Thycotic Telephone Number +1-202-802-9399 (US)

Thycotic IT security Webinars & events

Join us as we bring together thought leaders, industry experts, cyber security architects and more
to address key challenges in Privileged Access Management and IT Security,
and making the most out of Thycotic’s solutions.

Live Webinars

2019 Black Hat Conference Debrief: Key Takeaways and Insights
Thursday, September 19 | 11:00 AM ET

From social media manipulation and Deep Fakes, to DevSecOps and improving Active Directory security, the annual Black Hat conference in Las Vegas highlights the latest in cybercriminal and cyber security counter measures. Join our Chief Cyber Security Scientist Joseph Carson as he shares his observations and insights at this year’s conference along with our annual Black Hat Hacker Survey findings and key takeaways that include:

  • Top privileged account targets preferred by hackers
  • How hackers cover their tracks once a privileged account is compromised
  • The biggest obstacles hackers encounter when seeking to compromise credentials

The good news? You’ve got automated solutions that can effectively keep threats in check and protect your “keys to the kingdom.”

Every webinar registrant will receive a copy for our 2019 Black Hat Survey Report hot off the presses post conference.



Join Thycotic for one of our weekly demos

Introduction to Thycotic Privilege Manager

Wednesday, September 4
2:00 PM EST

Introduction to Thycotic Privilege Manager

Wednesday, September 18
2:00 PM EST

Don’t miss our other free webinars!
See all previously recorded webinars


On-Demand Webinars

BREACHED! Implementing Incident Response for a Compromised Credential

With 80% of breaches involving compromised credentials, the pace and scope of cyber-attacks continue to accelerate along with the cost of a breach. Join cybersecurity expert Joseph Carson as he takes you from the moment you realize you’ve been breached, to getting back to business with an enterprise-wide privileged account management solution.

You will learn how to:

• Respond to a compromised credential

• Identify your privileged account weaknesses and create an automated approach to Privileged Access Management

• Set up early warning alerts of potential account compromise



Least Privilege 101: How to Start Your Least Privilege Cybersecurity Journey

Are you looking at ways to implement least privilege across your IT environment? With 80% of breaches involving the compromise of IT and business user credentials (IDs and passwords) you need to create a plan to eliminate “overprivileged access” by users, applications, and services.

Join Thycotic Chief Cyber Security Scientist Joseph Carson, author of the new “Least Privilege Cybersecurity for Dummies” book, as he explains how to make a least privilege strategy successful in your organization.

Learn how you can substantially reduce the risk of exploitation on endpoints while preserving user productivity. This webinar will help you:

  • Understand the basic concepts of least privilege cybersecurity
  • Know the key steps to planning your least privilege cybersecurity strategy
  • See how to apply least privilege with application control


How Cyber Criminals Crack Your Passwords Using Dictionary Searches and Brute-Force

Interested in learning how a password is cracked? The Collection 1 Data Breach saw over 1 billion unique email addresses and passwords exposed. So how did they get their hands on them in the first place?

Step into the world of a cyber criminal with our Chief Cyber Security Scientist, Joseph Carson and special guest, X-Force Red’s Senior Managing Consultant, Dustin Heywood. They will walk you through how easy it is to hack your passwords through two of the most common techniques: dictionary searches and brute-force. Leveraging the popular pen testing tool, Kali Linux, Joseph and Dustin will take you through some of the most popular and latest tools cyber criminals use every day to perform these hacking techniques.

Attend this webinar to:

  • Gain insight into the vulnerabilities of passwords and how cyber criminals use different methods to easily crack them.
  • Learn what makes a secure password and how to update your password policies to reflect the latest NIST guidelines.
  • Discover resources that will help you develop and maintain best practices for password security.