Phone Number +1-202-802-9399 (US)

Thycotic is now Delinea!

Thycotic PAM, IT and
Cyber Security Webinars

Ongoing education, on-demand


Three Key Steps to Improve Your Privileged Access Management Maturity Level

Watch the Webinar


With up to 80 percent of breaches due to compromised credentials according to leading analysts, more organizations than ever before are prioritizing privileged account protection. For the second year in a row Gartner noted that Privileged Access Management be should your organization’s top cyber security project.

But a recent survey by Thycotic found 85% of organizations fail to meet even basic PAM security maturity levels. And among those who fall short, 55% have no idea how many privileged accounts they have or where they’re located.

Hear from Thycotic’s Chief Information Security Officer Terence Jackson as he explains the 4 stages of PAM maturity and shows how you can assess your organization’s own PAM maturity level. He’ll also provide 3 key recommendations to advance your PAM maturity.

Who should attend this webinar?

  • IT Security
  • CISO and Executive Leadership
  • New to PAM
  • PAM experts

What will I learn?

  • How to take the first step in PAM Maturity basics by automating the continuous discovery of privileged accounts
  • How to establish and automate specific security policies that promote proper PAM security hygiene
  • How to achieve greater PAM maturity through critical PAM insights using technology to improve cyber security

Get the answers to these important questions:

  • What is PAM maturity, and why is it difficult to achieve? Learn the 3 main reasons.
  • What are the 4 stages of PAM maturity?
  • What are the 3 steps to PAM maturity?
  • What level of PAM maturity has my organization achieved?

What materials or resources will I receive?

Download these free Thycotic resources:
PAM Maturity Report
Expert’s Guide to PAM Success



Terence Jackson

  • CISO at Thycotic
  • Over 17 years of public and private sector IT and Security experience
  • Responsible for protecting Thycotic’s information assets
  • Leads a corporate-wide information risk management program
  • Identifies, evaluates and reports on information security practices, controls, and risks in order to comply with regulatory requirements and to align with the risk posture of the enterprise