A Single Partner for Everything You Need Optiv works with more than 450 world-class security technology partners. By putting you at the center of our unmatched ecosystem of people, products, partners and programs, we accelerate business progress like no other company can.
We Are Optiv Greatness is every team working toward a common goal. Winning in spite of cyber threats and overcoming challenges in spite of them. It’s building for a future that only you can create or simply coming home in time for dinner. However you define greatness, Optiv is in your corner. We manage cyber risk so you can secure your full potential.
Search Terms Topic of Interest - Any -AppSecArchitecture and ImplementationBenefitsBig Data and AnalyticsBusiness/StrategyCloud SecurityCommentaryConsumer Financial Protection Agency (CFPA)CultureCyber Digital TransformationCyber OperationsCybersecurityCybersecurity AcronymsCybersecurity Awareness MonthCybersummitData Protection and Data PrivacyDeepfakesDigital IntelligenceDigital TransformationEducation and AwarenessEducation/IntelligenceGovernanceHealthcareIdentity and Access ManagementIncident ManagementIndustryIndustry AnalysisInfographicInnovationInternet of ThingsManaged Security ServicesOperational TechnologyOpinionOptivOptiv CorporateOptivConPartnershipPassword Security and HygienePhishingRegulatory/LegalRisk and ComplianceSecOpsSecurity OperationsSecurity Program StrategyServicesSolution and Program InsightSolutionsSource ZeroStaffingTalent AcquisitionTaniumTaniumTechnicalTechnical ContentTechnical InnovatorTechnical ResearchThought LeadershipThreats and VulnerabilitiesToolsZero Trust Sort By LatestOldest Image Control Maturity vs. Control Risk: A Client Discussion July 17, 2017 A client for whom I serve as CISO advisor posed an interesting question to me last week, “What if we measure and report on control maturity instead of.... See Details Blog Image A Day in the Life of Optiv Cyber Security Superheroes: Nick Hyatt July 12, 2017 Nick always had an inquisitive mind. At a very young age, his father would watch as he sat at the family’s new TRS-80 microcomputer marveling at the.... See Details Blog Image Indicators of Compromise (IOCs) are Not Intelligence July 05, 2017 When discussing the topic of cyber threat intelligence, I frequently hear questions about Indicators of Compromise (IOCs). IOCs are not intelligence.... See Details Blog Image The Patriot Award: Optiv’s Andy Maidment Makes a Special Tribute to his Supervisor, Andrew Coons July 04, 2017 When Andy Maidment found out about the Patriot Award during his annual civilian employment review, he immediately knew he wanted to nominate his.... See Details Blog Image Update: Intelligence Advisory – Petya Outbreak June 29, 2017 This is an update to the Intelligence Advisory: Petya Ransomware Outbreak - released June 27, 2017. Optiv’s Global Threat Intelligence Center (gTIC).... See Details Blog Image Petya / Petna / NotPetya Ransomware Recommendations from the Trenches June 28, 2017 Here we go again. Not long ago I updated a blog post containing actionable recommendations to protect your environment from ransomware threats.... See Details Blog Image The Most Important Threats for Your Organization to Watch June 26, 2017 The Optiv Cyber Threat Intelligence Estimate 2017 is a yearly report that reviews important events of the past calendar year, and uses them to make.... See Details Blog Image Intelligence Advisory – New Petya Ransomware Outbreak June 26, 2017 Optiv’s Global Threat Intelligence Center (gTIC) received reports from several sources concerning a recent modification to the Petya ransomware strain.... See Details Blog Image What Changes will EO 13800 Bring to Strengthening the Cybersecurity of Federal Networks and Critical Infrastructure? June 21, 2017 Anyone who has held the position of CIO or CISO in a government agency or bureau can tell you implementing an effective information risk management.... See Details Blog Image Cyber Threat Intelligence – Putting out Fires or Firefighting? June 19, 2017 When it comes to fighting malware, combating nation-state threats, and securing digital assets, the information security industry has much to learn.... See Details Blog Image Implementing an Identity Centric Approach June 18, 2017 With the latest Verizon Data Breach Incident Report finding that 81 percent of hacking related breaches leveraged either stolen and/or weak passwords.... See Details Blog Image Thank You for the Help! June 14, 2017 One of the more influential things in my life that directed me towards a career in information security was the 1983 movie, WarGames. I was already a.... See Details Blog Pagination First page « First Previous page ‹ Previous … Page 49 Page 50 Page 51 Page 52 Current page 53 Page 54 Page 55 Page 56 Page 57 … Next page Next › Last page Last »
Image Control Maturity vs. Control Risk: A Client Discussion July 17, 2017 A client for whom I serve as CISO advisor posed an interesting question to me last week, “What if we measure and report on control maturity instead of.... See Details Blog
Image A Day in the Life of Optiv Cyber Security Superheroes: Nick Hyatt July 12, 2017 Nick always had an inquisitive mind. At a very young age, his father would watch as he sat at the family’s new TRS-80 microcomputer marveling at the.... See Details Blog
Image Indicators of Compromise (IOCs) are Not Intelligence July 05, 2017 When discussing the topic of cyber threat intelligence, I frequently hear questions about Indicators of Compromise (IOCs). IOCs are not intelligence.... See Details Blog
Image The Patriot Award: Optiv’s Andy Maidment Makes a Special Tribute to his Supervisor, Andrew Coons July 04, 2017 When Andy Maidment found out about the Patriot Award during his annual civilian employment review, he immediately knew he wanted to nominate his.... See Details Blog
Image Update: Intelligence Advisory – Petya Outbreak June 29, 2017 This is an update to the Intelligence Advisory: Petya Ransomware Outbreak - released June 27, 2017. Optiv’s Global Threat Intelligence Center (gTIC).... See Details Blog
Image Petya / Petna / NotPetya Ransomware Recommendations from the Trenches June 28, 2017 Here we go again. Not long ago I updated a blog post containing actionable recommendations to protect your environment from ransomware threats.... See Details Blog
Image The Most Important Threats for Your Organization to Watch June 26, 2017 The Optiv Cyber Threat Intelligence Estimate 2017 is a yearly report that reviews important events of the past calendar year, and uses them to make.... See Details Blog
Image Intelligence Advisory – New Petya Ransomware Outbreak June 26, 2017 Optiv’s Global Threat Intelligence Center (gTIC) received reports from several sources concerning a recent modification to the Petya ransomware strain.... See Details Blog
Image What Changes will EO 13800 Bring to Strengthening the Cybersecurity of Federal Networks and Critical Infrastructure? June 21, 2017 Anyone who has held the position of CIO or CISO in a government agency or bureau can tell you implementing an effective information risk management.... See Details Blog
Image Cyber Threat Intelligence – Putting out Fires or Firefighting? June 19, 2017 When it comes to fighting malware, combating nation-state threats, and securing digital assets, the information security industry has much to learn.... See Details Blog
Image Implementing an Identity Centric Approach June 18, 2017 With the latest Verizon Data Breach Incident Report finding that 81 percent of hacking related breaches leveraged either stolen and/or weak passwords.... See Details Blog
Image Thank You for the Help! June 14, 2017 One of the more influential things in my life that directed me towards a career in information security was the 1983 movie, WarGames. I was already a.... See Details Blog
Would you like to speak to an advisor? Let's Talk Cybersecurity Provide your contact information and we will follow-up shortly. Let's Browse Cybersecurity Just looking? Explore how Optiv serves its ~6,000 clients. Show me AI Security Solutions Show me the Optiv brochure Take me to Optiv's Events page Browse all Services