+1-202-802-9399 (US)

Thycotic Events & Webinars

Join us as we bring together thought leaders, industry experts, security architects and more
to address key challenges in Privileged Account Management, IT security,
and how to make the most out of using Thycotic solutions.

Live Webinars

Reducing your domain admin footprint: Real world lessons from FireEye and Thycotic
Thursday, August 16 | 11:00 AM EDT

How many domain admin accounts in your IT environment?  Too many to keep track of?  Don’t have time to implement a recommended “Red Forest” approach to these privileged accounts?

Join Thycotic Chief Security Scientist Joseph Carson and Solution Architect Tyler Croak as they demonstrate practical approaches to reduce your domain administrator footprint and securing these sensitive accounts.   Using real-life examples from a past implementation at cyber security leader FireEye, you will learn how to determine ownership of Domain Admins, turn Domain Admin credentials into OTPs, and much more. Don’t miss this chance to see how Tyler planned and implemented an enterprise scale Secret Server deployment during his time at FireEye.

 

Back to the Basics: Privileged Access Management 101
Thursday, September 13 | 11:00 AM EDT

With so many recent high-profile breaches accomplished through compromising passwords on privileged accounts, Privileged Access Management is now everyone’s priority (Gartner puts it at the top of the list for 2018). But where do you start? And how do you know which PAM solution will work best to protect your organization without sacrificing productivity?

Join Chief Security Scientist Joseph Carson on a brief journey through the Privileged Account Management lifecycle to get you quickly up to speed on:

  • Best practices for evaluating your current PAM practices and where to start
  • How to automatically discover and manage credentials across your network
  • How to demonstrate regulatory compliance with automated reporting

 

How Blue Cross/Blue Shield Successfully Gained Enterprise-wide Adoption of Privileged Account Management
Thursday, September 20 | 11:00 AM EDT

Your Privileged Account Management (PAM) strategy will only be successful if your IT and security teams are on-board. Learn how Louisiana’s largest health insurance company, serving 2M+ members, introduced an enterprise PAM solution with Thycotic’s Secret Server.

Join Dayle Alsbury, Information Security Director at Blue Cross/Blue Shield Louisiana, as he explains how to overcome typical obstacles to PAM adoption through a phased implementation approach. He will share lessons learned and actionable steps from a real-life use case that you can use to make your own PAM strategy a success.

Every registrant will receive a free copy of the 2018 Global State of Privileged Access Management Risk and Compliance Report and is encouraged to take a free online Privileged Access Management Risk Assessment of their own organization.

 

WEEKLY Demos

Join Thycotic for one of our weekly demos

Introduction to Thycotic Privilege Manager

Wednesday, August 22
2:00 PM EDT

Introduction to Thycotic Privilege Manager

Wednesday, September 5
2:00 PM EDT

Don’t miss our other webinars!
See all previously recorded webinars

SEE PAST WEBINARS

On-Demand Webinars

Passwords or Passphrases: How fast can your password be cracked?

“Your password should be 12 characters long, contain at least 1 upper case, 1 lower case, 2 numbers, and 1 special character. You can’t use the same letter twice, you can’t use letters in your username, your password can’t rhyme with the word dog, and all characters can’t be from only one side of the keyboard.”

How many password requirements is too many? And when do those requirements actually start weakening your passwords? Better yet, how fast can those passwords be cracked?

There are many myths and misconceptions around passwords and their strength, and how challenging it is to crack them. In this webinar we’re going to:

  • Dive into some examples and research around the true strength of passwords
  • Review the NIST’s proposed changes to password policy recommendations
  • Provide you with some easy ways to strengthen your password practices
  • Explore tools that help you determine whether your current password policies have already led to weak passwords on your network

 

Anatomy of a Privileged Account Hack: How to Spot it. How to Stop it.

Join Thycotic with a panel of cybersecurity experts as we explain and demonstrate how easy it is for someone to gain access to, and compromise, your domain controller. Our panel will discuss the complete lifecycle of a modern-day cybersecurity breach, from the very simple hack to the very sophisticated infiltration of a network.

Don’t miss this panel discussion to learn:

  • How easy is it to take over any basic privileged account
  • How that basic account can be used to elevate privileges and move laterally through a network
  • How attackers can quickly make their way to your domain controller and other critical systems
  • Key steps to prevent privileged account hacks

 

Secret Server as a Service: How to Maximize PAM Success at Enterprise Scale

Join Thycotic and a Sr. Systems Administrator from cyber security leader FireEye to see how you can leverage the full capabilities and protection of Secret Server across an enterprise-scale environment. We will walk you through a real -world scenario that demonstrates how to set up Secret Server to scale in your organization. You’ll get best practice tips on how Secret Server can be used not only to enhance security but actually improve the productivity of various departments in your organization.

Register now to learn how you can:

  • Plan an enterprise scale Secret Server deployment
  • Implement best practice tips for folder structure
  • Increase adoption across your organization during deployment

 

World Password Day Tips: 10 Common Password Mistakes to Avoid in 2018

This World Password Day join Thycotic Chief Security Scientist Joseph Carson as he shares the ‘secret’ formula to a secure password and overall password management plan based on the latest 2018 research.  Password best practices have evolved and changed, so this is your opportunity to stay a step ahead of hackers by learning:

  • The do’s and don’ts of password security based on the latest 2018 InfoSec research
  • How to avoid the 10 most common password mistakes
  • How best to respond to a password breach and get back to business

PLUS: Every attendee will receive a free hard-copy of Joseph’s new “Cybersecurity for Dummies” book covering the top ways to reduce your online risks, and best practices to protect yourself at work and home.

Check your own password savvy with this Free Password Strength Checker

 

BREACHED! Implementing Incident Response for a Compromised Credential

With 80% of breaches involving compromised credentials, the pace and scope of cyber-attacks continue to accelerate along with the cost of a breach. Join cybersecurity expert Joseph Carson as he takes you from the moment you realize you’ve been breached, to getting back to business with an enterprise-wide privileged account management solution.

You will learn how to:

• Respond to a compromised credential

• Identify your privileged account weaknesses and create an automated approach to Privileged Access Management

• Set up early warning alerts of potential account compromise