Phone Number +1-202-802-9399 (US)

Thycotic IT security Webinars & events

Join us as we bring together thought leaders, industry experts, cyber security architects and more
to address key challenges in Privileged Access Management and IT Security,
and making the most out of Thycotic’s solutions.

Live Webinars

Service Account 101: How to Start Managing your Service Accounts
Thursday, February 20 | 11:00 AM ET

Our customers are constantly telling us service accounts present many security and logistical challenges. They are usually created ad-hoc, and you’ve got to manage hundreds or even thousands of services running across your network, accessing equal numbers of resources.

Services are programs that run in the background and spring into action when called on by a user, an application, or other services.  As such, these accounts typically don’t have people assigned to them, meaning there is little or no accountability.  If the person who created the service account leaves, they might take the credentials with them, posing a huge security issue.  How do you ensure proper management of these non-human accounts?  Service Account Governance—provisioning, reviewing, and decommissioning these services—needs to be a top priority.  Unfortunately, it’s virtually impossible to implement without proper tools.

Who Should Attend?

  • IT Directors
  • IT System Administrators
  • Database Administrators
  • Security Administrators

What will I learn?

How to take control of service account sprawl to assure your service accounts are identified and managed properly.

Get the answers to these important questions

  • What is the best way to create workflows for service accounts?
  • How can I delegate ownership?
  • How/where should I be provisioning service accounts?
  • What is the best way to enforce service account governance?
  • How can I automate the review and decommissioning of these accounts?

What materials will I receive?

  • A recording of this webinar
  • A free copy of our eBook Service Account for Dummies: Unmanaged, uncontrolled service accounts are a favorite target for cyber criminals. Get control of your service accounts now and see how to effectively manage them with automated tools with our eBook!
  • A free trial of Account Lifecycle Manager: your solution for comprehensive service account governance and control.

 

Privileged Access Management: How to Make the Business Case
Thursday, February 20 | 10:00 AM GMT

Getting Cyber Security heard at Board Level has never been more important, and with PAM as Gartner’s #01 Project for CISOs, there has never been a better time to put together a business case for PAM.

Join Thycotic Product & Strategy Consultant Robert Edmondson as he walks through the key elements of a successful business case for Privileged Access Management Programmes.

Who Should Attend?

Any IT or Security Professional who has a stake in PAM

What will I learn?

  • The key elements in a successful and impactful business case.
  • How to show the value of PAM at a business level. How PAM affects stakeholders throughout the business.
  • How to run a successful PAM project in terms of business value.

Get the answers to these important questions

  • Where do you start with a business case?
  • What are the key elements that it must cover?
  • How do you keep Total Cost of Ownership low?

What materials will I receive?

  • The Business Case Playbook from Thycotic
  • A recording of the Webinar
  • Links for free Business Risk Assessment Tools

 

Privileged Access Management: How to Make the Business Case
Thursday, February 20 | 3:00PM ACDT

Getting Cyber Security heard at Board Level has never been more important, and with PAM as Gartner’s #01 Project for CISOs, there has never been a better time to put together a business case for PAM.

Join Thycotic Product & Strategy Consultant Robert Edmondson as he walks through the key elements of a successful business case for Privileged Access Management Programmes.

Who Should Attend?

Any IT or Security Professional who has a stake in PAM

What will I learn?

  • The key elements in a successful and impactful business case.
  • How to show the value of PAM at a business level. How PAM affects stakeholders throughout the business.
  • How to run a successful PAM project in terms of business value.

Get the answers to these important questions

  • Where do you start with a business case?
  • What are the key elements that it must cover?
  • How do you keep Total Cost of Ownership low?

What materials will I receive?

  • The Business Case Playbook from Thycotic
  • A recording of the Webinar
  • Links for free Business Risk Assessment Tools

 

CISO Metrics Report: IT Security Performance & the Boardroom
Thursday, March 26 | 11:00 AM ET

In a recent study, almost 50% of cyber security professionals believe their executive boards see them strictly in  a maintenance role rather than as a source for business innovation . Thycotic’s recent research highlights key management issues facing those responsible for cyber security, including the need to address perceptions of the board, senior leadership and employees.

Given the enormous impact of security breaches and expanding compliance requirements, CISOs need to understand and overcome these internal challenges to get budget resources and avoid burnout.

Join Product Marketing Manager Erin Duncan as she discusses how cyber security professionals can expand their influence and align cyber security with business priorities, making a stronger case for security investments with executive boards.

Who should attend this webinar?

CISOs, IT and security directors and managers as well as professionals looking to move into those roles.

What will I learn?

Cyber security executive insights on how CISOs set key metrics, manage business alignment and improve leadership skills. You’ll also learn how to communicate to the board and change perceptions that restrict cyber security effectiveness.

Get the answers to these important questions:

  • What are other CISOs opinions about the challenges they face and how to overcome them?
  • How do I measure success and overcome cyber security obstacles?
  • How do I achieve the cyber security budget my team needs?
  • How do I avoid stress and get everyone motivated?

What materials will I receive?

  • A recording of the webinar
  • Cyber Security Team’s Guide to Success report

 

WEEKLY Demos

Join Thycotic for one of our weekly demos

Introduction to Thycotic Privilege Manager

Wednesday, February 5
2:00 PM EST

Introduction to Thycotic Privilege Manager

Wednesday, February 19
2:00 PM EST

Don’t miss our other free IT and cyber security webinars!
See all previously recorded webinars

SEE PAST WEBINARS

On-Demand Webinars

BREACHED! Implementing Incident Response for a Compromised Credential

With 80% of breaches involving compromised credentials, the pace and scope of cyber-attacks continue to accelerate along with the cost of a breach. Join cybersecurity expert Joseph Carson as he takes you from the moment you realize you’ve been breached, to getting back to business with an enterprise-wide privileged account management solution.

You will learn how to:

• Respond to a compromised credential

• Identify your privileged account weaknesses and create an automated approach to Privileged Access Management

• Set up early warning alerts of potential account compromise

 

 

Least Privilege 101: How to Start Your Least Privilege Cybersecurity Journey

Are you looking at ways to implement least privilege across your IT environment? With 80% of breaches involving the compromise of IT and business user credentials (IDs and passwords) you need to create a plan to eliminate “overprivileged access” by users, applications, and services.

Join Thycotic Chief Cyber Security Scientist Joseph Carson, author of the new “Least Privilege Cybersecurity for Dummies” book, as he explains how to make a least privilege strategy successful in your organization.

Learn how you can substantially reduce the risk of exploitation on endpoints while preserving user productivity. This webinar will help you:

  • Understand the basic concepts of least privilege cybersecurity
  • Know the key steps to planning your least privilege cybersecurity strategy
  • See how to apply least privilege with application control

 

How Cyber Criminals Crack Your Passwords Using Dictionary Searches and Brute-Force

Interested in learning how a password is cracked? The Collection 1 Data Breach saw over 1 billion unique email addresses and passwords exposed. So how did they get their hands on them in the first place?

Step into the world of a cyber criminal with our Chief Cyber Security Scientist, Joseph Carson and special guest, X-Force Red’s Senior Managing Consultant, Dustin Heywood. They will walk you through how easy it is to hack your passwords through two of the most common techniques: dictionary searches and brute-force. Leveraging the popular pen testing tool, Kali Linux, Joseph and Dustin will take you through some of the most popular and latest tools cyber criminals use every day to perform these hacking techniques.

Attend this webinar to:

  • Gain insight into the vulnerabilities of passwords and how cyber criminals use different methods to easily crack them.
  • Learn what makes a secure password and how to update your password policies to reflect the latest NIST guidelines.
  • Discover resources that will help you develop and maintain best practices for password security.