+1-202-802-9399 (US)

Thycotic Events & Webinars

Join us as we bring together thought leaders, industry experts, security architects and more
to address key challenges in Privileged Account Management, IT security,
and how to make the most out of using Thycotic solutions.

Live Webinars

Back to the Basics: Privileged Access Management 101
Wednesday, January 30 | 3:00 PM AEST

With so many recent high-profile breaches accomplished through compromising passwords on privileged accounts, Privileged Access Management is now everyone’s priority (Gartner puts it at the top of the list for 2018). But where do you start? And how do you know which PAM solution will work best to protect your organization without sacrificing productivity?

Join Chief Security Scientist Joseph Carson on a brief journey through the Privileged Account Management lifecycle to get you quickly up to speed on:

  • Best practices for evaluating your current PAM practices and where to start
  • How to automatically discover and manage credentials across your network
  • How to demonstrate regulatory compliance with automated reporting

 

Back to the Basics: Privileged Access Management 101
Wednesday, January 30 | 3:00 PM GMT

With so many recent high-profile breaches accomplished through compromising passwords on privileged accounts, Privileged Access Management is now everyone’s priority (Gartner puts it at the top of the list for 2018). But where do you start? And how do you know which PAM solution will work best to protect your organization without sacrificing productivity?

Join Chief Security Scientist Joseph Carson on a brief journey through the Privileged Account Management lifecycle to get you quickly up to speed on:

  • Best practices for evaluating your current PAM practices and where to start
  • How to automatically discover and manage credentials across your network
  • How to demonstrate regulatory compliance with automated reporting

 

Celebrate Change Your Password Day? Shining a new light on password management in the Cloud
Thursday, January 31 | 11:00 AM EST

February 1st marks Change Your Password Day 2019—for many an irritating reminder that passwords must be rotated and managed to stay secure. And as more organizations move to the cloud, your team faces the growing and constant challenge of keeping user’s password hygiene compliant. How are you managing cloud access to privileged accounts? And is it even safe?

Join Thycotic Product Manager Dan Ritch as he debunks several cloud security myths and concerns and shows how PAM has evolved to meet your enterprise’s growing needs. You’ll learn how to develop an action plan to: 

• Automate credential security for your team’s cloud environment
• Gain buy-in by stakeholders for a cloud-based PAM solution

Every attendee will get a preview of Thycotic’s new Secret Server Cloud User Interface.

 

Secret Server 10.6: A fresh look and new capabilities in our biggest release to date
Thursday, February 14 | 11:00 AM ET

Thycotic Secret Server 10.6 has a new look and several improvements you’ll truly appreciate, all based on our user community feedback.

Join Thycotic Product Manager, Dan Ritch, as he demonstrates the latest Secret Server feature improvements, giving you a preview of:

  • Secret Server’s new User Interface
  • Secret Server session recording capabilities
  • New workflow functionality
  • Added security support for MSPs

We have other surprises for you as well. So, don’t miss this chance to see all the great advantages of our BIGGEST Secret Server release to date!

 

Least Privilege 101: How to Start Your Least Privilege Cyber Security Journey
Thursday, February 28 | 11:00 AM ET

Are you looking at ways to implement least privilege across your IT environment? With 80% of breaches involving the compromise of IT and business user credentials (IDs and passwords) you need to create a plan to eliminate “overprivileged access” by users, applications, and services.

Join Thycotic Chief Cyber Security Scientist Joseph Carson, author of the new “Least Privilege Cybersecurity for Dummies” book, as he explains how to make a least privilege strategy successful in your organization.

Learn how you can substantially reduce the risk of exploitation on endpoints while preserving user productivity. This webinar will help you:

  • Understand the basic concepts of least privilege cybersecurity
  • Know the key steps to planning your least privilege cybersecurity strategy
  • See how to apply least privilege with application control

All attendees will receive a free hardcopy of Joseph’s new “Least Privilege Cybersecurity for Dummies” book from Wiley publishing.

 

How Cloud Adoption Makes PAM in the Cloud a Top Priority
Thursday, March 21 | 11:00 AM ET

With the average enterprise already using over 1,935 distinct cloud services, cloud adoption is accelerating across all industries. By 2020, cloud computing is projected to reach 70% of all software, services, and technology spending.

Regardless of your cloud model, Software-as-a-Service (SaaS), Platform-as-a-Service (PaaS), or Infrastructure-as-a-Service (IaaS), managing privileged access to cloud systems is your responsibility.  This is a major challenge that you must track, control, and secure. You’ll learn:

  • How cloud is revolutionizing the PAM space
  • How cloud services make PAM more challenging and more critical
  • Why cloud-based PAM is more flexible and cost-efficient than on-premise solutions

 

WEEKLY Demos

Join Thycotic for one of our weekly demos

Introduction to Thycotic Privilege Manager

Wednesday, January 23
2:00 PM EST

Introduction to Thycotic Privilege Manager

Wednesday, February 6
2:00 PM EST

Don’t miss our other webinars!
See all previously recorded webinars

SEE PAST WEBINARS

On-Demand Webinars

Passwords or Passphrases: How fast can your password be cracked?

“Your password should be 12 characters long, contain at least 1 upper case, 1 lower case, 2 numbers, and 1 special character. You can’t use the same letter twice, you can’t use letters in your username, your password can’t rhyme with the word dog, and all characters can’t be from only one side of the keyboard.”

How many password requirements is too many? And when do those requirements actually start weakening your passwords? Better yet, how fast can those passwords be cracked?

There are many myths and misconceptions around passwords and their strength, and how challenging it is to crack them. In this webinar we’re going to:

  • Dive into some examples and research around the true strength of passwords
  • Review the NIST’s proposed changes to password policy recommendations
  • Provide you with some easy ways to strengthen your password practices
  • Explore tools that help you determine whether your current password policies have already led to weak passwords on your network

 

Anatomy of a Privileged Account Hack: How to Spot it. How to Stop it.

Join Thycotic with a panel of cybersecurity experts as we explain and demonstrate how easy it is for someone to gain access to, and compromise, your domain controller. Our panel will discuss the complete lifecycle of a modern-day cybersecurity breach, from the very simple hack to the very sophisticated infiltration of a network.

Don’t miss this panel discussion to learn:

  • How easy is it to take over any basic privileged account
  • How that basic account can be used to elevate privileges and move laterally through a network
  • How attackers can quickly make their way to your domain controller and other critical systems
  • Key steps to prevent privileged account hacks

 

Secret Server as a Service: How to Maximize PAM Success at Enterprise Scale

Join Thycotic and a Sr. Systems Administrator from cyber security leader FireEye to see how you can leverage the full capabilities and protection of Secret Server across an enterprise-scale environment. We will walk you through a real -world scenario that demonstrates how to set up Secret Server to scale in your organization. You’ll get best practice tips on how Secret Server can be used not only to enhance security but actually improve the productivity of various departments in your organization.

Register now to learn how you can:

  • Plan an enterprise scale Secret Server deployment
  • Implement best practice tips for folder structure
  • Increase adoption across your organization during deployment

 

World Password Day Tips: 10 Common Password Mistakes to Avoid in 2018

This World Password Day join Thycotic Chief Security Scientist Joseph Carson as he shares the ‘secret’ formula to a secure password and overall password management plan based on the latest 2018 research.  Password best practices have evolved and changed, so this is your opportunity to stay a step ahead of hackers by learning:

  • The do’s and don’ts of password security based on the latest 2018 InfoSec research
  • How to avoid the 10 most common password mistakes
  • How best to respond to a password breach and get back to business

PLUS: Every attendee will receive a free hard-copy of Joseph’s new “Cybersecurity for Dummies” book covering the top ways to reduce your online risks, and best practices to protect yourself at work and home.

Check your own password savvy with this Free Password Strength Checker

 

BREACHED! Implementing Incident Response for a Compromised Credential

With 80% of breaches involving compromised credentials, the pace and scope of cyber-attacks continue to accelerate along with the cost of a breach. Join cybersecurity expert Joseph Carson as he takes you from the moment you realize you’ve been breached, to getting back to business with an enterprise-wide privileged account management solution.

You will learn how to:

• Respond to a compromised credential

• Identify your privileged account weaknesses and create an automated approach to Privileged Access Management

• Set up early warning alerts of potential account compromise