Every Solution You Can Imagine – and More
What cybersecurity solution do you need? From Zero Trust to ADR, IAM, risk/privacy, data protection, AppSec and threat, securing digital transformation, to resiliency and remediation, we can build the right program to help solve your challenges.
A Single Partner for Everything You Need
Optiv works with more than 450 world-class security technology partners. By putting you at the center of our unmatched ecosystem of people, products, partners and programs, we accelerate business progress like no other company can.
We Are Optiv
Greatness is every team working toward a common goal. Winning in spite of cyber threats and overcoming challenges in spite of them. It’s building for a future that only you can create or simply coming home in time for dinner.
However you define greatness, Optiv is in your corner. We manage cyber risk so you can secure your full potential.
Optiv Security Ramps Up for Cloud Identity Summit
-- Optiv to Share Significant Expertise to Help Organizations More Successfully Address Identity at the Project, Problem and Strategy Levels --
Denver – June 6, 2016 - Optiv Security, a market-leading provider of end-to-end cyber security solutions, today announced that its security experts will participate in eight different sessions at the 2016 Cloud Identity Summit (CIS). The speakers will share insights based on their expertise in helping organizations plan, build and run successful cloud and identity-focused security programs. The summit is scheduled to take place June 6-9, 2016 at the New Orleans Marriott in Louisiana.
Identity Really is the New PerimeterWho/Topic: With the proliferation of advanced threats, juxtaposed against increased connectivity demands of employees, vendors, business partners and consumers; identity is being looked at more than ever as a layer of defense, and in many ways, as the new perimeter. In this session, Aubrey Turner, client solutions director, will discuss how various types of technology are adapting to embrace this paradigm, and high-level approaches to prepare and react to this evolving security model.When/Where: Monday, June 6 from 4:15 – 4:40 p.m. CST/Salon E
Identity. It's Not Just a Thing, It's Integrated into EverythingWho/Topic: Many organizations have made investments in identity and access management (IAM) to support functions like user lifecycle management, identity governance or single sign-on. The identity industry is evolving, and identity is becoming the critical core of any security strategy. Attendees of this session led by Robert Block, vice president, strategic solutions, will learn how expanding the role of identity in their environment can revolutionize their approach to cyber security.When/Where: Tuesday, June 7 from 9:30 – 9:55 a.m. CST/Salon E
CISO & Identity = (Oil & Water) or (Oil & Vinegar) and What that Means to Your OrganizationWho/Topic: Too many CISOs do not embrace identity and its importance to a successful cyber security program, making the CISO and identity seem like oil and vinegar. During this session, Larry Whiteside Jr., vice president, executive strategy, healthcare and critical infrastructure solutions, will explain how oil and vinegar are not just great on salads, but also vital for the success of a CISO’s cyber security strategy.When/Where: Tuesday, June 7 from 10:40 – 11:05 a.m. CST/Salon E
“Optivized” Cloud Security – Establishing the Pillars for a Successful CloudSec ProgramWho/Topic: The adoption of cloud computing is a clear reaction to enterprises’ need for agility, elasticity and cost-effective IT solutions. In mature organizations, security professionals are in a rare position to address security early on in adoption cycles or even propose more secure alternatives that enable the adoption of innovative IT delivery. JD Sherry, vice president, strategy and innovation, will inform attendees about the common pillars one should include in their cloud security strategy.When/Where: Tuesday, June 7 from 2:30 – 2:55 p.m. CST/Salon E
Panel: Federated Identity for Large Scale DeploymentsWho/Topic: With the rise of cloud-based business and customer portals, enterprises need to be prepared to serve an exploding number of constituents, while also providing single sign-on and seamless UX for all users. In this session, Joe Greene, director, information security, and a panel of experts will lay out some key advantages of identity virtualization through the lens of federation and discuss the enhanced infrastructure speed, flexibility and security their respective IAM teams were able to achieve.When/Where: Wednesday, June 8 from 10:55 – 11:20 a.m. CST/Studio 1/2
Keynote Panel: Identity Defined Security – Enabling the R/evolutionWho/Topic: The traditional IT security approach of putting trusted users, devices and applications behind a single perimeter is no longer sufficient. In our increasingly decentralized, deperimeterized, 'bring-your-own-anything' world, we need a better approach to protect users, customers, data and assets. In this panel featuring Robert Block, leaders from the Identity Defined Security Alliance will discuss this new approach to security and how it can help deliver a better and safer experience.When/Where: Wednesday, June 8 from 5:30 – 6:00 p.m. CST/Grand Ballroom
Secure DevOps – Shared ResponsibilityWho/Topic: Infrastructure as a Service (IaaS) assets are completely under your control and require you to perform all of the necessary security configuration and management tasks. Today’s IT and security organizations see the world of IaaS through a variety of lenses depending on the charter the business has given them to transform how they deliver IT services. In this session, JD Sherry will walk attendees through some of the thoughtful considerations about how to secure these services and not slow down the speed of adoption of cloud infrastructure.When/Where: Thursday, June 9 from 9:30 – 9:55 a.m. CST/Salon E
Cloud Security Program, Best in Breed?Who/Topic: More and more organizations are in the process of planning, building or running a cloud security program. Whether identifying, encrypting, protecting or securing data in today's enterprises, Tim Benner, senior client solutions architect, will help session attendees craft an effective plan using the best-in-breed technology.When/Where: Thursday, June 9 from 10:40 – 11:05 a.m. CST/Salon E
Optiv recently expanded its leadership position in IAM with its acquisition of IAM solutions and services provider Advancive. The transaction helped Optiv create the industry’s deepest and broadest bench of IAM experts with experience in and capabilities across an extensive technology portfolio. The move also gave Optiv additional expertise to develop new and innovative IAM services and solutions to better help clients plan, build and run holistic IAM security programs that meet their specific business needs.
Optiv is proud to be a founding security sponsor of the CIS and will exhibit at booth number one. Media wishing to interview Optiv’s experts should contact Jennifer Torode at email@example.com or (781) 672-3119.
Optiv Security: Secure greatness.®
Optiv is the cyber advisory and solutions leader, delivering strategic and technical expertise to nearly 6,000 companies across every major industry. We partner with organizations to advise, deploy and operate complete cybersecurity programs from strategy and managed security services to risk, integration and technology solutions. With clients at the center of our unmatched ecosystem of people, products, partners and programs, we accelerate business progress like no other company can. At Optiv, we manage cyber risk so you can secure your full potential. For more information, visit www.optiv.com.
Let us know what you need, and we will have an Optiv professional contact you shortly.