Every Solution You Can Imagine – and More
What cybersecurity solution do you need? From Zero Trust to ADR, IAM, risk/privacy, data protection, AppSec and threat, securing digital transformation, to resiliency and remediation, we can build the right program to help solve your challenges.
A Single Partner for Everything You Need
Optiv works with more than 450 world-class security technology partners. By putting you at the center of our unmatched ecosystem of people, products, partners and programs, we accelerate business progress like no other company can.
We Are Optiv
Greatness is every team working toward a common goal. Winning in spite of cyber threats and overcoming challenges in spite of them. It’s building for a future that only you can create or simply coming home in time for dinner.
However you define greatness, Optiv is in your corner. We manage cyber risk so you can secure your full potential.
Optiv Security Experts to Speak at Interop ITX 2017
Cyber Security Thought Leaders to Discuss Securing Enterprise Infrastructure, Third-Party Risk Management, Security Skills Shortages and Career Opportunities in IT Security
DENVER – May 15, 2017 - Optiv Security, a market-leading provider of end-to-end cyber security solutions, today announced that three of its security thought leaders—Sean Cordero, Peter Gregory and Dawn-Marie Hutchinson—will participate in four separate speaking sessions at Interop ITX Conference. Session topics include securing enterprise infrastructure, career opportunities in IT security, the security skills shortage and third-party risk management. The event will take place May 15-19, 2017 at the MGM Grand Conference Center in Las Vegas.
Securing Your Enterprise Infrastructure Who/Topic: As the traditional IT infrastructure evolves to add new networking capabilities, software-defined networks and virtualized server environments, the risks are changing as well. In this audience-involved presentation, Hutchinson, executive director, Office of the CISO, will discuss the latest threats to the corporate IT environment and how an organization can mitigate them. The session, which will take place during the conference’s two-day Dark Reading Cybersecurity Crash Course, is intended for CIOs, CTOs and IT professionals who must answer questions about their organization’s security posture and want a comprehensive update on the latest threats to develop a cross-system security strategy.When/Where: Monday, May 15 from 9:30 – 10:15 a.m. PDT, Room 121
Career Opportunities in IT SecurityWho/Topic: In this panel discussion, Hutchinson will share her insights on diversity in security trends, as well as training and certifications needed to take advantage of the latest happenings in online defense. Individuals interested in learning new skills to grow opportunities in the field should attend this session, which will be moderated by Dark Reading’s editor-in-chief, Tim Wilson.When/Where: Wednesday, May 17 from 11:40 a.m. – 12:40 p.m. PDT, Room 115
Surviving the Security Skills ShortageWho/Topic: In this panel discussion, Cordero, senior executive director, Office of the CISO, will share perspectives, lessons and strategies from his career as a CISO and advisor to the Fortune 50 on actionable steps leaders can take towards overcoming the cyber security talent shortage. Security leaders interested in learning tips on attracting, cultivating and retaining talented cyber security team members should attend this session which will be moderated by Dark Reading’s executive editor, Kelly Jackson Higgins.When/Where: Wednesday, May 17 from 11:40 a.m. – 12:40 p.m. PDT, Room 111
Herding Vendors: Implementing Third Party Risk ProgramsWho/Topic: The structure of most organizations’ information processing involves large numbers of third-party companies that have access to most critical and sensitive data. Even modest-sized organizations have hundreds of third parties. Without a mature structure for effective management of third parties, organizations fail to uncover and manage risks they would find unacceptable had they been known. In this session, Gregory, executive director, Office of the CISO, will discuss program strategies for managing third-party risk. Details discussed include: the concept of risk tiering, requests for evidence, on-site visits, remediation, assessments by expert security firms, and intrusive monitoring.When/Where: Friday, May 19 from 9:00 – 10:00 a.m. PDT, Room 111
Media wishing to interview Optiv experts should contact Lauren Howe at email@example.com or (443) 519-5455.
Optiv Security: Secure greatness.™
Optiv is the cyber advisory and solutions leader, delivering strategic and technical expertise to nearly 6,000 companies across every major industry. We partner with organizations to advise, deploy and operate complete cybersecurity programs from strategy and managed security services to risk, integration and technology solutions. With clients at the center of our unmatched ecosystem of people, products, partners and programs, we accelerate business progress like no other company can. At Optiv, we manage cyber risk so you can secure your full potential. For more information, visit www.optiv.com.
Let us know what you need, and we will have an Optiv professional contact you shortly.