HIPAA’s Technical Safeguards: Managing Access to electronic-Protected Health Information (e-PHI) with Thycotic’s Secret Server
Thursday, February 11th | 1:00 PM EST
With digital medical records, patient online portals and other electronic methods of healthcare management, maintaining a secure network is critical to meet the Health Insurance Portability and Accountability Act (HIPAA) Technical Safegaurd requirements. IT accounts, such as IT admin accounts, application and service accounts, each grant a specific level of access to your companies electronic Protected Health Information (e-PHI). Typically IT teams share these credentials amongst themselves to gain access to equipment storing patient’s information, as needed. This makes it very difficult to know who exactly is accessing your patient’s data and to restrict access amongst IT staff. In this Webinar you’ll learn how Thycotic’s Secret Server Password Management Software manages the availability, rotation, and integrity of the privilege accounts that allow access to electronic Protected Health Information (e-PHI).
Top 5 Benefits of our Free Privileged Account Discovery for Windows
Thursday, February 25th | 1:00 PM EST
Do you know just how many privileged accounts and service accounts you have across your network? Privileged accounts are a key target of hackers and malicious insiders, but do you know where they all are? Our new free Windows Privileged Discovery Tool provides a single collection point for all your Windows privileged accounts across your entire network automatically. Join our webinar to learn the top 5 benefits of Privileged Account Discovery for Windows and how to use our new free tool to find at-risk privileged Windows accounts.
Managing VMware Environments with Thycotic Secret Server
Thursday, March 10th | 1:00 PM EST
In today’s world, virtualization is everywhere and it’s important to properly manage the privileged accounts. With Thycotic Secret Server you are able to find these privileged accounts in virtual environments and help your team manage, control and rotate those passwords. From ESXi to vCenter, learn how to get it all accessed and controlled from a single application while providing security and full auditing capabilities. Join the webinar and learn how Thycotic Secret Server can help control your VM environment.
2016 RSA Survey Results
Thursday, March 31st | 1:00 PM EST
RSA Conference 2016 will bring thousands of Information Security industry professionals to San Francisco for a week of sessions, learning labs, and connecting with peers and solutions to discuss current trends and progress. This year we’re asking attendees about cybersecurity trends and their thoughts on breaking industry news. Join our Executive Director of Security, Nathan Wenzler, to hear the top trends and leading industry news from RSA as well as our survey results.
Pass the Hash: 15 Minute Crash Course
MAY 5th 2015
Join Jonathan Cogley, CEO at Thycotic, for a crash course in Pass the Hash attacks. Find out how they happen, ways newer versions of Windows help protect against them, and other steps you can take to protect your organization. Recorded live at Microsoft Ignite 2015.
As an IT admin, how do I control my password kingdom?
March 19th 2015
You have your kingdom of servers, accounts, devices, and also many responsibilities. You want to know that it all works, no accounts or devices are missed, and you want to delegate occasionally so you can actually take a vacation. A few pretty reports during auditor time of the year would be nice too. Join Ben Yoder (Product Manager) and Nathan Wenzler (Senior Technology Evangelist) as they walk through configuring your view and controls in Thycotic Secret Server to make life a bit easier and give you some peace of mind.
Proactive Security beats Reactive Security with Microsoft MVP, Sami Laiho
MAY 8th 2014
Did you see the news about the latest zero-day attack using RTF-files? Yet again an example where no harm is done if you have your proactive security measures are in place. In fact, all of the biggest zero-attacks in the last decade have been of such nature that even without an anti-malware solution you could have avoided the worst consequences if you just had your proactive security done right. If a user has admin rights he/she can turn off the protective measures so this is the most important thing to do right and get rid of the excessive user permission. You can control admins with policies can’t you? No, you cannot, and in this session you’ll see how admins can turn off all policies in a heartbeat. After you’re done getting rid of admin rights you need to implement stuff like firewalls, IPsec, Software Resctriction policies and disk encryption. And yes, you also need a reactive solution like an anti-malware on top of the more important proactive measures. Reactive security reacts to found threats as proactive prevents you from getting them in the first place. Join this session and let one of the leading OS and Security Experts, Sami Laiho, show you how to build a proactive security solution that’s always up to date. No longer rely on someone else finding fingerprints and keeping your security up to date!
Conferences and Trade Shows
New York, New York | March 23-24, 2016
Las Vegas, Nevada | July 30-August 4, 2016
SAN DIEGO, CALIFORNIA | August 15-18, 2016
Las Vegas, Nevada | August 28-September 1, 2016
Atlanta, Georgia | September 26-30, 2016