Phone Number +1-202-802-9399 (US)

Thycotic PAM, IT and
Cyber Security Webinars

Ongoing education, on-demand

WATCH THIS WEBINAR

Least Privilege 101: How to Start Your Least Privilege Cybersecurity Journey


Watch the Webinar


 

Are you looking at ways to implement least privilege across your IT environment?

With 80% of breaches involving the compromise of IT and business user credentials (IDs and passwords) you need to create a plan to eliminate “overprivileged access” by users, applications, and services.

In this webinar, you’ll join Thycotic Chief Cyber Security Scientist Joseph Carson, author of the “Least Privilege Cybersecurity for Dummies” book, as he explains how to make a least privilege strategy successful in your organization.

Who should attend this webinar?

  • IT Security
  • CISO and Executive Leadership
  • New to PAM
  • PAM experts
  • IT operations: Systems Administrators, Helpdesk Teams, Infrastructure Management, Workstation Management, etc.
  • Compliance and Audit

What will I learn?

  • The basic concept of least privilege cybersecurity
  • How to substantially reduce your organization’s risk of exploitation on endpoints while preserving user productivity
  • How to apply least privilege with application control
  • Why CISOs should stop focusing on cybersecurity and focus on business risk.

Get the answers to these important questions:

  • What are the key steps to planning a least privilege strategy?
  • How do companies acquire so many overprivileged users, and what are the risks?
  • What does “privileged access” really mean? You may be surprised.
  • What simple privileged access oversight made by a UK company resulted in over $1M in damage?
  • What employee activity compromises my organization’s security?

What materials or resources will I receive?

Download our ebook Least Privilege Cybersecurity for Dummies

MEET THE PRESENTERS

Joseph Carson

  • Chief Security Scientist at Thycotic
  • Over 25 years' experience in enterprise security
  • Author of "Privileged Account Management for Dummies" and "Cybersecurity for Dummies"
  • Cyber security advisor to several governments, critical infrastructure, financial and transportation industries
  • Speaker at conferences globally

SHARE THIS