+1-202-802-9399 U.S. Headquarters

Thycotic Events & Webinars

Join us as we bring together thought leaders, industry experts, security architects and more
to address key challenges in Privileged Account Management, IT security,
and how to make the most out of using Thycotic solutions.

Live Webinars

Incident Response: Best practices to manage cyber breaches
Thursday, August 24 | 11:00 AM ET

Every second after a breach is critical to the survival of your company. In today’s world, every organization no matter how large or small needs an Incident Response plan in place to quickly manage and address the consequences of a breach. According to The SANS Institute, “More than one-quarter of IR professionals (26%) are dissatisfied with their current organization’s IR capabilities, calling them ineffective.” Are you prepared with an effective IR plan?

Join Thycotic security expert Joseph Carson as he demonstrates a security breach event through role-playing and how to best respond.

You will gain insights into:

• How to develop an effective and comprehensive Incident Response Plan
• Proven processes to manage detection and remediation of lost data
• The critical actions companies often fail to execute following a breach


Dynamic Duo. How Thycotic and Tenable Can Help Meet ASD Top 4 Mitigation Strategies
Wednesday, September 6 | 15:00 PM AEST

With cyber intrusions posing the biggest threat to government ICT systems, the Australian Signals Directorate (ASD) released a publication with 35 strategies to mitigate these attacks, ranked in order of overall effectiveness. According to the ASD, over 85% of cyber intrusions could be prevented by following the top four strategies on the list.

Join Tenable Network Security and Thycotic to learn how together, Tenable.io and Thycotic Secret Server can help you meet ASD Top 4 Recommendations.

During the webinar, Thycotic Chief Security Scientist Jospeh Carson and Richard Bussiere Tenable Technical Director will discuss:

• Performing deeper vulnerability assessments

• How to shrink the attack surface

• Reducing the time and effort needed for credential additions and changes

• How to Improve compliance with regulations requirement credential management



Staying ahead of the compliance whirlwind: HIPPA, PCI, GDPR and more…
Thursday, September 7 | 11:00 AM ET

Meeting the constantly changing provisions of HIPPA, PCI and GDPR consumes valuable IT resources. Yet, failing to keep up can result in hefty fines or worse.

Join Thycotic Senior Director of Product Development, Jai Dargan as he highlights the latest changes in major regulatory compliance that your organization must implement to satisfy auditors and reduce the risk to your organization from legal liabilities.

You will learn how to:

• Stay on top of security and compliance requirements without sacrificing productivity
• Develop a formal plan to handle and incorporate future compliance changes
• Implement an automated approach to compliance reporting


Anatomy of a Privileged Account Hack: How to Spot it. How to Stop it.
Thursday, September 21 | 11:00 AM ET

Join Thycotic with a panel of cybersecurity experts as we explain and demonstrate how easy it is for someone to gain access to, and compromise, your domain controller. Our panel will discuss the complete lifecycle of a modern-day cybersecurity breach, from the very simple hack to the very sophisticated infiltration of a network.

Don’t mess this panel discussion to learn:

  • How easy it is to take over any basic privileged account
  • How that basic account can be used to elevate privileges and move laterally through a network
  • How attackers can quickly make their way to your domain controller and other critical systems
  • Key steps to prevent privileged account hacks



Join Thycotic for one of our weekly demos

Introduction to Thycotic Privilege Manager for Windows

Wednesday, September 20
2:00 PM EST

Don’t miss our other webinars!
See all previously recorded webinars


On-Demand Webinars

5 Free PAM Tools Cybersecurity Professionals Live For

Get a quick overview of the latest cyber security tools that can help transform your PAM security program. You will save time and money while improving the protection of your privileged account passwords with these Free PAM security tools and training:

  • Secret Server Free – The fastest to deploy, easiest to use privileged access password security solution in a free edition.
  • Password Security Policy Template – Privileged account password security policy templates ready to customize, and help demonstrate compliance.
  • Windows Endpoint Application Discovery Tool- Identifies the riskiest applications running in your environment with reports that help you evaluate their potential risks.
  • Windows and Unix Privileged Account Discovery Tool – Saves you hours of effort in locating unknown and therefore unprotected privileged accounts.
  • Privileged Password Security Certification Training – One hour, online Privileged Password Security Training teaches you the basics of privileged account security.


Passwords or Passphrases: How fast can your password be cracked?

“Your password should be 12 characters long, contain at least 1 upper case, 1 lower case, 2 numbers, and 1 special character. You can’t use the same letter twice, you can’t use letters in your username, your password can’t rhyme with the word dog, and all characters can’t be from only one side of the keyboard.”

How many password requirements is too many? And when do those requirements actually start weakening your passwords? Better yet, how fast can those passwords be cracked?

There are many myths and misconceptions around passwords and their strength, and how challenging it is to crack them. In this webinar we’re going to:

  • Dive into some examples and research around the true strength of passwords
  • Review the NIST’s proposed changes to password policy recommendations
  • Provide you with some easy ways to strengthen your password practices
  • Explore tools that help you determine whether your current password policies have already led to weak passwords on your network


Secret Server as a Service: How to Maximize PAM Success at Enterprise Scale

Join Thycotic and a Sr. Systems Administrator from cyber security leader FireEye to see how you can leverage the full capabilities and protection of Secret Server across an enterprise-scale environment. We will walk you through a real -world scenario that demonstrates how to set up Secret Server to scale in your organization. You’ll get best practice tips on how Secret Server can be used not only to enhance security but actually improve the productivity of various departments in your organization.

Register now to learn how you can:

  • Plan an enterprise scale Secret Server deployment
  • Implement best practice tips for folder structure
  • Increase adoption across your organization during deployment


Using Excel to store privileged account passwords? You’ve probably already been breached.

Many organizations and IT Administrators still use Excel spreadsheets to store passwords in privileged accounts and share them between key staff members so they can gain access to important and critical systems. Yet this entrenched practice of storing sensitive passwords and credentials in a spreadsheet is a major security risk and should be avoided at all costs. In fact, your systems may already have been breached with this practice and you don’t even know it.

Join Thycotic Product Manager, Joseph Carson, as he highlights why and how you should eliminate the unnecessary risks around using Excel to manage privileged passwords including:

• Why Excel was never intended to be a Password Management Solution
• The lack of built-in security with spreadsheets
• Excel risks for data loss, security updates and transportability
• How you can eliminate these risks with automated PAM solutions

Everyone registered will receive a free white paper describing the risks with using Excel and how to eliminate them.


Who knew? The Top 5 Applications you should blacklist now!

Companies globally use thousands of applications that help with accessing emails, browsing the internet, running videos, listening to audio/music, mathematical calculations, and more. And, hackers and cyber criminals know how to exploit vulnerabilities associated with these applications to easily access systems that run these applications.

Join Thycotic Product Manager Joseph Carson as he reveals the top five common and popular applications (you may be surprised!) that pose the greatest risk to your organization — and how you can lock down systems running these applications, blacklist them or choose to remove them completely to help assure application access control. Every registered attendee will receive a free white paper, “The Top 5 Applications You Should Blacklist Now.”



October 19th & 20th | Washington DC

Conferences and Trade Shows

Sydney, Australia | August 23, 2017


VMworld 2017
Las Vegas, NV | August 27-31, 2017

Microsoft Ignite

Ignite 2017
Orlando, FL | September 25-29, 2017

Sydney, Australia | October 10-12, 2017

Nuremberg, Germany | October, 10-12 2017

Gartner Summits

Gartner Identity & Access Management Summit
Las Vegas, NV | November 28-30, 2017

IMI | IT meets Industry 2017

IT meets Industry
Frankenthal, Germany | September 19-20, 2017

9th e-Crime Abu Dhabi

Abu Dhabi, United Arab Emirates | 27 September, 2017

Gartner Summits

Gartner Security & Risk Management Summit
Sydney, Australia | August 21-22, 2017