Contact Us +1-202-802-9399 U.S. Headquarters

Thycotic Events & Webinars

Join us as we bring together thought leaders, industry experts, security architects and more
to address key challenges in Privileged Account Management, IT security,
and how to make the most out of using Thycotic solutions.

Live Webinars

lightbulb_icon

See how you compare: Privileged Account Vulnerability Benchmark Survey Results
Thursday, May 26th | 10:00 AM ET
Join Thycotic Product Manager Joseph Carson as he reviews the results of a recent groundbreaking benchmark survey on the global state of privileged account security risks. Joseph will discuss the survey results and their implications for how organizations should be protecting their “keys to the kingdom.”

Some of the startling results and major risks to be reviewed and discussed include:

•60% of companies still manually manage their privilege accounts.
•1 out of 5 of companies have not bothered to change their default privileged account passwords.
•30% of companies have no formal password controls and frequently allow accounts and passwords to be shared.
•70% require no formal approval for creating a privileged account.
Gain new insights into the global state of privileged account security and controls, and get the evidence you need to make a case for improving your own privileged account management and security practices.

key_icon

The new EU General Data Protection Regulation: Here’s what you need to know now!
Thursday, June 2nd | 10:00 AM ET
The EU’s new General Data Protection Regulation clock has started on May 4th 2016 and organisations have to transition to it by 2018. Failure to comply with the new regulation could result in companies being fined up to €20m or 4% of their annual turnover, whichever is greater, for failure to protect and provide adequate security to their customer data.* Every organization that collects or processes European citizen’s personal identifiable information will have to comply with the new regulation.

What is the best way to prepare your organization?

Join Thycotic Product Manager, Joseph Carson, as he highlights what you need to know about the GDPR and what you should be doing now to prepare.

Register now to learn:
• The key impacts and consequences for organization’s that collect or process European citizen’s data
• How to set expectations and plan for EU GDPR changes in your organization

All registrants will receive a Free Whitepaper “Preparing for the EU-GDPR: What you need to know now”

*http://bit.ly/TheGuardianNewsFeb2016

arellia-icon_192x192-execute-application

Best Practices for Disaster Recovery and Geo Replication
Thursday, June 9th | 1:00 PM ET
Establishing a set of procedures to recover data and maintain operations during a hardware failure, natural disaster, or other unforeseen circumstances, is mandatory for most businesses and institutions these days. But did you know that Secret Server can help System Administrators by storing and securing critical infrastructure data including admin-level credentials and important documents or files?

Join Thycotic Secret Server expert Ashley Allen, to learn how you can secure and quickly recover critical credentials in the event of a disaster. Ashley will walk you through Secret Server’s extensive list of features that are specifically designed to help you restore processes, along with explaining useful methods for achieving business continuity during disaster scenarios.

arellia-icon_192x192-manage-accounts

How real-time threat analysis with ACS can protect you from zero day attacks
Thursday, June 23rd | 1:00 PM ET
See how Thycotic’s Application Control Solution (ACS) provides real-time threat analysis with automated alert notifications to significantly reduce your risk from zero-day attacks. This webinar will give you a demonstration of attack scenarios where Application Control Solution can examine a known or unknown application’s reputation in real-time regardless of whether it is white- or black-listed. It can then either allow or block that application from running, and automatically alert security personnel if a threat has been detected.

Join Thycotic Product Manager Ed Breay as he demos several scenarios that show how Thycotic’s Application Control Solution:

•Prevents an unsuspecting user from running an infected application
•Examines a “bad” application’s by reputation and generates an alert on the Splunk console showing the file details
•Blocks a suspect application and notifies the user that the application is disallowed

Don’t miss our other webinars!
See all previously recorded webinars

SEE PAST WEBINARS

On-Demand Webinars

Pass the Hash 15 Minute Crash Course by Jonathan Cogley

Pass the Hash: 15 Minute Crash Course
MAY 5th 2015
Join Jonathan Cogley, CEO at Thycotic, for a crash course in Pass the Hash attacks. Find out how they happen, ways newer versions of Windows help protect against them, and other steps you can take to protect your organization. Recorded live at Microsoft Ignite 2015.

Thycotic Webinars - Controlling the Password Kingdom

As an IT admin, how do I control my password kingdom?
March 19th 2015
You have your kingdom of servers, accounts, devices, and also many responsibilities. You want to know that it all works, no accounts or devices are missed, and you want to delegate occasionally so you can actually take a vacation. A few pretty reports during auditor time of the year would be nice too. Join Ben Yoder (Product Manager) and Nathan Wenzler (Senior Technology Evangelist) as they walk through configuring your view and controls in Thycotic Secret Server to make life a bit easier and give you some peace of mind.

Sami Laiho Senior Technical Fellow

Proactive Security beats Reactive Security with Microsoft MVP, Sami Laiho
MAY 8th 2014
Did you see the news about the latest zero-day attack using RTF-files? Yet again an example where no harm is done if you have your proactive security measures are in place. In fact, all of the biggest zero-attacks in the last decade have been of such nature that even without an anti-malware solution you could have avoided the worst consequences if you just had your proactive security done right. If a user has admin rights he/she can turn off the protective measures so this is the most important thing to do right and get rid of the excessive user permission. You can control admins with policies can’t you? No, you cannot, and in this session you’ll see how admins can turn off all policies in a heartbeat. After you’re done getting rid of admin rights you need to implement stuff like firewalls, IPsec, Software Resctriction policies and disk encryption. And yes, you also need a reactive solution like an anti-malware on top of the more important proactive measures. Reactive security reacts to found threats as proactive prevents you from getting them in the first place. Join this session and let one of the leading OS and Security Experts, Sami Laiho, show you how to build a proactive security solution that’s always up to date. No longer rely on someone else finding fingerprints and keeping your security up to date!

Conferences and Trade Shows

Logo - RSA

RSA
San Francisco, California | February 29-March 4, 2016

Logo - IANs

IANS
New York, New York | March 23-24, 2016

BlackHat

Blackhat
Las Vegas, Nevada | July 30-August 4, 2016

Gartner IAM Catalyst Conference

GarTNER CATALYST
SAN DIEGO, CALIFORNIA | August 15-18, 2016

vmworld

VMWORLD
Las Vegas, Nevada | August 28-September 1, 2016

Microsoft Ignite

Microsoft Ignite
Atlanta, Georgia | September 26-30, 2016

Gartner Summits

GARTNER IAM
Las Vegas, Nevada | November 29-December 1, 2016

Logo - UNLOCKED2016

JUNE 20th & 21st | WASHINGTON D.C.