A Single Partner for Everything You Need Optiv works with more than 450 world-class security technology partners. By putting you at the center of our unmatched ecosystem of people, products, partners and programs, we accelerate business progress like no other company can.
We Are Optiv Greatness is every team working toward a common goal. Winning in spite of cyber threats and overcoming challenges in spite of them. It’s building for a future that only you can create or simply coming home in time for dinner. However you define greatness, Optiv is in your corner. We manage cyber risk so you can secure your full potential.
Search Terms Topic of Interest - Any -AppSecArchitecture and ImplementationBenefitsBig Data and AnalyticsBusiness/StrategyCloud SecurityCommentaryConsumer Financial Protection Agency (CFPA)CultureCyber Digital TransformationCyber OperationsCybersecurityCybersecurity AcronymsCybersecurity Awareness MonthCybersummitData Protection and Data PrivacyDeepfakesDigital IntelligenceDigital TransformationEducation and AwarenessEducation/IntelligenceGovernanceHealthcareIdentity and Access ManagementIncident ManagementIndustryIndustry AnalysisInfographicInnovationInternet of ThingsManaged Security ServicesOperational TechnologyOpinionOptivOptiv CorporateOptivConPartnershipPassword Security and HygienePhishingRegulatory/LegalRisk and ComplianceSecOpsSecurity OperationsSecurity Program StrategyServicesSolution and Program InsightSolutionsSource ZeroStaffingTalent AcquisitionTaniumTaniumTechnicalTechnical ContentTechnical InnovatorTechnical ResearchThought LeadershipThreats and VulnerabilitiesToolsZero Trust Sort By LatestOldest Image Some of the Top Cybersecurity Technology Buying Trends September 12, 2019 Keeping up with and evaluating cybersecurity technologies can be a continuous and ongoing challenge for organizations. To make this effort easier.... See Details Blog Image ATT&CK Series: Collection Tactics September 10, 2019 In this post, we will address some of the MITRE ATT&CK’s Collection techniques and tactics, from an attacker’s point of view to harvest organizational.... See Details Blog Image Privacy Programs as Foundational Security September 09, 2019 With mounting regulations, connectivity, and an explosion in data, privacy management programs are critical components of an overall security program.... See Details Blog Image Optiv Associates: Welcoming the Next Generation September 04, 2019 Optiv acknowledges the extraordinary need for security professionals, which is why we’ve decided to create Associate level positions. These roles.... See Details Blog Image Service Providers and PCI Compliance, Part 1 – Cloud Services and Your Obligations September 03, 2019 This post is the first in a three-part series dedicated to companies working with service providers relating to PCI compliance. Part 1 below focuses.... See Details Blog Image Cybersecurity: Lost Your Keys? September 02, 2019 From time to time we all lose our keys. The solution for physical keys is simple – find the spare set and head down to your local hardware store so.... See Details Blog Image Retro Risk Appetite August 27, 2019 Accepted risk is all too often the result of a lack of priorities around managing risk. It’s all too easy to say “We don’t want to spend $50,000 USD.... See Details Blog Image Is Your Organization GDPR Compliant? Use a Checklist August 20, 2019 Most major organizations are already fully compliant with GDPR. However, some may just now be launching into European markets, and others may have.... See Details Blog Image ATT&CK Series: Command and Control August 06, 2019 In this post, we will review ATT&CK’s Command and Control techniques from an attacker’s point of view. The techniques covered here are not inclusive.... See Details Blog Image Cybersecurity Lapses Can Derail the M&A Train July 31, 2019 Typical M&A concerns include overpaying for an acquired company and assimilating cultures. Executives often spend less time worrying about.... See Details Blog Image Managing Security with MITRE ATT&CK July 30, 2019 Optiv has been using the MITRE Adversary Tactics and Techniques and Common Knowledge (ATT&CK) framework to help clients strategically manage.... See Details Blog Image Closing the People, Processes and Technology Gap: How Innovation Can Strengthen Your Cybersecurity Program July 24, 2019 Learn how to achieve the right combination of people, processes and technology to evolve your cybersecurity program. See Details Blog Pagination First page « First Previous page ‹ Previous … Page 35 Page 36 Page 37 Page 38 Current page 39 Page 40 Page 41 Page 42 Page 43 … Next page Next › Last page Last »
Image Some of the Top Cybersecurity Technology Buying Trends September 12, 2019 Keeping up with and evaluating cybersecurity technologies can be a continuous and ongoing challenge for organizations. To make this effort easier.... See Details Blog
Image ATT&CK Series: Collection Tactics September 10, 2019 In this post, we will address some of the MITRE ATT&CK’s Collection techniques and tactics, from an attacker’s point of view to harvest organizational.... See Details Blog
Image Privacy Programs as Foundational Security September 09, 2019 With mounting regulations, connectivity, and an explosion in data, privacy management programs are critical components of an overall security program.... See Details Blog
Image Optiv Associates: Welcoming the Next Generation September 04, 2019 Optiv acknowledges the extraordinary need for security professionals, which is why we’ve decided to create Associate level positions. These roles.... See Details Blog
Image Service Providers and PCI Compliance, Part 1 – Cloud Services and Your Obligations September 03, 2019 This post is the first in a three-part series dedicated to companies working with service providers relating to PCI compliance. Part 1 below focuses.... See Details Blog
Image Cybersecurity: Lost Your Keys? September 02, 2019 From time to time we all lose our keys. The solution for physical keys is simple – find the spare set and head down to your local hardware store so.... See Details Blog
Image Retro Risk Appetite August 27, 2019 Accepted risk is all too often the result of a lack of priorities around managing risk. It’s all too easy to say “We don’t want to spend $50,000 USD.... See Details Blog
Image Is Your Organization GDPR Compliant? Use a Checklist August 20, 2019 Most major organizations are already fully compliant with GDPR. However, some may just now be launching into European markets, and others may have.... See Details Blog
Image ATT&CK Series: Command and Control August 06, 2019 In this post, we will review ATT&CK’s Command and Control techniques from an attacker’s point of view. The techniques covered here are not inclusive.... See Details Blog
Image Cybersecurity Lapses Can Derail the M&A Train July 31, 2019 Typical M&A concerns include overpaying for an acquired company and assimilating cultures. Executives often spend less time worrying about.... See Details Blog
Image Managing Security with MITRE ATT&CK July 30, 2019 Optiv has been using the MITRE Adversary Tactics and Techniques and Common Knowledge (ATT&CK) framework to help clients strategically manage.... See Details Blog
Image Closing the People, Processes and Technology Gap: How Innovation Can Strengthen Your Cybersecurity Program July 24, 2019 Learn how to achieve the right combination of people, processes and technology to evolve your cybersecurity program. See Details Blog
Would you like to speak to an advisor? How can we help you today? Image E-Book Cybersecurity Field Guide #13: A Practical Approach to Securing Your Cloud Transformation Download Now Image Events Register for an Upcoming OptivCon Learn More Ready to speak to an Optiv expert to discuss your security needs?