+1-202-802-9399 U.S. Headquarters

Thycotic Events & Webinars

Join us as we bring together thought leaders, industry experts, security architects and more
to address key challenges in Privileged Account Management, IT security,
and how to make the most out of using Thycotic solutions.

Live Webinars

A Must-Have for Every MSP: How to automate the security and management of your client’s credentials
Tuesday, November 21 | 10:00 AM ET

MSPs are constantly managing a balancing act between vendors and clients, always seeking the right combination. As clients demand better technologies and move their infrastructures to the cloud, MSPs are increasingly challenged with securing client credentials while maintaining ease of use and productivity. Join Thycotic in learning how smart MSPs are automating credential management to keep their customer’s secure and satisfied. You’ll learn how to:

· Easily deploy and organize different client sites
· Integrate Secret Server with other leading MSP software solutions
· Manage day-to-day operations for secure access to client data even when offline

Every registrant will receive a free guide, “MSP Guide to Privileged Account Management.”

Can’t make it? Be sure to still register to receive the recording to your inbox.

 

Don’t wait until it’s too late: Assess Your PAM Risks now with a new Free Tool
Thursday, December 7 | 11:00 AM ET

With privileged account credentials a top target of hackers, it’s essential that you get a better picture of your cybersecurity protections around your “keys to the kingdom.” Privileged Account Management (PAM) risk assessments, however, can be extremely time-consuming and expensive.

Join Thycotic as we step through best practices for conducting a PAM Risk Assessment, including a demonstration of a Free PAM Risk Assessment you can take yourself online that produces a valuable report highlighting potential vulnerabilities.

Every registrant will receive a Free Report, “2017 State of Cybersecurity Metrics Annual Report.”

Can’t make it? Be sure to still register to receive the recording to your inbox.

 

Cybersecurity Lessons Learned from 2017 and Predictions for 2018
Thursday, December 14 | 11:00 AM ET

Get ready to review the past year and prepare to tackle the top cybersecurity challenges and threats of 2018. In the midst of record-breaking breaches, with hacks becoming more sophisticated than ever before, we will highlight:

• Key lessons learned, including exploring the top breaches in 2017
• Latest cybersecurity industry research reports
• New opportunities emerging with GDPR and the Internet of Things.

What’s ahead for 2018? Our cybersecurity expert, Joseph Carson, will cover his top predictions and give you actionable insights into how to prepare for the year ahead.

Every registrant will receive access to a Free Privileged Account Management Risk Assessment Tool.

Can’t make it? Be sure to still register to receive the recording to your inbox.

 

WEEKLY Demos

Join Thycotic for one of our weekly demos

Don’t miss our other webinars!
See all previously recorded webinars

SEE PAST WEBINARS

On-Demand Webinars

5 Free PAM Tools Cybersecurity Professionals Live For

Get a quick overview of the latest cyber security tools that can help transform your PAM security program. You will save time and money while improving the protection of your privileged account passwords with these Free PAM security tools and training:

  • Secret Server Free – The fastest to deploy, easiest to use privileged access password security solution in a free edition.
  • Password Security Policy Template – Privileged account password security policy templates ready to customize, and help demonstrate compliance.
  • Windows Endpoint Application Discovery Tool- Identifies the riskiest applications running in your environment with reports that help you evaluate their potential risks.
  • Windows and Unix Privileged Account Discovery Tool – Saves you hours of effort in locating unknown and therefore unprotected privileged accounts.
  • Privileged Password Security Certification Training – One hour, online Privileged Password Security Training teaches you the basics of privileged account security.

 

Passwords or Passphrases: How fast can your password be cracked?

“Your password should be 12 characters long, contain at least 1 upper case, 1 lower case, 2 numbers, and 1 special character. You can’t use the same letter twice, you can’t use letters in your username, your password can’t rhyme with the word dog, and all characters can’t be from only one side of the keyboard.”

How many password requirements is too many? And when do those requirements actually start weakening your passwords? Better yet, how fast can those passwords be cracked?

There are many myths and misconceptions around passwords and their strength, and how challenging it is to crack them. In this webinar we’re going to:

  • Dive into some examples and research around the true strength of passwords
  • Review the NIST’s proposed changes to password policy recommendations
  • Provide you with some easy ways to strengthen your password practices
  • Explore tools that help you determine whether your current password policies have already led to weak passwords on your network

 

Anatomy of a Privileged Account Hack: How to Spot it. How to Stop it.

Join Thycotic with a panel of cybersecurity experts as we explain and demonstrate how easy it is for someone to gain access to, and compromise, your domain controller. Our panel will discuss the complete lifecycle of a modern-day cybersecurity breach, from the very simple hack to the very sophisticated infiltration of a network.

Don’t miss this panel discussion to learn:

  • How easy is it to take over any basic privileged account
  • How that basic account can be used to elevate privileges and move laterally through a network
  • How attackers can quickly make their way to your domain controller and other critical systems
  • Key steps to prevent privileged account hacks

 

Secret Server as a Service: How to Maximize PAM Success at Enterprise Scale

Join Thycotic and a Sr. Systems Administrator from cyber security leader FireEye to see how you can leverage the full capabilities and protection of Secret Server across an enterprise-scale environment. We will walk you through a real -world scenario that demonstrates how to set up Secret Server to scale in your organization. You’ll get best practice tips on how Secret Server can be used not only to enhance security but actually improve the productivity of various departments in your organization.

Register now to learn how you can:

  • Plan an enterprise scale Secret Server deployment
  • Implement best practice tips for folder structure
  • Increase adoption across your organization during deployment

 

Using Excel to store privileged account passwords? You’ve probably already been breached.

Many organizations and IT Administrators still use Excel spreadsheets to store passwords in privileged accounts and share them between key staff members so they can gain access to important and critical systems. Yet this entrenched practice of storing sensitive passwords and credentials in a spreadsheet is a major security risk and should be avoided at all costs. In fact, your systems may already have been breached with this practice and you don’t even know it.

Join Thycotic Product Manager, Joseph Carson, as he highlights why and how you should eliminate the unnecessary risks around using Excel to manage privileged passwords including:

• Why Excel was never intended to be a Password Management Solution
• The lack of built-in security with spreadsheets
• Excel risks for data loss, security updates and transportability
• How you can eliminate these risks with automated PAM solutions

Everyone registered will receive a free white paper describing the risks with using Excel and how to eliminate them.

 


 

Conferences and Trade Shows

Gartner Summits

Gartner Identity & Access Management Summit
Las Vegas, NV | November 28-30, 2017

SecureCISO
Seattle, Washington | December 14, 2017, 2017