Phone Number +1-202-802-9399 (US)

Thycotic is now Delinea!

Thycotic PAM, IT and
Cyber Security Webinars

Ongoing education, on-demand


Live Hack: How Cyber Criminals Target Remote Employee’s Cloud Credentials

Watch the Webinar


Most organization employees and other individuals, be it in an office environment or working remotely at home, at a café, or while traveling, will find themselves confronted with an unfamiliar Wi-Fi network. Hopefully, they’ll ask that all-important question: Is this Wi-Fi safe to use?

How safe is working remotely and accessing cloud solutions?

This typically means you’re trusting someone else with your data as it travels through their network and equipment.  Some employees may connect using mobile data, though it depends on the package they have or whether it will consume their mobile phone battery.  So instead, most will use free public Wi-Fi because it’s convenient—and it’s free! But that public Wi-Fi comes with security risks to the user, and possibly to your organization too, especially when using your credentials to access cloud services.

Pyramid of basic human needs

Join Thycotic’s Chief Security Scientist and Advisory CISO Joseph Carson as he demonstrates a live hack. Learn about the risks of working remotely, using Wi-Fi, and the techniques cyber criminals use to steal your data, abuse your access, compromise your credentials and passwords, or infect your systems with malicious malware. Joseph will demonstrate some of the tools they use such as the Wi-Fi Pineapple from Hak5 and Kali Linux.

Who should attend this webinar?

  • CISO and Executive Leadership
  • IT Security
  • Employees

What will I learn?

  • The security risks associated with accessing cloud applications and services
  • Why 77% of Cloud breaches involved compromised credentials
  • The risks that come with using unfamiliar or public Wi-Fi
  • Commonly used Wi-Fi security controls that are available to you
  • The steps you can take to reduce Wi-Fi security risks
  • Popular tools and techniques used by cyber criminals, like rogue Wi-Fi networks, monitoring access points, identifying clients and brute forcing passwords

Get the answers to these important questions:

  • How can I reduce my risk when accessing cloud applications?
  • Can I trust Wi-Fi networks that are password protected?
  • What should I do and not do when using Wi-Fi networks?
  • How do I tell if the Wi-Fi network I’m accessing is a rogue access point?
  • How can I reduce my risk when using public Wi-Fi or any other unfamiliar Wi-Fi?
  • How does the Wi-Fi Pineapple work and how is it used?


  • Chief Security Scientist at Thycotic
  • Over 25 years' experience in enterprise security
  • Author of "Privileged Account Management for Dummies" and "Cybersecurity for Dummies"
  • Cyber security advisor to several governments, critical infrastructure, financial and transportation industries
  • Speaker at conferences globally