A Single Partner for Everything You Need Optiv works with more than 450 world-class security technology partners. By putting you at the center of our unmatched ecosystem of people, products, partners and programs, we accelerate business progress like no other company can.
We Are Optiv Greatness is every team working toward a common goal. Winning in spite of cyber threats and overcoming challenges in spite of them. It’s building for a future that only you can create or simply coming home in time for dinner. However you define greatness, Optiv is in your corner. We manage cyber risk so you can secure your full potential.
Search Terms Topic of Interest - Any -AppSecArchitecture and ImplementationBenefitsBig Data and AnalyticsBusiness/StrategyCloud SecurityCommentaryConsumer Financial Protection Agency (CFPA)CultureCyber Digital TransformationCyber OperationsCybersecurityCybersecurity AcronymsCybersecurity Awareness MonthCybersummitData Protection and Data PrivacyDeepfakesDigital IntelligenceDigital TransformationEducation and AwarenessEducation/IntelligenceGovernanceHealthcareIdentity and Access ManagementIncident ManagementIndustryIndustry AnalysisInfographicInnovationInternet of ThingsManaged Security ServicesOperational TechnologyOpinionOptivOptiv CorporateOptivConPartnershipPassword Security and HygienePhishingRegulatory/LegalRisk and ComplianceSecOpsSecurity OperationsSecurity Program StrategyServicesSolution and Program InsightSolutionsSource ZeroStaffingTalent AcquisitionTaniumTaniumTechnicalTechnical ContentTechnical InnovatorTechnical ResearchThought LeadershipThreats and VulnerabilitiesToolsZero Trust Sort By LatestOldest Image A Day in the Life of Optiv Cyber Security Superheroes: Optiv Worldwide September 21, 2017 Deemed the “Silicon Valley of India,” Bangalore is a major hub for many of the top multinational information technology firms, software companies, and.... See Details Blog Image Six Key Alignments for CISO's on Cloud Security September 20, 2017 Many CISO's and security teams are struggling with developing and executing an effective cloud security strategy, especially one that can keep up with.... See Details Blog Image The Need for Augmented Intelligence September 07, 2017 Cyber threat intelligence can be a lot harder than you think. As a regular speaker at various conferences, I’m constantly asked the question about how.... See Details Blog Image The Cybersecurity Mega Cycle Aftermath September 06, 2017 During the past decade, we have witnessed a virtual explosion in the cybersecurity world. While serving as CEO of McAfee and FireEye, and a U.S. Army.... See Details Blog Image A Day in the Life of Optiv Cyber Security Superheroes: Pete Arzamendi August 24, 2017 Whether it’s cyber security or his passion for Jiu-Jitsu, Pete Arzamendi enjoys the art of combat and the constant search for attacks throughout the.... See Details Blog Image A Day in the Life of Optiv Cyber Security Superheroes: Chris Patten August 09, 2017 You could say Chris Patten’s passion for cyber security all started with yard sales. Growing up in the Midwest, Chris and his dad wandered local yard.... See Details Blog Image A Day in the Life of Optiv Cyber Security Superheroes: Keyana Jones August 09, 2017 Keyana’s mantra of ‘unlocking tomorrow’ is clear when she enters the room at the Opt-In New Employee Training session. She wastes no time dispersing.... See Details Blog Image Recovering From a Credential Breach, Part 2 August 09, 2017 Probably the most important step to take when a user suspects that his or her user account has been compromised is to notify the organization’s IT.... See Details Blog Image PCI Compliance Every Day – Requirement 7 August 08, 2017 This post focuses on PCI DSS requirement seven; restricting access to cardholder data and in-scope system components based on the “need to know” and.... See Details Blog Image Recovering From a Credential Breach, Part 1 August 02, 2017 A few years ago while on a business trip, I was out to dinner and left my luggage in my rental car (I had not yet checked in to my hotel). When I.... See Details Blog Image Top 20 CIS Critical Security Controls (CSC) Through the Eyes of a Hacker – CSC 20 July 30, 2017 Test the overall strength of an organization’s defenses (the technology, the process and the people) by simulating the objectives and actions of an.... See Details Blog Image DEF CON is Here: A Reminder to Manage and Remediate Security Vulnerabilities of Your Third Parties July 27, 2017 Every year I like to take a look at the talks at Black Hat and DEFCON to see if there are areas of risk I need to review. This year, like others, has.... See Details Blog Pagination First page « First Previous page ‹ Previous … Page 48 Page 49 Page 50 Page 51 Current page 52 Page 53 Page 54 Page 55 Page 56 … Next page Next › Last page Last »
Image A Day in the Life of Optiv Cyber Security Superheroes: Optiv Worldwide September 21, 2017 Deemed the “Silicon Valley of India,” Bangalore is a major hub for many of the top multinational information technology firms, software companies, and.... See Details Blog
Image Six Key Alignments for CISO's on Cloud Security September 20, 2017 Many CISO's and security teams are struggling with developing and executing an effective cloud security strategy, especially one that can keep up with.... See Details Blog
Image The Need for Augmented Intelligence September 07, 2017 Cyber threat intelligence can be a lot harder than you think. As a regular speaker at various conferences, I’m constantly asked the question about how.... See Details Blog
Image The Cybersecurity Mega Cycle Aftermath September 06, 2017 During the past decade, we have witnessed a virtual explosion in the cybersecurity world. While serving as CEO of McAfee and FireEye, and a U.S. Army.... See Details Blog
Image A Day in the Life of Optiv Cyber Security Superheroes: Pete Arzamendi August 24, 2017 Whether it’s cyber security or his passion for Jiu-Jitsu, Pete Arzamendi enjoys the art of combat and the constant search for attacks throughout the.... See Details Blog
Image A Day in the Life of Optiv Cyber Security Superheroes: Chris Patten August 09, 2017 You could say Chris Patten’s passion for cyber security all started with yard sales. Growing up in the Midwest, Chris and his dad wandered local yard.... See Details Blog
Image A Day in the Life of Optiv Cyber Security Superheroes: Keyana Jones August 09, 2017 Keyana’s mantra of ‘unlocking tomorrow’ is clear when she enters the room at the Opt-In New Employee Training session. She wastes no time dispersing.... See Details Blog
Image Recovering From a Credential Breach, Part 2 August 09, 2017 Probably the most important step to take when a user suspects that his or her user account has been compromised is to notify the organization’s IT.... See Details Blog
Image PCI Compliance Every Day – Requirement 7 August 08, 2017 This post focuses on PCI DSS requirement seven; restricting access to cardholder data and in-scope system components based on the “need to know” and.... See Details Blog
Image Recovering From a Credential Breach, Part 1 August 02, 2017 A few years ago while on a business trip, I was out to dinner and left my luggage in my rental car (I had not yet checked in to my hotel). When I.... See Details Blog
Image Top 20 CIS Critical Security Controls (CSC) Through the Eyes of a Hacker – CSC 20 July 30, 2017 Test the overall strength of an organization’s defenses (the technology, the process and the people) by simulating the objectives and actions of an.... See Details Blog
Image DEF CON is Here: A Reminder to Manage and Remediate Security Vulnerabilities of Your Third Parties July 27, 2017 Every year I like to take a look at the talks at Black Hat and DEFCON to see if there are areas of risk I need to review. This year, like others, has.... See Details Blog
Would you like to speak to an advisor? Let's Talk Cybersecurity Provide your contact information and we will follow-up shortly. Let's Browse Cybersecurity Just looking? Explore how Optiv serves its ~6,000 clients. Show me AI Security Solutions Show me the Optiv brochure Take me to Optiv's Events page Browse all Services