Thycotic

The Insider's Guide to Successfully Implementing Least Privilege

Join us for breakfast and a comprehensive overview of Least Privilege in just 90 minutes.

What will I learn?
Get a better understanding of Least Privilege. What the threats are, and how to protect your endpoints without compromising productivity.

Privacy Policy

Breakfast Meeting - The Insider's Guide to Implementing Least Privilege

Have you been exploring ways to implement a least privilege strategy? Worried that removing privileges from users will backfire if they can’t access the applications and tools they need?

In this comprehensive overview on Wednesday 11th September, from 9:00am, you'll see how to implement least privilege to protect confidential data, block malware, and meet compliance requirements, without slowing down users or requiring additional desktop support.

Here's what you'll learn:

See the effects of removing admin rights to protect your endpoints from attackers.

Join us on Wednesday 11th September to Get a better understanding of how Least Privilege can help to protect your endpoints.
SAVE MY PLACE

© 2019 Alpha Generation Distribution Ltd.
All rights reserved. All trademarks, trade names, or company names referenced herein are used for identification only and are the property of their respective owners.

About SECON CYBER

Established in 1999, Secon Cyber has long-standing experience in providing class leading cybersecurity solutions to customers ranging from small to large enterprises.

Secon Cyber’s expertise lies in a deep understanding of the cybersecurity market and unique position in supplying best-of-breed products and services to provide a fit for purpose security solution.

Secon Cyber

Why Choose Thycotic?

The fastest growing provider of Privilege Management solutions, Thycotic secures more than 10,000 organisations worldwide including Fortune 500 enterprises - giving the company unique insight into the challenges enterprises are facing. Thycotic’s award-winning Privileged Account Management minimises risk, limits access, and controls applications on endpoints and servers.

Thycotic

Meet your speaker:

Scott Shields

Scott Shields is on a mission to help Enterprise organisations and MSPs understand the importance of Privileged Access Management and Least Privilege from both a security and compliance point of view.

An experienced security engineer, Scott has worked globally in a variety of IT fields and major enterprise projects.

Thycotic
Scott Shields

Event agenda for Wednesday 11th September, 2019:

9:00 am

Arrival and registration

9:50 am

10:30 am

9:45 am

9:15 am

Breakfast served

Introductions

Questions and close

The Insider's Guide to Implementing Least Privilege

Wednesday 11th September, 2019 | 9:00am to 10:30am

Great Scots Hall | Radisson Blu Hotel | 80 High Street 
The Royal Mile | Edinburgh | EH1 1TH

Get the insight you need to help plan your implementation of least privilege.

Plan

See how implementing least privilege can block damage from malware and ransomware.

Stop

Understand the level of risk of unnecessary privileges associated with your endpoints.

Risk
Secon Cyber
Calendar Icon