About
Highlights

Keynote Conversation:
Staying Ahead of Current Cybersecurity Threats & Vulnerabilities

Panel Discussion:
SolarWinds Panel 2.0 -
Lessons Learned

CPE Credits
By attending the full live event, including keynote, panel discussion & breakout sessions, attendees can earn up to 3 credits.
During the live event you can submit your credentials using the CPE widget located at the bottom of your screen. Optiv will submit to ISC(2) on your behalf as long as you provide us with the following information: full name & member number (CISSP).
If you need to submit credits to an organization other than ISC(2), please download a certificate from the Resources widget available during live sessions.
Agenda
10:00 a.m. PT

10:45 a.m. PT

Todd Weber (Moderator), Chief Technology Officer, Optiv
Anthony Diaz, SVP of Cyber Defense and Applied Services, Optiv
Danny Pickens, Practice Director, Enterprise Incident Management, Optiv
Brian Wrozek, VP, CISO, Optiv
Nir Gertner, Chief Security Strategist, CyberArk
Robert Huber, Chief Security Officer, Tenable
11:45 a.m. PT

In this talk we’ll cover how open source application components fit into the enterprise vulnerability management program, and how the differences in how they need to be managed versus traditional vulnerabilities. We’ll specifically dive into what Software Composition Analysis (SCA) looks like from a security organization perspective, how to enable the security group with visibility that is usually available only in development, and proactive strategies that can be adopted to get ahead of the problem.
Speaker Information:
John Bock, Senior Research Scientist, Optiv

A proactive, risk-driven Vulnerability Management approach delivers comprehensive, continuous visibility and informs technical and business decisions. Join Tenable’s Nathan Wenzler and Optiv’s Doug Drew (a respected Tenable Guardian) as they discuss real world VM challenges and how to manage and measure your cyber risk.
Partner Speaker Information:
Nathan Wenzler, Chief Security Strategist, Tenable
12:30 p.m. PT

Cloud adoption is both a critical step to an organization’s digital transformation (DX) as well as a security vulnerability due to its increased attack surface and advanced threat vectors.
Securing critical assets is a primary element of a security program that must be re-addressed as the proliferation of the cloud expands beyond an organization’s four walls. This often results in re-assessing their security strategy from a risk, management and compliance perspective across their on-premise, cloud and hybrid environments.
Controlling and governing access to assets in the cloud is a key tenet to securing them. Cloud access governance enables organizations to extend their access controls beyond on-premise environments by providing the tools to discover, secure and govern access to assets (data, apps and workloads). Join this session to understand how cloud access governance can help manage your risk, security and compliance posture in the era of DX.
Speaker Information:
Ralph Martino, Practice Director - CP&I, Identity Governance, Optiv
Sagnik Mukherjee, Sr Manager - CP&I, Identity Governance, Optiv

Identity has a significant impact on your customers’ journey with your brand. It helps protect customer data from breach and fraud while ensuring that you respect their privacy, consent, and data.
Partner Speaker Information:
Richard Bird, Chief Customer Information Officer, Ping Identity
1:15 p.m. PT
Event Conclusion
Frequently Asked Questions
Is there a fee to participate?
No, OptivCon Virtual is a complimentary digital event.
How do I earn CPEs for attending?
By attending the full live event, including the keynote presentation, panel, and breakout sessions, attendees can earn up to 3 credits.
During the live event, you can submit your credentials using the CPE widget. Optiv will submit to ISC(2) on your behalf as long as you provide us with the following information: full name & member number (CISSP).
If you need to submit credits to an organization other than ISC(2), please request a certificate post-event from Optiv Marketing.
What time does the event start?
The event will begin at 10:00 a.m. (PT) on Thursday, March 4. Audience members may arrive up to 15 minutes before the scheduled start time, but entry times may vary. Live presentations will not begin until their scheduled times. Please check the agenda for more details.
Do I have to attend the entire event?
In order to fully engage with us during OptivCon Virtual, we recommend participating in all live sessions. By attending the keynote, panel & breakout, you're eligible to earn 3 CPE credits.
What can I expect from OptivCon Virtual?
The event is specifically curated to align with the current cyber landscape and attendees can expect actionable takeaways from the insightful content shared by industry experts.
By attending OptivCon Virtual, you will automatically be entered to win a $10 Chipotle eGift card

Technology Sponsors
Axonius is the cybersecurity asset management platform that gives organizations a comprehensive asset inventory, uncovers security solution coverage gaps, and automatically validates and enforces security policies.
|
Check Point and Optiv together offer a multilevel security architecture with services to provide advanced Generation V level threat prevention to protect all networks, cloud and mobile operations against both known and unknown attacks.
|
With Optiv and Crowdstrike, you gain the tools and services needed to implement your solutions more quickly, securely and respond to changing threats faster.
|
Optiv and IBM work together to improve the way clients manage security across the network by orchestrating and integrating security to better protect against evolving attacks. Optiv's services and IBM's technology combined helps stop advanced threats, protect critical assetes, and deliver digital transformation.
|
Optiv’s security expertise and services, combined with Imperva’s leading data and application security solutions, ensure the security of business-critical assets across your entire network, whether in the cloud, on-premises, or hybrid environments.
|
Onapsis protects the mission-critical applications that power the global economy, including ERP, CRM, PLM, HCM, SCM and BI from SAP®, Oracle® and leading cloud vendors. Onapsis works with over 300 global brands and partners with leading security solution integrators like Optiv.
|
Together, Optiv and Ping, champion the unique identity needs of enterprises and a modern Identity and Access Management (IAM) platform that spans your entire hybrid IT and multi-cloud infrastructures.
|
Thales and Optiv have partnered to provide a more strategic approach to cybersecurity, enabling organizations to move to the cloud securely, achieve compliance with confidence and ensure trusted access to the cloud.
|
Optiv and Veracode have joined forces to provide a complete solution for customers that includes integration of sandbox testing into the CI/CD pipeline for security adoption, speed to market, and reduced costs.
|