Deliver Your News to the World

rThreat Announces Igor Volovich as Newest Member of Board of Advisors

Bellingham, WA, United States – WEBWIRE

rThreat (, the first company to develop a Breach and Attack Emulation solution that enables fully automated, real-world, real-time measurement and validation of enterprise cybersecurity controls and risk posture by leveraging known and unknown threats, is proud to welcome Igor Volovich as the newest member of rThreat’s Board of Advisors.

Mr. Volovich is an award-winning cybersecurity executive and industry thought leader whose 20-year career has spanned some of the largest commercial and public sector enterprises in senior security strategy, architecture, leadership, and advisory roles. Igor has also worked extensively within the cybersecurity startup community, serving as a leading mentor at Virginia’s Mach37 cyber accelerator and as Chief Strategy Officer of Romad Cyber.

Igor began his cybersecurity career at Terabeam, later joining Microsoft’s Trustworthy Computing Group (TwC). Following his transition to advisory work, Igor’s engagements have included prominent firms within the manufacturing, CPG, technology, financial services, regulatory, and critical infrastructure sectors, as well as US Federal executive and legislative agencies. After joining Invensys plc, Igor served as the firm’s CISO and Vice President of Risk Management, followed by his role as the CISO of Schneider Electric Americas after the companies’ $5.4B merger.

Igor continues his advisory work as the founder and Chief Strategist at Cyber Strategy Partners, most recently serving as senior enterprise security strategy and architecture advisor to the Office of the CISO at the United States Postal Service. His experience and knowledge will be a significant asset to rThreat’s efforts to execute their go-to-market strategy and deliver innovative capabilities to clients and partners.

Igor had the following response when asked about rThreat’s solution:

“The best way to know whether your security program is effective is to test it: Holistically, realistically, and honestly. The need to understand the true value of our investments and the state of security controls has never been greater. Yet, traditional penetration testing remains difficult to scale, automate, or deliver on a continuous basis across the entire enterprise, at best capturing a snapshot of the enterprise’s risk posture. Threat modeling, while a powerful tool for secure design, doesn’t capture the implementation state of controls once they’ve left the whiteboard.

“Security leaders must be able to safely and accurately validate the performance of their security controls against real-world threats, testing a variety of ‘what if’ scenarios against their entire portfolio. They also demand the ability to predict with a high degree of confidence how their enterprise will perform under attack, including its people, process, and technology, without having to rely on guesstimates obtained through qualitative analyses or tabletop exercises.

“rThreat identified the strategic gap between traditional threat modeling and penetration testing, and developed their platform to deliver a continuous, automated, realistic controls validation capability that allows the CISO to finally answer the perpetual question: Are we secure?

“Security and business leaders seeking honest answers about the state of their programs will find rThreat’s platform a critical component of their risk management strategy.”

About rThreat
rThreat’s mission is to help clients prevent cyber-attacks both known and, most importantly, unknown. rThreat was born in response to the need to pragmatically evaluate an organization’s security posture against potential attacks and security breaches using real-world and custom threat artifacts. As a result, rThreat has developed a scalable platform with the latest technologies capable of providing an authentic testing environment that can be used in real-time to evaluate the security posture of its clients. For more information, visit


 Igor Volovich
 Breach Attack Emulation
 Attack Emulation Platform
 Cyber Attack Emulation
 Seattle Cybersecurity

This news content may be integrated into any legitimate news gathering and publishing effort. Linking is permitted.

News Release Distribution and Press Release Distribution Services Provided by WebWire.