+1-202-802-9399 (US)

Thycotic Events & Webinars

Join us as we bring together thought leaders, industry experts, security architects and more
to address key challenges in Privileged Account Management, IT security,
and how to make the most out of using Thycotic solutions.

Live Webinars

Top 5 Cyber Security Predictions for 2019
Thursday, December 13 | 11:00 AM EST

As 2018 comes to a close, some of the major breaches and cyber security decisions will live on and have a major impact into next year. We saw some promising cyber security advances including privacy updates around GDPR. But, we also witnessed several serious information leaks including a breach at the data aggregation firm Exactis which exposed over 340 million consumer records. Can we expect to make better progress defending our sensitive data from attackers in 2019?

Thycotic’s Chief Cyber Security Scientist, Joseph Carson, will follow the timeline of major cyber security events in 2018, and then highlight his top 5 cyber security predictions around, IoT, cloud security, the future of Privileged Access Management and more.

 

WEEKLY Demos

Join Thycotic for one of our weekly demos

Introduction to Thycotic Privilege Manager

Wednesday, December 12
2:00 PM EST

Introduction to Thycotic Privilege Manager

Wednesday, December 26
2:00 PM EST

Don’t miss our other webinars!
See all previously recorded webinars

SEE PAST WEBINARS

On-Demand Webinars

Passwords or Passphrases: How fast can your password be cracked?

“Your password should be 12 characters long, contain at least 1 upper case, 1 lower case, 2 numbers, and 1 special character. You can’t use the same letter twice, you can’t use letters in your username, your password can’t rhyme with the word dog, and all characters can’t be from only one side of the keyboard.”

How many password requirements is too many? And when do those requirements actually start weakening your passwords? Better yet, how fast can those passwords be cracked?

There are many myths and misconceptions around passwords and their strength, and how challenging it is to crack them. In this webinar we’re going to:

  • Dive into some examples and research around the true strength of passwords
  • Review the NIST’s proposed changes to password policy recommendations
  • Provide you with some easy ways to strengthen your password practices
  • Explore tools that help you determine whether your current password policies have already led to weak passwords on your network

 

Anatomy of a Privileged Account Hack: How to Spot it. How to Stop it.

Join Thycotic with a panel of cybersecurity experts as we explain and demonstrate how easy it is for someone to gain access to, and compromise, your domain controller. Our panel will discuss the complete lifecycle of a modern-day cybersecurity breach, from the very simple hack to the very sophisticated infiltration of a network.

Don’t miss this panel discussion to learn:

  • How easy is it to take over any basic privileged account
  • How that basic account can be used to elevate privileges and move laterally through a network
  • How attackers can quickly make their way to your domain controller and other critical systems
  • Key steps to prevent privileged account hacks

 

Secret Server as a Service: How to Maximize PAM Success at Enterprise Scale

Join Thycotic and a Sr. Systems Administrator from cyber security leader FireEye to see how you can leverage the full capabilities and protection of Secret Server across an enterprise-scale environment. We will walk you through a real -world scenario that demonstrates how to set up Secret Server to scale in your organization. You’ll get best practice tips on how Secret Server can be used not only to enhance security but actually improve the productivity of various departments in your organization.

Register now to learn how you can:

  • Plan an enterprise scale Secret Server deployment
  • Implement best practice tips for folder structure
  • Increase adoption across your organization during deployment

 

World Password Day Tips: 10 Common Password Mistakes to Avoid in 2018

This World Password Day join Thycotic Chief Security Scientist Joseph Carson as he shares the ‘secret’ formula to a secure password and overall password management plan based on the latest 2018 research.  Password best practices have evolved and changed, so this is your opportunity to stay a step ahead of hackers by learning:

  • The do’s and don’ts of password security based on the latest 2018 InfoSec research
  • How to avoid the 10 most common password mistakes
  • How best to respond to a password breach and get back to business

PLUS: Every attendee will receive a free hard-copy of Joseph’s new “Cybersecurity for Dummies” book covering the top ways to reduce your online risks, and best practices to protect yourself at work and home.

Check your own password savvy with this Free Password Strength Checker

 

BREACHED! Implementing Incident Response for a Compromised Credential

With 80% of breaches involving compromised credentials, the pace and scope of cyber-attacks continue to accelerate along with the cost of a breach. Join cybersecurity expert Joseph Carson as he takes you from the moment you realize you’ve been breached, to getting back to business with an enterprise-wide privileged account management solution.

You will learn how to:

• Respond to a compromised credential

• Identify your privileged account weaknesses and create an automated approach to Privileged Access Management

• Set up early warning alerts of potential account compromise