Contributor Biography

Home  /  Blogs  /  Contributors  /  Contributor Biography
Stephen Horvath

Stephen Horvath

Stephen Horvath Jr. is a cyber security thought leader with over 17 years of experience within the infosec domain. As vice president of strategy and vision, a position he assumed in December 2013, he is responsible for the development of long-term strategies and solutions with a focus on the commercial market.

Stephen joined Telos Corporation in August of 2006 and immediately established a new model for providing services in support of the Xacta product suite. He continues to provide direct consulting support in the area of enterprise security architecture.

Stephen maintains both Certified Information Systems Security Professional (CISSP), and Project Management Professional (PMP) certifications, and graduated from the University of Maryland with a B.A. in Liberal Arts, with an emphasis on English Literature.

NIST RMF Workshop: Approaches to SDLC Risk Management

Stephen Horvath
September 28, 2017

The software development life cycle (SDLC) is a considerable topic of conversation as it relates to cybersecurity.  In fact, many features of our Xacta 360 product have been built to aid developers in understanding exactly what information assurance controls they are responsible to comply with as they build systems that will be deployed in the federal government.

Continue Reading ...

IT Industry Says of the Cloud: Look What We Can Do, Securely.

Stephen Horvath
January 24, 2017

My perspective on the cloud has shifted. I have admiration and respect for organizations like AWS that have defined a market by making the incredible achievable – not by selling a solution, but by promoting the idea that individuals can invent incredible things, and giving them the platform to do so.

Continue Reading ...

Cloud Compliance at AWS Public Sector Summit 2016

Stephen Horvath
June 14, 2016

Telos and AWS can help streamline the cloud compliance process by dramatically reducing controls documentation and validation. Faster to cloud, means faster to mission, production, and value.

Continue Reading ...

Pen-testing Security Solutions Is as Valuable as Pen-testing Security Environments

Stephen Horvath
May 25, 2016

Pen-testing is just as valuable for vetting an IT security offering as it is for vetting the security of an IT environment.

Continue Reading ...

Tomorrow’s Cyber Problem

Stephen Horvath
July 13, 2015

In a world where breaches are commonplace, it’s imperative that we develop solutions to verify the integrity and authenticity of data and information.

Continue Reading ...

Effective cyber defense is more about mindset than budget

Stephen Horvath
March 19, 2015

Implementing an effective cyber defense program is not out of reach for small to medium sized organizations. More important than size of budget, is having the correct mindset and processes for training security professionals, preventing attacks, and responding appropriately when, not if, they occur.

Continue Reading ...

Has Subject Matter Expertise Gone to the Dogs?

Stephen Horvath
December 18, 2014

From dog training to complex technology solutions – true subject matter expertise will deliver better outcomes.

Continue Reading ...

Vigilance

Stephen Horvath
September 3, 2014

Just as individuals shouldn’t rely solely on their banks’ fraud-monitoring alerts for financial protection, so cybersecurity personnel shouldn’t rely solely on tools like network or host intrusion detection to let them know when something is amiss with information resources. We need to take an active, hands-on role in ensuring the protection of our networks.

Continue Reading ...

Kick Off the Summer with Three Cybersecurity, Innovation, and Emerging Technology Events

Stephen Horvath
June 23, 2014

The first week of summer is upon us, and while many are hitting the beach or the golf course, we are busy showcasing our cybersecurity, mission planning, and network security solutions at three different events, from Baltimore, DC, all the way to San Antonio, Texas.

Continue Reading ...

The Hard Part

Stephen Horvath
October 28, 2013

No matter how much technology is thrown at this issue, cybersecurity is still wildly difficult. It requires time, process, oversight, audit, enforcement, policy, hard work, and technology. As with all things, technology will help lighten the load, but you still have to build momentum on your own.

Continue Reading ...