Phone Number +1-202-802-9399 (US)

Thycotic IT security Webinars & events

Join us as we bring together thought leaders, industry experts, cyber security architects and more
to address key challenges in Privileged Access Management and IT Security,
and making the most out of Thycotic’s solutions.

Live Webinars

How much does your PAM software really cost?
Thursday, December 12

Virtually any time you recommend a technology purchase, your boss, executive management, and the finance department want to know the cost. As you plan to implement Privileged Access Management software, do you know the real cost? Total cost of ownership goes far beyond software and support costs. To get the complete picture, you also need to calculate the cost of infrastructure, professional services, supporting technology, and internal operations to support the project.

In this webinar, we’ll review the right questions to ask and all the information you need so you can budget time, money, and resources before you buy PAM software. Then, you’ll be able to go to your finance team with a complete picture of the spend and value of your PAM project.

 

WEEKLY Demos

Join Thycotic for one of our weekly demos

Introduction to Thycotic Privilege Manager

Wednesday, December 11
2:00 PM EST

Introduction to Thycotic Privilege Manager

Wednesday, January 8
2:00 PM EST

Don’t miss our other free IT and cyber security webinars!
See all previously recorded webinars

SEE PAST WEBINARS

On-Demand Webinars

BREACHED! Implementing Incident Response for a Compromised Credential

With 80% of breaches involving compromised credentials, the pace and scope of cyber-attacks continue to accelerate along with the cost of a breach. Join cybersecurity expert Joseph Carson as he takes you from the moment you realize you’ve been breached, to getting back to business with an enterprise-wide privileged account management solution.

You will learn how to:

• Respond to a compromised credential

• Identify your privileged account weaknesses and create an automated approach to Privileged Access Management

• Set up early warning alerts of potential account compromise

 

 

Least Privilege 101: How to Start Your Least Privilege Cybersecurity Journey

Are you looking at ways to implement least privilege across your IT environment? With 80% of breaches involving the compromise of IT and business user credentials (IDs and passwords) you need to create a plan to eliminate “overprivileged access” by users, applications, and services.

Join Thycotic Chief Cyber Security Scientist Joseph Carson, author of the new “Least Privilege Cybersecurity for Dummies” book, as he explains how to make a least privilege strategy successful in your organization.

Learn how you can substantially reduce the risk of exploitation on endpoints while preserving user productivity. This webinar will help you:

  • Understand the basic concepts of least privilege cybersecurity
  • Know the key steps to planning your least privilege cybersecurity strategy
  • See how to apply least privilege with application control

 

How Cyber Criminals Crack Your Passwords Using Dictionary Searches and Brute-Force

Interested in learning how a password is cracked? The Collection 1 Data Breach saw over 1 billion unique email addresses and passwords exposed. So how did they get their hands on them in the first place?

Step into the world of a cyber criminal with our Chief Cyber Security Scientist, Joseph Carson and special guest, X-Force Red’s Senior Managing Consultant, Dustin Heywood. They will walk you through how easy it is to hack your passwords through two of the most common techniques: dictionary searches and brute-force. Leveraging the popular pen testing tool, Kali Linux, Joseph and Dustin will take you through some of the most popular and latest tools cyber criminals use every day to perform these hacking techniques.

Attend this webinar to:

  • Gain insight into the vulnerabilities of passwords and how cyber criminals use different methods to easily crack them.
  • Learn what makes a secure password and how to update your password policies to reflect the latest NIST guidelines.
  • Discover resources that will help you develop and maintain best practices for password security.