The Complete Guide to Ransomware [Updated for 2022] Download eBook

Register for upcoming webinars or view one of our previous recorded webinars on a number of data security and compliance related topics

Data Protection Strategies to Adopt in 2022

Thursday 06th October 2022, 2pm EST

Register Now

Data Protection Strategies to Adopt in 2022

Thursday 06th October 2022, 2pm BST

Register Now
 

The Lepide Data Security Platform – A Guided Tour

View Recording
 

The Complete Guide to Ransomware [Updated for 2022]

Recorded on: 25 August 2022

View Recording

The Lepide Guide to Essential Penetration Testing Techniques

Recorded on: 21 April 2022

View Recording

Common Causes of Account Lockouts in AD and How to Troubleshoot them

Recorded on: 31 March 2022

View Recording

Top Security Events to Monitor in Microsoft 365

Recorded on: 17 March 2022

View Recording

Active Directory and Windows Infrastructure as a Malware Tool

Recorded on: 27 Jan 2022

View Recording

Executive's Guide to the Business of Malware

Recorded on: 16 Dec 2021

View Recording

Lepide (powered by tenfold) Live Demonstration

Recorded on: 25 Nov 2021

View Recording

How to Detect Threats to Data Security and Better Govern Access?

Recorded on: 26 Aug 2021

View Recording

The New US Data Privacy Environment: Are You Ready?

Recorded on: 10 Aug 2021

View Recording

A Four Step Roadmap to Complying with the GLBA Safeguards Rule

Recorded on: 24 June 2021

View Recording

The Four Secrets of US HIPAA Compliance

Recorded on: 20 May 2021

View Recording

How to Improve Your Data Security By Addressing the Insider Threat

Recorded on: 07 Jan 2021

View Recording

Office 365 Security: How to Protect Sensitive Data Whilst Using MS Teams

Recorded on: 19 Nov 2020

View Recording

Learn How to Be Cyber-Smart for This Year's Cybersecurity Awareness Month

Recorded on: 08 Oct 2020

View Recording

Is “Zero Trust” the Magic Bullet for Data Security?

Recorded on: 20 Aug 2020

View Recording

Is "Trust but Verify" the Most Important Security Strategy?

Recorded on: 27 Aug 2020

View Recording

How to Better Understand Your Privileged Users in Active Directory

Recorded on: 23 July 2020

View Recording

How to Detect and Respond to a Ransomware Attack

Recorded on: 09 July 2020

View Recording

How to Build a Business Case for Information Security

Recorded on: 25 June 2020

View Recording

How to Deal with the Rise of Security Threats Affecting Your Sensitive Data

Recorded on: 28 May 2020

View Recording

Why Your Legacy Security Will Fail to Protect Against Home Workers

Recorded on: 30 April 2020

View Recording

How to Implement Zero Trust with Remote Workers

Recorded on: 16 April 2020

View Recording

How to Keep Track of What Remote Workers Are Doing with Your Sensitive Data

Recorded on: 09 April 2020

View Recording

How to Maintain Data Security and Productivity with Remote Workers

Recorded on: 02 April 2020

View Recording

How to Achieve & Maintain CCPA Compliance

Recorded on: 21 November 2019

View Recording

How to do Data Discovery & Classification for Free

Recorded on: 28 March 2018

View Recording

Cyber Attacks: A Suggested Approach to Proactively Mitigate Risk

Recorded on: 8 March 2018

View Recording