A Single Partner for Everything You Need Optiv works with more than 450 world-class security technology partners. By putting you at the center of our unmatched ecosystem of people, products, partners and programs, we accelerate business progress like no other company can.
We Are Optiv Greatness is every team working toward a common goal. Winning in spite of cyber threats and overcoming challenges in spite of them. It’s building for a future that only you can create or simply coming home in time for dinner. However you define greatness, Optiv is in your corner. We manage cyber risk so you can secure your full potential.
Optiv Security Gears Up for RSA Conference 2016 Breadcrumb Home About Us Press Releases Optiv Security Gears Up for RSA Conference 2016 February 23, 2016 Optiv Security Gears Up for RSA Conference 2016 -- Optiv Experts to Share Insights on Women in Cyber Security, the Evolution of the CISO, Endpoint Security, Personal Security and Techniques on Lateral Movement -- Denver – February 23, 2016 - Optiv Security, a leading provider of end-to-end cyber security solutions, today announced several of its industry-leading experts will participate in six different sessions at RSA Conference 2016. The experts will share insights based on their expertise from delivering the industry’s most holistic, programmatic cyber security solutions to clients around the world. Session topics include retaining women in the industry, evolution of the CISO, endpoint strategy, personal security and privacy, and techniques on lateral movement. The event will take place from Feb. 29 to Mar. 4 at the Moscone Center in San Francisco. Sessions include: Should I Stay or Should I Go? How to Attract/Retain Women in the Industry Who/Topic: Ping Look, director, information security, will join a panel discussion that will provide insight into the findings of the 2015 (ISC)2 Global Information Security Workforce Study and discuss how these findings relate to real-world experiences for women in security. The panel will provide thought-provoking discussion on the importance of driving initiatives to reach young women entering the profession, and ways to attract/retain women in this industry. When/Where: Monday, February 29 from 1:50 – 2:50 p.m. PT/West Room: 3014 Track: Professional Development From Cave Man to Business Man, the Evolution of the CISO to CIRO Who/Topic: James Christiansen, vice president, information risk management, will present on how the CISO is evolving to CIRO. His session will focus on how successful IT security leaders are transforming their skills to meet the demands for today and future needs of their organization. When/Where: Monday, February 29 from 3:00 – 3:50 p.m. PT/West Room: 3014 Track: Professional Development Detection, Prevention and Response Strategy: The Return of the Endpoint Who/Topic: After many years of neglect, enterprises once again are switching their focus and budgets to deployment of next-generation endpoint security technologies to help address the lack of continuous visibility and rapid response functionality they miss with existing technologies. During this panel discussion, Rafal Los, managing director, solutions research and development, will debate the importance of security from the endpoint perspective and discuss strategies that bring together endpoint and network security capabilities to holistically define protection schemes that solve real problems. When/Where: Tuesday, March 1 from 3:30 – 4:20 p.m. PT/West Room: 3002 Track: Technology Infrastructure & Operations Privacy Perspectives: How It’s Lost and the Implications Who/Topic: Florindo Gallicchio, executive director, Office of the CISO, will co-present on how privacy and security are not fixed points but rather moving points we must continually assess and reframe. When/Where: Thursday, March 3 from 10:20 – 11:10 a.m. PT/West Room: 3014 Track: RSAC Studio The Pivot Who/Topic: In today’s threat landscape, the attacker’s goal is to become trusted. Whether a state-sponsored actor or cybercriminal, attackers typically first compromise the endpoint with a client-side exploit and then pivot. In this presentation, Jonathan Trull, vice president, information security, will take a deep dive into how attackers pivot through organizations, identify the telltale signs of a pivot, and most importantly, identify steps for defending against it. When/Where: Friday, March 4 from 10:10 – 11:00 a.m. PT/West Room: 2006 Track: Analytics & Incident Response Got Coverage? Cyber-Insurance Realities Revealed Who/Topic: Cyber-insurance, although around since the 90s, is increasingly being discussed and provisioned by the executive leadership team. Cyber-insurance is not a replacement for a solid security strategy and program. Blake Huebner, vice president, security education and awareness, will join this panel discussion of realities from the insurer, legal and CISO viewpoints. When/Where: Friday, March 4 from 10:10 – 11:00 a.m. PT/West Room: 2018 Track: Law Optiv is proud to exhibit at RSA Conference 2016 at booth 1715. Media wishing to interview any Optiv experts are encouraged to contact Lauren Howe at lauren.howe@optiv.com or (443) 519-5455. Optiv Security: Secure greatness.® Optiv is the cyber advisory and solutions leader, delivering strategic and technical expertise to nearly 6,000 companies across every major industry. We partner with organizations to advise, deploy and operate complete cybersecurity programs from strategy and managed security services to risk, integration and technology solutions. With clients at the center of our unmatched ecosystem of people, products, partners and programs, we accelerate business progress like no other company can. At Optiv, we manage cyber risk so you can secure your full potential. For more information, visit www.optiv.com. Share:
Optiv Security: Secure greatness.® Optiv is the cyber advisory and solutions leader, delivering strategic and technical expertise to nearly 6,000 companies across every major industry. We partner with organizations to advise, deploy and operate complete cybersecurity programs from strategy and managed security services to risk, integration and technology solutions. With clients at the center of our unmatched ecosystem of people, products, partners and programs, we accelerate business progress like no other company can. At Optiv, we manage cyber risk so you can secure your full potential. For more information, visit www.optiv.com.
Would you like to speak to an advisor? How can we help you today? Image E-Book Cybersecurity Field Guide #13: A Practical Approach to Securing Your Cloud Transformation Download Now Image Events Register for an Upcoming OptivCon Learn More Ready to speak to an Optiv expert to discuss your security needs?