Revolutionary Security
  • Cybersecurity Services
      • Cybersecurity Services
        • Assess & Test
          • Framework-Based Assessments
          • Penetration Testing
          • Breach & Attack Simulation (LiveFire®)
          • Incident Response Tabletop Exercises
          • Insider Threat Assessments
          • OT Assessments & Tests
        • Design & Build
          • Security Operations Transformation
          • Incident Response Planning
          • Cyber Threat Intelligence
          • Threat Hunting
          • Vulnerability Management
          • Insider Threat Mitigation
          • Cloud Security
          • OT Network Defense
        • Operate & Support
          • Incident Response & Remediation
      • About Us
      • Careers
      • Contact Us
      • Blog

      Can cyber threats navigate between your IT and OT networks?

      Be prepared. Integrate security operations across your enterprise.

      LEARN MORE

  • Cybersecurity Services
    • Assess & Test
      • Framework-Based Assessments
      • Penetration Testing
      • Breach & Attack Simulation (LiveFire®)
      • Incident Response Tabletop Exercises
      • Insider Threat Assessments
      • OT Assessments & Tests
    • Design & Build
      • Security Operations Transformation
      • Incident Response Planning
      • Cyber Threat Intelligence
      • Threat Hunting
      • Vulnerability Management
      • Insider Threat Mitigation
      • Cloud Security
      • OT Network Defense
    • Operate & Support
      • Incident Response & Remediation
  • About Us
  • Careers
  • Contact Us
  • Blog
  • Request a Consultation
  • Blog
  • Rob Hlavaty

Cyber Insights & News

Browse Topics
  • Industrial Control Systems (ICS)
  • Assessments
  • OT Network Defense
  • Vulnerability Management
  • Insider Threats
  • Cyber Attacks
  • Cyber Threats
  • News & Events
  • Security Operations
  • Countermeasures
  • Incident Response
  • Training & Awareness
  • Risk Management
  • Strategic Planning
  • Security Controls
  • Cloud Security
  • Cyber Threat Intelligence
  • Compliance
  • Penetration Testing

Subscribe Here!

Rob Hlavaty

Rob Hlavaty

Rob has wide-ranging experience as a security consultant partnering with Fortune 1000 clients across various industries. Rob has conducted security assessments aligned to the NIST Cybersecurity Framework, Department of Energy C2M2, DFARS, CIS Top 20, and other proprietary models. In 2018/2019 he developed a comprehensive mitigation plan for Spectre and Meltdown vulnerabilities for a large utility organization. In 2019 and into 2020 he performed several enterprise assessments focused on legal, privacy, and compliance requirements, as well as industry frameworks.
5 Steps to Get Your Organization CMMC Certified
What is the Department of Defense Cybersecurity Maturity Model Certification? Debuted in 2015, the Department of Defense’s (DoD) Defense Federal …
Read Post
Avoid the Burnout: 5 Ways to Beat Cybersecurity Stress
Most people outside the cybersecurity profession have no idea how stressful the job can be. To help them understand, I give them this analogy: …
Read Post
Don’t Be Haunted by Spectre and Meltdown
Enabling Proactive Mitigations Through Defense in Depth "Effective SecOps teams need to have their finger on the pulse of the business—not just the …
Read Post
The Vulnerability That Keeps On Giving: Seven New Variations of Spectre and Meltdown Discovered
Meltdown and Spectre Overview On January 8, 2018, Revolutionary Security reported on Meltdown and Spectre, which are kernel-level vulnerabilities …
Read Post
Prev Next
Contact
  • +1 267.664.4200
  • 350 Sentry Parkway
    Bldg. 670, Suite 201
    Blue Bell, PA 19422
Connect
  • LinkedIn
  • Twitter
More
  • Careers
  • Privacy Policy
  • Resources
©2021 Revolutionary Security. All rights reserved.