+1-202-802-9399 U.S. Headquarters

Thycotic Events & Webinars

Join us as we bring together thought leaders, industry experts, security architects and more
to address key challenges in Privileged Account Management, IT security,
and how to make the most out of using Thycotic solutions.

Live Webinars

Enemy Within: How to Detect and Stop Insider Cyber Threat
Thursday, August 10 | 11:00 AM ET

Whether working on your network or remotely, your colleagues know the ins and outs of your network and your system’s biggest weaknesses. To safeguard against insider abuse or misuse, you need a security plan in place to monitor and control access to privileged accounts—the keys to your kingdom.

Join cybersecurity expert Joseph Carson as he demonstrates how to combine privileged account management and privileged user analytics to deliver an actionable plan to immediately detect and combat insider threats.

You will learn:

• How to set up alerts for anomalous behaviors that call for immediate action
• What to look for in detecting insider threats early
• What actions to take after an insider threat occurs

 

Secret Server as a Service: How to Maximize PAM Success at Enterprise Scale
Tuesday, August 15 | 11:00 AM ET

Join Thycotic and a Sr. Systems Administrator from cyber security leader FireEye to see how you can leverage the full capabilities and protection of Secret Server across an enterprise-scale environment… We will walk you through a real -world scenario that demonstrates how to set up Secret Server to scale in your organization. You’ll get best practice tips on how Secret Server can be used not only to enhance security but actually improve the productivity of various departments in your organization.

Register now to learn how you can:

  • Plan an enterprise scale Secret Server deployment
  • Implement best practice tips for folder structure
  • Increase adoption across your organization during deployment

 

Incident Response: Best practices to manage cyber breaches
Thursday, August 24 | 11:00 AM ET

Every second after a breach is critical to the survival of your company. In today’s world, every organization no matter how large or small needs an Incident Response plan in place to quickly manage and address the consequences of a breach. According to The SANS Institute, “More than one-quarter of IR professionals (26%) are dissatisfied with their current organization’s IR capabilities, calling them ineffective.” Are you prepared with an effective IR plan?

Join Thycotic security expert Joseph Carson as he demonstrates a security breach event through role-playing and how to best respond.

You will gain insights into:

• How to develop an effective and comprehensive Incident Response Plan
• Proven processes to manage detection and remediation of lost data
• The critical actions companies often fail to execute following a breach

 

Staying ahead of the compliance whirlwind: HIPPA, PCI, GDPR and more…
Thursday, September 7 | 11:00 AM ET

Meeting the constantly changing provisions of HIPPA, PCI and GDPR consumes valuable IT resources. Yet, failing to keep up can result in hefty fines or worse.

Join Thycotic Senior Director of Product Development, Jai Dargan as he highlights the latest changes in major regulatory compliance that your organization must implement to satisfy auditors and reduce the risk to your organization from legal liabilities.

You will learn how to:

• Stay on top of security and compliance requirements without sacrificing productivity
• Develop a formal plan to handle and incorporate future compliance changes
• Implement an automated approach to compliance reporting

 

Anatomy of a Privileged Account Hack: How to Spot it. How to Stop it.
Thursday, September 21 | 11:00 AM ET

Join Thycotic with a panel of cybersecurity experts as we explain and demonstrate how easy it is for someone to gain access to, and compromise, your domain controller. Our panel will discuss the complete lifecycle of a modern-day cybersecurity breach, from the very simple hack to the very sophisticated infiltration of a network..
Don’t mess this panel discussion to learn:

  • How easy it is to take over any basic privileged account
  • How that basic account can be used to elevate privileges and move laterally through a network
  • How attackers can quickly make their way to your domain controller and other critical systems
  • Key steps to prevent privileged account hacks

 

WEEKLY Demos

Join Thycotic for one of our weekly demos

Don’t miss our other webinars!
See all previously recorded webinars

SEE PAST WEBINARS

On-Demand Webinars

5 Free PAM Tools Cybersecurity Professionals Live For

Get a quick overview of the latest cyber security tools that can help transform your PAM security program. You will save time and money while improving the protection of your privileged account passwords with these Free PAM security tools and training:

  • Secret Server Free – The fastest to deploy, easiest to use privileged access password security solution in a free edition.
  • Password Security Policy Template – Privileged account password security policy templates ready to customize, and help demonstrate compliance.
  • Windows Endpoint Application Discovery Tool- Identifies the riskiest applications running in your environment with reports that help you evaluate their potential risks.
  • Windows and Unix Privileged Account Discovery Tool – Saves you hours of effort in locating unknown and therefore unprotected privileged accounts.
  • Privileged Password Security Certification Training – One hour, online Privileged Password Security Training teaches you the basics of privileged account security.

 

Passwords or Passphrases: How fast can your password be cracked?

“Your password should be 12 characters long, contain at least 1 upper case, 1 lower case, 2 numbers, and 1 special character. You can’t use the same letter twice, you can’t use letters in your username, your password can’t rhyme with the word dog, and all characters can’t be from only one side of the keyboard.”

How many password requirements is too many? And when do those requirements actually start weakening your passwords? Better yet, how fast can those passwords be cracked?

There are many myths and misconceptions around passwords and their strength, and how challenging it is to crack them. In this webinar we’re going to:

  • Dive into some examples and research around the true strength of passwords
  • Review the NIST’s proposed changes to password policy recommendations
  • Provide you with some easy ways to strengthen your password practices
  • Explore tools that help you determine whether your current password policies have already led to weak passwords on your network

 

Using Excel to store privileged account passwords? You’ve probably already been breached.

Many organizations and IT Administrators still use Excel spreadsheets to store passwords in privileged accounts and share them between key staff members so they can gain access to important and critical systems. Yet this entrenched practice of storing sensitive passwords and credentials in a spreadsheet is a major security risk and should be avoided at all costs. In fact, your systems may already have been breached with this practice and you don’t even know it.

Join Thycotic Product Manager, Joseph Carson, as he highlights why and how you should eliminate the unnecessary risks around using Excel to manage privileged passwords including:

• Why Excel was never intended to be a Password Management Solution
• The lack of built-in security with spreadsheets
• Excel risks for data loss, security updates and transportability
• How you can eliminate these risks with automated PAM solutions

Everyone registered will receive a free white paper describing the risks with using Excel and how to eliminate them.

 

The Shortfall in Privileged Account Security – and what organizations can do about it

According to the 2016 Verizon Data Breach Report, 63% of confirmed data breaches involved leveraging weak, default or stolen passwords.

Thycotic a provider of privileged account management solutions for 7,500+ organizations worldwide, in conjunction with Cybersecurity Ventures, a research, and market intelligence firm, launched a ground-breaking online Privileged Password Vulnerability Benchmark survey taken by 600+ organization from around the globe to learn why 63% of the data breaches involved privileged accounts.

We found that 52% of the companies who participated in the benchmark survey received a failing grade on the enforcement of privileged credential controls.

Join Thycotic in a 45-minute educational training session that reveals the specific shortcomings in the current state of privileged account security and provides recommendations for how to address the most common failures.

 

Best security tip you’ll get this year: Limit user privileges

85% of reported breaches involve compromised endpoints according to SANS. Traditional Antivirus and Anti-malware blacklisting can’t keep up with new and advanced threats targeting desktops, laptops and servers.

Join Product Manager, Joseph Carson as he describes how you can lock down endpoints and control application permissions and access with least privilege policies using new Privilege Manager for Windows and Mac from Thycotic. You’ll learn how easy and effective it can be to implement a least privilege access policy with an easy, simple and affordable solution: Privilege Manager for Windows, Mac and Unix from Thycotic.

 


 

October 19th & 20th | Washington DC

Conferences and Trade Shows

Thycotic Lunch & Learn
Minneapolis, MN | July 12, 2017

BlackHat

Black Hat 2017
Las Vegas, NV | July 26-27, 2017

Navigate’17
Sydney, Australia | August 23, 2017

vmworld

VMworld 2017
Las Vegas, NV | August 27-31, 2017

Microsoft Ignite

Ignite 2017
Orlando, FL | September 25-29, 2017

AISA
Sydney, Australia | October 10-12, 2017

ITSA
Nuremberg, Germany | October, 10-12 2017

Gartner Summits

Gartner Identity & Access Management Summit
Las Vegas, NV | November 28-30, 2017