Phone Number +1-202-802-9399 (US)

Thycotic PAM, IT and
Cyber Security Webinars

Ongoing education, on-demand

WATCH THIS WEBINAR

Privileged Access Cloud Security: Insider Tips and Best Practices

Tuesday, August 11, 2020 | 10:00 AM ET

As the adoption of cloud applications and services accelerates, organizations across the globe must understand and manage the challenges posed by privileged access from remote employees, third parties, and contractors.  With 77% of cloud breaches due to compromised credentials, making sure your users get easy and secure access to the cloud should be a top priority.

Join Thycotic chief security scientist and author Joseph Carson as he explains a practical approach to help you define and implement privileged access cloud security best practices. He will also share how Thycotic’s new Access Control solutions can safeguard cloud access by both IT and business users.

Who should attend? 

  •  IT Security
  • CISO and Executive Leadership
  • New to PAM
  • PAM experts
  • IT operations: Systems Administrators, Helpdesk Teams, Infrastructure Management, Workstation Management, etc.
  • Compliance and Audit

What will I learn?

  • Key privileged access security challenges facing your cloud users
  • Best practices for securing cloud privileged access
  • Proven approach to implementing secure privileged access for remote workers and third parties

Get the answers to these important questions:

  • What are the critical differences posed by privileged access to cloud applications?
  • How do overprivileged users create one of the greatest risks in the cloud?
  • What’s the best way to implement a least privilege approach that will secure cloud privileged access?
  • What automated tools can help manage and secure privileged access for cloud applications?

What materials or resources will I receive?

  • A recording of this webinar
  • Free copy of Privileged Access Cloud Security for Dummies eBook

Watch the Webinar


 

MEET THE PRESENTERS

Joseph Carson

Joseph Carson

  • Chief Security Scientist at Thycotic
  • Over 25 years' experience in enterprise security
  • Author of "Privileged Account Management for Dummies" and "Cybersecurity for Dummies"
  • Cyber security advisor to several governments, critical infrastructure, financial and transportation industries
  • Speaker at conferences globally

SHARE THIS