Thycotic Events & Webinars
How to customize Secret Server to fit your organization’s privileged account security needs
Thursday, October 27 | 1:00 PM ET
Many organizations today use passwords in scripts, or have applications that need regular access to API keys or credentials. Join Thycotic expert engineer Ali Falahi as he demonstrates how to integrate your applications with Secret Server through our API. Ali will cover some simple integration use cases with the web services to get you started, along with more advanced scenarios using our application API libraries. See how you can save substantial time and effort in customizing Secret Server to your specific security needs.
Who knew? The Top 5 Applications you should blacklist now!
Thursday, November 3 | 10:00 AM ET
Companies globally use thousands of applications that help with accessing emails, browsing the internet, running videos, listening to audio/music, mathematical calculations, and more. And, hackers and cyber criminals know how to exploit vulnerabilities associated with these applications to easily access systems that run these applications.
Join Thycotic Product Manager Joseph Carson as he reveals the top five common and popular applications (you may be surprised!) that pose the greatest risk to your organization — and how you can lock down systems running these applications, blacklist them or choose to remove them completely to help assure application access control. Every registered attendee will receive a free white paper, “The Top 5 Applications You Should Blacklist Now.”
Deep dive into better application control with Privilege Manager for Windows
Thursday, November 10 | 10:00 AM ET
Get an in-depth look at how new Privilege Manager for Windows from Thycotic gives you a comprehensive application control solution encompassing whitelisting, blacklisting and greylisting. See how Privilege Manager for Windows delivers the security, usability and manageability you’ve been looking for to implement a least privilege strategy.
Thycotic Product Manager Joseph Carson will demonstrate how Privilege Manager for Windows provides:
• Effective endpoint protection against ransomware and evolving advanced threats
• Easiest to manage application access control
• Least privilege enforcement without impacting productivity
• Time savings and reduced help desk calls
• Reports to help meet compliance requirements
Why Privileged Account Management should be your # 1 security priority
Thursday, November 17 | 10:00 AM ET
A new global benchmark survey, “The 2016 State of Privileged Account Management” shows that while security is a top priority, nearly two-thirds of respondents still rely on manual methods to manage privileged account passwords. That’s an alarming statistic when you consider that privileged account passwords and access are a prime target for hackers and one of the biggest cyber security risks for breaching the defenses of any organization.
Join Thycotic Product Manager Joseph Carson as he highlights research results that reveal several security gaps in how organizations manage and secure their privileged account passwords and access. You’ll get key recommendations for how to address the most common shortcomings in PAM security, including how automated PAM solutions can secure privileged credentials throughout your IT infrastructure while enhancing your productivity.
Best security tip you’ll get this year: Limit user privileges
Thursday, December 1 | 1:00 PM ET
85% of reported breaches involve compromised endpoints according to SANS. Traditional Antivirus and Anti-malware blacklisting can’t keep up with new and advanced threats targeting desktops, laptops and servers.
Join Product Manager, Joseph Carson as he describes how you can lock down endpoints and control application permissions and access with least privilege policies using new Privilege Manager for Windows from Thycotic. You’ll learn how easy and effective it can be to implement a least privilege access policy with an easy, simple and affordable solution: Privilege Manager for Windows and Unix from Thycotic.
Top IT security predictions for 2017: Gain insights into the year ahead
Thursday, December 15 | 10:00 AM ET
We’ve put our best expert minds together to help you identify trends in our annual predictions for IT security in the coming year. Thycotic Product Manager Joseph Carson will share thoughts and insights based on industry research that provide key indicators for what to expect in the realm of IT security in the year ahead including:
• Identity and Access Management
• Behavior analysis and reputation
• Deception technologies
• Multi-factor authentication
• Data integrity with blockchain
Using Excel to store privileged account passwords? You’ve probably already been breached.
Many organizations and IT Administrators still use Excel spreadsheets to store passwords in privileged accounts and share them between key staff members so they can gain access to important and critical systems. Yet this entrenched practice of storing sensitive passwords and credentials in a spreadsheet is a major security risk and should be avoided at all costs. In fact, your systems may already have been breached with this practice and you don’t even know it.
Join Thycotic Product Manager, Joseph Carson, as he highlights why and how you should eliminate the unnecessary risks around using Excel to manage privileged passwords including:
• Why Excel was never intended to be a Password Management Solution
• The lack of built-in security with spreadsheets
• Excel risks for data loss, security updates and transportability
• How you can eliminate these risks with automated PAM solutions
Everyone registered will receive a free white paper describing the risks with using Excel and how to eliminate them.
As an IT admin, how do I control my password kingdom?
You have your kingdom of servers, accounts, devices and also many responsibilities. You want to know that it all works, no accounts or devices are missed and you want to delegate occasionally so you can actually take a vacation. A few pretty reports during auditor time of the year would be nice too. Join Ben Yoder (Product Manager) and Nathan Wenzler (Senior Technology Evangelist) as they walk through configuring your view and controls in Thycotic Secret Server to make life a bit easier and give you some peace of mind.
Pass the Hash: 15 Minute Crash Course
Join Jonathan Cogley, CEO at Thycotic, for a crash course in Pass the Hash attacks. Find out how they happen, ways newer versions of Windows help protect against them, and other steps you can take to protect your organization. Recorded live at Microsoft Ignite 2015.
Protecting federal agencies with Thycotic Privileged Account Management security solutions
Federal government agencies are among the least prepared with cyber security measures. Yet. they are often a top target among state-sponsored hacking and malware attacks that are only becoming more frequent and sophisticated. Recent breaches, including the hack on the Office of Personnel Management, compromised the personal information of over 21.5 million federal employees and job applicants. It is critical for Federal government agencies to take steps now to protect their critical infrastructure, including privileged accounts.
Join Thycotic’s Ali Falahi as he demonstrates how Thycotic privileged account management solutions can secure your privileged credentials and mitigate malware attacks against federal agencies.
The wait is over- Introducing Secret Server Cloud
Introducing Thycotic Secret Server Cloud, a secure cloud-based password manager to protect privileged credentials that can be activated in seconds. Join product manager Ben Yoder as he introduces Thycotic’s new Secret Server Cloud offering and highlights new capabilities and architecture built for fast and simple deployments.
You will learn how Secret Server Cloud gives you an easy afford PAM solution with several key benefits including:
1. A scalable and resilient architecture for an enterprise password management solution
2. Cloud based active capabilities for password changing, Discovery, Active Directory Integration, and more
3. Built in security and high availability