Skip to main content
Sort By:

Managing Risk in a Digital Transformation (DX) World

Learn about importance of balancing risk against opportunity at the C-level.

See Details

Cybersecurity Dictionary

Explore the top terms in cybersecurity from core concepts to innovation.

See Details

The Truths and Myths about Cybersecurity Risk

Debunk risk management myths in order to build a truly resilient cybersecurity program.

See Details

IAM & PAM Myth Busters!

Webcast highlighting actual customer use cases, as well as dispelling perpetuated IAM and PAM myths vs. today’s realities.

See Details

Features of a Threat Intelligence Platform

A Threat Intelligence Platform (TIP) is a fantastic way to manage intelligence and its process amongst individual teams and communities, including cli...

See Details

Top 5 Risk Management Mistakes (And How To Fix Them)

Learn not only about the top risk management mistakes businesses make today, but how to fix them.

See Details

Need a Risk Management Transformation?

Transition from traditional risk management to a modern approach to ensure cybersecurity risk and business risk are aligned.

See Details

Security in 2019: Getting Ahead of the Game

The year 2018 was not much different than recent years in the world of security: Several massive security incidents at large companies and government ...

See Details

RISKY BUSINESS: Solving Cyber Insecurity with a Risk-Centric Business Model

Optiv’s Risky Business white paper discusses how risk management needs to transform to become a fundamental component of overall business objectives....

See Details

How Can We Help?

Let us know what you need, and we will have an Optiv professional contact you shortly.

Privacy Policy

Stay in the Know

For all the latest cybersecurity and Optiv news, subscribe to our blog and connect with us on Social.


Join our Email List

We take your privacy seriously and promise never to share your email with anyone.

Stay Connected

Find cybersecurity Events in your area.