Thycotic Events & Webinars
Demystifying Behavior Analytics through Focus – Privileged Behavior is Critical!
Thursday, March 2 | 11:00 AM ET
User Behavior Analytics is a very hot topic these days, and a number of companies are popping up all over the place with new or similar products that leverage the concept of Big Data to try and analyze behavior patterns across the entire organization. However, where should your Security Team focus first? Is it important to focus on unusual dropbox access or administrative access to a server at 3am? Which alerts and behavior should take priority first? Machine learning, intelligent algorithms, behavioral pattern recognition, user and entity behavior, and other buzzwords are being thrown around by a number of companies – but what does it all mean? In this webinar, extend the protection of Secret Server with Thycotic’s new Privileged Behavior Analytics, in this webinar we’re going to provide you with a sneak peak of our upcoming analytics product launch!
Suffering from security fatigue? Here’s what you can do about it!
Thursday, March 23 | 1:00 PM EST
A new study from the National Institute of Standards and Technology (NIST) found that most typical computer users they interviewed experienced security fatigue that often leads users to risky computing behavior at work and in their personal lives.
Because of end user security fatigue, IT professionals are constantly playing defense, trying to manage passwords, change passwords and protect passwords. They are spending far too much time and effort just trying to keep up with password maintenance—and experiencing password security fatigue themselves—as they try to manage and protect both end user and privileged accounts.
Join Thycotic as we share insights into how you can minimize security fatigue in your organization for both end users and privileged account users, and prevent threats from outside hackers and malicious insiders.
PAM for IoT – Internet of Things
Thursday, March 30 | 11:00 AM EST
Is your organization ready to adopt IoT? While IoT may offer significant benefits, including cost savings and efficiencies, there are several security concerns that are keeping CSO’s up at night.
Join Thycotic in understanding how Privileged Account Management can add an additional layer of security to help control, monitor and secure IoT devices. You will learn how businesses can readily authenticate all connected IoT devices on your network by:
• Creating a comprehensive IoT management plan for accountability
• Adopting IoT and PAM best practices in your organization
Join Thycotic for one of our weekly demos
How to Hack a Privileged User: Defending Against a Privileged Account Attack
Criminal hackers and sophisticated state-sponsored attackers are going for the easiest, most vulnerable targets—your organization’s privileged users. Even though hackers are highly-skilled, attacks on privileged account user passwords are relatively simple to execute. With up to 80% of breaches resulting from weak or stolen password credentials, exploiting unmanaged and unprotected privileged accounts is the easiest way to extract your company’s most critical data. And in many cases these exploited accounts can go undetected for several weeks or months.
Join Thycotic for a demonstration of how hackers gain control of Privileged User accounts by way of:
- Shared accounts
- Storing passwords in Excel
- Pass-the-Hash attacks
- Default Passwords
- Former employees
As we illustrate each exploitation scenario, we will show you how to defend against these typical Privileged Account attacks with automated Privileged Account Management (PAM) security solutions. Don’t miss this chance to get a thorough introduction to the various password attack vectors most favored by hackers—and how you can stop them in their tracks.
Using Excel to store privileged account passwords? You’ve probably already been breached.
Many organizations and IT Administrators still use Excel spreadsheets to store passwords in privileged accounts and share them between key staff members so they can gain access to important and critical systems. Yet this entrenched practice of storing sensitive passwords and credentials in a spreadsheet is a major security risk and should be avoided at all costs. In fact, your systems may already have been breached with this practice and you don’t even know it.
Join Thycotic Product Manager, Joseph Carson, as he highlights why and how you should eliminate the unnecessary risks around using Excel to manage privileged passwords including:
• Why Excel was never intended to be a Password Management Solution
• The lack of built-in security with spreadsheets
• Excel risks for data loss, security updates and transportability
• How you can eliminate these risks with automated PAM solutions
Everyone registered will receive a free white paper describing the risks with using Excel and how to eliminate them.
The Shortfall in Privileged Account Security – and what organizations can do about it
According to the 2016 Verizon Data Breach Report, 63% of confirmed data breaches involved leveraging weak, default or stolen passwords.
Thycotic a provider of privileged account management solutions for 7,500+ organizations worldwide, in conjunction with Cybersecurity Ventures, a research, and market intelligence firm, launched a ground-breaking online Privileged Password Vulnerability Benchmark survey taken by 600+ organization from around the globe to learn why 63% of the data breaches involved privileged accounts.
We found that 52% of the companies who participated in the benchmark survey received a failing grade on the enforcement of privileged credential controls.
Join Thycotic in a 45-minute educational training session that reveals the specific shortcomings in the current state of privileged account security and provides recommendations for how to address the most common failures.
Best security tip you’ll get this year: Limit user privileges
85% of reported breaches involve compromised endpoints according to SANS. Traditional Antivirus and Anti-malware blacklisting can’t keep up with new and advanced threats targeting desktops, laptops and servers.
Join Product Manager, Joseph Carson as he describes how you can lock down endpoints and control application permissions and access with least privilege policies using new Privilege Manager for Windows from Thycotic. You’ll learn how easy and effective it can be to implement a least privilege access policy with an easy, simple and affordable solution: Privilege Manager for Windows and Unix from Thycotic.
Who knew? The Top 5 Applications you should blacklist now!
Companies globally use thousands of applications that help with accessing emails, browsing the internet, running videos, listening to audio/music, mathematical calculations, and more. And, hackers and cyber criminals know how to exploit vulnerabilities associated with these applications to easily access systems that run these applications.
Join Thycotic Product Manager Joseph Carson as he reveals the top five common and popular applications (you may be surprised!) that pose the greatest risk to your organization — and how you can lock down systems running these applications, blacklist them or choose to remove them completely to help assure application access control. Every registered attendee will receive a free white paper, “The Top 5 Applications You Should Blacklist Now.”