Skip to main content
home
Contact
Search
HOW CAN WE HELP?

Let us know what you need, and we will have an Optiv professional contact you shortly.

General Inquiries
800-574-0896
info@optiv.com

Incident Response
(888) 732-9407

Invoicing Requests
invoicing@optiv.com

Copy the Below Link To Your RSS Reader

Main navigation

  • Security Solutions
    • Cyber Digital Transformation
      • Analytics and Big Data
      • Cloud Security Solutions
      • Cybersecurity Orchestration and Automation
      • Product Security Services
    • Cybersecurity Maturity Model Certification (CMMC)
    • Identity and Data Management
      • Digital Access Management
      • Identity Governance and Administration
      • Data Governance and Protection
    • Optiv Federal
    • Risk Management and Transformation
      • Cyber Resilience
      • Privacy and Governance
      • Risk Optimization
    • Security Operations
      • Advanced Fusion Center Operations
      • Cyber Authorized Support Services
      • Cyber-as-a-Service
      • Intelligence Operations
      • Managed Detection and Response Services
      • Managed Security Services
    • Security Services
      • Application Security
      • Architecture and Implementation
      • Attack and Penetration
      • Canadian Operations
      • Cybersecurity Education
      • GDPR
      • Software Assurance-as-a-Service
      • Security Program Strategy
      • ThreatDNA and ThreatBEAT
    • Security Technology
      • Application Security Technology
      • Cloud Security Technology
      • Data Security Technology
      • Endpoint Security Technology
      • Identity and Access Management Technology
      • Network Security Technology
      • Security Operations Solutions Technology
    • Threat Management
      • Attack and Penetration
  • Partner Directory
  • Explore Optiv Insights
    • Blog
    • CISO Periodic Table
    • Cybersecurity Dictionary
    • Downloads
    • Press Releases
    • Source Zero
    • Videos
  • Our Story
    • Client Success Stories
    • Events
    • Leadership
    • Locations
    • News and Awards
  • Join the Team
    • Careers
    • Resources
  • Client Portal
Image
IDM_Active-Directory-Assessment_list_476x210

Active Directory Assessment

January 27, 2020

Learn how Optiv can help you assess your existing Active Directory environment.

See Details

Download

Image
Risk_Privacy-Management-Blog_476x210_list_item

Building a Holistic Privacy Management Program

November 13, 2019

Rather than building programs for individual jurisdictions, organizations should develop holistic programs that address the overarching commonalities.

See Details

Blog

Image
What's an OptivCon Cybersecurity Summit?

What's an OptivCon Cybersecurity Summit?

August 13, 2019

OptivCon is a local one-day summit focused on enterprise risk and realizing stronger, simpler and less costly cybersecurity programs. This free event...

See Details

Video

Image
organization_shift_IAM_to_IDM_list_476x210

Organizations Shift from Identity and Access Management to Identity and Data Management

May 01, 2019

With the exponential growth in unstructured data each year, coupled with cloud adoption and IoT devices, it is critical that organizations begin to....

See Details

Blog

Image
RiskBusiness-Organic_list_476x210

Security at the Speed of Business

March 07, 2019

Learn how to build a blueprint for effective risk management and data protection and governance to secure Digital Transformation.

See Details

Download

Image
Evolution of Risk

Evolution of Risk Webinar

March 05, 2019

Learn about solving cyber insecurity with a risk-centric business and IT integration.

See Details

Video

Image
managing_risk_dx_list_476x210

Managing Risk in a Digital Transformation (DX) World

February 21, 2019

Learn about importance of balancing risk against opportunity at the C-level.

See Details

Download

Image
secops_devops_list_476x210

SecOps vs. DevOps in the Information Age

December 18, 2018

Information is varied and complex, involving many data types, structures, and protocols for different types of data sets. This increases challenges....

See Details

Blog

Image
data_list_476x210

Get Control of the Mayhem: A Day in the Life of a Piece of Unstructured Sensitive Data

March 21, 2018

Sensitive and relevant data, such as personally identifiable information (PII) or intellectual property, may be running rampant in your organization....

See Details

Blog

Image
generic_list

Unstructured Data Risk Assessment

January 22, 2018

Learn how Optiv can help you assess your risk of a breach related to unstructured data.

See Details

Download

Image
gen_blog_list_item

GDPR Part 2: The Six Information Security Pillars

October 30, 2017

In this second part of the series, we will discuss Optiv’s Six Information Security Pillars for GDPR compliance. For the information security....

See Details

Blog

Image
generic_list

It's Time for CISOs to Embrace IAM

May 11, 2017

Today’s CISO has a lot on their mind, but is there something missing?

See Details

Download

Pagination

  • Current page 1
  • Page 2
  • Next page ››
  • Last page Last »

Footer menu

  • Security Solutions
  • Partner Directory
  • Explore Optiv Insights
  • Our Story
  • Join Optiv Team
  • Client Portal

 

 

Home | Contact | Cookie Policy | Privacy Policy | Terms of Use | Sitemap

 

The content provided is for informational purposes only. Links to third party sites are provided for your convenience and do not constitute an endorsement. These sites may not have the same privacy, security or accessibility standards.

 

Copyright @ 2021. Optiv Security Inc. All Rights Reserved