Thycotic Telephone Number +1-202-802-9399 (US)

Thycotic IT security Webinars & events

Join us as we bring together thought leaders, industry experts, cyber security architects and more
to address key challenges in Privileged Access Management and IT Security,
and making the most out of Thycotic’s solutions.

Live Webinars

Guiding Your Cyber Security Team to Success: How to Measure Results, Secure Budget, and Avoid Stress
Tuesday, October 29 | 10:00 AM GMT

Are we empowering CISOs and their teams to succeed at protecting our most sensitive data assets from every increasing cyberthreats?  Do we provide them with the resources and budget they need to reduce the ever-growing risks from cyberattacks?

CISOs have one of the most difficult and challenging jobs in any business today. They typically work hidden in the background, leading a combination of security and operation teams charged with keeping critical systems and sensitive data protected from cyber criminals and malicious insiders.  Constantly on duty, ensuring systems are updated and patches applied, delivering cyber security awareness training, controlling and securing privileged access—not to mention satisfying rapidly evolving compliance mandates and regulations their businesses are required to meet.

Global survey shares cyber security team insights on how CISOs set key metrics, manage business alignment and improve leadership skills

Join this webinar to learn from your cyber security colleagues about:

  • Measuring success and overcoming obstacles
  • Achieving the security budget you want and need
  • Avoiding stress and getting everyone motivated


National Cyber Security Awareness Month: Cyber Security Campfire
Thursday, October 31 | 11:00 AM ET

It’s October and National Cyber Security Awareness Month is upon us.  As a National Cyber Security Alliance partner, we’re excited to share a glimpse in to the life of a CISO and reveal the most terrifying stories from the front line. Get in the Halloween spirit and gather around the campfire as our very own CISO Terence Jackson shares:

  • Why he chose a cyber security career
  • What the biggest security threats of 2019 are
  • How to stay safe online all year long

An especially sweet treat, you’ll have a chance to submit your top cyber security career questions and scariest tales to have answered & shared live during the webinar. Submit them using the #CISOtales hashtag or by emailing Grab some s’mores – we invite you to share spooky security stories across the Dark Web and learn a few tricks to staying secure all year long.


How much does your PAM software really cost?
Thursday, December 12

Virtually any time you recommend a technology purchase, your boss, executive management, and the finance department want to know the cost. As you plan to implement Privileged Access Management software, do you know the real cost? Total cost of ownership goes far beyond software and support costs; To get the complete picture, you also need to calculate the cost of infrastructure, professional services, supporting technology, and internal operations to support the project.

Before you reach for your calculator, make sure you factor in all these variables. Consider what it costs to get up and running and to maintain and grow your solution over time. In this webinar, we’ll review the right questions to ask and all the information you need so you can budget time, money, and resources before you buy PAM software.



Join Thycotic for one of our weekly demos

Introduction to Thycotic Privilege Manager

Wednesday, October 16
2:00 PM EST

Introduction to Thycotic Privilege Manager

Wednesday, October 30
2:00 PM EST

Don’t miss our other free IT and cyber security webinars!
See all previously recorded webinars


On-Demand Webinars

BREACHED! Implementing Incident Response for a Compromised Credential

With 80% of breaches involving compromised credentials, the pace and scope of cyber-attacks continue to accelerate along with the cost of a breach. Join cybersecurity expert Joseph Carson as he takes you from the moment you realize you’ve been breached, to getting back to business with an enterprise-wide privileged account management solution.

You will learn how to:

• Respond to a compromised credential

• Identify your privileged account weaknesses and create an automated approach to Privileged Access Management

• Set up early warning alerts of potential account compromise



Least Privilege 101: How to Start Your Least Privilege Cybersecurity Journey

Are you looking at ways to implement least privilege across your IT environment? With 80% of breaches involving the compromise of IT and business user credentials (IDs and passwords) you need to create a plan to eliminate “overprivileged access” by users, applications, and services.

Join Thycotic Chief Cyber Security Scientist Joseph Carson, author of the new “Least Privilege Cybersecurity for Dummies” book, as he explains how to make a least privilege strategy successful in your organization.

Learn how you can substantially reduce the risk of exploitation on endpoints while preserving user productivity. This webinar will help you:

  • Understand the basic concepts of least privilege cybersecurity
  • Know the key steps to planning your least privilege cybersecurity strategy
  • See how to apply least privilege with application control


How Cyber Criminals Crack Your Passwords Using Dictionary Searches and Brute-Force

Interested in learning how a password is cracked? The Collection 1 Data Breach saw over 1 billion unique email addresses and passwords exposed. So how did they get their hands on them in the first place?

Step into the world of a cyber criminal with our Chief Cyber Security Scientist, Joseph Carson and special guest, X-Force Red’s Senior Managing Consultant, Dustin Heywood. They will walk you through how easy it is to hack your passwords through two of the most common techniques: dictionary searches and brute-force. Leveraging the popular pen testing tool, Kali Linux, Joseph and Dustin will take you through some of the most popular and latest tools cyber criminals use every day to perform these hacking techniques.

Attend this webinar to:

  • Gain insight into the vulnerabilities of passwords and how cyber criminals use different methods to easily crack them.
  • Learn what makes a secure password and how to update your password policies to reflect the latest NIST guidelines.
  • Discover resources that will help you develop and maintain best practices for password security.