Phone Number +1-202-802-9399 (US)

Thycotic is now Delinea!

Thycotic PAM, IT and
Cyber Security Webinars

Ongoing education, on-demand


One Size Doesn’t Fit All: Defining Least Privilege Policies for Different Departments & Users

Watch the Webinar


With 85% of breaches involving compromised endpoints, organizations are implementing a least privilege security posture and application control to minimize risks caused by cyber-attacks and fraudulent users. But before doing so, you need to design policies for different departments and users, keeping in mind how implementing least privilege will affect their productivity.

Your IT Admins, for example, should have standard accounts without privileged network access for day-to-day tasks and be granted privileged access only occasionally as needed. Your business users will need access to applications with restricted privileges that do not interfere with getting their work done.

Join Thycotic’s Privilege Manager Product Manager, Steve Goldberg, and Product Marketing Manager, Barbara Hoffman, as they show you how to create a custom least privilege security plan that manages different users and application requirements based on different department needs. They will share real-world examples of policies that help organizations implement a least privilege strategy.

Who should attend this webinar?

  • IT Security
  • New to PAM
  • PAM experts
  • Compliance and Audit

What will I learn?

  • How to automate your application policies and workflows to review and approve applications to accommodate different departments
  • How to craft your department policies to meet your team’s access needs while meeting your IT policy and compliance requirements
  • Why the cloud makes so much sense for endpoint management

Get the answers to these important questions:

  • How are employees most likely compromise my organization’s security?
  • What does least privilege mean, and why do organizations implement least privilege strategies?
  • What are the 6 common challenges in managing endpoints, and how do I tackle them?
  • How does my organization compare to others in terms of managing user privilege? View live poll results.

What materials or resources will I receive?

A free trial of Privilege Manager, Thycotic’s endpoint privilege management and application control software



Barbara Hoffman

  • Decade of experience in IT software and security
  • Many more years working in product management, development and marketing across a number of different industries
  • Helps drive marketing strategy, messaging & positioning, sales enablement, and content creation for Thycotic’s Secret Server, Privilege Behavior Analytics and Account Lifecycle Manager
  • BS in International Business from George Washington University
  • MBA from the University of Southern California
  • Cybersecurity Certification from Georgetown University


Steve Goldberg

  • Thycotic's Senior Product Manager for the Privilege Manager solution
  • Began his career as a consultant and developer
  • Served as a senior technical resource for solution engineering and product management teams