Back to Congress
Latest Sponsored Events
Related Videos
Webinar Recording
Dec 08, 2021
Lessons From a Journey Into a Real-World Ransomware Attack

Ransomware Attacks have become the biggest single cyber risk for enterprises of any size and industry. Research indicates a steep rise not only in the number of attacks, but as well in the average damage per incident. It is therefore essential that organizations are prepared for these attacks.

Event Recording
Apr 29, 2021
Joseph Carson: Your Journey to Privileged Access Security Maturity and Success

Privileged Access Management (PAM) continues to be a top priority for many organisations throughout the world. It is one of the most important solutions to help organisations reduce the risk from cyberattacks that target their privileged accounts and help move passwords into the background reducing cyber fatigue. A compromised privileged account enables an attacker to move around the network undetected, download malicious payloads, stage compromised servers and cause significant financial losses to their victims. 

Almost all users are now privileged users. With 80% of breaches involving the compromise of IT and business user credentials you must create a plan to reduce the risks posed by “overprivileged access” users, applications, and services.  When users are over-privileged it only takes attackers a few easy steps to become a full domain administrator.  We must make it more difficult that force attackers to take more risks increasing the chance of detecting them early before serious damage is done. 

One question for all organizations is how to get started. Where is the best place to begin for managing and protecting privileged access? It’s vital that you have have a solid strategy. Whether you’re starting a new PAM project or strengthening an existing Privileged Access Solution, Joseph Carson, Thycotic’s Chief Security Scientist and Advisory CISO will guide you step-by-step through planning your journey to privileged access security and introduce you to the PAM checklist that will help guide you to both maturity and success

Webinar Recording
Sep 02, 2020
Designing and Establishing a Mature PAM Ecosystem for Reducing Risk in Your Organisation

What makes a PAM strategy different from enterprise password management or Identity Access Management? What are the first actions you should take to protect your privileged accounts in the shortest amount of time? And, how has the definition of “PAM Basics” changed as the industry and cyber risks have evolved? This webinar is a must for teams launching PAM initiatives to ensure they start on the right foot. As you progress on your PAM journey, there’s always something new to learn. If you’ve already begun your PAM rollout, this event is a great chance to confirm you’re setting the appropriate milestones and see how others demonstrate success.  

Event Recording
Aug 21, 2020
Joseph Carson: Privileged Access Cloud Security: Insider Tips and Best Practices

As the adoption of cloud applications and services accelerates, organizations across the globe must understand and manage the challenges posed by privileged access from remote employees, third parties, and contractors. With 77% of cloud breaches due to compromised credentials, making sure your users get easy and secure access to the cloud should be a top priority.
Join Thycotic chief security scientist and author Joseph Carson as he explains a practical approach to help you define and implement privileged access cloud security best practices. He will also share how Thycotic’s new Access Control solutions can safeguard cloud access by both IT and business users.

Webinar Recording
Dec 15, 2015
Protecting the Keys to Your Kingdom Against Cyber-Attacks and Insider Threats
Do you really know who and how many employees in your company use a privileged account? Are these accounts properly managed and secured? Answering just one of these questions with "no" or "don't know" puts the most valuable data assets of your enterprise at risk.
Webinar Recording
Apr 29, 2015
Information Security at Work: Automating End-User Password Reset for Better Efficiency and fewer Headaches
In this webinar, KuppingerCole Senior Analyst Amar Singh and Thycotic CEO Jonathan Cogley will talk about essentials for the digital transformation of your enterprise: Managing your end user identities and offering end users self-service password reset abilities to increase help desk efficiency without compromising security.
Webinar Recording
May 06, 2014
How to Stop the Insider Threat: Protect Yourself from Privileged Users

KuppingerCole Webinar recording