Bob Radvanovsky

Bob Radvanovsky – BSc, MSc, CIFI, CISM, CIPS, REM
Chief Security Strategist and Co-Founder of Infracritical

Bob is a visionary.

Though his view of the world can be seen through the goggles of technology and science, he generally has an inquisitive side to his personality. He likes to see how things work.

Though his background has stemmed primarily from computer science and information technology, his love for understanding of what makes things ‘tick’ has led him down the path of conducting research for Infracritical and for the CIP/homeland security industries.

His attitude is simple: if it’s a system, it can be broken and exploited.

In other words, just because his background started in computers does not mean that he cannot comprehend how a given system works. Computer systems are indicative of businesses today, moving blindingly quick. Thus, computer systems are reflections of the very business systems (and their environments) that they support. Weaknesses in how a business system is structured (usually) means that the similar flaws are carried over into and throughout their computer counterparts. The same may hold true for how business systems of critical infrastructures function and relate to one another.

His observation at this level as to how these ties interrelate between business systems, their inter-dependencies, and how they interact with each other intrigued Bob. Some of his earlier works pertained to ‘CIP’ when he wrote whitepapers during college on inherented risks associated with high-energy transmission lines in the Western region of the U.S. and their vulnerabilities.

Thus, was the start of Bob’s long path towards ‘CIP’ research.

In 2009, Bob was one of eight authors recognized for their commitment to the public health and emergency preparedness management communities, and was present to sign books for those wishing a more personalized autograph. The event took place on Wednesday, July 15, 2009 at the Illinois Public Health Emergency Preparedness Summit at the Oak Brook Hills Marriott Resort in Oak Brook Hills, IL.

Critical Infrastructure: Homeland Security & Emergency PreparednessBob is a published author. His first book, “Critical Infrastructure: Homeland Security and Emergency Preparedness” (published by Taylor & Francis Publishing, released in May 2006) outlines issues pertaining to homeland security and emergency preparedness, but mentions about ‘CIP’ and critical infrastructure information (“CII”), and how all is tied together. His book is a reference compendium and contains almost 1500 cited sources – an invaluable plethora of information for any researcher or government official, and is currently sold on Amazon.

This book has been updated, and there is currently a “Third Edition”.

Security Management Magazine review review [December 2007]
Used in Wikipedia: Proactive Cyber Defence here

URL: Amazon (1st Edition) | ISBN 0-8493-7398-0

Transportation Systems SecurityBob co-authored his second book with Allan McDougall entitled, “Transportation Systems Security” (also published by Taylor & Francis Publishing, released in June 2008) provides text presenting strategic, practical, and operational applications for physical, procedural, and psychological safeguards needed to keep all modes of transportation up and running. Topics include systems layout, core performance issues, and risk assessment, predicting internal and external loss, exercises and training. Allan McDougall is the president of Evolutionary Security Management in Canada.

Professional Security Magazine review [October 2008]
Materials Management & Distribution (MM&D) review [June 2008]

URL: Amazon (1st Edition) | ISBN 1-4200-6378-2

Government Public RelationsBob chapter-authored his third publication with book editor/author Mordecai Lee entitled, “Government Public Relations” (published by Auerbach Publishing, released in December 2007) stresses the “publicness” of government public relations as distinct from business PR and examines the increasing use of non-profit agencies to deliver government funded services. An extensive appendix consists of an annotated bibliography of the historical literature. Bob’s chapter deals with public information aspects pertaining to Homeland Security and Emergency Preparedness.

URL: Amazon (1st Edition) | ISBN 1-4200-6277-8

Critical Infrastructure: Homeland Security & Emergency PreparednessBob’s fourth book, “Critical Infrastructure: Homeland Security and Emergency Preparedness – Second Edition” (published by Taylor & Francis Publishing, released in December 2009) takes Bob’s first book as a base and begins to migrate from protecting assets to assuring operational services. Working with Allan McDougall from his second book, both authors felt that references should be “frozen in time”, and have been preserved with an online web site. This book is used at several educational institutions throughout United States and Canada as an authoritative source about “critical infrastructure”.

Reference web site:

This book has been updated, and there is currently a “Third Edition”.

URL: Amazon (2nd Edition) | ISBN 1-4200-9527-7

Corporate Hacking and Technology-Driven Crime: Social Dynamics and ImplicationsBob chapter-authored his fifth publication with Jacob Brodsky and book editors/authors Thomas Holt and Bernadette Schell entitled, “Corporate Hacking and Technology-Driven Crime: Social Dynamics and Implications” (published by Information Science Publishing, released in July 2010) which presents current research undertakings and findings in order to find interdisciplinary solutions to the complex domain of cyber crime and network breaches. Bob’s and Jake’s chapter deals with criminal intent towards SCADA and industrial control systems, also outlining several recent intentional incidents.

URL: Amazon | ISBN 1-6169-2805-0
Specific chapter URL: Chapter: Control Systems Security

Information Security and Privacy: A Practical Guide for Global Executives, Lawyers and TechnologistsBob wrote a small section specifically about “critical infrastructure protection” (Chapter 7: New Emerging Technologies, Section 7.6: Critical Infrastructure and Control Systems, p. 292 – 296) in American Bar Association’s, “Information Security and Privacy: A Practical Guide for Global Executives, Lawyers and Technologists”.

The focus is on the current laws applicable to our Nation’s infrastructures. Discussions include information security and privacy issues, government response, law (specific to U.S.), and “smart grid”.

URL: American Bar Association | ISBN 1-61632-807-8

Critical Infrastructure: Homeland Security & Emergency PreparednessBob’s seventh book, co-authored with Allan McDougall, “Critical Infrastructure: Homeland Security and Emergency Preparedness – Third Edition” (published by Taylor & Francis Publishing, released in April 2013), states that since the initial inception of this book, there have been significant strides to safeguard the operations of our world’s infrastructures. In recent years, there has also been a shift to more fluid postures associated with resilience and the establishment of redundant infrastructure. In keeping with the fast-changing nature of this field, Critical Infrastructure: Homeland Security and Emergency Preparedness, Third Edition has been revised and updated to reflect this shift in focus and to incorporate the latest developments. The book begins with the historical background of critical infrastructure and why it is important to society. It then explores the current trend in understanding the infrastructure’s sensitivity to impacts that flow through its networked environment. Embracing an “all-hazards approach” to homeland security, critical infrastructure protection and assurance, and emergency management.

URL: Amazon (3rd Edition) | ISBN 1-4665-0345-9

Handbook of SCADA/Control Systems SecurityBob’s eighth book, co-authored/edited with Jacob Brodsky “Handbook of SCADA/Control Systems Security – First Edition” (published by Taylor & Francis Publishing, released in February 2013), identifies the availability and security of many services we rely upon—including water treatment, electricity, healthcare, transportation, and financial transactions—are routinely put at risk by cyber threats. The Handbook of SCADA/Control Systems Security is a fundamental outline of security concepts, methodologies, and relevant information pertaining to the supervisory control and data acquisition (SCADA) systems and technology that quietly operate in the background of critical utility and industrial facilities worldwide. Divided into five sections, the book examines topics comprising functions within and throughout industrial control systems (ICS) environments.

IEEXplore review review [May 2014]

URL: Amazon (1st Edition) | ISBN 1-4665-0226-6

Hackers and Hacking: A Reference HandbookBob’s ninth book was a small section that he wrote specifically about “critical infrastructure protection” (Chapter 3: Perspectives, Protecting Critical Infrastructures, p. 121) and book editors/authors Thomas Holt and Bernadette Schell entitled, “Hackers and Hacking: A Reference Handbook” (published by ABC-CLIO, released in July 2013) which defines the social world of hackers? How do individuals utilize hacking techniques against corporations, governments, and the general public? And what motivates them to do so? This book traces the origins of hacking from the 1950s to today and provides an in-depth exploration of the ways in which hackers define themselves, the application of malicious and ethical hacking techniques, and how hackers’ activities are directly tied to the evolution of the technologies we use every day.

URL: Amazon (1st Edition) | ISBN 1-6106-9276-4

Journal of Digital Forensic PracticeBob wrote a short whitepaper on electronic mail header spoofing, what impacts our society, and how to detect them.

This was the first journal that Bob wrote which got him on the path of writing/publishing books about Homeland Security, Critical Infrastructure Protection and Cyber Security.

Currently, Bob is currently writing a book about SCADA/control systems forensics management.

URL: JDFP | ISSN 1556-7281 (paper)
Specific article URL: Analyzing Spoofed E-Mail Headers


Bachelor of Science, Business Administration (awarded 1991)
California Polytechnic University, Pomona, California

Masters of Science, Computer Science (awarded 2001)
DePaul University, Chicago, Illinois


Certified Information Forensics Investigator (CIFI)
International Information Systems Forensics Association

Certified Information Security Manager (CISM)
Information Systems Audit and Control Association

Certified Infrastructure Preparedness Specialist (CIPS)
Office of Infrastructure Preparedness

Registered Environmental Manager (REM)
National Registry of Environmental Professionals

View My Profile on Focus