+1-202-802-9399 (US)

Thycotic Events & Webinars

Join us as we bring together thought leaders, industry experts, security architects and more
to address key challenges in Privileged Account Management, IT security,
and how to make the most out of using Thycotic solutions.

Live Webinars

From NIST to NESA – getting global with your Access Control requirements. What do CISO’s really need to do in the face of compliance mandates?
Wednesday, July 10 | 3:00 PM AEST

According to Thycotic research, 60% of organisations say they must demonstrate compliance and auditing of privileged accounts as part of their compliance requirements.

And for CISOs operating at a global scale, the overlapping compliance requirements create additional levels of complexity in passing all the red tape.

Join Thycotic’s Cyber Security Consultant, Robert Edmondson as he discusses the emerging compliance climate a global level to unpack what needs to be done, where to start, and the keys to building a pro-active win:win strategy for Compliance & Security teams.

Key Takeaways:

  • See how your global compliance mandates drive for action Access Control
  • Get clarity on what needs to be done – no more overlapping requests
  • Unpack the practical application of key access control requirements for your businesses MFA, Auditing, and Discovery practices

 

From NIST to NESA – getting global with your Access Control requirements. What do CISO’s really need to do in the face of compliance mandates?
Wednesday, July 10 | 10:00am BST

According to Thycotic research, 60% of organisations say they must demonstrate compliance and auditing of privileged accounts as part of their compliance requirements.

And for CISOs operating at a global scale, the overlapping compliance requirements create additional levels of complexity in passing all the red tape.

Join Thycotic’s Cyber Security Consultant, Robert Edmondson as he discusses the emerging compliance climate a global level to unpack what needs to be done, where to start, and the keys to building a pro-active win:win strategy for Compliance & Security teams.

Key Takeaways:

  • See how your global compliance mandates drive for action Access Control
  • Get clarity on what needs to be done – no more overlapping requests
  • Unpack the practical application of key access control requirements for your businesses MFA, Auditing, and Discovery practices

 

Top Cloud Security Use Cases: Plus a Sneak Peek of how DevOps Secrets Vault helps secure your CI/CD Environment
Thursday, July 18 | 11:00 AM ET

Managing privileged access as part of your cloud strategy needs to be one of your top priorities. According to Gartner, at least 99% of cloud security failures through 2022 will be the customer’s fault, with more than 50% attributed to inadequate management of identities, access, and privileges.

Join our Thycotic product team as they explain:

    • The most common privileged account vulnerabilities in the cloud for Infrastructure-as-a-Service (IaaS), Platform-as-a-Service (PaaS), and Software-as-a-Service (SaaS)
    • How Privileged Access Management (PAM) serves as a core control for modern cloud security
    • How PAM enables you to close gaps in the cloud attack surface so you can realize the benefits of cloud computing while securing your most sensitive assets

You’ll also get a sneak peek preview of Thycotic’s latest product release, DevOps Secrets Vault. This powerful vault is a solution designed to automate your DevOps secrets management.

Every attendee will receive a copy of our new “Top 10 Cloud Use Cases for PAM” white paper.

 

WEEKLY Demos

Join Thycotic for one of our weekly demos

Introduction to Thycotic Privilege Manager

Wednesday, June 26
2:00 PM EST

Introduction to Thycotic Privilege Manager

Wednesday, July 10
2:00 PM EST

Don’t miss our other webinars!
See all previously recorded webinars

SEE PAST WEBINARS

On-Demand Webinars

BREACHED! Implementing Incident Response for a Compromised Credential

With 80% of breaches involving compromised credentials, the pace and scope of cyber-attacks continue to accelerate along with the cost of a breach. Join cybersecurity expert Joseph Carson as he takes you from the moment you realize you’ve been breached, to getting back to business with an enterprise-wide privileged account management solution.

You will learn how to:

• Respond to a compromised credential

• Identify your privileged account weaknesses and create an automated approach to Privileged Access Management

• Set up early warning alerts of potential account compromise

 

 

Least Privilege 101: How to Start Your Least Privilege Cybersecurity Journey

Are you looking at ways to implement least privilege across your IT environment? With 80% of breaches involving the compromise of IT and business user credentials (IDs and passwords) you need to create a plan to eliminate “overprivileged access” by users, applications, and services.

Join Thycotic Chief Cyber Security Scientist Joseph Carson, author of the new “Least Privilege Cybersecurity for Dummies” book, as he explains how to make a least privilege strategy successful in your organization.

Learn how you can substantially reduce the risk of exploitation on endpoints while preserving user productivity. This webinar will help you:

  • Understand the basic concepts of least privilege cybersecurity
  • Know the key steps to planning your least privilege cybersecurity strategy
  • See how to apply least privilege with application control

 

How Cyber Criminals Crack Your Passwords Using Dictionary Searches and Brute-Force

Interested in learning how a password is cracked? The Collection 1 Data Breach saw over 1 billion unique email addresses and passwords exposed. So how did they get their hands on them in the first place?

Step into the world of a cyber criminal with our Chief Cyber Security Scientist, Joseph Carson and special guest, X-Force Red’s Senior Managing Consultant, Dustin Heywood. They will walk you through how easy it is to hack your passwords through two of the most common techniques: dictionary searches and brute-force. Leveraging the popular pen testing tool, Kali Linux, Joseph and Dustin will take you through some of the most popular and latest tools cyber criminals use every day to perform these hacking techniques.

Attend this webinar to:

  • Gain insight into the vulnerabilities of passwords and how cyber criminals use different methods to easily crack them.
  • Learn what makes a secure password and how to update your password policies to reflect the latest NIST guidelines.
  • Discover resources that will help you develop and maintain best practices for password security.