SlideShare une entreprise Scribd logo
1  sur  9
Télécharger pour lire hors ligne
Six Key Components
to Achieving GDPR
Cyber Security
Requirements
The General Data Protection
Regulation (GDPR) is hitting
the world by storm.
With a deadline of May 25, 2018, organizations are
searching for an all-encompassing solution for
GDPR readiness and compliance.
Optiv is strategically positioned to assist
organizations with the cyber security components
of the GDPR regulation. Our goal is to help clients
reduce noise around point solutions, understand
the requirements as they relate to the organization,
develop a strategic and tailored GDPR roadmap and
execute across the six pillars of GDPR compliance.
Optiv is here to help you not only weather the
GPDR storm, but conquer it.
1Six Key Components to Achieving GDPR Cyber Security Requirements
In a perfect world – to avoid GDPR
retribution – don’t get breached.
Sounds easy, but unfortunately it’s
not that simple. The key is to prove
due diligence.
With the May 2018 deadline
approaching, how is your
organization preparing for GDPR?
GDPR is a sweeping
privacy law with strict
fines and penalties
should a breach occur.
WHAT IS GENERAL DATA PROTECTION REGULATION?
2Six Key Components to Achieving GDPR Cyber Security Requirements
The General Data
Protection Regulation –
At 10,000 Feet
• Applies to all organizations processing
personal data of EU citizens
• Organizations in breach will be fined up to
4 percent of annual global turnover or $20
Million (Euro) (whichever is greater).
• Defines lawfulness of processing to include
consent by data subjects, “Privacy by Design”,
the “Right to Be Forgotten” and data portability
requirements
• Outlines responsibilities of controllers and
processors
• Requires Privacy Impact Assessments
• Breach notification requirements
• Appointment of a Data Protection Officer
• Deadline for compliance – May 25, 2018
3Six Key Components to Achieving GDPR Cyber Security Requirements
Can you interpret how GDPR
effects your organization?
Quick hit questions to consider:
√ Do you know what data is relevant to
GDPR?
√ Do you know where that data is?
√ Do you know who has access to this data?
√ Do you have the right controls in place to
protect that data?
√ Can you show your work to prove GDPR
due diligence?
√ How can you prioritize GDPR against
your other threats?
GDPR is a complex challenge that affects multiple
areas of your organization:
4Six Key Components to Achieving GDPR Cyber Security Requirements
Cyber Security IT Legal
Achieve and maintain
compliance across the Six
Cyber Security Pillars of GDPR
5Six Key Components to Achieving GDPR Cyber Security Requirements
Data Governance
Data
Classification
Data
Discovery
Data Access
Data
Handling
Data
Protection
Data Governance
6Six Key Components to Achieving GDPR Cyber Security Requirements
Understand your GDPR obligations as
they relate to your business and activate
your program to meet these obligations.
Data Classification
Analyze what data within your environment
is relevant to GDPR and develop a proper
classification scheme for ongoing data
management.
SIX PILLARS OF GDPR COMPLIANCE
Data Discovery
Discover where sensitive data lives within
your environment and setup structures
for ongoing management of such data.
8Six Key Components to Achieving GDPR Cyber Security Requirements
Data Access
Determine who has access to the data
and setup rules for ongoing access
management.
SIX PILLARS OF GDPR COMPLIANCE
Data Handling
Prepare for the chance of an incident and
ensure that plans are in place to meet
GDPR obligations regarding the handling
of sensitive information.
Data Protection
Plan, build and run an appropriate
security program to protect sensitive
information.
START HERE:
Begin with a plan.
Understand your gaps.
Build a roadmap for execution.
Align your security and privacy
programs to reach GDPR compliance..
At times, the road to GDPR compliance may
seem to be an overwhelming journey with
unsurmountable obstacles.
Optiv can help organizations across
the six pillars of GDPR compliance.
Optiv is a market-leading provider of end-to-end cyber security solutions. We help clients plan, build and run successful cyber security
programs that achieve business objectives through our depth and breadth of cyber security offerings, extensive capabilities and proven
expertise in cyber security strategy, managed security services, incident response, risk and compliance, security consulting, training and
support, integration and architecture services, and security technology. Optiv maintains premium partnerships with more than 350
of the leading security technology manufacturers. For more information, visit www.optiv.com or follow us at www.twitter.com/optiv,
www.facebook.com/optivinc and www.linkedin.com/company/optiv-inc.
© 207 Optiv All Rights Reserved. Optiv” is a registered trademark of Optiv Security Inc.
1125 17th Street, Suite 1700
Denver, CO 80202
800.574.0896 | www.optiv.com
Get in Touch
10.17 | F1

Contenu connexe

Tendances

Tendances (20)

What the GDPR Means for your Cybersecurity Strategy [Webinar Slides]
What the GDPR Means for your Cybersecurity Strategy [Webinar Slides]What the GDPR Means for your Cybersecurity Strategy [Webinar Slides]
What the GDPR Means for your Cybersecurity Strategy [Webinar Slides]
 
GDPR Audit Resilience: How to Align Diverse Internal Stakeholder Needs and De...
GDPR Audit Resilience: How to Align Diverse Internal Stakeholder Needs and De...GDPR Audit Resilience: How to Align Diverse Internal Stakeholder Needs and De...
GDPR Audit Resilience: How to Align Diverse Internal Stakeholder Needs and De...
 
The Trick to Passing Your Next Compliance Audit
The Trick to Passing Your Next Compliance AuditThe Trick to Passing Your Next Compliance Audit
The Trick to Passing Your Next Compliance Audit
 
72 Hours Notice: Incident Response Management under the GDPR [Webinar Slides]
72 Hours Notice: Incident Response Management under the GDPR [Webinar Slides]72 Hours Notice: Incident Response Management under the GDPR [Webinar Slides]
72 Hours Notice: Incident Response Management under the GDPR [Webinar Slides]
 
2020 Global Privacy Survey: Emerging Trends, Benchmarking Research and Best P...
2020 Global Privacy Survey: Emerging Trends, Benchmarking Research and Best P...2020 Global Privacy Survey: Emerging Trends, Benchmarking Research and Best P...
2020 Global Privacy Survey: Emerging Trends, Benchmarking Research and Best P...
 
Best Practices for Managing Individual Rights under the GDPR [Webinar Slides]
Best Practices for Managing Individual Rights under the GDPR [Webinar Slides]Best Practices for Managing Individual Rights under the GDPR [Webinar Slides]
Best Practices for Managing Individual Rights under the GDPR [Webinar Slides]
 
FinTech Belgium GDPR MeetUp - PwC - 14/09/17
FinTech Belgium GDPR MeetUp - PwC - 14/09/17FinTech Belgium GDPR MeetUp - PwC - 14/09/17
FinTech Belgium GDPR MeetUp - PwC - 14/09/17
 
Satori GDPR Overview 2018
Satori GDPR Overview 2018Satori GDPR Overview 2018
Satori GDPR Overview 2018
 
FinTech Belgium GDPR MeetUp - Laga - 14/09/17
FinTech Belgium GDPR MeetUp - Laga - 14/09/17FinTech Belgium GDPR MeetUp - Laga - 14/09/17
FinTech Belgium GDPR MeetUp - Laga - 14/09/17
 
GDPR: Is Your Organization Ready for the General Data Protection Regulation?
GDPR: Is Your Organization Ready for the General Data Protection Regulation?GDPR: Is Your Organization Ready for the General Data Protection Regulation?
GDPR: Is Your Organization Ready for the General Data Protection Regulation?
 
FinTech Belgium GDPR MeetUp - deJurists - 14/09/17
FinTech Belgium GDPR MeetUp - deJurists - 14/09/17FinTech Belgium GDPR MeetUp - deJurists - 14/09/17
FinTech Belgium GDPR MeetUp - deJurists - 14/09/17
 
The EU General Protection Regulation and how Oracle can help
The EU General Protection Regulation and how Oracle can help The EU General Protection Regulation and how Oracle can help
The EU General Protection Regulation and how Oracle can help
 
GDPR Learning Lab: Gartner Data & Analytics 2018 Slides
GDPR Learning Lab: Gartner Data & Analytics 2018 Slides GDPR Learning Lab: Gartner Data & Analytics 2018 Slides
GDPR Learning Lab: Gartner Data & Analytics 2018 Slides
 
Convince your board: How to prepare your business for List X
Convince your board: How to prepare your business for List XConvince your board: How to prepare your business for List X
Convince your board: How to prepare your business for List X
 
GDPR in the Digital World
GDPR in the Digital WorldGDPR in the Digital World
GDPR in the Digital World
 
Tech Connect Live 30th May 2018 ,GDPR Summit Sharon o' reilly
Tech Connect Live 30th May 2018 ,GDPR Summit Sharon o' reillyTech Connect Live 30th May 2018 ,GDPR Summit Sharon o' reilly
Tech Connect Live 30th May 2018 ,GDPR Summit Sharon o' reilly
 
SourceCloud GDPR statement march 2018
SourceCloud GDPR statement march 2018 SourceCloud GDPR statement march 2018
SourceCloud GDPR statement march 2018
 
General Data Protection Regulation: Where are we now?
General Data Protection Regulation: Where are we now?General Data Protection Regulation: Where are we now?
General Data Protection Regulation: Where are we now?
 
EU General Data Protection Regulation
EU General Data Protection RegulationEU General Data Protection Regulation
EU General Data Protection Regulation
 
c~Sharpe Security Services
c~Sharpe Security Servicesc~Sharpe Security Services
c~Sharpe Security Services
 

Similaire à Six Key Components to Achieving GDPR Security Requirements

14.3.2018, Παρουσίαση Κώστα Γκρίτση στην εκδήλωση «Προστασία Προσωπικών Δεδομ...
14.3.2018, Παρουσίαση Κώστα Γκρίτση στην εκδήλωση «Προστασία Προσωπικών Δεδομ...14.3.2018, Παρουσίαση Κώστα Γκρίτση στην εκδήλωση «Προστασία Προσωπικών Δεδομ...
14.3.2018, Παρουσίαση Κώστα Γκρίτση στην εκδήλωση «Προστασία Προσωπικών Δεδομ...
ekyklos Κύκλος Ιδεών για τη Εθνική Ανασυγκρότηση
 

Similaire à Six Key Components to Achieving GDPR Security Requirements (20)

GDPR Compliance with Microsoft 365
GDPR Compliance with Microsoft 365 GDPR Compliance with Microsoft 365
GDPR Compliance with Microsoft 365
 
14.3.2018, Παρουσίαση Κώστα Γκρίτση στην εκδήλωση «Προστασία Προσωπικών Δεδομ...
14.3.2018, Παρουσίαση Κώστα Γκρίτση στην εκδήλωση «Προστασία Προσωπικών Δεδομ...14.3.2018, Παρουσίαση Κώστα Γκρίτση στην εκδήλωση «Προστασία Προσωπικών Δεδομ...
14.3.2018, Παρουσίαση Κώστα Γκρίτση στην εκδήλωση «Προστασία Προσωπικών Δεδομ...
 
Is your business GDPR ready?
Is your business GDPR ready?Is your business GDPR ready?
Is your business GDPR ready?
 
Convince your board - Ten steps to GDPR compliance
Convince your board  - Ten steps to GDPR complianceConvince your board  - Ten steps to GDPR compliance
Convince your board - Ten steps to GDPR compliance
 
GDPR: 20 Million Reasons to Get Ready - Part 2: Living Compliance
GDPR: 20 Million Reasons to Get Ready - Part 2: Living ComplianceGDPR: 20 Million Reasons to Get Ready - Part 2: Living Compliance
GDPR: 20 Million Reasons to Get Ready - Part 2: Living Compliance
 
MMV Webinar 1. GDPR Perspectives. November 2017
MMV Webinar 1. GDPR Perspectives. November 2017MMV Webinar 1. GDPR Perspectives. November 2017
MMV Webinar 1. GDPR Perspectives. November 2017
 
Solution Brief: Helping prepare for risk & compliance challenges for GDPR
Solution Brief: Helping prepare for risk & compliance challenges for GDPRSolution Brief: Helping prepare for risk & compliance challenges for GDPR
Solution Brief: Helping prepare for risk & compliance challenges for GDPR
 
Symantec Webinar Part 4 of 6 GDPR Compliance, What NAM Organizations Need to...
Symantec Webinar Part 4 of 6  GDPR Compliance, What NAM Organizations Need to...Symantec Webinar Part 4 of 6  GDPR Compliance, What NAM Organizations Need to...
Symantec Webinar Part 4 of 6 GDPR Compliance, What NAM Organizations Need to...
 
1 -2-6 kista watson summit-gdpr ibm pov hogg-sm
1 -2-6 kista watson summit-gdpr ibm pov hogg-sm1 -2-6 kista watson summit-gdpr ibm pov hogg-sm
1 -2-6 kista watson summit-gdpr ibm pov hogg-sm
 
GDPR - what you need to know
GDPR -  what you need to know GDPR -  what you need to know
GDPR - what you need to know
 
Richard Hogg & Dennis Waldron - #InfoGov17 - Cognitive Unified Governance & P...
Richard Hogg & Dennis Waldron - #InfoGov17 - Cognitive Unified Governance & P...Richard Hogg & Dennis Waldron - #InfoGov17 - Cognitive Unified Governance & P...
Richard Hogg & Dennis Waldron - #InfoGov17 - Cognitive Unified Governance & P...
 
2 -2-6 kista watson summit-gdpr how ibm preparing hogg-sm
2 -2-6 kista watson summit-gdpr how ibm preparing hogg-sm2 -2-6 kista watson summit-gdpr how ibm preparing hogg-sm
2 -2-6 kista watson summit-gdpr how ibm preparing hogg-sm
 
Security, GDRP, and IT outsourcing: How to get it right
Security, GDRP, and IT outsourcing: How to get it rightSecurity, GDRP, and IT outsourcing: How to get it right
Security, GDRP, and IT outsourcing: How to get it right
 
Using GDPR to Transform Customer Experience
Using GDPR to Transform Customer ExperienceUsing GDPR to Transform Customer Experience
Using GDPR to Transform Customer Experience
 
General Data Protection Regulation (GDPR) Compliance
General Data Protection Regulation (GDPR) ComplianceGeneral Data Protection Regulation (GDPR) Compliance
General Data Protection Regulation (GDPR) Compliance
 
20170323 are you ready the new gdpr is here
20170323 are you ready the new gdpr is here20170323 are you ready the new gdpr is here
20170323 are you ready the new gdpr is here
 
GDPR for dummies
GDPR for dummies  GDPR for dummies
GDPR for dummies
 
Six Steps to Addressing Data Governance under GDPR and US Privacy Shield Regu...
Six Steps to Addressing Data Governance under GDPR and US Privacy Shield Regu...Six Steps to Addressing Data Governance under GDPR and US Privacy Shield Regu...
Six Steps to Addressing Data Governance under GDPR and US Privacy Shield Regu...
 
Ritz 4th-july-gdpr
Ritz 4th-july-gdprRitz 4th-july-gdpr
Ritz 4th-july-gdpr
 
GDPR & Demand Generation: What Your Team Needs To Know
GDPR & Demand Generation: What Your Team Needs To KnowGDPR & Demand Generation: What Your Team Needs To Know
GDPR & Demand Generation: What Your Team Needs To Know
 

Dernier

CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
giselly40
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
Earley Information Science
 

Dernier (20)

How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 

Six Key Components to Achieving GDPR Security Requirements

  • 1. Six Key Components to Achieving GDPR Cyber Security Requirements
  • 2. The General Data Protection Regulation (GDPR) is hitting the world by storm. With a deadline of May 25, 2018, organizations are searching for an all-encompassing solution for GDPR readiness and compliance. Optiv is strategically positioned to assist organizations with the cyber security components of the GDPR regulation. Our goal is to help clients reduce noise around point solutions, understand the requirements as they relate to the organization, develop a strategic and tailored GDPR roadmap and execute across the six pillars of GDPR compliance. Optiv is here to help you not only weather the GPDR storm, but conquer it. 1Six Key Components to Achieving GDPR Cyber Security Requirements
  • 3. In a perfect world – to avoid GDPR retribution – don’t get breached. Sounds easy, but unfortunately it’s not that simple. The key is to prove due diligence. With the May 2018 deadline approaching, how is your organization preparing for GDPR? GDPR is a sweeping privacy law with strict fines and penalties should a breach occur. WHAT IS GENERAL DATA PROTECTION REGULATION? 2Six Key Components to Achieving GDPR Cyber Security Requirements
  • 4. The General Data Protection Regulation – At 10,000 Feet • Applies to all organizations processing personal data of EU citizens • Organizations in breach will be fined up to 4 percent of annual global turnover or $20 Million (Euro) (whichever is greater). • Defines lawfulness of processing to include consent by data subjects, “Privacy by Design”, the “Right to Be Forgotten” and data portability requirements • Outlines responsibilities of controllers and processors • Requires Privacy Impact Assessments • Breach notification requirements • Appointment of a Data Protection Officer • Deadline for compliance – May 25, 2018 3Six Key Components to Achieving GDPR Cyber Security Requirements
  • 5. Can you interpret how GDPR effects your organization? Quick hit questions to consider: √ Do you know what data is relevant to GDPR? √ Do you know where that data is? √ Do you know who has access to this data? √ Do you have the right controls in place to protect that data? √ Can you show your work to prove GDPR due diligence? √ How can you prioritize GDPR against your other threats? GDPR is a complex challenge that affects multiple areas of your organization: 4Six Key Components to Achieving GDPR Cyber Security Requirements Cyber Security IT Legal
  • 6. Achieve and maintain compliance across the Six Cyber Security Pillars of GDPR 5Six Key Components to Achieving GDPR Cyber Security Requirements Data Governance Data Classification Data Discovery Data Access Data Handling Data Protection
  • 7. Data Governance 6Six Key Components to Achieving GDPR Cyber Security Requirements Understand your GDPR obligations as they relate to your business and activate your program to meet these obligations. Data Classification Analyze what data within your environment is relevant to GDPR and develop a proper classification scheme for ongoing data management. SIX PILLARS OF GDPR COMPLIANCE Data Discovery Discover where sensitive data lives within your environment and setup structures for ongoing management of such data.
  • 8. 8Six Key Components to Achieving GDPR Cyber Security Requirements Data Access Determine who has access to the data and setup rules for ongoing access management. SIX PILLARS OF GDPR COMPLIANCE Data Handling Prepare for the chance of an incident and ensure that plans are in place to meet GDPR obligations regarding the handling of sensitive information. Data Protection Plan, build and run an appropriate security program to protect sensitive information.
  • 9. START HERE: Begin with a plan. Understand your gaps. Build a roadmap for execution. Align your security and privacy programs to reach GDPR compliance.. At times, the road to GDPR compliance may seem to be an overwhelming journey with unsurmountable obstacles. Optiv can help organizations across the six pillars of GDPR compliance. Optiv is a market-leading provider of end-to-end cyber security solutions. We help clients plan, build and run successful cyber security programs that achieve business objectives through our depth and breadth of cyber security offerings, extensive capabilities and proven expertise in cyber security strategy, managed security services, incident response, risk and compliance, security consulting, training and support, integration and architecture services, and security technology. Optiv maintains premium partnerships with more than 350 of the leading security technology manufacturers. For more information, visit www.optiv.com or follow us at www.twitter.com/optiv, www.facebook.com/optivinc and www.linkedin.com/company/optiv-inc. © 207 Optiv All Rights Reserved. Optiv” is a registered trademark of Optiv Security Inc. 1125 17th Street, Suite 1700 Denver, CO 80202 800.574.0896 | www.optiv.com Get in Touch 10.17 | F1