+1-202-802-9399 (US)

Thycotic Events & Webinars

Join us as we bring together thought leaders, industry experts, security architects and more
to address key challenges in Privileged Account Management, IT security,
and how to make the most out of using Thycotic solutions.

Live Webinars

The Sleepless CISO: Spot the early warning signs of insider threats
Thursday, February 22 | 11:00 AM ET

Three out of four respondents in a “2016 Insider Threat Report” by the Information Security Community on LinkedIn estimated insider threats cost their organizations an average of $500,000 in 2016.

New, innovative machine learning tools can help you identify and alert you to suspicious behavior by insiders before you experience a compromise.  See how you can take a proactive approach to detecting insider threats and potential data theft by joining Product Manager Dan Ritch, as he demos Thycotic’s Privileged Behavior Analytics solution.  You’ll learn how you can:

  • Free up time and effort from time-consuming log collection and analysis.
  • Set up views of privileged accounts and access patterns for individual users across your enterprise to observe and detect anomalous behaviors.

Can’t make it? Be sure to still register to receive the recording to your inbox.


Ready for GDPR? Here’s Your 8-step, Last Minute Reality Checklist!
Thursday, March 1 | 12:00 Noon GMT

The EU General Data Protection Regulation is only weeks away—going into effect on May 25, 2018! Many companies are rushing to make sure they have done everything to meet GDPR requirements. Is your organisation prepared? Join cybersecurity expert Joseph Carson as he reviews the significant regulatory requirements of the EU GDPR, and walks you through a quick 8-step checklist to make sure you are ready.

Can’t make it? Be sure to still register to receive the recording to your inbox.


How to Respond to a Cybersecurity Breach – Your Guide to Getting Back to Business
Thursday, March 22 | 11:00 AM ET

Most organizations are fast realizing that experiencing a cybersecurity breach is only a matter of time. But as the latest headline-grabbing breaches remind us, too many organizations fail to respond appropriately—risking their reputations, customer relationships and substantial fines.

Join cybersecurity expert Joseph Carson as he provides recommended best practices on how to respond to a cyber incident, along with key takeaways based on lessons learned from several high-profile breaches this past year.



Join Thycotic for one of our weekly demos

Introduction to Thycotic Privilege Manager

Wednesday, February 28
3:00 PM EST

Don’t miss our other webinars!
See all previously recorded webinars


On-Demand Webinars

5 Free PAM Tools Cybersecurity Professionals Live For

Get a quick overview of the latest cyber security tools that can help transform your PAM security program. You will save time and money while improving the protection of your privileged account passwords with these Free PAM security tools and training:

  • Secret Server Free – The fastest to deploy, easiest to use privileged access password security solution in a free edition.
  • Password Security Policy Template – Privileged account password security policy templates ready to customize, and help demonstrate compliance.
  • Windows Endpoint Application Discovery Tool- Identifies the riskiest applications running in your environment with reports that help you evaluate their potential risks.
  • Windows and Unix Privileged Account Discovery Tool – Saves you hours of effort in locating unknown and therefore unprotected privileged accounts.
  • Privileged Password Security Certification Training – One hour, online Privileged Password Security Training teaches you the basics of privileged account security.


Passwords or Passphrases: How fast can your password be cracked?

“Your password should be 12 characters long, contain at least 1 upper case, 1 lower case, 2 numbers, and 1 special character. You can’t use the same letter twice, you can’t use letters in your username, your password can’t rhyme with the word dog, and all characters can’t be from only one side of the keyboard.”

How many password requirements is too many? And when do those requirements actually start weakening your passwords? Better yet, how fast can those passwords be cracked?

There are many myths and misconceptions around passwords and their strength, and how challenging it is to crack them. In this webinar we’re going to:

  • Dive into some examples and research around the true strength of passwords
  • Review the NIST’s proposed changes to password policy recommendations
  • Provide you with some easy ways to strengthen your password practices
  • Explore tools that help you determine whether your current password policies have already led to weak passwords on your network


Anatomy of a Privileged Account Hack: How to Spot it. How to Stop it.

Join Thycotic with a panel of cybersecurity experts as we explain and demonstrate how easy it is for someone to gain access to, and compromise, your domain controller. Our panel will discuss the complete lifecycle of a modern-day cybersecurity breach, from the very simple hack to the very sophisticated infiltration of a network.

Don’t miss this panel discussion to learn:

  • How easy is it to take over any basic privileged account
  • How that basic account can be used to elevate privileges and move laterally through a network
  • How attackers can quickly make their way to your domain controller and other critical systems
  • Key steps to prevent privileged account hacks


Secret Server as a Service: How to Maximize PAM Success at Enterprise Scale

Join Thycotic and a Sr. Systems Administrator from cyber security leader FireEye to see how you can leverage the full capabilities and protection of Secret Server across an enterprise-scale environment. We will walk you through a real -world scenario that demonstrates how to set up Secret Server to scale in your organization. You’ll get best practice tips on how Secret Server can be used not only to enhance security but actually improve the productivity of various departments in your organization.

Register now to learn how you can:

  • Plan an enterprise scale Secret Server deployment
  • Implement best practice tips for folder structure
  • Increase adoption across your organization during deployment


Using Excel to store privileged account passwords? You’ve probably already been breached.

Many organizations and IT Administrators still use Excel spreadsheets to store passwords in privileged accounts and share them between key staff members so they can gain access to important and critical systems. Yet this entrenched practice of storing sensitive passwords and credentials in a spreadsheet is a major security risk and should be avoided at all costs. In fact, your systems may already have been breached with this practice and you don’t even know it.

Join Thycotic Product Manager, Joseph Carson, as he highlights why and how you should eliminate the unnecessary risks around using Excel to manage privileged passwords including:

• Why Excel was never intended to be a Password Management Solution
• The lack of built-in security with spreadsheets
• Excel risks for data loss, security updates and transportability
• How you can eliminate these risks with automated PAM solutions

Everyone registered will receive a free white paper describing the risks with using Excel and how to eliminate them.



Conferences and Trade Shows

Las Vegas, NV
March 5-9, 2018

Tenable Edge
Los Angeles, CA
March 8-9, 2018

Logo - RSA

San Francisco, CA
April 16-19, 2018

ISACA Health IoT
Rosslyn, VA
April 26, 2018

Sailpoint Navigate
Austin, TX
May 14-16, 2018

Gartner Summits

Gartner Security & Risk
National Harbor, MD
June 4-7, 2018

Arlington, VA
June 12-13, 2018


Black Hat
Las Vegas, NV
August 8-9


Las Vegas, NV
August 26-30

Microsoft Ignite

Orlando, FL
September 24-27

Gartner Summits

Gartner IAM
Las Vegas, NV
December 3-5, 2018