+1-202-802-9399 (US)

Thycotic Events & Webinars

Join us as we bring together thought leaders, industry experts, security architects and more
to address key challenges in Privileged Account Management, IT security,
and how to make the most out of using Thycotic solutions.

Live Webinars

World Password Day Tips: 10 Common Password Mistakes to Avoid in 2018
Thursday, May 3 | 11:00 AM EDT

This World Password Day join Thycotic Chief Security Scientist Joseph Carson as he shares the ‘secret’ formula to a secure password and overall password management plan based on the latest 2018 research.  Password best practices have evolved and changed, so this is your opportunity to stay a step ahead of hackers by learning:

  • The do’s and don’ts of password security based on the latest 2018 InfoSec research
  • How to avoid the 10 most common password mistakes
  • How best to respond to a password breach and get back to business

PLUS: Every attendee will receive a free hard-copy of Joseph’s new “Cybersecurity for Dummies” book covering the top ways to reduce your online risks, and best practices to protect yourself at work and home.

Check your own password savvy with this Free Password Strength Checker

 

BREACHED! Implementing Incident Response for a Compromised Credential
Thursday, May 24 | 11:00 AM EDT

With 80% of breaches involving compromised credentials, the pace and scope of cyber-attacks continue to accelerate along with the cost of a breach. Join cybersecurity expert Joseph Carson as he takes you from the moment you realize you’ve been breached, to getting back to business with an enterprise-wide privileged account management solution.

You will learn how to:

• Respond to a compromised credential

• Identify your privileged account weaknesses and create an automated approach to Privileged Access Management

• Set up early warning alerts of potential account compromise

Every registrant will receive a copy of the 2018 Global State of Privileged Access Management Risk and Compliance Report.

PLUS: One lucky attendee will win a $50 Amazon gift card at the end of the webinar!

 

The Secret to Improving DevSecOps Credential Security without Sacrificing Productivity
Thursday, June 21 | 11:00 AM EDT

By 2021, security practices will be embedded in 80% of rapid DevOps teams according to Gartner. And as organizations race to adopt a DevSecOps model, eliminating security gaps in the DevOps environment and keeping user credentials secure are a top priority. Typical DevOps vulnerabilities include, embedded credentials in application environments, stored credentials in popular repositories, or shared private keys and credentials for fast access to source code.

Join Thycotic Product Manager Dan Ritch as he explains how you can help assure proper credential security for your DevOps team with an automated privileged access solution. You will learn:

• How to optimize your team’s DevOp’s environment to increase security without hindering their development and deployment schedules. 

• An automated approach to remove hardcoded passwords and meet compliance without impacting workflow. 

• How to integrate PAM security across each tool in the DevOps toolchain.

Every registered attendee will get a free “Securing access for agile DevOps Teams: Privileged Account Management (PAM) as Code” whitepaper.

PLUS: One lucky attendee will win a $50 Amazon gift card at the end of the webinar!

 

WEEKLY Demos

Join Thycotic for one of our weekly demos

Introduction to Thycotic Privilege Manager

Wednesday, April 25
3:00 PM EST

Introduction to Thycotic Privilege Manager

Wednesday, May 9
3:00 PM EST

Don’t miss our other webinars!
See all previously recorded webinars

SEE PAST WEBINARS

On-Demand Webinars

5 Free PAM Tools Cybersecurity Professionals Live For

Get a quick overview of the latest cyber security tools that can help transform your PAM security program. You will save time and money while improving the protection of your privileged account passwords with these Free PAM security tools and training:

  • Secret Server Free – The fastest to deploy, easiest to use privileged access password security solution in a free edition.
  • Password Security Policy Template – Privileged account password security policy templates ready to customize, and help demonstrate compliance.
  • Windows Endpoint Application Discovery Tool- Identifies the riskiest applications running in your environment with reports that help you evaluate their potential risks.
  • Windows and Unix Privileged Account Discovery Tool – Saves you hours of effort in locating unknown and therefore unprotected privileged accounts.
  • Privileged Password Security Certification Training – One hour, online Privileged Password Security Training teaches you the basics of privileged account security.

 

Passwords or Passphrases: How fast can your password be cracked?

“Your password should be 12 characters long, contain at least 1 upper case, 1 lower case, 2 numbers, and 1 special character. You can’t use the same letter twice, you can’t use letters in your username, your password can’t rhyme with the word dog, and all characters can’t be from only one side of the keyboard.”

How many password requirements is too many? And when do those requirements actually start weakening your passwords? Better yet, how fast can those passwords be cracked?

There are many myths and misconceptions around passwords and their strength, and how challenging it is to crack them. In this webinar we’re going to:

  • Dive into some examples and research around the true strength of passwords
  • Review the NIST’s proposed changes to password policy recommendations
  • Provide you with some easy ways to strengthen your password practices
  • Explore tools that help you determine whether your current password policies have already led to weak passwords on your network

 

Anatomy of a Privileged Account Hack: How to Spot it. How to Stop it.

Join Thycotic with a panel of cybersecurity experts as we explain and demonstrate how easy it is for someone to gain access to, and compromise, your domain controller. Our panel will discuss the complete lifecycle of a modern-day cybersecurity breach, from the very simple hack to the very sophisticated infiltration of a network.

Don’t miss this panel discussion to learn:

  • How easy is it to take over any basic privileged account
  • How that basic account can be used to elevate privileges and move laterally through a network
  • How attackers can quickly make their way to your domain controller and other critical systems
  • Key steps to prevent privileged account hacks

 

Secret Server as a Service: How to Maximize PAM Success at Enterprise Scale

Join Thycotic and a Sr. Systems Administrator from cyber security leader FireEye to see how you can leverage the full capabilities and protection of Secret Server across an enterprise-scale environment. We will walk you through a real -world scenario that demonstrates how to set up Secret Server to scale in your organization. You’ll get best practice tips on how Secret Server can be used not only to enhance security but actually improve the productivity of various departments in your organization.

Register now to learn how you can:

  • Plan an enterprise scale Secret Server deployment
  • Implement best practice tips for folder structure
  • Increase adoption across your organization during deployment

 

Using Excel to store privileged account passwords? You’ve probably already been breached.

Many organizations and IT Administrators still use Excel spreadsheets to store passwords in privileged accounts and share them between key staff members so they can gain access to important and critical systems. Yet this entrenched practice of storing sensitive passwords and credentials in a spreadsheet is a major security risk and should be avoided at all costs. In fact, your systems may already have been breached with this practice and you don’t even know it.

Join Thycotic Product Manager, Joseph Carson, as he highlights why and how you should eliminate the unnecessary risks around using Excel to manage privileged passwords including:

• Why Excel was never intended to be a Password Management Solution
• The lack of built-in security with spreadsheets
• Excel risks for data loss, security updates and transportability
• How you can eliminate these risks with automated PAM solutions

Everyone registered will receive a free white paper describing the risks with using Excel and how to eliminate them.