+1-202-802-9399 U.S. Headquarters

Thycotic Events & Webinars

Join us as we bring together thought leaders, industry experts, security architects and more
to address key challenges in Privileged Account Management, IT security,
and how to make the most out of using Thycotic solutions.

Live Webinars

Quick, Fast, and Easy Ways to Optimize Your Privileged Password Management Practices
Thursday, May 4 | 11:00 AM ET

As a small to medium size business, you’ve got your cybersecurity bases covered. But are you really optimizing your Privileged Password Management policies and practices to increase productivity and security?

Join Thycotic product marketing manager RJ Gazarak as he demonstrates simple security practices that enable you to discover, secure, and manage your privileged account passwords—all automatically, with little or no maintenance. You’ll learn valuable techniques that:

• Save valuable IT and system admin time,
• Identify outside attacker and malicious insider threats faster
• Significantly improve the security of privileged account credentials

All registrants will receive a free electronic copy of “PAM for Dummies” guide, explaining the key principles and benefits of privileged account credential security.

 

Law firms at risk: Why you need to safeguard Privileged Account credentials now
Tuesday, May 16 | 11:00 AM ET

A recent law firm breach infiltrated an email server in which Chinese hackers used stolen information associated with merger deals to make over $4 million by discovering stocks about to soar in value. This incident reinforces what the legal industry now recognizes as a major threat: law firms are the newest and softest target of cybercriminals intent on stealing and monetizing confidential information, from market-moving M&A intelligence to sensitive patent filings.

In most breach incidents, hackers target the takeover of user accounts and then move on to privileged accounts which then gives them unrestricted access to a law firm’s most sensitive information. To safeguard privileged accounts—your “keys to the kingdom” — law firms must elevate and automate Privileged Account Management (PAM) and security.

Join Thycotic PAM security experts as they explain how hackers and malicious insiders target privileged accounts at law firms, and how you can implement automated security solutions that detect user compromise before sensitive assets are stolen.

Every registrant will receive a free copy of Thycotic’s “Law Firm PAM Protection Guide” 

 

Stop blaming China & Russia for every security breach: Debunking the top myths associated with cyber attacks
Tuesday, May 23 | 10:00 AM ET

Blaming high profile cyber security breaches on nation-states such as China and Russia is no excuse for failing to implement proper safeguards—especially when it comes to protecting privileged account credentials.

Join Amar Singh, CEO of the Cyber Management Alliance, and Thycotic PAM security expert Joseph Carson, as they challenge many of the headline-grabbing assumptions around cyber breaches including:

• Myth # 1 – All successful cyberattacks are sophisticated and complex
• Myth # 2 – All cyberattack actors are highly-skilled professionals
and more…

Gain a better understanding of the truth behind the media headlines, and learn key steps to take now that will help you protect your organization from outside attacks and insider threats.

Each registrant will receive a free white paper: “Stop blaming all cyberattacks on China & Russia.”

 

Stay on Top of Password Hygiene for Compliance Without Sacrificing Speed and Efficiency
Thursday, June 1 | 11:00 AM ET

Protecting your organization from cyber criminals, hackers and malicious insiders and meeting compliance mandates doesn’t have to mean adding a lot of extra work and complexity to your daily operations. Smart security and IT admin professionals know that securing user and privileged account passwords must be a priority—but there are options available that won’t break your systems or the bank.

See for yourself how easy it can be to stay on top of password hygiene, improve your company’s security posture, and meet compliance requirements without hindering productivity. Thycotic security experts will demonstrate how to manage and secure your user and privileged credentials at the fraction of the cost in time, effort and money, compared with other solutions.

Every webinar registrant will receive a free copy of “PAM for Dummies” book.

 

Passwords or Passphrases: How fast can your password be cracked?
Thursday, June 15 | 11:00 AM ET

“Your password should be 12 characters long, contain at least 1 Uppercase, 1 Lowercase, 2 Numbers, and 1 Special Character. You can’t use the same letter twice, you can’t use letters in your username, your password can’t rhyme with the word dog, and all characters can’t be from only one side of the keyboard…”

How many password requirements is too many, and when do you actually start causing passwords to become weaker due to those requirements? Better yet… how fast can those passwords be cracked?

There are a lot of myths and misconceptions around passwords and their strengths, and how easy or hard it is to crack them. On this webinar today, we’re going to…

• Dive into some examples and research around the true strength of passwords
• Review the NIST’s proposed changes to password policy recommendations
• Provide you some easy ways to strengthening your password practices
• Tools to find out if your current password policies have led to weak passwords on your network

 

WEEKLY Demos

Join Thycotic for one of our weekly demos

Don’t miss our other webinars!
See all previously recorded webinars

SEE PAST WEBINARS

On-Demand Webinars

5 Free PAM Tools Cybersecurity Professionals Live For

Get a quick overview of the latest cyber security tools that can help transform your PAM security program. You will save time and money while improving the protection of your privileged account passwords with these Free PAM security tools and training:

  • Secret Server Free – The fastest to deploy, easiest to use privileged access password security solution in a free edition.
  • Password Security Policy Template – Privileged account password security policy templates ready to customize, and help demonstrate compliance.
  • Windows Endpoint Application Discovery Tool- Identifies the riskiest applications running in your environment with reports that help you evaluate their potential risks.
  • Windows and Unix Privileged Account Discovery Tool – Saves you hours of effort in locating unknown and therefore unprotected privileged accounts.
  • Privileged Password Security Certification Training – One hour, online Privileged Password Security Training teaches you the basics of privileged account security.

 

Using Excel to store privileged account passwords? You’ve probably already been breached.

Many organizations and IT Administrators still use Excel spreadsheets to store passwords in privileged accounts and share them between key staff members so they can gain access to important and critical systems. Yet this entrenched practice of storing sensitive passwords and credentials in a spreadsheet is a major security risk and should be avoided at all costs. In fact, your systems may already have been breached with this practice and you don’t even know it.

Join Thycotic Product Manager, Joseph Carson, as he highlights why and how you should eliminate the unnecessary risks around using Excel to manage privileged passwords including:

• Why Excel was never intended to be a Password Management Solution
• The lack of built-in security with spreadsheets
• Excel risks for data loss, security updates and transportability
• How you can eliminate these risks with automated PAM solutions

Everyone registered will receive a free white paper describing the risks with using Excel and how to eliminate them.

 

The Shortfall in Privileged Account Security – and what organizations can do about it

According to the 2016 Verizon Data Breach Report, 63% of confirmed data breaches involved leveraging weak, default or stolen passwords.

Thycotic a provider of privileged account management solutions for 7,500+ organizations worldwide, in conjunction with Cybersecurity Ventures, a research, and market intelligence firm, launched a ground-breaking online Privileged Password Vulnerability Benchmark survey taken by 600+ organization from around the globe to learn why 63% of the data breaches involved privileged accounts.

We found that 52% of the companies who participated in the benchmark survey received a failing grade on the enforcement of privileged credential controls.

Join Thycotic in a 45-minute educational training session that reveals the specific shortcomings in the current state of privileged account security and provides recommendations for how to address the most common failures.

 

Protecting ALL the Privileged Accounts in Your Environment and the Cloud

You can’t protect what you don’t know exists. So before you launch into a privileged account lockdown project you need to start with really understanding how many such accounts exist. Most of the time organizations significantly underestimate.

Administrator on Windows and root on Linux are just the beginning. Let’s think about a web application farm running some off the shelf software package. Let’s say there are 3 web servers and 2 database servers. One OS root/admin account per system is a given. Next there’s the DB super user account such as “sa” on SQL Server. Next, if the application is running on Windows/IIS there are

-Service accounts for the DB
-Service accounts for the application
-AppPool identities
-Accounts used by the application to access the database

And don’t forget the hardware level accounts used for logging on to the motherboard itself for remote maintenance and control.

All of these should be considered privilege accounts. That brings me to another issue we’ll discuss in this real training for free ™ event: how do you define privileged accounts. That’s really a pre-requisite to get resolved before you even try to discover privileged accounts.

These are just the built-in / system-required accounts for the application. On top of that are other accounts for system management and actual human IT staff. Privileged users should include more than just accounts with full admin or root authority. Other users may be less privileged but are still privileged. This would include perhaps helpdesk staff with password reset authority or operations folks who have backup authority.

It turns out that there are probably event people, outside of IT, in your user departments that should be considered privileged accounts and subject to similar safeguards.

But you can’t stop at the network. Cloud apps and services have privileged accounts too and there’s no difference in the security requirements. In fact I know of a technology startup that completely went out of business when their AWS admin portal was hacked.

In this webinar we will look at methods and tools for helping you systematically catalog and maintain all the privileged accounts in your organization – whether on prem or in the cloud. And we’ll give you a list of criteria to choose from in defining what “privileged” means for your organization.

We’ll show you some free tools including:

-Windows Privileged Account Discovery
-Unix/Linux Privileged Account Discovery

 

Best security tip you’ll get this year: Limit user privileges

85% of reported breaches involve compromised endpoints according to SANS. Traditional Antivirus and Anti-malware blacklisting can’t keep up with new and advanced threats targeting desktops, laptops and servers.

Join Product Manager, Joseph Carson as he describes how you can lock down endpoints and control application permissions and access with least privilege policies using new Privilege Manager for Windows from Thycotic. You’ll learn how easy and effective it can be to implement a least privilege access policy with an easy, simple and affordable solution: Privilege Manager for Windows and Unix from Thycotic.

 


 

October 19th & 20th | Washington DC

Conferences and Trade Shows

Thycotic Lunch & Learn
Boston, MA | April 12, 2017

DATA CONNECTORS
Chicago, IL | April 13, 2017

NOAA IT SECURITY CONFERENCE
Silver Spring, MD | May 3, 2017

CAMP LEJEUNE
TACTICAL & TECH DAY

Camp LeJeune, NC | May 10, 2017

FORT BRAGG
TACTICAL & TECH DAY

Fort Bragg, NC | May 11, 2017

Security Insight Summit
Atlanta, GA | June 5-7, 2017

NATIONAL CYBER SUMMIT
Huntsville, AL | June 6-8, 2017

ILTA LEGALSEC
Arlington, VA | June 13-14, 2017

NSA INFORMATION ASSURANCE SYMPOSIUM
Baltimore, MD | June 19-21, 2017

BlackHat

Black Hat 2017
Las Vegas, NV | July 26-27, 2017

vmworld

VMworld 2017
Las Vegas, NV | August 27-31, 2017

Microsoft Ignite

Ignite 2017
Orlando, FL | September 25-29, 2017

Gartner Summits

Gartner Identity & Access Management Summit
Las Vegas, NV | November 28-30, 2017