Phone Number +1-202-802-9399 (US)

ThycoticCentrify is now Delinea!

Thycotic PAM, IT and
Cyber Security Webinars

Ongoing education, on-demand


How to Hack a Privileged User in South Africa

Tuesday, June 20, 2017 | 11:00 AM CAT

Watch the Webinar


Criminal hackers and sophisticated state-sponsored attackers are going for the easiest, most vulnerable targets—your organization’s privileged users.

Even though hackers are highly-skilled, attacks on privileged account user passwords are relatively simple to execute. With up to 80% of breaches resulting from weak or stolen password credentials, exploiting unmanaged and unprotected privileged accounts is the easiest way to extract your company’s most critical data. And in many cases these exploited accounts can go undetected for several weeks or months.

Join Thycotic for a demonstration of how hackers gain control of Privileged User accounts by way of:

  • Shared accounts
  • Storing passwords in Excel
  • Pass-the-Hash attacks
  • Default Passwords
  • Former employees

As we illustrate each exploitation scenario, we will show you how to defend against these typical Privileged Account attacks with automated Privileged Account Management (PAM) security solutions. Don’t miss this chance to get a thorough introduction to the various password attack vectors most favored by hackers—and how you can stop them in their tracks.