Every Solution You Can Imagine – and More What cybersecurity solution do you need? From Zero Trust to ADR, IAM, risk/privacy, data protection, AppSec and threat, securing digital transformation, to resiliency and remediation, we can build the right program to help solve your challenges.
A Single Partner for Everything You Need Optiv works with more than 400 world-class security technology partners. By putting you at the center of our unmatched ecosystem of people, products, partners and programs, we accelerate business progress like no other company can.
We Are Optiv Greatness is every team working toward a common goal. Winning in spite of cyber threats and overcoming challenges in spite of them. It’s building for a future that only you can create or simply coming home in time for dinner. However you define greatness, Optiv is in your corner. We manage cyber risk so you can secure your full potential.
Image Up-to-date information and research on red and blue team security capabilities, objective tools analysis, new research and step-by-step solutions. The Source Zero® platform is a community of Optiv’s skilled individuals doing research and sharing their expertise. The Source Zero Tools are resources that provide actionable support and demonstrations around research initiatives. Image Search Terms Type - Any -BlogToolVideo Team - Any -RedBluePurple/No Team Sort By LatestOldest Image Rethink Remediation - Linear vs. Lifecycle June 01, 2022 Every organization takes part in some kind or remediation within their organization. Within Optiv's Threat, Vulnerability and Remediation practice, we... See Details Video Image Leveling Up Your Phishing Game On Modern Platforms June 01, 2022 Modern platforms are consistently developing new phishing detections to stop attackers and popular techniques are not going to cut it anymore. Aaron... See Details Video Image GraphQL Vulnerabilities June 01, 2022 GraphQL, an open-source data query language for APIs, has been becoming more prevalent in modern applications. A brief overview of the technology as... See Details Video Image Practical Password Guessing Workshop June 01, 2022 Whether you are a pro, or just getting starting, red team or blue team. Or maybe just want to learn how attackers can compromise various network... See Details Video Image OSINT: Discovery and Profiling for Pentesters June 01, 2022 OSINT can encompass the investigation of an individual, groups of people and/or organizations, all which require the application of different toolsets... See Details Video Image Open Source Forensic Threat Hunting June 01, 2022 In this session I will demonstrate the use of open source software Judge Jury and Executable to acquire forensic data into a database where we will... See Details Video Image Accelerating Vulnerability Remediation with Automation June 01, 2022 Using Microsoft Automation to bridge technology gaps and fully automate vulnerability discovery to remediation with the assistance of RPA. See Details Video Image Creating a Shared Reality - Ad-hoc Intelligence Collection for Emerging Threats June 01, 2022 This talk is built from the background of how the EIM practice rapidly collected and consolidated threat intelligence from myriad sources following... See Details Video Image Reversing Automotive 8051 June 01, 2022 In this session I will cover adventures in reverse engineering intel 8051 assembly code for the engine control unit on an old Bosch Motronic unit. See Details Video Image Intro to Burp Suite June 01, 2022 Burp Suite is one of the most popular tools in a hacker's toolkit. From security researchers to bug bounty hunters, Burp is used by information... See Details Video Image Remaining Invisible in the Age of EDR June 01, 2022 EDR products are becoming a necessary solution in the security stack. In this session you will learn the short comings of EDR, so you can make... See Details Video Image Cloud Pen Test 101 June 01, 2022 High level overview of the most popular cloud platforms GCP, Azure, and AWS. Explain the benefits and why companies are moving services and data into... See Details Video Pagination First page « First Previous page ‹ Previous Page 1 Current page 2 Page 3 Page 4 Page 5 Page 6 Page 7 Page 8 Next page Next › Last page Last » Introducing Source Zero Our new technical cybersecurity thought leadership resource, Source Zero, focuses on red and blue team security capabilities, objective tools analysis, and more.
Image Rethink Remediation - Linear vs. Lifecycle June 01, 2022 Every organization takes part in some kind or remediation within their organization. Within Optiv's Threat, Vulnerability and Remediation practice, we... See Details Video
Image Leveling Up Your Phishing Game On Modern Platforms June 01, 2022 Modern platforms are consistently developing new phishing detections to stop attackers and popular techniques are not going to cut it anymore. Aaron... See Details Video
Image GraphQL Vulnerabilities June 01, 2022 GraphQL, an open-source data query language for APIs, has been becoming more prevalent in modern applications. A brief overview of the technology as... See Details Video
Image Practical Password Guessing Workshop June 01, 2022 Whether you are a pro, or just getting starting, red team or blue team. Or maybe just want to learn how attackers can compromise various network... See Details Video
Image OSINT: Discovery and Profiling for Pentesters June 01, 2022 OSINT can encompass the investigation of an individual, groups of people and/or organizations, all which require the application of different toolsets... See Details Video
Image Open Source Forensic Threat Hunting June 01, 2022 In this session I will demonstrate the use of open source software Judge Jury and Executable to acquire forensic data into a database where we will... See Details Video
Image Accelerating Vulnerability Remediation with Automation June 01, 2022 Using Microsoft Automation to bridge technology gaps and fully automate vulnerability discovery to remediation with the assistance of RPA. See Details Video
Image Creating a Shared Reality - Ad-hoc Intelligence Collection for Emerging Threats June 01, 2022 This talk is built from the background of how the EIM practice rapidly collected and consolidated threat intelligence from myriad sources following... See Details Video
Image Reversing Automotive 8051 June 01, 2022 In this session I will cover adventures in reverse engineering intel 8051 assembly code for the engine control unit on an old Bosch Motronic unit. See Details Video
Image Intro to Burp Suite June 01, 2022 Burp Suite is one of the most popular tools in a hacker's toolkit. From security researchers to bug bounty hunters, Burp is used by information... See Details Video
Image Remaining Invisible in the Age of EDR June 01, 2022 EDR products are becoming a necessary solution in the security stack. In this session you will learn the short comings of EDR, so you can make... See Details Video
Image Cloud Pen Test 101 June 01, 2022 High level overview of the most popular cloud platforms GCP, Azure, and AWS. Explain the benefits and why companies are moving services and data into... See Details Video