Every Solution You Can Imagine – and More
What cybersecurity solution do you need? From Zero Trust to ADR, IAM, risk/privacy, data protection, AppSec and threat, securing digital transformation, to resiliency and remediation, we can build the right program to help solve your challenges.
A Single Partner for Everything You Need
Optiv works with more than 450 world-class security technology partners. By putting you at the center of our unmatched ecosystem of people, products, partners and programs, we accelerate business progress like no other company can.
We Are Optiv
Greatness is every team working toward a common goal. Winning in spite of cyber threats and overcoming challenges in spite of them. It’s building for a future that only you can create or simply coming home in time for dinner.
However you define greatness, Optiv is in your corner. We manage cyber risk so you can secure your full potential.
This report offers insight into critical threat activities, threat actors and topics crucial to breach prevention, plus recommendations you should consider when making decisions about your cybersecurity programs and investments, as well as risk management.
Inspired by national intelligence estimates (analytical reports produced by the intelligence community of the United States for Congress), our report addresses evolving technology, threat actor updates and regulatory changes to keep you abreast of the latest global threat trends. Dig into the 2020 CTIE for:
By applying the best-practice recommendations provided by our CTIE report, decision-makers and influencers can strengthen their cybersecurity strategies and operations. For organizations that collect and analyze their threat intelligence, the information assembled here can validate and augment their findings.
*This report includes contributions from Carbon Black, Digital Shadows, Optiv’s Global Threat Intelligence Center (gTIC), Palo Alto Networks’ global threat intelligence team, SailPoint, Unit 42 and VMware.
The COVID-19 Effect
Attack Tools, Techniques
The COVID-19 pandemic has had and will continue to have, profound, long-lasting effects on organizations and people. Remote access and worker support have created new and novel vulnerabilities. This massive attack surface expansion maintained business continuity but came with security and risk concerns. The CTIE offers specific insights and guidance.
Experts from contributing partners collected cyber-activity statistics from thousands of clients. The resulting report clearly articulates key activities, events and trends.
Content The CTIE examines the industries with the most incidents and explores the specific details.
Content The correlation and analysis of TTPs helps analysts diagnose the “who” and “why” behind cyber attacks. Important TTPs involve cryptomining, IoT attack methods, cyber espionage and malware. The report discusses:
Optiv and select partners discuss what happened and what might happen, offering recommendations for improving your cybersecurity programs.
Critical CTIE Data Around the Who, What, Where and How
Optiv’s CTO, Todd Weber, discusses the company’s 2020 Cyber Threat Intelligence Estimate report, which provides an expert data-provisioned summary of today’s key threat activities, threat actors and topics crucial to current data breach prevention.
Verticals Most Impacted in the COVID-19 Era
Optiv and Digital Shadows’ Threat Researcher Kacey Clark discuss COVID-19 and the impact it has had to date on the Technology and Financial Services industries, as revealed in this year’s Optiv CTIE.
Compliance and Incident Response: Relieving New Pressure
Your IoT is Too Open
Remote Work, Identity Changes and Security Concerns
Here’s a comprehensive view of the cyber-threat landscape to help you mitigate risk and strengthen defenses.
A Visual History of Cybersecurity
From Commodore 64 to COVID-19, from ARPANET to 2020, the most unprecedented year most of us can remember, our new Visual History of Cybersecurity...
Timeline: COVID-19 Impact on Cybersecurity
Understanding the COVID timeline helps us plan for what our post-pandemic world will look like.
Explore the top terms in cybersecurity from core concepts to innovation.