A Single Partner for Everything You Need Optiv works with more than 450 world-class security technology partners. By putting you at the center of our unmatched ecosystem of people, products, partners and programs, we accelerate business progress like no other company can.
We Are Optiv Greatness is every team working toward a common goal. Winning in spite of cyber threats and overcoming challenges in spite of them. It’s building for a future that only you can create or simply coming home in time for dinner. However you define greatness, Optiv is in your corner. We manage cyber risk so you can secure your full potential.
Optiv Cybersecurity Dictionary Breadcrumb Home Cybersecurity Dictionary CoBiT - Control Objectives for Information and Related Technologies What is CoBiT? Control Objectives for Information and Related Technologies (CoBiT) is an IT management framework first developed in 1996. The framework was published by the IT Governance Institute and the Information Systems Audit and Control Association (ISACA) to help businesses develop, organize and implement strategies around information management and governance. The objective is to provide a common language for business executives to communicate with each other about goals, objectives and results. The latest version was published in 2013 and emphasizes the value that information governance can provide to a business's success. It also provides guidance about enterprise risk management. CoBiT 5 is based on five key principles for governance and management of enterprise IT: meeting stakeholder needs, covering the enterprise end to end, applying a single, integrated framework, enabling a holistic approach and separating governance from management. Image Related Services Enterprise Resilience Data Governance CMMC Endpoint Security Related TermsNIST CSF - National Institute of Standards and Technology Cybersecurity Framework Share: Contact Us
Would you like to speak to an advisor? How can we help you today? Image E-Book Cybersecurity Field Guide #13: A Practical Approach to Securing Your Cloud Transformation Download Now Image Events Register for an Upcoming OptivCon Learn More Ready to speak to an Optiv expert to discuss your security needs?