A Single Partner for Everything You Need Optiv works with more than 450 world-class security technology partners. By putting you at the center of our unmatched ecosystem of people, products, partners and programs, we accelerate business progress like no other company can.
We Are Optiv Greatness is every team working toward a common goal. Winning in spite of cyber threats and overcoming challenges in spite of them. It’s building for a future that only you can create or simply coming home in time for dinner. However you define greatness, Optiv is in your corner. We manage cyber risk so you can secure your full potential.
Downloads Search Terms Topics - Any -AppSecArchitecture and ImplementationBenefitsBig Data and AnalyticsBusiness/StrategyCloud SecurityCommentaryConsumer Financial Protection Agency (CFPA)CultureCyber Digital TransformationCyber OperationsCybersecurityCybersecurity AcronymsCybersecurity Awareness MonthCybersummitData Protection and Data PrivacyDeepfakesDigital IntelligenceDigital TransformationEducation and AwarenessEducation/IntelligenceGovernanceHealthcareIdentity and Access ManagementIncident ManagementIndustryIndustry AnalysisInfographicInnovationInternet of ThingsManaged Security ServicesOperational TechnologyOpinionOptivOptiv CorporateOptivConPartnershipPassword Security and HygienePhishingRegulatory/LegalRisk and ComplianceSecOpsSecurity OperationsSecurity Program StrategyServicesSolution and Program InsightSolutionsSource ZeroStaffingTalent AcquisitionTaniumTaniumTechnicalTechnical ContentTechnical InnovatorTechnical ResearchThought LeadershipThreats and VulnerabilitiesToolsZero Trust Type - Any -ArticleBrochure and eBookFact SheetField GuideInfographicInteractivePresentationReportService BriefSuccess StoryThird PartyToolkitWhite Paper Sort By LatestOldest Image Managing Risk in a Digital Transformation (DX) World February 21, 2019 Learn about importance of balancing risk against opportunity at the C-level. See Details Download Image Cybersecurity Dictionary February 21, 2019 Explore the top terms in cybersecurity from core concepts to innovation. See Details Download Image The Truths and Myths about Cybersecurity Risk February 14, 2019 Debunk risk management myths in order to build a truly resilient cybersecurity program. See Details Download Image Getting The Board On Board With Security Risk February 13, 2019 Guidance on how to communicate overall security health to the C-suite and board. See Details Download Image Need a Risk Management Transformation? February 12, 2019 Transition from traditional risk management to a modern approach to ensure cybersecurity risk and business risk are aligned. See Details Download Image Top 5 Risk Management Mistakes (And How To Fix Them) February 12, 2019 Learn not only about the top risk management mistakes businesses make today, but how to fix them. See Details Download Image RISKY BUSINESS: Solving Cyber Insecurity with a Risk-Centric Business Model January 31, 2019 Optiv’s Risky Business white paper discusses how risk management needs to transform to become a fundamental component of overall business objectives. See Details Download Image Mapping the Risk (R)evolution January 29, 2019 The Optiv Security Risk (R)evolution timeline maps out changes in risk management with the rapid adoption of digital technologies. See Details Download Image Risk Management and Transformation: Cyber Resilience January 22, 2019 Optiv’s Cyber Resilience services offers everything you need to become – and remain – vigilant about your cybersecurity. See Details Download Image Risk Management and Transformation: Privacy and Governance January 03, 2019 Optiv’s Privacy and Governance service provides security assessments and strategy to build out your entire procedural framework. See Details Download Image Defending Against the Attacker vs. the Auditor November 29, 2018 Check out the top six questions you should ask to ensure you are defending against the attacker – and not just the auditor. See Details Download Image Behind the Eyes of the Enemy: Why Threat Actors are Petrified of Privileged Access Management (PAM) October 23, 2018 Learn how Privileged Access Management (PAM) helps restrict and protect privileged accounts to data. See Details Download Pagination First page « First Previous page ‹ Previous … Page 35 Page 36 Page 37 Page 38 Current page 39 Page 40 Page 41 Page 42 Page 43 … Next page Next › Last page Last »
Image Managing Risk in a Digital Transformation (DX) World February 21, 2019 Learn about importance of balancing risk against opportunity at the C-level. See Details Download
Image Cybersecurity Dictionary February 21, 2019 Explore the top terms in cybersecurity from core concepts to innovation. See Details Download
Image The Truths and Myths about Cybersecurity Risk February 14, 2019 Debunk risk management myths in order to build a truly resilient cybersecurity program. See Details Download
Image Getting The Board On Board With Security Risk February 13, 2019 Guidance on how to communicate overall security health to the C-suite and board. See Details Download
Image Need a Risk Management Transformation? February 12, 2019 Transition from traditional risk management to a modern approach to ensure cybersecurity risk and business risk are aligned. See Details Download
Image Top 5 Risk Management Mistakes (And How To Fix Them) February 12, 2019 Learn not only about the top risk management mistakes businesses make today, but how to fix them. See Details Download
Image RISKY BUSINESS: Solving Cyber Insecurity with a Risk-Centric Business Model January 31, 2019 Optiv’s Risky Business white paper discusses how risk management needs to transform to become a fundamental component of overall business objectives. See Details Download
Image Mapping the Risk (R)evolution January 29, 2019 The Optiv Security Risk (R)evolution timeline maps out changes in risk management with the rapid adoption of digital technologies. See Details Download
Image Risk Management and Transformation: Cyber Resilience January 22, 2019 Optiv’s Cyber Resilience services offers everything you need to become – and remain – vigilant about your cybersecurity. See Details Download
Image Risk Management and Transformation: Privacy and Governance January 03, 2019 Optiv’s Privacy and Governance service provides security assessments and strategy to build out your entire procedural framework. See Details Download
Image Defending Against the Attacker vs. the Auditor November 29, 2018 Check out the top six questions you should ask to ensure you are defending against the attacker – and not just the auditor. See Details Download
Image Behind the Eyes of the Enemy: Why Threat Actors are Petrified of Privileged Access Management (PAM) October 23, 2018 Learn how Privileged Access Management (PAM) helps restrict and protect privileged accounts to data. See Details Download