A Single Partner for Everything You Need With more than 450 technology partners in its ecosystem, Optiv provides clients with best-in-class security technology and solutions that equip organizations to detect and manage cyber threats effectively and efficiently in today's growing attack surface. Optiv's Partner of the Year Awards recognize forward-thinking innovation, performance and growth, and unparalleled technology solutions.
We Are Optiv Greatness is every team working toward a common goal. Winning in spite of cyber threats and overcoming challenges in spite of them. It’s building for a future that only you can create or simply coming home in time for dinner. However you define greatness, Optiv is in your corner. We manage cyber risk so you can secure your full potential.
Explore Our Videos Showing 109 - 120 of 156 results Search Terms Type Type of VideoLinkedIn LiveVideoVlogWebinar Sort By Sort by LatestSort by Oldest Image Video Practical Password Guessing Workshop May 26, 2021 Whether you are a pro, or just getting starting, red team or blue team. Or maybe just want to learn how attackers can compromise various network... Watch Video Image Video OSINT: Discovery and Profiling for Pentesters May 26, 2021 OSINT can encompass the investigation of an individual, groups of people and/or organizations, all which require the application of different toolsets... Watch Video Image Video Deep Dive Into Android Static Analysis and Exploitation May 26, 2021 The talk will highlight some of the common mistakes made by developers while coding mobile applications and how attackers can exploit them. We will... Watch Video Image Video Get Off My wLan - Hacking Wireless Networks May 26, 2021 As enterprises modernize their wireless technology, new attacks have developed on the horizon. The presentation will cover WiFi terminology, various... Watch Video Image Video Legacy Attack Surface in the Modern Enterprise May 26, 2021 With a heavy focus on monitoring, host based detection and attack prevention, much of a legacy attack surface still remains. MitM attacks utilizing... Watch Video Image Video Open Source Forensic Threat Hunting May 25, 2021 In this session I will demonstrate the use of open source software Judge Jury and Executable to acquire forensic data into a database where we will... Watch Video Image Video Accelerating Vulnerability Remediation with Automation May 25, 2021 Using Microsoft Automation to bridge technology gaps and fully automate vulnerability discovery to remediation with the assistance of RPA. Watch Video Image Video Creating a Shared Reality - Ad-hoc Intelligence Collection for Emerging Threats May 25, 2021 This talk is built from the background of how the EIM practice rapidly collected and consolidated threat intelligence from myriad sources following... Watch Video Image Video Reversing Automotive 8051 May 25, 2021 In this session I will cover adventures in reverse engineering intel 8051 assembly code for the engine control unit on an old Bosch Motronic unit. Watch Video Image Video Intro to Burp Suite May 25, 2021 Burp Suite is one of the most popular tools in a hacker's toolkit. From security researchers to bug bounty hunters, Burp is used by information... Watch Video Image Video Remaining Invisible in the Age of EDR May 25, 2021 EDR products are becoming a necessary solution in the security stack. In this session you will learn the short comings of EDR, so you can make... Watch Video Image Video Cloud Pen Test 101 May 25, 2021 High level overview of the most popular cloud platforms GCP, Azure, and AWS. Explain the benefits and why companies are moving services and data into... Watch Video Pagination First page « First Previous page ‹ Previous … Page 5 Page 6 Page 7 Page 8 Page 9 Current page 10 Page 11 Page 12 Page 13 Next page Next › Last page Last »
Image Video Practical Password Guessing Workshop May 26, 2021 Whether you are a pro, or just getting starting, red team or blue team. Or maybe just want to learn how attackers can compromise various network...
Image Video OSINT: Discovery and Profiling for Pentesters May 26, 2021 OSINT can encompass the investigation of an individual, groups of people and/or organizations, all which require the application of different toolsets...
Image Video Deep Dive Into Android Static Analysis and Exploitation May 26, 2021 The talk will highlight some of the common mistakes made by developers while coding mobile applications and how attackers can exploit them. We will...
Image Video Get Off My wLan - Hacking Wireless Networks May 26, 2021 As enterprises modernize their wireless technology, new attacks have developed on the horizon. The presentation will cover WiFi terminology, various...
Image Video Legacy Attack Surface in the Modern Enterprise May 26, 2021 With a heavy focus on monitoring, host based detection and attack prevention, much of a legacy attack surface still remains. MitM attacks utilizing...
Image Video Open Source Forensic Threat Hunting May 25, 2021 In this session I will demonstrate the use of open source software Judge Jury and Executable to acquire forensic data into a database where we will...
Image Video Accelerating Vulnerability Remediation with Automation May 25, 2021 Using Microsoft Automation to bridge technology gaps and fully automate vulnerability discovery to remediation with the assistance of RPA.
Image Video Creating a Shared Reality - Ad-hoc Intelligence Collection for Emerging Threats May 25, 2021 This talk is built from the background of how the EIM practice rapidly collected and consolidated threat intelligence from myriad sources following...
Image Video Reversing Automotive 8051 May 25, 2021 In this session I will cover adventures in reverse engineering intel 8051 assembly code for the engine control unit on an old Bosch Motronic unit.
Image Video Intro to Burp Suite May 25, 2021 Burp Suite is one of the most popular tools in a hacker's toolkit. From security researchers to bug bounty hunters, Burp is used by information...
Image Video Remaining Invisible in the Age of EDR May 25, 2021 EDR products are becoming a necessary solution in the security stack. In this session you will learn the short comings of EDR, so you can make...
Image Video Cloud Pen Test 101 May 25, 2021 High level overview of the most popular cloud platforms GCP, Azure, and AWS. Explain the benefits and why companies are moving services and data into...