Profiles search
Samuel Sutton - CASP, CISM
Technologist ● Cyber Advisor ● Distinguished Communicator ● FBI Computer Scientist (Retired)
Austin, TX, United States
Details
Experience:
Making a move over to the Internal Security Staff to,... to,... help keep on eye on things. Yeah, That's it!
2023 : Present
Info-Tech Research Group
Director, Information Security
This is a fast growing and highly ranked company with a global presence! I'm currently involved in Business Development and Engagement Management related to Security Audits and Risk Assessments.
2022 : 2023
Info-Tech Research Group
Director, Consulting - Cyber Security
The experience of 28 years of classified federal cyber security service can now be applied to your...
● Intellectual Property. ● Business Plans. ● Marketing Strategies.
To summarize,... Total Cyber Security Advisory Services℠ will provide experienced Cyber Security Intelligence, Expertise, and Strategic Analysis, applied to your business,... confidentially!
2020 : 2022
Total Cyber Security Advisory Services
Chief Technologist, Cyber Intelligence Advisor, and Certified Cyber Psychiatrist
This is a privately held company with a multi-national presence. It is using a distributed High Performance Computing network to host Artificial Intelligence which is applied towards Big Data Analytics.
● I provide reviews and recommendations for integrating the various technologies involved.
● I suggest strategy and vision to advance technology and service developments.
● I bring a technical perspective to the Marketing Analysis.
● I conduct oversight of the Cyber Security issues.
2020 : 2022
Undisclosed
Member Of The Board Of Advisors
Assignments have been in different locations across the USA. The various job tasks break out into
the following categories.
● CISO . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . [8+years]
Minimized risks associated with IT systems, by evaluating and delivering solutions
to protect critical business operations and sensitive customer data.
● NETWORK SECURITY ARCHITECT . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . [8+years]
Identified exploitable technology vulnerabilities. Provided technical advice,
guidance, and recommendations for Security Measures and Counter Measures.
● INFORMATION SYSTEMS EXPLOITATION . . . . . . . . . . . . . . . . . . . . . . . . . . .[4+years]
Leader of projects that delivered enhanced network capabilities. Produced tools
to disrupt terrorist activities on international networks used by foreign terrorist.
● INTRUSION INVESTIGATION . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .[6+years]
Analyzed techniques used to defeat security measures deployed in networked
environments.
<<Be sure to expand the list of projects!>>
● To view some interesting additional details.
● Presentation titles are provided at the bottom of the expanded projects list.
<<Active Security Clearance : Yes>>
1992 : 2020
Federal Bureau of Investigation (FBI)
Computer Scientist - (Retired)
2023 : Present
Info-Tech Research Group
Director, Information Security
This is a fast growing and highly ranked company with a global presence! I'm currently involved in Business Development and Engagement Management related to Security Audits and Risk Assessments.
2022 : 2023
Info-Tech Research Group
Director, Consulting - Cyber Security
The experience of 28 years of classified federal cyber security service can now be applied to your...
● Intellectual Property. ● Business Plans. ● Marketing Strategies.
To summarize,... Total Cyber Security Advisory Services℠ will provide experienced Cyber Security Intelligence, Expertise, and Strategic Analysis, applied to your business,... confidentially!
2020 : 2022
Total Cyber Security Advisory Services
Chief Technologist, Cyber Intelligence Advisor, and Certified Cyber Psychiatrist
This is a privately held company with a multi-national presence. It is using a distributed High Performance Computing network to host Artificial Intelligence which is applied towards Big Data Analytics.
● I provide reviews and recommendations for integrating the various technologies involved.
● I suggest strategy and vision to advance technology and service developments.
● I bring a technical perspective to the Marketing Analysis.
● I conduct oversight of the Cyber Security issues.
2020 : 2022
Undisclosed
Member Of The Board Of Advisors
Assignments have been in different locations across the USA. The various job tasks break out into
the following categories.
● CISO . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . [8+years]
Minimized risks associated with IT systems, by evaluating and delivering solutions
to protect critical business operations and sensitive customer data.
● NETWORK SECURITY ARCHITECT . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . [8+years]
Identified exploitable technology vulnerabilities. Provided technical advice,
guidance, and recommendations for Security Measures and Counter Measures.
● INFORMATION SYSTEMS EXPLOITATION . . . . . . . . . . . . . . . . . . . . . . . . . . .[4+years]
Leader of projects that delivered enhanced network capabilities. Produced tools
to disrupt terrorist activities on international networks used by foreign terrorist.
● INTRUSION INVESTIGATION . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .[6+years]
Analyzed techniques used to defeat security measures deployed in networked
environments.
<<Be sure to expand the list of projects!>>
● To view some interesting additional details.
● Presentation titles are provided at the bottom of the expanded projects list.
<<Active Security Clearance : Yes>>
1992 : 2020
Federal Bureau of Investigation (FBI)
Computer Scientist - (Retired)
Company:
Info-Tech Research Group
About
Samuel Sutton has been a cyber security professional for 28+ years balancing business and technology, while performing in technically challenging positions. His project management assignments focused on the defensive and offensive logistics operations of intelligence, information, and network security issues.
He is an accomplished speaker and recognized authority on data protection and network security issues. Engaging audiences from Technologist to CEO, small firm to global company, and classroom to conference hall.