems but these are but a few of windows of opportunity for malware introduction. This presentation demonstrates an approach for augmenting an existing security practice…

    Malicious Code Detection or BRIC Breaking Through Static Analysis: As organizations outsource development to less trustworthy providers malware becomes as much a problem as introduction of honest vulnerability by one's own development shop. Assessment practices currently look for vulnerability within source code and a running systems but these are but a few of windows of opportunity for malware introduction. This presentation demonstrates an approach for augmenting an existing security practice with the capability to detect potentially malicious code through secure code review. First, we show how to break malicious intent--often quite subtle--into concrete patterns we can reliably detect. The framework then demonstrates how to build suspicion around reliance of particular patterns' use in concert which, increasingly, imply malicious intent. These techniques will be explained through a demonstration in a real world application.

    Bio Masha (a.k.a Marina) has dreamed of becoming a security consultant before she ever knew what a ballerina was, and that's a good thing - because she does not intend her talk to be a ballet recital. Having been in software security for over seven years, Ms. Khainson has delivered Architecture Risk Assessment, Secure Code Review, and Ethical Hacking on many architectures, platforms and technologies. Marina has also developed training materials for clients and led remediation assistance teams.

    Additional Authors Marina Khainson & John Stevens.

    See publication

Honors & Awards

  • Phi Beta Cyber Society

    Cybersecurity Ventures

    Phi Beta Cyber honors outstanding men and women who have devoted their careers to cyber defending and protecting the United States and its citizens, businesses, educational institutions, and organizations of all types.

    Membership is by Invitation, and review of candidate submissions. Selection criteria includes academic achievement, certifications and ongoing training, years of cyber defense experience (preferably 15+ years), and work history. Published works, patents, and relevant…

    Phi Beta Cyber honors outstanding men and women who have devoted their careers to cyber defending and protecting the United States and its citizens, businesses, educational institutions, and organizations of all types.

    Membership is by Invitation, and review of candidate submissions. Selection criteria includes academic achievement, certifications and ongoing training, years of cyber defense experience (preferably 15+ years), and work history. Published works, patents, and relevant accomplishments are considered.

    The Society’s primary initiative is informing U.S. high school students on cybersecurity, higher education programs, and career opportunities in the field. Phi Beta Cyber members pledge to speak at local high schools — in order to raise awareness around cybercrime, cyberwarfare, and the importance of cyber defense. The goal is to help generate more of our nation’s future cyber fighters.

    There are no membership dues or profit motives in connection with The Phi Beta Cyber Society.

    Our members receive benefits which include private networking, other opportunities to volunteer, and a quarterly newsletter. Members may proudly display their inclusion in the Society, and they are recognized in the Phi Beta Cyber directory.

  • DoD "Hack the Pentagon"​, Bug Bounty program 2016

    DoD & Hackerone

    Recognized for my involvement of the "Hack the Pentagon" Bug Bounty Program. Ask me about my White Paper on the project.

  • US Navy Veteran - USS Chicago CG-11

    Honorable Discharge

Languages

  • German

    -

  • Papiamento

    -

Recommendations received

More activity by Albert E.

View Albert E.’s full profile

  • See who you know in common
  • Get introduced
  • Contact Albert E. directly
Join to view full profile

Other similar profiles

Explore top content on LinkedIn

Find curated posts and insights for relevant topics all in one place.

View top content

Others named Albert E. Whale

1 other named Albert E. Whale is on LinkedIn

See others named Albert E. Whale

Add new skills with these courses