Subscribe to our Press Releases RSS feed to stay up-to-date on latest news.
-- Optiv to Share Significant Expertise to Help Organizations More Successfully Address Identity at the Project, Problem and Strategy Levels --
Denver – June 6, 2016 – Optiv Security, a market-leading provider of end-to-end cyber security solutions, today announced that its security experts will participate in eight different sessions at the 2016 Cloud Identity Summit (CIS). The speakers will share insights based on their expertise in helping organizations plan, build and run successful cloud and identity-focused security programs. The summit is scheduled to take place June 6-9, 2016 at the New Orleans Marriott in Louisiana.
Identity Really is the New Perimeter
Who/Topic: With the proliferation of advanced threats, juxtaposed against increased connectivity demands of employees, vendors, business partners and consumers; identity is being looked at more than ever as a layer of defense, and in many ways, as the new perimeter. In this session, Aubrey Turner, client solutions director, will discuss how various types of technology are adapting to embrace this paradigm, and high-level approaches to prepare and react to this evolving security model.
When/Where: Monday, June 6 from 4:15 – 4:40 p.m. CST/Salon E
Identity. It's Not Just a Thing, It's Integrated into Everything
Who/Topic: Many organizations have made investments in identity and access management (IAM) to support functions like user lifecycle management, identity governance or single sign-on. The identity industry is evolving, and identity is becoming the critical core of any security strategy. Attendees of this session led by Robert Block, vice president, strategic solutions, will learn how expanding the role of identity in their environment can revolutionize their approach to cyber security.
When/Where: Tuesday, June 7 from 9:30 – 9:55 a.m. CST/Salon E
CISO & Identity = (Oil & Water) or (Oil & Vinegar) and What that Means to Your Organization
Who/Topic: Too many CISOs do not embrace identity and its importance to a successful cyber security program, making the CISO and identity seem like oil and vinegar. During this session, Larry Whiteside Jr., vice president, executive strategy, healthcare and critical infrastructure solutions, will explain how oil and vinegar are not just great on salads, but also vital for the success of a CISO’s cyber security strategy.
When/Where: Tuesday, June 7 from 10:40 – 11:05 a.m. CST/Salon E
“Optivized” Cloud Security – Establishing the Pillars for a Successful CloudSec Program
Who/Topic: The adoption of cloud computing is a clear reaction to enterprises’ need for agility, elasticity and cost-effective IT solutions. In mature organizations, security professionals are in a rare position to address security early on in adoption cycles or even propose more secure alternatives that enable the adoption of innovative IT delivery. JD Sherry, vice president, strategy and innovation, will inform attendees about the common pillars one should include in their cloud security strategy.
When/Where: Tuesday, June 7 from 2:30 – 2:55 p.m. CST/Salon E
Panel: Federated Identity for Large Scale Deployments
Who/Topic: With the rise of cloud-based business and customer portals, enterprises need to be prepared to serve an exploding number of constituents, while also providing single sign-on and seamless UX for all users. In this session, Joe Greene, director, information security, and a panel of experts will lay out some key advantages of identity virtualization through the lens of federation and discuss the enhanced infrastructure speed, flexibility and security their respective IAM teams were able to achieve.
When/Where: Wednesday, June 8 from 10:55 – 11:20 a.m. CST/Studio 1/2
Keynote Panel: Identity Defined Security – Enabling the R/evolution
Who/Topic: The traditional IT security approach of putting trusted users, devices and applications behind a single perimeter is no longer sufficient. In our increasingly decentralized, deperimeterized, 'bring-your-own-anything' world, we need a better approach to protect users, customers, data and assets. In this panel featuring Robert Block, leaders from the Identity Defined Security Alliance will discuss this new approach to security and how it can help deliver a better and safer experience.
When/Where: Wednesday, June 8 from 5:30 – 6:00 p.m. CST/Grand Ballroom
Secure DevOps – Shared Responsibility
Who/Topic: Infrastructure as a Service (IaaS) assets are completely under your control and require you to perform all of the necessary security configuration and management tasks. Today’s IT and security organizations see the world of IaaS through a variety of lenses depending on the charter the business has given them to transform how they deliver IT services. In this session, JD Sherry will walk attendees through some of the thoughtful considerations about how to secure these services and not slow down the speed of adoption of cloud infrastructure.
When/Where: Thursday, June 9 from 9:30 – 9:55 a.m. CST/Salon E
Cloud Security Program, Best in Breed?
Who/Topic: More and more organizations are in the process of planning, building or running a cloud security program. Whether identifying, encrypting, protecting or securing data in today's enterprises, Tim Benner, senior client solutions architect, will help session attendees craft an effective plan using the best-in-breed technology.
When/Where: Thursday, June 9 from 10:40 – 11:05 a.m. CST/Salon E
Optiv recently expanded its leadership position in IAM with its acquisition of IAM solutions and services provider Advancive. The transaction helped Optiv create the industry’s deepest and broadest bench of IAM experts with experience in and capabilities across an extensive technology portfolio. The move also gave Optiv additional expertise to develop new and innovative IAM services and solutions to better help clients plan, build and run holistic IAM security programs that meet their specific business needs.
Optiv is proud to be a founding security sponsor of the CIS and will exhibit at booth number one. Media wishing to interview Optiv’s experts should contact Jennifer Torode at firstname.lastname@example.org or (781) 672-3119.
About Optiv Security
Optiv is a market-leading provider of end-to-end cyber security solutions. We help clients plan, build and run successful cyber security programs that achieve business objectives through our depth and breadth of cyber security offerings, extensive capabilities and proven expertise in cyber security strategy, managed security services, incident response, risk and compliance, security consulting, training and support, integration and architecture services, and security technology. A Blackstone (NYSE: BX) portfolio company, Optiv maintains premium partnerships with more than 300 of the leading security technology manufacturers. For more information, visit www.optiv.com or follow us at www.twitter.com/optiv, www.facebook.com/optivinc and www.linkedin.com/company/optiv-inc.