Register for upcoming webinars or view one of our previous recorded webinars on a number of data security and compliance related topics

Lepide Guide to Effective Data Access Governance - webinar thumb

A Roadmap for Zero Trust: Implementation Strategies and Case Studies

Thursday 25th July 2024

2PM EDT 2PM BST
Lepide Guide to Effective Data Access Governance - webinar thumb

Insider Threat Detection and Prevention: Best Practices and Examples

Thursday 15th August 2024

2PM EDT 2PM BST
Lepide Guide to Effective Data Access Governance - webinar thumb

Ransomware Resilience: Prepare, Detect, and Respond

Thursday 29th August 2024

2PM EDT 2PM GMT
Lepide Guide to Effective Data Access Governance - webinar thumb

AI Trust, Risk, and Security Management: A Framework for Security in the AI Era

Thursday 12th September 2024

2PM EDT 2PM GMT
Lepide Guide to Effective Data Access Governance - webinar thumb

Data Detection and Response : A New Approach to Protect Your Sensitive Data

Thursday 26th September 2024

2PM EDT 2PM GMT
 
The Lepide Data Security Platform – A Guided Tour

The Lepide Data Security Platform – A Guided Tour

View Recording
 
Lepide Guide to Effective Data Access Governance - webinar thumb

Lepide Guide to Effective Data Access Governance

Recorded on: 28 March 2024

View Recording
Lepide Guide to Ransomware Detection and Response - webinar thumb

Lepide Guide to Ransomware Detection and Response

Recorded on: 07 March 2024

View Recording
How to Effectively Audit File Server for Data Protection and Compliance - webinar thumb

How to Effectively Audit File Server for Data Protection and Compliance

Recorded on: 22 February 2024

View Recording
Lepide Guide to Active Directory Security - webinar thumb

Lepide Guide to Active Directory Security

Recorded on: 08 February 2024

View Recording
Webinar thumb - 25 jan 2024

Using Lepide to Detect Threats, Protect Data, and Meet Compliance

Recorded on: 25 January 2024

View Recording
Webinar thumb - image 1

Data Protection Strategies to Adopt This Year

Recorded on: 13 July 2023

View Recording
Webinar thumb - image 2

How to Enable Lepide for Privileged Access Management

Recorded on: 22 June 2023

View Recording
Webinar thumb - image 3

How to Better Understand Your Privileged Users in Active Directory

Recorded on: 08 June 2023

View Recording
Webinar thumb - image 4

How to Enable Lepide for Compliance

Recorded on: 25 May 2023

View Recording
Webinar thumb - image 5

A Complete Guide to the NIST Cybersecurity Framework

Recorded on: 11 May 2023

View Recording
Webinar thumb - image 6

How to Detect and Prevent Data Breaches with the Lepide Data Security Platform

Recorded on: 20 April 2023

View Recording
Webinar thumb - image 7

How to Enable Lepide for Data Loss Prevention

Recorded on: 23 March 2023

View Recording
Webinar thumb - image 8

How to Enable Lepide for Digital Transformation

Recorded on: 09 March 2023

View Recording
Webinar thumb - image 9

How to Enable Lepide for Data Access Governance

Recorded on: 23 February 2023

View Recording
Webinar thumb - image 10

The Complete Guide to Ransomware [Updated for 2022]

Recorded on: 25 August 2022

View Recording
Webinar thumb - image 11

The Lepide Guide to Essential Penetration Testing Techniques

Recorded on: 21 April 2022

View Recording
Webinar thumb - image 12

Common Causes of Account Lockouts in AD and How to Troubleshoot them

Recorded on: 31 March 2022

View Recording
Webinar thumb - image 13

Top Security Events to Monitor in Microsoft 365

Recorded on: 17 March 2022

View Recording
Webinar thumb - image 14

Active Directory and Windows Infrastructure as a Malware Tool

Recorded on: 27 Jan 2022

View Recording
Webinar thumb - image 15

Executive's Guide to the Business of Malware

Recorded on: 16 Dec 2021

View Recording
Webinar thumb - image 16

Lepide (powered by tenfold) Live Demonstration

Recorded on: 25 Nov 2021

View Recording
Webinar thumb - image 17

How to Detect Threats to Data Security and Better Govern Access?

Recorded on: 26 Aug 2021

View Recording
Webinar thumb - image 18

The New US Data Privacy Environment: Are You Ready?

Recorded on: 10 Aug 2021

View Recording
Webinar thumb - image 19

A Four Step Roadmap to Complying with the GLBA Safeguards Rule

Recorded on: 24 June 2021

View Recording
Webinar thumb - image 20

The Four Secrets of US HIPAA Compliance

Recorded on: 20 May 2021

View Recording
Webinar thumb - image 21

How to Improve Your Data Security By Addressing the Insider Threat

Recorded on: 07 Jan 2021

View Recording
Webinar thumb - image 22

Office 365 Security: How to Protect Sensitive Data Whilst Using MS Teams

Recorded on: 19 Nov 2020

View Recording
Webinar thumb - image 23

Learn How to Be Cyber-Smart for This Year's Cybersecurity Awareness Month

Recorded on: 08 Oct 2020

View Recording
Webinar thumb - image 24

Is “Zero Trust” the Magic Bullet for Data Security?

Recorded on: 20 Aug 2020

View Recording
Webinar thumb - image 25

Is "Trust but Verify" the Most Important Security Strategy?

Recorded on: 27 Aug 2020

View Recording
Webinar thumb - image 26

How to Detect and Respond to a Ransomware Attack

Recorded on: 09 July 2020

View Recording
Webinar thumb - image 27

How to Build a Business Case for Information Security

Recorded on: 25 June 2020

View Recording
Webinar thumb - image 28

How to Deal with the Rise of Security Threats Affecting Your Sensitive Data

Recorded on: 28 May 2020

View Recording
Webinar thumb - image 29

Why Your Legacy Security Will Fail to Protect Against Home Workers

Recorded on: 30 April 2020

View Recording
Webinar thumb - image 30

How to Implement Zero Trust with Remote Workers

Recorded on: 16 April 2020

View Recording
Webinar thumb - image 31

How to Keep Track of What Remote Workers Are Doing with Your Sensitive Data

Recorded on: 09 April 2020

View Recording
Webinar thumb - image 32

How to Maintain Data Security and Productivity with Remote Workers

Recorded on: 02 April 2020

View Recording
Webinar thumb - image 33

How to Achieve & Maintain CCPA Compliance

Recorded on: 21 November 2019

View Recording
Webinar thumb - image 34

Cyber Attacks: A Suggested Approach to Proactively Mitigate Risk

Recorded on: 8 March 2018

View Recording