A Single Partner for Everything You Need With more than 450 technology partners in its ecosystem, Optiv provides clients with best-in-class security technology and solutions that equip organizations to detect and manage cyber threats effectively and efficiently in today's growing attack surface. Optiv's Partner of the Year Awards recognize forward-thinking innovation, performance and growth, and unparalleled technology solutions.
We Are Optiv Greatness is every team working toward a common goal. Winning in spite of cyber threats and overcoming challenges in spite of them. It’s building for a future that only you can create or simply coming home in time for dinner. However you define greatness, Optiv is in your corner. We manage cyber risk so you can secure your full potential.
Explore Our Videos Showing 97 - 108 of 164 results Search Terms Type Type of VideoLinkedIn LiveVideoVlogWebinar Sort By Sort by LatestSort by Oldest Image Video Optiv’s Cyber Recovery Solution (CRS) Explained June 03, 2022 Learn how Optiv’s Cyber Recovery Solution can help you get back to business — faster. Watch Video Image Video The Optiv CRS Story May 31, 2022 Our cybersecurity strategy experts discuss what CRS is and how it works to enable faster business recovery. Watch Video Image Video Zero Trust March 15, 2022 Optiv Zero Trust is risk-based, identity-driven security for the modern network. Watch Video Image Video Advanced Detection & Response March 14, 2022 Threat detection and response should be intelligence-based, bespoke and responsive. Our tailored ADR helps you find and neutralize threats quickly. Watch Video Image Webinar Nation States as Threat Actors February 23, 2022 In this video, James Turgal and Nycki Brooks stress the need for U.S. organizations to understand the cyber attack strategies of nation-state... Watch Video Image Video Cloud Transformation Journey Interview With Jeff Stewart January 20, 2022 Optiv’s Jeff Stewart explains the cloud security services journey’s five phases: discovery, design, construct, simplify and accelerate. Watch Video Image Video C-FAR (See Far) October 05, 2021 To thrive in a new digital future you must be able to see far (C-FAR): establish CLARITY, cultivate FORESIGHT, create AGILITY and build RESILIENCE. Watch Video Image Vlog Protecting IoT if You Work From Home: Q&A with Sean Tufts September 07, 2021 Cybersecurity Awareness Month Week 2: the growing challenges of IoT in work-from-home environments. Watch Video Image Video Why Your Insider Risk Program Must Be Holistic: A conversation with Wendy Overton and James Turgal July 13, 2021 Optiv’s James Turgal and Wendy Overton discuss the most efficient ways to address insider risk. (Hint: you gotta eliminate silos.) Watch Video Image Video Phone-Pretexting - Mastering Social Engineering Savior-Faire May 27, 2021 I will discuss how to carry out phone pretexting calls for engagements, including how to begin reconnaissance, how to build a scenario, preparing for... Watch Video Image Video MDM The Blindspot You Didn't Know May 27, 2021 The Internet accessible single-factor attack surface is decreasing with the increased implementation of multi-factor. However, configuration of multi... Watch Video Image Video Detection of ScareCrow/EDR Bypass Payloads May 27, 2021 Present methods for potential detection of ScareCrow EDR Bypass payloads. Present pending work with EDR products, memory forensics, and share other... Watch Video Pagination First page « First Previous page ‹ Previous … Page 5 Page 6 Page 7 Page 8 Page 9 Page 10 Page 11 Page 12 Page 13 … Next page Next › Last page Last »
Image Video Optiv’s Cyber Recovery Solution (CRS) Explained June 03, 2022 Learn how Optiv’s Cyber Recovery Solution can help you get back to business — faster.
Image Video The Optiv CRS Story May 31, 2022 Our cybersecurity strategy experts discuss what CRS is and how it works to enable faster business recovery.
Image Video Zero Trust March 15, 2022 Optiv Zero Trust is risk-based, identity-driven security for the modern network.
Image Video Advanced Detection & Response March 14, 2022 Threat detection and response should be intelligence-based, bespoke and responsive. Our tailored ADR helps you find and neutralize threats quickly.
Image Webinar Nation States as Threat Actors February 23, 2022 In this video, James Turgal and Nycki Brooks stress the need for U.S. organizations to understand the cyber attack strategies of nation-state...
Image Video Cloud Transformation Journey Interview With Jeff Stewart January 20, 2022 Optiv’s Jeff Stewart explains the cloud security services journey’s five phases: discovery, design, construct, simplify and accelerate.
Image Video C-FAR (See Far) October 05, 2021 To thrive in a new digital future you must be able to see far (C-FAR): establish CLARITY, cultivate FORESIGHT, create AGILITY and build RESILIENCE.
Image Vlog Protecting IoT if You Work From Home: Q&A with Sean Tufts September 07, 2021 Cybersecurity Awareness Month Week 2: the growing challenges of IoT in work-from-home environments.
Image Video Why Your Insider Risk Program Must Be Holistic: A conversation with Wendy Overton and James Turgal July 13, 2021 Optiv’s James Turgal and Wendy Overton discuss the most efficient ways to address insider risk. (Hint: you gotta eliminate silos.)
Image Video Phone-Pretexting - Mastering Social Engineering Savior-Faire May 27, 2021 I will discuss how to carry out phone pretexting calls for engagements, including how to begin reconnaissance, how to build a scenario, preparing for...
Image Video MDM The Blindspot You Didn't Know May 27, 2021 The Internet accessible single-factor attack surface is decreasing with the increased implementation of multi-factor. However, configuration of multi...
Image Video Detection of ScareCrow/EDR Bypass Payloads May 27, 2021 Present methods for potential detection of ScareCrow EDR Bypass payloads. Present pending work with EDR products, memory forensics, and share other...