A Single Partner for Everything You Need Optiv works with more than 450 world-class security technology partners. By putting you at the center of our unmatched ecosystem of people, products, partners and programs, we accelerate business progress like no other company can.
We Are Optiv Greatness is every team working toward a common goal. Winning in spite of cyber threats and overcoming challenges in spite of them. It’s building for a future that only you can create or simply coming home in time for dinner. However you define greatness, Optiv is in your corner. We manage cyber risk so you can secure your full potential.
Image Remote Work: Making the Culture Shift April 22, 2020 Here are several tips that will help ease the transition to working at home. See Details Blog
Image Service Providers and PCI Compliance, Part 3 – Remediating Missing Due Diligence October 08, 2019 Part three of this series addressing an organization's PCI-DSS compliance obligations when they use cloud services (IAAS, PAAS, or SAAS). Part two.... See Details Blog
Image Service Providers and PCI Compliance, Part 2 – Third-Party Risk Management September 30, 2019 In this post, Service Providers and PCI Compliance, Part 2 – Third-Party Risk Management, we look more closely at the relationships between.... See Details Blog
Image Service Providers and PCI Compliance, Part 1 – Cloud Services and Your Obligations September 03, 2019 This post is the first in a three-part series dedicated to companies working with service providers relating to PCI compliance. Part 1 below focuses.... See Details Blog
Image That Time I Clicked on a Phish April 16, 2019 Even the savviest of us can “fall for” a phishing email. Here are a few things to look for to help spot them quicker. See Details Blog
Image Thoughts on Breach of Trust vs. a Breach of Security April 25, 2018 General thought: A breach of trust is different than a breach of security. Trust and security, while related, are very different from each other. In.... See Details Blog
Image Employees’ Contribution to Breach of Trust April 25, 2018 General thought: A breach of trust is different than a breach of security. Trust and security, while related, are very different from each other. In.... See Details Blog
Image Third-Party Breaches Will Continue Until Morale Improves November 08, 2017 I have some bad news for you: breaches at third parties are not going to stop – not any time soon. Various studies show that somewhere between one.... See Details Blog
Image Recovering From a Credential Breach, Part 2 August 09, 2017 Probably the most important step to take when a user suspects that his or her user account has been compromised is to notify the organization’s IT.... See Details Blog
Image Recovering From a Credential Breach, Part 1 August 02, 2017 A few years ago while on a business trip, I was out to dinner and left my luggage in my rental car (I had not yet checked in to my hotel). When I.... See Details Blog
Image Control Maturity vs. Control Risk: A Client Discussion July 17, 2017 A client for whom I serve as CISO advisor posed an interesting question to me last week, “What if we measure and report on control maturity instead of.... See Details Blog
Image OCC Updated Guidance on Third-Party Risk March 15, 2017 Recently, the Office of the Comptroller of the Currency (OCC), released updated guidance for bank examiners as they scrutinize third-party risk.... See Details Blog
Would you like to speak to an advisor? How can we help you today? Image E-Book Cybersecurity Field Guide #13: A Practical Approach to Securing Your Cloud Transformation Download Now Image Events Register for an Upcoming OptivCon Learn More Ready to speak to an Optiv expert to discuss your security needs?