Skip to main content
  • Conferences
  • Speakers
  • Skillcamp
Notifications
  • Strategies for Online and Offline Success
    ×
  • That Will Get You Speaking Engagements in 2024
    ×
  • For a Meeting or Talk
    ×
  • SpeakerHub's commitment to innovation and user-centric design.
    ×
  • How to Make Your Public Speech Professional and Memorable
    ×
  • SIGN UP
  • SIGN IN
  1. Home
  2. Find a speaker
  3. Igor Volovich
Igor Volovich's cover banner
Igor Volovich's picture

Igor Volovich

Managing Director, Founder
Cyber Strategy Partners
Country or state 
United States
Available to 
Europe,
North America,
...
Fee 
Ask for pricing
Languages 
English,
Russian
Volunteer
Yes
Timezone 
America/New_York

Personal Details

Bio

Strategist, advisor, advocate, mentor, author, speaker, and recognized leader in the field of information security. Passionate about the craft of cybersecurity and its role in protecting the computing public, the integrity of global commerce and international trade, and defense of critical national infrastructure.

Internationally experienced cyber security executive and senior advisor with 20 years of service to the world's largest private and public-sector entities, Fortune 100's, US legislative and executive branches, and regulatory agencies.

Current position (3)

Managing Director, Founder

Cyber Strategy Partners

Chief Executive Officer

ROMAD Cyber Systems

Stars Mentor

MACH37 Cyber Accelerator

Achievements (5)
Winner, Security Shark Tank® at RSA 2017
Winner, Security Shark Tank® Cupertino 2016
Executive Briefing Program of the Year
IT Showcase Customer Commitment Award
Security Mobilization Award

Presentations

Presentations (2)
Keynote: Hacking for the Greater Good

In this keynote we discuss the field of Ethical Hacking and the methods of leveraging penetration testing as a key component of a mature cyber security program.

Last presented at National Cyber Security Symposium, National Internet Governance Forum, Belize City, Belize.

Emerging trends in malware monetization models

Cybercriminals are increasingly pushing to shorten the monetization cycle for their offensive tradecraft. Financial incentives remain the largest driving force behind the 150M+ new malware samples released in the wild each year. The advent of ransomware ushered in the era of "instant monetization", effectively making traditional anti-malware solutions obsolete and incapable of offering a truly proactive capability.

It is now time to evolve beyond the legacy thinking that is now failing the enterprise and the consumer alike across the board. It is time to move past passive Defense and Response capabilities to the realm of Disruption. Disruption of criminal value chains, disruption of attack tradecraft en masse.

Originally presented at Security by Design DC.

Past talks (6)
Keynote: Hacking for the Greater Good
National Cyber Security Symposium, National Internet Governance Forum
Belize City, Belize
December 31, 2016
Emerging trends in malware monetization models
Security by Design DC
Washington, DC
December 31, 2015
Keynote: Evolve to Demand. Demand to Evolve.
EC-Council Global CISO Forum 2016 - Atlanta
Atlanta, GA
December 31, 2015
Evolving Cyber Public-Private Partnerships for National Defense and Offense
EC-Council CISO Summit - Connecticut
Hartford, CT
December 31, 2015
Are Traditional Anti-Malware Software Solutions Effective?
Risk Roundup
Online
December 31, 2015
Forensic Challenges and Benefits of Stealth (SDP) Clouds
National Institutes of Standards and Technologies Cloud Summit
Gaithersburg, MD
December 31, 2014
  • All (4)
  • Videos
  • Photos (1)
  • Slides (1)
  • One sheet (1)
  • Press information (1)
This speaker hasn't uploaded any videos yet.
Cyber Strategy Partners
Cyber Strategy Partners

Books & Articles (29)

CNN: Russian bank claims effort to frame it for connections to Trump Organization
Matt Lewis Show: About Those WikiLeaks' C.I.A. Documents
ROMAD CEO: Disrupting value chain is key in fight against malware
Post-election Russian hacker cyberattacks evade malware detection
Defeating Malware With Its Own DNA
Genetic Sequencing of Malware Families Offers Unique Prevention and Detection Capabilities
Dark web markets get warning shots from global law enforcement
CISOs Choose ROMAD Cyber Systems as Winner of Security Current's Security Shark Tank® Cupertino
The Cyber Wire Daily Podcast
Rising to the challenge: Evolving cyber defense strategies to meet global threats
Evolve to Demand. Demand to Evolve.
Evolving Cyber Public-Private Partnerships for National Defense and Offense
Verizon breach underscores inevitability of compromise against determined foe
Are Traditional Anti-Malware Software Solutions Effective?
CISO Perspectives: Declaration of Independence
Cyber whistleblowing pivotal in ensuring corporate transparency and accountability in the IoT era
ICIT Fellow Insights: IoT Resiliency - Priorities to Secure a Growing Attack Surface
Legislative Brief "Moving Forward: How Victims Can Regain Control & Mitigate Threats in the Wake of the OPM Breach“
Focus on private sector to secure national cyberspace
Fog of War in Cloud Forensics: Establishing Ground Rules for eDiscovery and Admissibility
Legislative Brief "Handing Over the Keys to the Castle: OPM breach demonstrates how antiquated security practices harm national
Repositioning Cyber Security as a Business Value Generator
Global CISO Forum Podcast Episode 8: Gravitate Towards the Challenge
Maturing Enterprise Security Event and Incident Management Capability
Transforming Cyber Security Into a Business Value Generator
Building Information Governance Across Your Organization
Cyber Security: From Cost Centre to Revenue Driver
SC Congress eSymposium Keynote: SIEM - Better Mousetraps for Smarter Mice
SIEM: Wasted dollars or Golden goose?

Expertise (29)

Leadership
Technology
Business
Social & Political
Security
Computer and Network Security business security Cybercrime Cyber Attacks cyber defense Cyber Innovation Startup malware Information Security Social Enterprise Social Entrepreneurship corporate ethics and transparency cyber ethics Cyber Education cyber governance Corporate Governance Business Ethics and Trust Fear Conquering Fear Immigration Business Business and Innovation Technology

Awards & certifications (6)

Certified Information Systems Security Professional (CISSP)
ISC2
2006
Certified in Risk and Information Systems Control (CRISC)
ISACA
2011
Certified Information Systems Auditor (CISA)
ISACA
2009
Certified Information Security Manager (CISM)
ISACA
2008
Private Pilot, Helicopter and Airplane
FAA
2010
Open Water, Dry Suit, Enriched Air Diver
PADI
2008
Recommendations
Why choose me? 

Experienced speaker and recognized cyber, risk, and compliance expert, ex-CISO Schneider Electric.

Similar to Igor
  • Roze Merditaj (Mj)'s picture
    Roze
    Merditaj (Mj)
    Founder
    RWCA
  • Brencil Kaimba's picture
    Brencil
    Kaimba
    Information Security Consultant
    u Ltd
  • Erez Yalon's picture
    Erez
    Yalon
    VP of Security Research
    Checkmarx
  • Janice Gravely's picture
    Janice
    Gravely
  • Boomy Tokan's picture
    Boomy
    Tokan
    CEO
    Start Your Own Business Academy
  • Speakers
  • Agencies
  • Events
  • How it works
  • Blog
  • Upgrade
  • Podcast
  • About us
  • Organizers
  • Terms of use
  • Privacy policy
  • FAQ
  • API
  • Contact
  • Corporate Speakers Bureau & CRM
  • Motivational speakers
  • Leadership speakers
  • Business speakers
  • Inspirational speakers
  • Keynote speakers
  • Corporate speakers
  • Celebrity speakers
  • Top 50 Business Speakers
  • Top 50 Leadership Speakers
  • Top 50 Motivational Speakers
  • Top 50 Technology Speakers

Get speaking tips & so much more!

Twice a month we send you speaking tips, training ideas and lots of useful updates.

© 2026 SpeakerHub
All rights reserved.

  • Facebook
  • Twitter
  • LinkedIn
  • SoundCloud