A Single Partner for Everything You Need Optiv works with more than 450 world-class security technology partners. By putting you at the center of our unmatched ecosystem of people, products, partners and programs, we accelerate business progress like no other company can.
We Are Optiv Greatness is every team working toward a common goal. Winning in spite of cyber threats and overcoming challenges in spite of them. It’s building for a future that only you can create or simply coming home in time for dinner. However you define greatness, Optiv is in your corner. We manage cyber risk so you can secure your full potential.
OPTIV/SOURCE ZERO Latest news and research on red and blue team security capabilities, objective tool analysis and step-by-step solutions. The Source Zero® platform provides a space for the Optiv community to share their knowledge, research and tools. See our newest insights on subjects ranging from ethical hacking to threat intelligence to application security. Image Search Terms Type - Any -BlogToolVideo Team - Any -RedBluePurple/No Team Sort By LatestOldest Image Phone-Pretexting - Mastering Social Engineering Savior-Faire May 27, 2021 I will discuss how to carry out phone pretexting calls for engagements, including how to begin reconnaissance, how to build a scenario, preparing for... See Details Video Image MDM The Blindspot You Didn't Know May 27, 2021 The Internet accessible single-factor attack surface is decreasing with the increased implementation of multi-factor. However, configuration of multi... See Details Video Image Detection of ScareCrow/EDR Bypass Payloads May 27, 2021 Present methods for potential detection of ScareCrow EDR Bypass payloads. Present pending work with EDR products, memory forensics, and share other... See Details Video Image Digital Dumpster Diving - Searching for Value in Scraped Paste Site Data May 27, 2021 In this talk, I will introduce the concepts of web scraping, how they apply to paste sites, and specific tools that I have used to gather data... See Details Video Image Is Your Application Sending Email as Securely as Possible? May 27, 2021 Many web applications use email as a mechanism for user verification, password resets, real time notifications and much more. But security testers and... See Details Video Image Purple Teaming Inside-Out May 27, 2021 For the past two years, we have been facilitating purple team exercises for our clients using a framework that we developed that simulates insider... See Details Video Image Security Impact of the Rapid Growth of IoT (Internet of Things) May 27, 2021 The emergence of IoT (Internet of Things) and mobile devices has multiplied in the past five years. In this 30 minute presentation, the impact of this... See Details Video Image The Evolution of Cloud Forensics and Incident Response May 26, 2021 With the adoption of cloud infrastructure rapidly changing our attack landscape, we find ourselves with SOC and IR teams asking for some of the same... See Details Video Image Rethink Remediation - Linear vs. Lifecycle May 26, 2021 Every organization takes part in some kind or remediation within their organization. Within Optiv's Threat, Vulnerability and Remediation practice, we... See Details Video Image Leveling Up Your Phishing Game On Modern Platforms May 26, 2021 Modern platforms are consistently developing new phishing detections to stop attackers and popular techniques are not going to cut it anymore. Aaron... See Details Video Image GraphQL Vulnerabilities May 26, 2021 GraphQL, an open-source data query language for APIs, has been becoming more prevalent in modern applications. A brief overview of the technology as... See Details Video Image Practical Password Guessing Workshop May 26, 2021 Whether you are a pro, or just getting starting, red team or blue team. Or maybe just want to learn how attackers can compromise various network... See Details Video Pagination Current page 1 Page 2 Next page Next › Last page Last » Introducing Source Zero Our new technical cybersecurity thought leadership resource, Source Zero, focuses on red and blue team security capabilities, objective tools analysis, and more.
Image Phone-Pretexting - Mastering Social Engineering Savior-Faire May 27, 2021 I will discuss how to carry out phone pretexting calls for engagements, including how to begin reconnaissance, how to build a scenario, preparing for... See Details Video
Image MDM The Blindspot You Didn't Know May 27, 2021 The Internet accessible single-factor attack surface is decreasing with the increased implementation of multi-factor. However, configuration of multi... See Details Video
Image Detection of ScareCrow/EDR Bypass Payloads May 27, 2021 Present methods for potential detection of ScareCrow EDR Bypass payloads. Present pending work with EDR products, memory forensics, and share other... See Details Video
Image Digital Dumpster Diving - Searching for Value in Scraped Paste Site Data May 27, 2021 In this talk, I will introduce the concepts of web scraping, how they apply to paste sites, and specific tools that I have used to gather data... See Details Video
Image Is Your Application Sending Email as Securely as Possible? May 27, 2021 Many web applications use email as a mechanism for user verification, password resets, real time notifications and much more. But security testers and... See Details Video
Image Purple Teaming Inside-Out May 27, 2021 For the past two years, we have been facilitating purple team exercises for our clients using a framework that we developed that simulates insider... See Details Video
Image Security Impact of the Rapid Growth of IoT (Internet of Things) May 27, 2021 The emergence of IoT (Internet of Things) and mobile devices has multiplied in the past five years. In this 30 minute presentation, the impact of this... See Details Video
Image The Evolution of Cloud Forensics and Incident Response May 26, 2021 With the adoption of cloud infrastructure rapidly changing our attack landscape, we find ourselves with SOC and IR teams asking for some of the same... See Details Video
Image Rethink Remediation - Linear vs. Lifecycle May 26, 2021 Every organization takes part in some kind or remediation within their organization. Within Optiv's Threat, Vulnerability and Remediation practice, we... See Details Video
Image Leveling Up Your Phishing Game On Modern Platforms May 26, 2021 Modern platforms are consistently developing new phishing detections to stop attackers and popular techniques are not going to cut it anymore. Aaron... See Details Video
Image GraphQL Vulnerabilities May 26, 2021 GraphQL, an open-source data query language for APIs, has been becoming more prevalent in modern applications. A brief overview of the technology as... See Details Video
Image Practical Password Guessing Workshop May 26, 2021 Whether you are a pro, or just getting starting, red team or blue team. Or maybe just want to learn how attackers can compromise various network... See Details Video
Would you like to speak to an advisor? Let's Talk Cybersecurity Provide your contact information and we will follow-up shortly. Let's Browse Cybersecurity Just looking? Explore how Optiv serves its ~6,000 clients. Show me AI Security Solutions Show me the Optiv brochure Take me to Optiv's Events page Browse all Services