Thycotic Events & Webinars
Cloud-based Privileged Password Security the Next Killer App? – featuring University of San Diego
Thursday, January 26 | 1:00 PM EST
With analysts predicting 30 percent of Privileged Account Management (PAM) security purchases running in the Cloud by 2019—up from 5 percent today—organizations must carefully consider all their deployment options including Cloud, on premise and hybrid solutions.
Join Thycotic Product Manager Joseph Carson and the Chief Cloud Evangelist, Mike Somerville, from the University of San Diego as they discuss the deployment of enterprise privileged account management in the cloud. You’ll explore the advantages gained from offloading PAM management to a cloud provider, and how Secret Server Cloud provides the security, convenience and efficiency you expect from a cloud solution.
5 steps federal agencies must take to reduce their biggest IT Security Risk: Insider Threats
Thursday, February 9 | 1:00 PM EST
A recent Ponemon survey reinforces research published by the Government Accountability Office that showed 15 to 24 federal agencies had “persistent weaknesses” in cyber security over the past two years. Many federal agencies are focusing on privileged access management (PAM) security as a key to minimizing risks to government IT operations and our national security.
Join Thycotic Product Manager Ben Yoder as he shares the 5 critical steps federal agencies must take to reduce IT security risk around privileged accounts and vulnerable endpoints. You’ll learn the basics of an actionable plan that will help you properly secure privileged information and mitigate malware attacks.
Privileged Identity Management – How to integrate IAM and PAM solutions
Thursday, February 23 | 10:00 AM EST
The IT categories of Privilege Account Management (PAM) and Identity and Access Management (IAM) are likely to converge over the next few years. That means users will have a digital identity that works across not only for a single employer, but across multiple industries and governments. Imagine a digital identity that you could conveniently use for voting, banking, traveling, unlocking doors, starting a car, riding public transportation or accessing healthcare services.
Yet as they converge, it will become even more critical to lockdown and control Privileged Accounts so that they cannot be misused or abused while still providing productive and efficient access.
Join Thycotic as we explore how to build an integrated IAM and PAM solution that includes a review of key elements, along with a demonstration of what a comprehensive integrated IAM and PAM solution should encompass.
PAM for IoT – Internet of Things
Thursday, March 9 | 10:00 AM EST
Is your organization ready to adopt IoT? While IoT may offer significant benefits, including cost savings and efficiencies, there are several security concerns that are keeping CSO’s up at night.
Join Thycotic in understanding how Privileged Account Management can add an additional layer of security to help control, monitor and secure IoT devices. You will learn how businesses can readily authenticate all connected IoT devices on your network by:
• Creating a comprehensive IoT management plan for accountability
• Adopting IoT and PAM best practices in your organization
Suffering from security fatigue? Here’s what you can do about it!
Thursday, March 23 | 1:00 PM EST
A new study from the National Institute of Standards and Technology (NIST) found that most typical computer users they interviewed experienced security fatigue that often leads users to risky computing behavior at work and in their personal lives.
Because of end user security fatigue, IT professionals are constantly playing defense, trying to manage passwords, change passwords and protect passwords. They are spending far too much time and effort just trying to keep up with password maintenance—and experiencing password security fatigue themselves—as they try to manage and protect both end user and privileged accounts.
Join Thycotic as we share insights into how you can minimize security fatigue in your organization for both end users and privileged account users, and prevent threats from outside hackers and malicious insiders.
Join Thycotic for one of our weekly demos
96% of critical vulnerabilities affecting the Windows operating systems could be mitigated by removing admin rights. 60% of all Microsoft vulnerabilities published could be mitigated by removing admin rights. But what happens after you remove admin rights? What if a user needs to run or install an application that requires admin rights? Learn how Privilege Manager for Windows can manage a set of policies that will allow end users to work productively but safe. We will demonstrate how Privilege Manager for Windows can work for you including:
• Discover software on endpoints, especially software that requires admin right to run.
• Create policies that will identify, evaluate and apply specific actions to any process initiated on a Windows endpoint.
• Create easy policy groups we call Personas and quickly apply them to groups of endpoint or groups of users.
• See Privilege Manager for Windows reports that provide a rich set of auditing and compliance information regarding application control.
62% of breaches are from privileged account abuse. Privileged Account Management introduces a fundamental security layer to protect against cyber-attacks that target privileged accounts to get at critical information assets in your organization. Learn how Secret Server automates the management and security of your enterprise privileged accounts from a single console, saving you time and money while reducing risk.
We will demonstrate how Thycotic Secret Server can work for you including:
•How to manage and organization user permissions and credentials
•Review Secret Server’s security controls and auditing capabilities
Minimizing Help Desk calls can save significant amounts of time and money. Learn how Thycotic self-service password reset tool for end-users can simplify your password management. By allowing employees to reset their forgotten Active Directory passwords directly from the web or Windows login screen, Password Reset Server can drastically cut Help Desk calls and reduce costs.
We will demonstrate how Password Reset Server can work for you including:
• How to implement an end-user password reset solution and receive buy-in
• Review Password Reset Server security controls and auditing capabilities
• Key ways to improve your organization’s efficiency and bottom line
5 Free PAM Tools Cybersecurity Professionals Live For
Get a quick overview of the latest cyber security tools that can help transform your PAM security program. You will save time and money while improving the protection of your privileged account passwords with these Free PAM security tools and training:
- Secret Server Free – The fastest to deploy, easiest to use privileged access password security solution in a free edition.
- Password Security Policy Template – Privileged account password security policy templates ready to customize, and help demonstrate compliance.
- Windows Endpoint Application Discovery Tool- Identifies the riskiest applications running in your environment with reports that help you evaluate their potential risks.
- Windows and Unix Privileged Account Discovery Tool – Saves you hours of effort in locating unknown and therefore unprotected privileged accounts.
- Privileged Password Security Certification Training – One hour, online Privileged Password Security Training teaches you the basics of privileged account security.
Using Excel to store privileged account passwords? You’ve probably already been breached.
Many organizations and IT Administrators still use Excel spreadsheets to store passwords in privileged accounts and share them between key staff members so they can gain access to important and critical systems. Yet this entrenched practice of storing sensitive passwords and credentials in a spreadsheet is a major security risk and should be avoided at all costs. In fact, your systems may already have been breached with this practice and you don’t even know it.
Join Thycotic Product Manager, Joseph Carson, as he highlights why and how you should eliminate the unnecessary risks around using Excel to manage privileged passwords including:
• Why Excel was never intended to be a Password Management Solution
• The lack of built-in security with spreadsheets
• Excel risks for data loss, security updates and transportability
• How you can eliminate these risks with automated PAM solutions
Everyone registered will receive a free white paper describing the risks with using Excel and how to eliminate them.
The Shortfall in Privileged Account Security – and what organizations can do about it
According to the 2016 Verizon Data Breach Report, 63% of confirmed data breaches involved leveraging weak, default or stolen passwords.
Thycotic a provider of privileged account management solutions for 7,500+ organizations worldwide, in conjunction with Cybersecurity Ventures, a research, and market intelligence firm, launched a ground-breaking online Privileged Password Vulnerability Benchmark survey taken by 600+ organization from around the globe to learn why 63% of the data breaches involved privileged accounts.
We found that 52% of the companies who participated in the benchmark survey received a failing grade on the enforcement of privileged credential controls.
Join Thycotic in a 45-minute educational training session that reveals the specific shortcomings in the current state of privileged account security and provides recommendations for how to address the most common failures.
Protecting ALL the Privileged Accounts in Your Environment and the Cloud
You can’t protect what you don’t know exists. So before you launch into a privileged account lockdown project you need to start with really understanding how many such accounts exist. Most of the time organizations significantly underestimate.
Administrator on Windows and root on Linux are just the beginning. Let’s think about a web application farm running some off the shelf software package. Let’s say there are 3 web servers and 2 database servers. One OS root/admin account per system is a given. Next there’s the DB super user account such as “sa” on SQL Server. Next, if the application is running on Windows/IIS there are
-Service accounts for the DB
-Service accounts for the application
-Accounts used by the application to access the database
And don’t forget the hardware level accounts used for logging on to the motherboard itself for remote maintenance and control.
All of these should be considered privilege accounts. That brings me to another issue we’ll discuss in this real training for free ™ event: how do you define privileged accounts. That’s really a pre-requisite to get resolved before you even try to discover privileged accounts.
These are just the built-in / system-required accounts for the application. On top of that are other accounts for system management and actual human IT staff. Privileged users should include more than just accounts with full admin or root authority. Other users may be less privileged but are still privileged. This would include perhaps helpdesk staff with password reset authority or operations folks who have backup authority.
It turns out that there are probably event people, outside of IT, in your user departments that should be considered privileged accounts and subject to similar safeguards.
But you can’t stop at the network. Cloud apps and services have privileged accounts too and there’s no difference in the security requirements. In fact I know of a technology startup that completely went out of business when their AWS admin portal was hacked.
In this webinar we will look at methods and tools for helping you systematically catalog and maintain all the privileged accounts in your organization – whether on prem or in the cloud. And we’ll give you a list of criteria to choose from in defining what “privileged” means for your organization.
We’ll show you some free tools including:
-Windows Privileged Account Discovery
-Unix/Linux Privileged Account Discovery
Best security tip you’ll get this year: Limit user privileges
85% of reported breaches involve compromised endpoints according to SANS. Traditional Antivirus and Anti-malware blacklisting can’t keep up with new and advanced threats targeting desktops, laptops and servers.
Join Product Manager, Joseph Carson as he describes how you can lock down endpoints and control application permissions and access with least privilege policies using new Privilege Manager for Windows from Thycotic. You’ll learn how easy and effective it can be to implement a least privilege access policy with an easy, simple and affordable solution: Privilege Manager for Windows and Unix from Thycotic.