+1-202-802-9399 (US)

Thycotic Events & Webinars

Join us as we bring together thought leaders, industry experts, security architects and more
to address key challenges in Privileged Account Management, IT security,
and how to make the most out of using Thycotic solutions.

Live Webinars

3 New Things You Can Do with Secret Server 10.4
Thursday, January 18 | 11:00 AM ET

There’s plenty for security pros, DevOps teams and service providers to appreciate in Thycotic’s latest release of Secret Server.

Join Product Manager Chris Widstrom as he demonstrates the latest Secret Server features, designed to increase productivity while securing privileged credentials. Highlights include:

  • Protecting and managing privileges used in a DevOps environment with the new Secret Server SDK
  • Leveraging Secret Server’s single-sign-on functionality for Privileged Behavior Analytics
  • Securing and managing client credentials more easily through our new MSP Portal

All registrants will receive a free copy of the new book, Cybersecurity for Dummies.

Can’t make it? Be sure to still register to receive the recording to your inbox.


How to Empower Your Employees to be Safer Online at Work and at Home
Thursday, January 25 | 11:00 AM ET

Join cybersecurity expert and author, Joseph Carson as he explains why it’s essential to empower employees in protecting your organization from the latest cyber threats.  He will cover the key benefits of taking a people-centric approach to making cybersecurity everyone’s responsibility, including:

  • How to engage employees to become personally aware and proactive in their cybersecurity habits
  • Encouraging key individuals to act as cybersecurity ambassadors and mentors to colleagues
  • What to do during a cybersecurity attack and how to respond to an incident
  • The importance of expanding better cybersecurity hygiene practices at home as well as at work

All registrants will receive a free copy of Joseph’s new book, “Cybersecurity for Dummies” which they can share with executives, colleagues and employees.

Can’t make it? Be sure to still register to receive the recording to your inbox.


The Insider’s Guide to Successfully Implementing Least Privilege
Thursday, February 1 | 11:00 AM ET

Have you been exploring ways to implement a least privilege strategy? Worried that removing privileges from users will backfire if they can’t access the applications and tools they need?

In this comprehensive overview, Thycotic Product Manager Steve Goldberg will explain how you can implement least privilege to protect confidential data, block malware, and meet compliance requirements, without slowing down users or requiring additional desktop support.

To illustrate, Steve will demonstrate the before and after effects of removing privileged human accounts, which are the targets of external attackers, malware, and rogue insiders.

You’ll gain a better understanding of how you can protect endpoints, the most vulnerable part of your attack surface, without sacrificing productivity.

Every registrant receives a free whitepaper: Top 10 Keys to Successful Least Privilege Adoption Via Application Control”

Can’t make it? Be sure to still register to receive the recording to your inbox.


Compliance & Privileged Account Management: How to Make a Perfect Match
Thursday, February 8 | 11:00 AM ET

While the relationship between compliance and Privileged Account Management hasn’t always been rosy, bringing them together is not as difficult as you might think. GDPR, SOX, PCI and other regulations now require you to demonstrate proper protection and security around privileged users and account access.

Join Thycotic’s Product Manager, Dan Ritch, as he demonstrates how to match your compliance requirements with automated Privileged Account Management for:

  • Monitoring and managing Privileged Users
  • Protecting against Insider Threats with advanced behavior analytics
  • Streamlined reporting to help satisfy audit reviews

Every registrant is encouraged to take a Free online PAM Risk Assessment based on industry-leading compliance standards from ISO, NIST, PCI, CIS CSC and the EU’s General Data Privacy Regulations (GDPR).

Can’t make it? Be sure to still register to receive the recording to your inbox.


Alert! Don’t Move to Windows 10 Before Resolving These Security Issues
Thursday, February 15 | 11:00 AM ET

A migration to Windows 10 is your opportunity to “right size” security policies to match compliance requirements and protect your endpoints most effectively.

Removing local admin rights from endpoints at the same time you install your new Windows version is the most effective way to block malware at the gate. Without access to administrative credentials, threat agents won’t be able to exploit endpoints and progress throughout your network to reach sensitive data.

In this webinar, we’ll assess the pros and cons of the Windows solution for least privilege and identify strategies to make sure least privilege is adopted without hindering user productivity.

Join Thycotic Product Manager, Steve Goldberg, as he demonstrates how you can:

  • Remove local administrative rights from endpoints and enforce the principle of least privilege through application control policies
  • Match your policies to the needs of business users while reducing your attack surface
  • Make choices as part of your Windows 10 planning that will set the foundation for a painless least privilege implementation

Every registrant receives a free whitepaper: Don’t Switch to Windows 10 Without an Endpoint Security Plan.”

Can’t make it? Be sure to still register to receive the recording to your inbox.


The Sleepless CISO: Spot the early warning signs of insider threats
Thursday, February 22 | 11:00 AM ET

Three out of four respondents in a “2016 Insider Threat Report” by the Information Security Community on LinkedIn estimated insider threats cost their organizations an average of $500,000 in 2016.

New, innovative machine learning tools can help you identify and alert you to suspicious behavior by insiders before you experience a compromise.  See how you can take a proactive approach to detecting insider threats and potential data theft by joining Product Manager Dan Ritch, as he demos Thycotic’s Privileged Behavior Analytics solution.  You’ll learn how you can:

  • Free up time and effort from time-consuming log collection and analysis.
  • Set up views of privileged accounts and access patterns for individual users across your enterprise to observe and detect anomalous behaviors.

Can’t make it? Be sure to still register to receive the recording to your inbox.


How to Respond to a Cybersecurity Breach – Your Guide to Getting Back to Business
Thursday, March 22 | 11:00 AM ET

Most organizations are fast realizing that experiencing a cybersecurity breach is only a matter of time. But as the latest headline-grabbing breaches remind us, too many organizations fail to respond appropriately—risking their reputations, customer relationships and substantial fines.

Join cybersecurity expert Joseph Carson as he provides recommended best practices on how to respond to a cyber incident, along with key takeaways based on lessons learned from several high-profile breaches this past year.



Join Thycotic for one of our weekly demos

Don’t miss our other webinars!
See all previously recorded webinars


On-Demand Webinars

5 Free PAM Tools Cybersecurity Professionals Live For

Get a quick overview of the latest cyber security tools that can help transform your PAM security program. You will save time and money while improving the protection of your privileged account passwords with these Free PAM security tools and training:

  • Secret Server Free – The fastest to deploy, easiest to use privileged access password security solution in a free edition.
  • Password Security Policy Template – Privileged account password security policy templates ready to customize, and help demonstrate compliance.
  • Windows Endpoint Application Discovery Tool- Identifies the riskiest applications running in your environment with reports that help you evaluate their potential risks.
  • Windows and Unix Privileged Account Discovery Tool – Saves you hours of effort in locating unknown and therefore unprotected privileged accounts.
  • Privileged Password Security Certification Training – One hour, online Privileged Password Security Training teaches you the basics of privileged account security.


Passwords or Passphrases: How fast can your password be cracked?

“Your password should be 12 characters long, contain at least 1 upper case, 1 lower case, 2 numbers, and 1 special character. You can’t use the same letter twice, you can’t use letters in your username, your password can’t rhyme with the word dog, and all characters can’t be from only one side of the keyboard.”

How many password requirements is too many? And when do those requirements actually start weakening your passwords? Better yet, how fast can those passwords be cracked?

There are many myths and misconceptions around passwords and their strength, and how challenging it is to crack them. In this webinar we’re going to:

  • Dive into some examples and research around the true strength of passwords
  • Review the NIST’s proposed changes to password policy recommendations
  • Provide you with some easy ways to strengthen your password practices
  • Explore tools that help you determine whether your current password policies have already led to weak passwords on your network


Anatomy of a Privileged Account Hack: How to Spot it. How to Stop it.

Join Thycotic with a panel of cybersecurity experts as we explain and demonstrate how easy it is for someone to gain access to, and compromise, your domain controller. Our panel will discuss the complete lifecycle of a modern-day cybersecurity breach, from the very simple hack to the very sophisticated infiltration of a network.

Don’t miss this panel discussion to learn:

  • How easy is it to take over any basic privileged account
  • How that basic account can be used to elevate privileges and move laterally through a network
  • How attackers can quickly make their way to your domain controller and other critical systems
  • Key steps to prevent privileged account hacks


Secret Server as a Service: How to Maximize PAM Success at Enterprise Scale

Join Thycotic and a Sr. Systems Administrator from cyber security leader FireEye to see how you can leverage the full capabilities and protection of Secret Server across an enterprise-scale environment. We will walk you through a real -world scenario that demonstrates how to set up Secret Server to scale in your organization. You’ll get best practice tips on how Secret Server can be used not only to enhance security but actually improve the productivity of various departments in your organization.

Register now to learn how you can:

  • Plan an enterprise scale Secret Server deployment
  • Implement best practice tips for folder structure
  • Increase adoption across your organization during deployment


Using Excel to store privileged account passwords? You’ve probably already been breached.

Many organizations and IT Administrators still use Excel spreadsheets to store passwords in privileged accounts and share them between key staff members so they can gain access to important and critical systems. Yet this entrenched practice of storing sensitive passwords and credentials in a spreadsheet is a major security risk and should be avoided at all costs. In fact, your systems may already have been breached with this practice and you don’t even know it.

Join Thycotic Product Manager, Joseph Carson, as he highlights why and how you should eliminate the unnecessary risks around using Excel to manage privileged passwords including:

• Why Excel was never intended to be a Password Management Solution
• The lack of built-in security with spreadsheets
• Excel risks for data loss, security updates and transportability
• How you can eliminate these risks with automated PAM solutions

Everyone registered will receive a free white paper describing the risks with using Excel and how to eliminate them.



Conferences and Trade Shows

Las Vegas, NV
March 5-9, 2018

Tenable Edge
Los Angeles, CA
March 8-9, 2018

Logo - RSA

San Francisco, CA
April 16-19, 2018

ISACA Health IoT
Rosslyn, VA
April 26, 2018

Sailpoint Navigate
Austin, TX
May 14-16, 2018

Gartner Summits

Gartner Security & Risk
National Harbor, MD
June 4-7, 2018

Arlington, VA
June 12-13, 2018


Black Hat
Las Vegas, NV
August 8-9


Las Vegas, NV
August 26-30

Microsoft Ignite

Orlando, FL
September 24-27

Gartner Summits

Gartner IAM
Las Vegas, NV
December 3-5, 2018