Every Solution You Can Imagine – and More
What cybersecurity solution do you need? From Zero Trust to ADR, IAM, risk/privacy, data protection, AppSec and threat, securing digital transformation, to resiliency and remediation, we can build the right program to help solve your challenges.
A Single Partner for Everything You Need
Optiv works with more than 450 world-class security technology partners. By putting you at the center of our unmatched ecosystem of people, products, partners and programs, we accelerate business progress like no other company can.
We Are Optiv
Greatness is every team working toward a common goal. Winning in spite of cyber threats and overcoming challenges in spite of them. It’s building for a future that only you can create or simply coming home in time for dinner.
However you define greatness, Optiv is in your corner. We manage cyber risk so you can secure your full potential.
April 22, 2020
Here are several tips that will help ease the transition to working at home.
October 08, 2019
Part three of this series addressing an organization's PCI-DSS compliance obligations when they use cloud services (IAAS, PAAS, or SAAS). Part two....
September 30, 2019
In this post, Service Providers and PCI Compliance, Part 2 – Third-Party Risk Management, we look more closely at the relationships between....
September 03, 2019
This post is the first in a three-part series dedicated to companies working with service providers relating to PCI compliance. Part 1 below focuses....
April 16, 2019
Even the savviest of us can “fall for” a phishing email. Here are a few things to look for to help spot them quicker.
April 25, 2018
General thought: A breach of trust is different than a breach of security. Trust and security, while related, are very different from each other. In....
November 08, 2017
I have some bad news for you: breaches at third parties are not going to stop – not any time soon. Various studies show that somewhere between one....
August 09, 2017
Probably the most important step to take when a user suspects that his or her user account has been compromised is to notify the organization’s IT....
August 02, 2017
A few years ago while on a business trip, I was out to dinner and left my luggage in my rental car (I had not yet checked in to my hotel). When I....
July 17, 2017
A client for whom I serve as CISO advisor posed an interesting question to me last week, “What if we measure and report on control maturity instead of....
March 15, 2017
Recently, the Office of the Comptroller of the Currency (OCC), released updated guidance for bank examiners as they scrutinize third-party risk....