Phone Number +1-202-802-9399 (US)

Thycotic is now Delinea!

Thycotic PAM, IT and
Cyber Security Webinars

Ongoing education, on-demand


Live Hack: Securing privileged access to stop attackers in their tracks

Watch the Webinar


See why endpoints are the favored targets of attackers in this live hack simulation, and how cyber criminals use compromised credentials to escalate privileges and access your cloud applications.

Join Thycotic Chief Security Scientist, Joseph Carson, as he demonstrates how an attacker captures an employee password on an endpoint, gets hold of an email account, and escalates the exploit to access a critical cloud application—all undetected by typical security controls. Then, see how you can stop these endpoint attacks and protect privileged access to critical cloud applications with PAM security solutions.

Who should watch this webinar?

  • IT Security
  • CISO and Executive Leadership
  • IT Managers
  • IT operations:
    • Systems Administrators
    • Helpdesk Teams
    • Infrastructure Management
    • Workstation Management, etc.
    • Professionals looking to move into these roles

What will I learn?

  • The favored techniques and tools for compromising employee credentials
  • How an attacker escalates privileges to gain access to cloud apps
  • What you can do to shut down attacks before they escalate

Get the answers to these important questions

  • Who is most at risk for credential compromise?
  • How do I align PAM tools to my application security priorities?
  • What’s the best way to enforce least privilege for cloud apps?


Joseph Carson

Joseph Carson

  • Chief Security Scientist at Thycotic
  • Over 25 years' experience in enterprise security
  • Author of "Privileged Account Management for Dummies" and "Cybersecurity for Dummies"
  • Cyber security advisor to several governments, critical infrastructure, financial and transportation industries
  • Speaker at conferences globally