+1-202-802-9399 (US)

Thycotic Events & Webinars

Join us as we bring together thought leaders, industry experts, security architects and more
to address key challenges in Privileged Account Management, IT security,
and how to make the most out of using Thycotic solutions.

Live Webinars

One Size Doesn’t Fit All: Defining Least Privilege Policies for Different Departments & Users
Thursday, April 25 | 11:00 AM ET

With 85% of breaches involving compromised endpoints, organizations are implementing a least privilege security posture and application control to minimize risks caused by cyberattacks and fraudulent users. Before getting started, you’ll need to design policies for different departments and users, keeping in mind how implementing least privilege will affect their productivity. Your IT Admins, for example, should have standard accounts without privileged network access for day-to-day tasks and be granted privileged access only occasionally as needed. Your business users will need access to applications with restricted privileges that do not interfere with getting their work done.

Join Thycotic’s Privilege Manager Product Manager, Steve Goldberg, and Product Marketing Manager, Barbara Hoffman, as they show you how to create a custom least privilege security plan that manages different users and application requirements based on different department needs. They will share real-world examples of policies that help organizations implement a least privilege strategy.

You’ll learn: 

  • How to automate your application policies and workflows to review and approve applications to accommodate different departments
  • How to craft your department policies to meet your team’s access needs while meeting your IT policy and compliance requirements
  • Why the cloud makes so much sense for endpoint management

Each webinar registrant will also get their own copy of the “Least Privilege Cybersecurity for Dummies” eBook to kick start their least privilege program.


How Cyber Criminals Crack Your Passwords Using Dictionary Searches and Brute-Force
Thursday, May 2 | 11:00 AM ET

Interested in learning how a password is cracked? The Collection 1 Data Breach saw over 1 billion unique email addresses and passwords exposed. So how did they get their hands on them in the first place?

This World Password Day 2019 step into the world of a cyber criminal with our Chief Cyber Security Scientist, Joseph Carson and special guest, X-Force Red’s Senior Managing Consultant, Dustin Heywood. They will walk you through how easy it is to hack your passwords through two of the most common techniques: dictionary searches and brute-force. Leveraging the popular pen testing tool, Kali Linux, Joseph and Dustin will take you through some of the most popular and latest tools cyber criminals use every day to perform these hacking techniques.

Attend this webinar to:

  • Gain insight into the vulnerabilities of passwords and how cyber criminals use different methods to easily crack them.
  • Learn what makes a secure password and how to update your password policies to reflect the latest NIST guidelines.
  • Discover resources that will help you develop and maintain best practices for password security.


Day in the Life of a Healthcare Security and IT Team
Tuesday, May 21 | 1:00PM EST

With the right credentials, any user or IT system can access and manipulate protected healthcare data. Within a single day, security and IT teams tackle multiple challenges to these privileged accounts, including external threats and insider behavior. Faced with limited budgets and small teams, these teams must have visibility and control to reduce risk to ePHI.

In this webinar, Ed Breay, Thycotic’s Senior Solutions Engineer, will share top strategies healthcare leaders recommend, including automated, policy-based controls for:

  • Role-based access
  • Password provisioning, deprovisioning and rotation
  • Least privilege implementation
  • Privileged session monitoring and recording

Save your spot for the webinar. Let Ed know the NUMBER ONE challenge you face when protecting privileged accounts and he’ll be sure to address it.

The webinar will be recorded, so even if you can’t make the live session, please register and we’ll send you a link so you won’t miss this important information.


Three Key Steps to Improve Your Privilege Access Management Maturity Level
Thursday, June 13 | 11:00 AM ET

With up to 80 percent of breaches due to compromised credentials according to leading analysts, more organizations than ever before are prioritizing privileged account protection. Gartner noted that Privileged Access Management be your top cyber security project for 2019 the 2nd year in a row.

But a recent survey by Thycotic found 85% of organizations fail to meet even basic PAM security maturity levels. And among those who fall short, 55% have no idea how many privileged accounts they have or where they’re located.

Join Thycotic’s Chief Information Security Officer Terence Jackson as he explains the 4 stages of PAM Maturity and shows how you can assess your organization’s own PAM Maturity level. He’ll provide 3 key recommendations to advance your PAM maturity, showing you how to:

  1. Take the first step in PAM Maturity basics by automating the continuous discovery of privileged accounts
  2. Establish and automate specific security policies that promote proper PAM security hygiene
  3. Achieve greater PAM maturity through critical PAM insights using technology to improve cyber security

Each webinar registrant will receive a copy of the just-published 2019 State of PAM Maturity Report featuring results from our assessment survey, key takeaways, and recommendation along with free resources.



Join Thycotic for one of our weekly demos

Introduction to Thycotic Privilege Manager

Wednesday, May 1
2:00 PM EST

Introduction to Thycotic Privilege Manager

Wednesday, May 15
2:00 PM EST

Don’t miss our other webinars!
See all previously recorded webinars


On-Demand Webinars

Secret Server as a Service: How to Maximize PAM Success at Enterprise Scale

Join Thycotic and a Sr. Systems Administrator from cyber security leader FireEye to see how you can leverage the full capabilities and protection of Secret Server across an enterprise-scale environment. We will walk you through a real -world scenario that demonstrates how to set up Secret Server to scale in your organization. You’ll get best practice tips on how Secret Server can be used not only to enhance security but actually improve the productivity of various departments in your organization.

Register now to learn how you can:

  • Plan an enterprise scale Secret Server deployment
  • Implement best practice tips for folder structure
  • Increase adoption across your organization during deployment


BREACHED! Implementing Incident Response for a Compromised Credential

With 80% of breaches involving compromised credentials, the pace and scope of cyber-attacks continue to accelerate along with the cost of a breach. Join cybersecurity expert Joseph Carson as he takes you from the moment you realize you’ve been breached, to getting back to business with an enterprise-wide privileged account management solution.

You will learn how to:

• Respond to a compromised credential

• Identify your privileged account weaknesses and create an automated approach to Privileged Access Management

• Set up early warning alerts of potential account compromise



Least Privilege 101: How to Start Your Least Privilege Cybersecurity Journey

Are you looking at ways to implement least privilege across your IT environment? With 80% of breaches involving the compromise of IT and business user credentials (IDs and passwords) you need to create a plan to eliminate “overprivileged access” by users, applications, and services.

Join Thycotic Chief Cyber Security Scientist Joseph Carson, author of the new “Least Privilege Cybersecurity for Dummies” book, as he explains how to make a least privilege strategy successful in your organization.

Learn how you can substantially reduce the risk of exploitation on endpoints while preserving user productivity. This webinar will help you:

  • Understand the basic concepts of least privilege cybersecurity
  • Know the key steps to planning your least privilege cybersecurity strategy
  • See how to apply least privilege with application control