A Single Partner for Everything You Need Optiv works with more than 450 world-class security technology partners. By putting you at the center of our unmatched ecosystem of people, products, partners and programs, we accelerate business progress like no other company can.
We Are Optiv Greatness is every team working toward a common goal. Winning in spite of cyber threats and overcoming challenges in spite of them. It’s building for a future that only you can create or simply coming home in time for dinner. However you define greatness, Optiv is in your corner. We manage cyber risk so you can secure your full potential.
Optiv Security Experts to Speak at Interop ITX 2017 Breadcrumb Home About Us Press Releases Optiv Security Experts to Speak at Interop ITX 2017 May 15, 2017 Optiv Security Experts to Speak at Interop ITX 2017 Cyber Security Thought Leaders to Discuss Securing Enterprise Infrastructure, Third-Party Risk Management, Security Skills Shortages and Career Opportunities in IT Security DENVER – May 15, 2017 - Optiv Security, a market-leading provider of end-to-end cyber security solutions, today announced that three of its security thought leaders—Sean Cordero, Peter Gregory and Dawn-Marie Hutchinson—will participate in four separate speaking sessions at Interop ITX Conference. Session topics include securing enterprise infrastructure, career opportunities in IT security, the security skills shortage and third-party risk management. The event will take place May 15-19, 2017 at the MGM Grand Conference Center in Las Vegas. Session details include: Securing Your Enterprise Infrastructure Who/Topic: As the traditional IT infrastructure evolves to add new networking capabilities, software-defined networks and virtualized server environments, the risks are changing as well. In this audience-involved presentation, Hutchinson, executive director, Office of the CISO, will discuss the latest threats to the corporate IT environment and how an organization can mitigate them. The session, which will take place during the conference’s two-day Dark Reading Cybersecurity Crash Course, is intended for CIOs, CTOs and IT professionals who must answer questions about their organization’s security posture and want a comprehensive update on the latest threats to develop a cross-system security strategy. When/Where: Monday, May 15 from 9:30 – 10:15 a.m. PDT, Room 121 Career Opportunities in IT Security Who/Topic: In this panel discussion, Hutchinson will share her insights on diversity in security trends, as well as training and certifications needed to take advantage of the latest happenings in online defense. Individuals interested in learning new skills to grow opportunities in the field should attend this session, which will be moderated by Dark Reading’s editor-in-chief, Tim Wilson. When/Where: Wednesday, May 17 from 11:40 a.m. – 12:40 p.m. PDT, Room 115 Surviving the Security Skills Shortage Who/Topic: In this panel discussion, Cordero, senior executive director, Office of the CISO, will share perspectives, lessons and strategies from his career as a CISO and advisor to the Fortune 50 on actionable steps leaders can take towards overcoming the cyber security talent shortage. Security leaders interested in learning tips on attracting, cultivating and retaining talented cyber security team members should attend this session which will be moderated by Dark Reading’s executive editor, Kelly Jackson Higgins. When/Where: Wednesday, May 17 from 11:40 a.m. – 12:40 p.m. PDT, Room 111 Herding Vendors: Implementing Third Party Risk Programs Who/Topic: The structure of most organizations’ information processing involves large numbers of third-party companies that have access to most critical and sensitive data. Even modest-sized organizations have hundreds of third parties. Without a mature structure for effective management of third parties, organizations fail to uncover and manage risks they would find unacceptable had they been known. In this session, Gregory, executive director, Office of the CISO, will discuss program strategies for managing third-party risk. Details discussed include: the concept of risk tiering, requests for evidence, on-site visits, remediation, assessments by expert security firms, and intrusive monitoring. When/Where: Friday, May 19 from 9:00 – 10:00 a.m. PDT, Room 111 Media wishing to interview Optiv experts should contact Lauren Howe at lauren.howe@optiv.com or (443) 519-5455. Optiv Security: Secure greatness.® Optiv is the cyber advisory and solutions leader, delivering strategic and technical expertise to nearly 6,000 companies across every major industry. We partner with organizations to advise, deploy and operate complete cybersecurity programs from strategy and managed security services to risk, integration and technology solutions. With clients at the center of our unmatched ecosystem of people, products, partners and programs, we accelerate business progress like no other company can. At Optiv, we manage cyber risk so you can secure your full potential. For more information, visit www.optiv.com. Share:
Optiv Security: Secure greatness.® Optiv is the cyber advisory and solutions leader, delivering strategic and technical expertise to nearly 6,000 companies across every major industry. We partner with organizations to advise, deploy and operate complete cybersecurity programs from strategy and managed security services to risk, integration and technology solutions. With clients at the center of our unmatched ecosystem of people, products, partners and programs, we accelerate business progress like no other company can. At Optiv, we manage cyber risk so you can secure your full potential. For more information, visit www.optiv.com.
Would you like to speak to an advisor? How can we help you today? Image E-Book Cybersecurity Field Guide #13: A Practical Approach to Securing Your Cloud Transformation Download Now Image Events Register for an Upcoming OptivCon Learn More Ready to speak to an Optiv expert to discuss your security needs?