Every Solution You Can Imagine – and More
What cybersecurity solution do you need? From Zero Trust to ADR, IAM, risk/privacy, data protection, AppSec and threat, securing digital transformation, to resiliency and remediation, we can build the right program to help solve your challenges.
A Single Partner for Everything You Need
Optiv works with more than 400 world-class security technology partners. By putting you at the center of our unmatched ecosystem of people, products, partners and programs, we accelerate business progress like no other company can.
We Are Optiv
Greatness is every team working toward a common goal. Winning in spite of cyber threats and overcoming challenges in spite of them. It’s building for a future that only you can create or simply coming home in time for dinner.
However you define greatness, Optiv is in your corner. We manage cyber risk so you can secure your full potential.
Optiv Security Gears Up for RSA Conference 2016
-- Optiv Experts to Share Insights on Women in Cyber Security, the Evolution of the CISO, Endpoint Security, Personal Security and Techniques on Lateral Movement --
Denver – February 23, 2016 - Optiv Security, a leading provider of end-to-end cyber security solutions, today announced several of its industry-leading experts will participate in six different sessions at RSA Conference 2016. The experts will share insights based on their expertise from delivering the industry’s most holistic, programmatic cyber security solutions to clients around the world. Session topics include retaining women in the industry, evolution of the CISO, endpoint strategy, personal security and privacy, and techniques on lateral movement. The event will take place from Feb. 29 to Mar. 4 at the Moscone Center in San Francisco.
Should I Stay or Should I Go? How to Attract/Retain Women in the Industry
Who/Topic: Ping Look, director, information security, will join a panel discussion that will provide insight into the findings of the 2015 (ISC)2 Global Information Security Workforce Study and discuss how these findings relate to real-world experiences for women in security. The panel will provide thought-provoking discussion on the importance of driving initiatives to reach young women entering the profession, and ways to attract/retain women in this industry.
When/Where: Monday, February 29 from 1:50 – 2:50 p.m. PT/West Room: 3014
Track: Professional Development
From Cave Man to Business Man, the Evolution of the CISO to CIRO
Who/Topic: James Christiansen, vice president, information risk management, will present on how the CISO is evolving to CIRO. His session will focus on how successful IT security leaders are transforming their skills to meet the demands for today and future needs of their organization.
When/Where: Monday, February 29 from 3:00 – 3:50 p.m. PT/West Room: 3014
Track: Professional Development
Detection, Prevention and Response Strategy: The Return of the Endpoint
Who/Topic: After many years of neglect, enterprises once again are switching their focus and budgets to deployment of next-generation endpoint security technologies to help address the lack of continuous visibility and rapid response functionality they miss with existing technologies. During this panel discussion, Rafal Los, managing director, solutions research and development, will debate the importance of security from the endpoint perspective and discuss strategies that bring together endpoint and network security capabilities to holistically define protection schemes that solve real problems.
When/Where: Tuesday, March 1 from 3:30 – 4:20 p.m. PT/West Room: 3002
Track: Technology Infrastructure & Operations
Privacy Perspectives: How It’s Lost and the Implications
Who/Topic: Florindo Gallicchio, executive director, Office of the CISO, will co-present on how privacy and security are not fixed points but rather moving points we must continually assess and reframe.
When/Where: Thursday, March 3 from 10:20 – 11:10 a.m. PT/West Room: 3014
Track: RSAC Studio
Who/Topic: In today’s threat landscape, the attacker’s goal is to become trusted. Whether a state-sponsored actor or cybercriminal, attackers typically first compromise the endpoint with a client-side exploit and then pivot. In this presentation, Jonathan Trull, vice president, information security, will take a deep dive into how attackers pivot through organizations, identify the telltale signs of a pivot, and most importantly, identify steps for defending against it.
When/Where: Friday, March 4 from 10:10 – 11:00 a.m. PT/West Room: 2006
Track: Analytics & Incident Response
Got Coverage? Cyber-Insurance Realities Revealed
Who/Topic: Cyber-insurance, although around since the 90s, is increasingly being discussed and provisioned by the executive leadership team. Cyber-insurance is not a replacement for a solid security strategy and program. Blake Huebner, vice president, security education and awareness, will join this panel discussion of realities from the insurer, legal and CISO viewpoints.
When/Where: Friday, March 4 from 10:10 – 11:00 a.m. PT/West Room: 2018
Optiv is proud to exhibit at RSA Conference 2016 at booth 1715. Media wishing to interview any Optiv experts are encouraged to contact Lauren Howe at email@example.com or (443) 519-5455.
Optiv Security: Secure greatness.™
Optiv is the cyber advisory and solutions leader, delivering strategic and technical expertise to more than 7,000 companies across every major industry. We partner with organizations to advise, deploy and operate complete cybersecurity programs from strategy and managed security services to risk, integration and technology solutions. With clients at the center of our unmatched ecosystem of people, products, partners and programs, we accelerate business progress like no other company can. At Optiv, we manage cyber risk so you can secure your full potential. For more information, visit www.optiv.com.
Let us know what you need, and we will have an Optiv professional contact you shortly.