A Single Partner for Everything You Need With more than 450 technology partners in its ecosystem, Optiv provides clients with best-in-class security technology and solutions that equip organizations to detect and manage cyber threats effectively and efficiently in today's growing attack surface. Optiv's Partner of the Year Awards recognize forward-thinking innovation, performance and growth, and unparalleled technology solutions.
We Are Optiv Greatness is every team working toward a common goal. Winning in spite of cyber threats and overcoming challenges in spite of them. It’s building for a future that only you can create or simply coming home in time for dinner. However you define greatness, Optiv is in your corner. We manage cyber risk so you can secure your full potential.
Explore Our Videos Showing 97 - 108 of 156 results Search Terms Type Type of VideoLinkedIn LiveVideoVlogWebinar Sort By Sort by LatestSort by Oldest Image Video Why Your Insider Risk Program Must Be Holistic: A conversation with Wendy Overton and James Turgal July 13, 2021 Optiv’s James Turgal and Wendy Overton discuss the most efficient ways to address insider risk. (Hint: you gotta eliminate silos.) Watch Video Image Video Phone-Pretexting - Mastering Social Engineering Savior-Faire May 27, 2021 I will discuss how to carry out phone pretexting calls for engagements, including how to begin reconnaissance, how to build a scenario, preparing for... Watch Video Image Video MDM The Blindspot You Didn't Know May 27, 2021 The Internet accessible single-factor attack surface is decreasing with the increased implementation of multi-factor. However, configuration of multi... Watch Video Image Video Detection of ScareCrow/EDR Bypass Payloads May 27, 2021 Present methods for potential detection of ScareCrow EDR Bypass payloads. Present pending work with EDR products, memory forensics, and share other... Watch Video Image Video Digital Dumpster Diving - Searching for Value in Scraped Paste Site Data May 27, 2021 In this talk, I will introduce the concepts of web scraping, how they apply to paste sites, and specific tools that I have used to gather data... Watch Video Image Video Is Your Application Sending Email as Securely as Possible? May 27, 2021 Many web applications use email as a mechanism for user verification, password resets, real time notifications and much more. But security testers and... Watch Video Image Video Purple Teaming Inside-Out May 27, 2021 For the past two years, we have been facilitating purple team exercises for our clients using a framework that we developed that simulates insider... Watch Video Image Video Security Impact of the Rapid Growth of IoT (Internet of Things) May 27, 2021 The emergence of IoT (Internet of Things) and mobile devices has multiplied in the past five years. In this 30 minute presentation, the impact of this... Watch Video Image Video The Evolution of Cloud Forensics and Incident Response May 26, 2021 With the adoption of cloud infrastructure rapidly changing our attack landscape, we find ourselves with SOC and IR teams asking for some of the same... Watch Video Image Video Rethink Remediation - Linear vs. Lifecycle May 26, 2021 Every organization takes part in some kind or remediation within their organization. Within Optiv's Threat, Vulnerability and Remediation practice, we... Watch Video Image Video Leveling Up Your Phishing Game On Modern Platforms May 26, 2021 Modern platforms are consistently developing new phishing detections to stop attackers and popular techniques are not going to cut it anymore. Aaron... Watch Video Image Video GraphQL Vulnerabilities May 26, 2021 GraphQL, an open-source data query language for APIs, has been becoming more prevalent in modern applications. A brief overview of the technology as... Watch Video Pagination First page « First Previous page ‹ Previous … Page 5 Page 6 Page 7 Page 8 Current page 9 Page 10 Page 11 Page 12 Page 13 Next page Next › Last page Last »
Image Video Why Your Insider Risk Program Must Be Holistic: A conversation with Wendy Overton and James Turgal July 13, 2021 Optiv’s James Turgal and Wendy Overton discuss the most efficient ways to address insider risk. (Hint: you gotta eliminate silos.)
Image Video Phone-Pretexting - Mastering Social Engineering Savior-Faire May 27, 2021 I will discuss how to carry out phone pretexting calls for engagements, including how to begin reconnaissance, how to build a scenario, preparing for...
Image Video MDM The Blindspot You Didn't Know May 27, 2021 The Internet accessible single-factor attack surface is decreasing with the increased implementation of multi-factor. However, configuration of multi...
Image Video Detection of ScareCrow/EDR Bypass Payloads May 27, 2021 Present methods for potential detection of ScareCrow EDR Bypass payloads. Present pending work with EDR products, memory forensics, and share other...
Image Video Digital Dumpster Diving - Searching for Value in Scraped Paste Site Data May 27, 2021 In this talk, I will introduce the concepts of web scraping, how they apply to paste sites, and specific tools that I have used to gather data...
Image Video Is Your Application Sending Email as Securely as Possible? May 27, 2021 Many web applications use email as a mechanism for user verification, password resets, real time notifications and much more. But security testers and...
Image Video Purple Teaming Inside-Out May 27, 2021 For the past two years, we have been facilitating purple team exercises for our clients using a framework that we developed that simulates insider...
Image Video Security Impact of the Rapid Growth of IoT (Internet of Things) May 27, 2021 The emergence of IoT (Internet of Things) and mobile devices has multiplied in the past five years. In this 30 minute presentation, the impact of this...
Image Video The Evolution of Cloud Forensics and Incident Response May 26, 2021 With the adoption of cloud infrastructure rapidly changing our attack landscape, we find ourselves with SOC and IR teams asking for some of the same...
Image Video Rethink Remediation - Linear vs. Lifecycle May 26, 2021 Every organization takes part in some kind or remediation within their organization. Within Optiv's Threat, Vulnerability and Remediation practice, we...
Image Video Leveling Up Your Phishing Game On Modern Platforms May 26, 2021 Modern platforms are consistently developing new phishing detections to stop attackers and popular techniques are not going to cut it anymore. Aaron...
Image Video GraphQL Vulnerabilities May 26, 2021 GraphQL, an open-source data query language for APIs, has been becoming more prevalent in modern applications. A brief overview of the technology as...