Close Close Preview

Your amazing online presence is right this way.

Create your profile
Capture who you are, what you do, and where you're going. All in one place.

William Saito

William Saito

Founder & CEO


Los Angeles County, CA

William Saito worked as Special Advisor in the Ministry of Economy, Trade and Industry from Oct 2016 – Dec 2017 which was Located in Tokyo, Japan but he was born in United States and got his undergraduate from the University of California, Riverside.

William Hiroyuki Saito

William Saito | Advisor & Executive Officer

William Saito has also provided information security subject matter expertise to the likes of the World Economic Forum, Price water house Coopers and The Chertoff Group.

William Saito is the Founder and Chief Executive Officer

William Saito is the Founder and Chief Executive Officer (CEO) Company Name Intecur Dates Employed Jul 2007. He is an internationally recognized expert in investment management and financial planning and a former advisor.


Founder & CEO

Lead all operations and consultations for a Tokyo-based consultancy founded to help clients in the private and public sectors to respond with an effective IT strategy based on today’s rapidly changing and increasingly complex networked environment.

Harvard Kennedy School

Global Leadership and Public Policy

This Executive Education Program is designed to prepare the Wold Economic Forum's select Young Global Leaders to expand their knowledge base in order to better address some of the most pressing global problems. The course seeks to provide YGL's with a deeper understanding of public policy issues in conjunction with leadership skills.

William Saito appears as a speaker

William Saito is the a former adviser to the industry ministry and the Cabinet Office, provides human resources services company, and served as an adviser to the Los Angeles government on pension investments and retirement income.

Cyber Security Requirement in Present Time

As we know that unawareness on the part of customers can present further vulnerabilities; for example, by using poor security passwords, setting up untrustworthy software and using vulnerable gadgets and programs.