+1-202-802-9399 (US)

Who knew? The Top 5 Applications you should blacklist now!

Companies globally use thousands of applications that help with accessing emails, browsing the internet, running videos, listening to audio/music, mathematical calculations, and more. And, hackers and cyber criminals know how to exploit vulnerabilities associated with these applications to easily access systems that run these applications.

Join Thycotic Product Manager Joseph Carson as he reveals the top five common and popular applications (you may be surprised!) that pose the greatest risk to your organization — and how you can lock down systems running these applications, blacklist them or choose to remove them completely to help assure application access control. Every registered attendee will receive a free white paper, “The Top 5 Applications You Should Blacklist Now.”

 

SHARE THIS


The following two tabs change content below.

Jordan True

Jordan is a social media strategist, digital community manager and a lover of all things IT. She currently manages the Social Media Program at Thycotic and loves to connect with technology communities online and at enterprise IT events. Addicted to the outdoors, you can find Jordan on the running trails in her free time or sharing the latest InfoSec buzz on Twitter @ThycoticJordan.
ISC-CPE Credit LogoInterested in CPE Credit for attending? Please provide your (ISC)2 ID certificate number when you register. You will then automatically see your CPE credit added to your (ISC)2 account within 4-6 weeks. Note, most Thycotic webinars qualify for 1 CPE credit.

Watch the Webinar