Every Solution You Can Imagine – and More What cybersecurity solution do you need? From Zero Trust to ADR, IAM, risk/privacy, data protection, AppSec and threat, securing digital transformation, to resiliency and remediation, we can build the right program to help solve your challenges.
A Single Partner for Everything You Need Optiv works with more than 400 world-class security technology partners. By putting you at the center of our unmatched ecosystem of people, products, partners and programs, we accelerate business progress like no other company can.
We Are Optiv Greatness is every team working toward a common goal. Winning in spite of cyber threats and overcoming challenges in spite of them. It’s building for a future that only you can create or simply coming home in time for dinner. However you define greatness, Optiv is in your corner. We manage cyber risk so you can secure your full potential.
Image Up-to-date information and research on red and blue team security capabilities, objective tools analysis, new research and step-by-step solutions. The Source Zero® platform is a community of Optiv’s skilled individuals doing research and sharing their expertise. The Source Zero Tools are resources that provide actionable support and demonstrations around research initiatives. Image Search Terms Type - Any -BlogToolVideo Team - Any -RedBluePurple/No Team Sort By LatestOldest Image Phone-Pretexting - Mastering Social Engineering Savior-Faire June 02, 2022 I will discuss how to carry out phone pretexting calls for engagements, including how to begin reconnaissance, how to build a scenario, preparing for... See Details Video Image MDM The Blindspot You Didn't Know June 02, 2022 The Internet accessible single-factor attack surface is decreasing with the increased implementation of multi-factor. However, configuration of multi... See Details Video Image Detection of ScareCrow/EDR Bypass Payloads June 02, 2022 Present methods for potential detection of ScareCrow EDR Bypass payloads. Present pending work with EDR products, memory forensics, and share other... See Details Video Image Digital Dumpster Diving - Searching for Value in Scraped Paste Site Data June 02, 2022 In this talk, I will introduce the concepts of web scraping, how they apply to paste sites, and specific tools that I have used to gather data... See Details Video Image Is Your Application Sending Email as Securely as Possible? June 02, 2022 Many web applications use email as a mechanism for user verification, password resets, real time notifications and much more. But security testers and... See Details Video Image Purple Teaming Inside-Out June 02, 2022 For the past two years, we have been facilitating purple team exercises for our clients using a framework that we developed that simulates insider... See Details Video Image Security Impact of the Rapid Growth of IoT (Internet of Things) June 02, 2022 The emergence of IoT (Internet of Things) and mobile devices has multiplied in the past five years. In this 30 minute presentation, the impact of this... See Details Video Image Deep Dive Into Android Static Analysis and Exploitation June 02, 2022 The talk will highlight some of the common mistakes made by developers while coding mobile applications and how attackers can exploit them. We will... See Details Video Image Get Off My wLan - Hacking Wireless Networks June 02, 2022 As enterprises modernize their wireless technology, new attacks have developed on the horizon. The presentation will cover WiFi terminology, various... See Details Video Image Legacy Attack Surface in the Modern Enterprise June 02, 2022 With a heavy focus on monitoring, host based detection and attack prevention, much of a legacy attack surface still remains. MitM attacks utilizing... See Details Video Image The Evolution of Cloud Forensics and Incident Response June 01, 2022 With the adoption of cloud infrastructure rapidly changing our attack landscape, we find ourselves with SOC and IR teams asking for some of the same... See Details Video Image Rethink Remediation - Linear vs. Lifecycle June 01, 2022 Every organization takes part in some kind or remediation within their organization. Within Optiv's Threat, Vulnerability and Remediation practice, we... See Details Video Pagination Current page 1 Page 2 Next page Next › Last page Last » Introducing Source Zero Our new technical cybersecurity thought leadership resource, Source Zero, focuses on red and blue team security capabilities, objective tools analysis, and more.
Image Phone-Pretexting - Mastering Social Engineering Savior-Faire June 02, 2022 I will discuss how to carry out phone pretexting calls for engagements, including how to begin reconnaissance, how to build a scenario, preparing for... See Details Video
Image MDM The Blindspot You Didn't Know June 02, 2022 The Internet accessible single-factor attack surface is decreasing with the increased implementation of multi-factor. However, configuration of multi... See Details Video
Image Detection of ScareCrow/EDR Bypass Payloads June 02, 2022 Present methods for potential detection of ScareCrow EDR Bypass payloads. Present pending work with EDR products, memory forensics, and share other... See Details Video
Image Digital Dumpster Diving - Searching for Value in Scraped Paste Site Data June 02, 2022 In this talk, I will introduce the concepts of web scraping, how they apply to paste sites, and specific tools that I have used to gather data... See Details Video
Image Is Your Application Sending Email as Securely as Possible? June 02, 2022 Many web applications use email as a mechanism for user verification, password resets, real time notifications and much more. But security testers and... See Details Video
Image Purple Teaming Inside-Out June 02, 2022 For the past two years, we have been facilitating purple team exercises for our clients using a framework that we developed that simulates insider... See Details Video
Image Security Impact of the Rapid Growth of IoT (Internet of Things) June 02, 2022 The emergence of IoT (Internet of Things) and mobile devices has multiplied in the past five years. In this 30 minute presentation, the impact of this... See Details Video
Image Deep Dive Into Android Static Analysis and Exploitation June 02, 2022 The talk will highlight some of the common mistakes made by developers while coding mobile applications and how attackers can exploit them. We will... See Details Video
Image Get Off My wLan - Hacking Wireless Networks June 02, 2022 As enterprises modernize their wireless technology, new attacks have developed on the horizon. The presentation will cover WiFi terminology, various... See Details Video
Image Legacy Attack Surface in the Modern Enterprise June 02, 2022 With a heavy focus on monitoring, host based detection and attack prevention, much of a legacy attack surface still remains. MitM attacks utilizing... See Details Video
Image The Evolution of Cloud Forensics and Incident Response June 01, 2022 With the adoption of cloud infrastructure rapidly changing our attack landscape, we find ourselves with SOC and IR teams asking for some of the same... See Details Video
Image Rethink Remediation - Linear vs. Lifecycle June 01, 2022 Every organization takes part in some kind or remediation within their organization. Within Optiv's Threat, Vulnerability and Remediation practice, we... See Details Video