Phone Number +1-202-802-9399 (US)

ThycoticCentrify is now Delinea!

Thycotic PAM, IT and
Cyber Security Webinars

Ongoing education, on-demand


CISO Decision Making Report: How do your peers make cyber security technology purchasing decisions?

Wednesday, January 27, 2021 | 10:00 CEST

Watch the Webinar


Join Thycotic’s Chief Security Scientist Joseph Carson as he steps through key findings from a new global survey that reveals how IT and security professionals make cyber security technology purchase decisions. See how your cyber security colleagues from 10 countries decide on what new technologies to purchase…and what motivates their boards to approve their security budgets. Learn how you can avoid pitfalls, evaluate solutions, and overcome barriers when making buying decisions.

Who should watch this webinar?

  • IT Security Team Members
  • CISOs and Executive Leadership
  • IT operations: Systems Administrators, Helpdesk Teams, Infrastructure Management, Workstation Management, etc.
  • Compliance and Audit

What will I learn?

  • Why Boards are more willing than ever to make more cyber security investments,
  • Criteria used by IT and security professionals from around the world to evaluate technology purchases,
  • How US, European and Asian countries differ in their approach to getting boards to approve investments.

Get the answers to these important questions.

  • What’s driving organisations worldwide to increase their 2021 cyber security budgets?
  • Who has the final say in making cyber security technology investments?
  • What is the preferred way to evaluate new technology investments?
  • What do IT/security professionals fear most when making technology buying decisions?
  • To what extent have security teams been forced to temporarily reduce personnel expenses?

What materials or resources will I receive?

  • A copy of the report: “Cyber Security Team’s Guide to Technology Decision Making”
  • A recording of this webinar


Joseph Carson

Joseph Carson

  • Chief Security Scientist at Thycotic
  • Over 25 years' experience in enterprise security
  • Author of "Privileged Account Management for Dummies" and "Cybersecurity for Dummies"
  • Cyber security advisor to several governments, critical infrastructure, financial and transportation industries
  • Speaker at conferences globally