A Single Partner for Everything You Need Optiv works with more than 450 world-class security technology partners. By putting you at the center of our unmatched ecosystem of people, products, partners and programs, we accelerate business progress like no other company can.
We Are Optiv Greatness is every team working toward a common goal. Winning in spite of cyber threats and overcoming challenges in spite of them. It’s building for a future that only you can create or simply coming home in time for dinner. However you define greatness, Optiv is in your corner. We manage cyber risk so you can secure your full potential.
Source Zero Con Video Hub Attack and Penetration Videos Cyber Resilience and Incident Response Videos Cyber Threat Intelligence Videos Application Security Videos Source Zero Con is a virtual event bringing the technical community together to educate future security leaders. This video repository features the latest presentations and interactive workshops led by Optiv’s Source Zero research and innovation team. Browse the archives for expert insights on emergent security concepts and capabilities from various practices, including Attack and Penetration, Application Security, Cyber Threat Intelligence, Digital Forensics and Incident Response. Stay up to date on red and blue team tools and solutions. Visit Source Zero Attack and Penetration View the Source Zero playlist on YouTube AI for Red Teamers (What It Looks Like When the Matrix Actually Comes for You) Speaker: Tim Elrod Watch Video Breaking Into the Cloud Speaker: Aaron Martin & Savannah Lazzara Watch Video LOLBins – The Quieter Way Speaker: Mattia Campagnano Watch Video Hacking a Bird Speaker: Tim Fake Watch Video Deliberate Engagements – Using USAF Ops Battle Rhythm for Pen Testing Speaker: John Quadrino Watch Video Pre-Windows 2000 Backdoors and Bypasses Speaker: Garrett Foster Watch Video Do You Know What Your API is Doing? Speaker: Bryce Harty Watch Video Automating Offensive Security Infrastructure Speaker: Joe Berry Watch Video Current State of Linux Rootkits Speaker: Phillip Haas Watch Video Gaining a Foothold: Penetration Testing as a Second Career Speaker: William Giles Watch Video Cyber Resilience and Incident Response View the Source Zero playlist on YouTube This Talk is About Incident Response Processes Speaker: Curtis Fechner Watch Video Cyber Insurance: Why It’s an Asset NOT a Liability in a Cyber Event Speaker: Dara Gibson Watch Video How to Use AI for Decision Making for Vulnerability Remediation Planning Speaker: David Halka Watch Video Optiv Vulnerability Management Maturity Model Speaker: Luis Castillo Watch Video Don’t [You] Forget About [Me]…(or Forgotten Components of a Vulnerability Management Program Speaker: Vince Pascale Watch Video Business Email Compromise (BEC) & Phishing Investigations in Office365 Speaker: Justin Safa Watch Video Ransomware: An Epidemic for the Digital Age Speaker: Matthew Waddell Watch Video Cyber Insurance – Panacea or a House of Cards? Speaker: Bill Young Watch Video Cyber Threat Intelligence View the Source Zero playlist on YouTube Vertical Risk Reports and You: Practical Applications of Cyber Threat Intelligence Speaker: Emily Lee & Nick Hyatt Watch Video The “I” in CTI: “Intelligence” or Just “Information”. Re-applying Risk and Fundamentals Back into Intelligence Speaker: Aamil Karimi Watch Video One Piece at a Time: A Guide to Building a CTI Program Speaker: Nick Hyatt Watch Video Application Security View the Source Zero playlist on YouTube The Nooks and Crannies of AppSec Programs Speaker: John Tsangaris Watch Video Ghost in the Machine: Adversarial AI Attacks Speaker: Nikhil Ollukaren Watch Video Securing Your AWS Cloud: Best Practices and Pentesting Techniques Speaker: Prasad Nadkarni Watch Video Is Your SBOM a Dud or Da Bomb Speaker: Doug Rogahn Watch Video Assessing iOS Application Speaker: Vandan Pathak Watch Video Software Composition Analysis: Tools and Techniques Speaker: Rushyendra Reddy Induri Watch Video Security Risks with Low-Code and No-Code Application Development Platforms Speaker: Dan Sharp Watch Video Developers Gone Wild Speaker: Tim Farley Watch Video (Security) Culture Eats Strategy for Breakfast Speaker: Brendon Collins Watch Video Managing Perspectives for Assessment Reports with Few or Zero Findings Speaker: Mayank Singh Watch Video Looking for Red and Blue Team Tools and Solutions? Visit Source Zero Contact Us
Would you like to speak to an advisor? Let's Talk Cybersecurity Provide your contact information and we will follow-up shortly. Let's Browse Cybersecurity Just looking? Explore how Optiv serves its ~6,000 clients. Show me AI Security Solutions Show me the Optiv brochure Take me to Optiv's Events page Browse all Services