Phone Number +1-202-802-9399 (US)

Thycotic IT security Webinars & events

Join us as we bring together thought leaders, industry experts, cyber security architects and more
to address key challenges in Privileged Access Management and IT Security,
and making the most out of Thycotic’s solutions.

Live Webinars

Cyber Security Team’s Quick Guide to Work Remotely & Securely – Fireside Chat with Q&A
Thursday, April 2 | 11:00 AM ET - 4:00 PM GMT

The world is accelerating a shift to the largest remote workforce ever. With the current unusual circumstances, IT teams have been forced to accelerate cyber security projects to aid this mass digital transformation. A well-executed transition will make working from home possible and maintain security, and it will do so within the limitations of your organization’s existing infrastructure.

Some of the primary security challenges many companies will face involve managing the multiple systems and laptops that have never been outside the company perimeter. As employees are packing up their office equipment and taking it home, they are facing serious risks and exposure to cybercriminals wanting to take advantage of these increased opportunities.

CISOs and IT security professionals must address important questions to reduce the risks exposed by this transition. In this webinar CISO Terence Jackson and Chief Cyber Security Scientist Joseph Carson answer your top questions and share tips to balance the security and productivity of your teams. Bring your questions to the chat, and get ready for an interactive webinar aimed at addressing the top remote worker security challenges that organizations are facing today.

What will I learn?
How to strengthen your remote worker’s cyber security transition.

Get the answers to these important questions:

  • What data is on my systems and will it still comply with compliance and regulations if employees leave the office and work remotely?
  • Does it matter if my users are local administrators
  • How can I sustain a business as usual approach and maintain security?
  • Will a Zero Trust strategy work?

Related reading: Empower remote employees and vendors to stay productive and secure

 

Secret Server Major Release: Exciting new features give tighter control and greater visibility
Thursday, April 30 | 11:00 AM ET

Secret Server is a comprehensive Privileged Account Management solution available both on premise and in the cloud. With its latest release, Thycotic’s award winning software empowers security and IT ops teams to gain even tighter control and visibility over privileged access and improve productivity with new session management and automation capabilities.

Now, Secret Server makes it even easier to automate tasks that might be repetitive or time consuming with its new if/then automation, as well as extending its powerful privileged session management capabilities with web session recording. These new enhancements provide organizations with powerful solutions to take control over their privileged account attack surface.

Who should attend this webinar?

  • Secret Server Customers
  • IT Directors
  • IT System Administrators
  • Database Administrators
  • Security Administrators

What will I learn?

  • How Secret Server’s latest feature enhancements improve both security and productivity
  • How if/then automation makes it easy to automate many of your repetitive or time consuming tasks
  • How our web session recording feature extends Secret Server’s powerful privileged session management to include any web-based user-interface
  • How advanced filtering and new viewer user roles give your security and IT ops teams the control they need, while also meeting compliance and privacy regulations.

Get the answers to these important questions:

  • What’s new in Secret Server in 2020?
  • How can I take advantage of these awesome new capabilities?

What materials will I receive?

A recording of this webinar.

 

WEEKLY Demos

Join Thycotic for one of our weekly demos

Introduction to Thycotic Privilege Manager

Wednesday, April 1
2:00 PM EST

Introduction to Thycotic Privilege Manager

Wednesday, April 15
2:00 PM EST

Don’t miss our other free IT and cyber security webinars!
See all previously recorded webinars

SEE PAST WEBINARS

On-Demand Webinars

BREACHED! Implementing Incident Response for a Compromised Credential

With 80% of breaches involving compromised credentials, the pace and scope of cyber-attacks continue to accelerate along with the cost of a breach. Join cybersecurity expert Joseph Carson as he takes you from the moment you realize you’ve been breached, to getting back to business with an enterprise-wide privileged account management solution.

You will learn how to:

• Respond to a compromised credential

• Identify your privileged account weaknesses and create an automated approach to Privileged Access Management

• Set up early warning alerts of potential account compromise

 

 

Least Privilege 101: How to Start Your Least Privilege Cybersecurity Journey

Are you looking at ways to implement least privilege across your IT environment?

With 80% of breaches involving the compromise of IT and business user credentials (IDs and passwords) you need to create a plan to eliminate “overprivileged access” by users, applications, and services.

In this webinar, you’ll join Thycotic Chief Cyber Security Scientist Joseph Carson, author of the “Least Privilege Cybersecurity for Dummies” book, as he explains how to make a least privilege strategy successful in your organization.

Who should attend this webinar?

  • IT Security
  • CISO and Executive Leadership
  • New to PAM
  • PAM experts
  • IT operations: Systems Administrators, Helpdesk Teams, Infrastructure Management, Workstation Management, etc.
  • Compliance and Audit

What will I learn?

  • The basic concept of least privilege cybersecurity
  • How to substantially reduce your organization’s risk of exploitation on endpoints while preserving user productivity
  • How to apply least privilege with application control
  • Why CISOs should stop focusing on cybersecurity and focus on business risk.

Get the answers to these important questions:

  • What are the key steps to planning a least privilege strategy?
  • How do companies acquire so many overprivileged users, and what are the risks?
  • What does “privileged access” really mean? You may be surprised.
  • What simple privileged access oversight made by a UK company resulted in over $1M in damage?
  • What employee activity compromises my organization’s security?

What materials or resources will I receive?

Download our ebook Least Privilege Cybersecurity for Dummies

 

Ultimate Password Cracking Techniques Used by Hackers

Ever wonder how a cyber-criminal cracks a password? Stealing your credentials is a common technique used by criminal hackers to access your sensitive information.  In honor of Change Your Password Day, Thycotic is focusing on the most common and complex password cracking techniques to give you a better understanding of how you can protect your credentials.

Watch as we demonstrate a live privileged account hack with readily available tools cyber criminals use every day to crack your passwords and gain access to sensitive information. By thinking like a hacker, you’ll be able to stay one step ahead in making it more difficult and reduce the risks of your password becoming the next victim.

Who should attend this webinar?

IT Security
CISO and Executive Leadership
New to PAM
PAM experts
IT operations: Systems Administrators, Helpdesk Teams, Infrastructure Management, Workstation Management, etc.
Compliance and Audit

What will I learn?

Gain a deeper understanding of the tools and techniques cyber criminals use to crack passwords and elevate access. You’ll also get an insider’s view on how cyber criminals keep their own credentials secure.

Get the answers to these important questions:

  • What does a real-time privileged account hack look like?
  • How often should we change our passwords to meet NIST’s 2020 guidelines?
  • What are the current best methods to reduce the risks against a privileged account attack