Register for upcoming webinars or view one of our previous recorded webinars on a number of data security and compliance related topics

 
The Lepide Data Security Platform – A Guided Tour

The Lepide Data Security Platform – A Guided Tour

View Recording
 
Data Protection Strategies to Adopt

Data Protection Strategies to Adopt This Year

Recorded on: 13 July 2023

View Recording

How to Enable Lepide for Privileged Access Management

Recorded on: 22 June 2023

View Recording
How to Better Understand Your Privileged Users in Active Directory

How to Better Understand Your Privileged Users in Active Directory

Recorded on: 08 June 2023

View Recording

How to Enable Lepide for Compliance

Recorded on: 25 May 2023

View Recording

A Complete Guide to the NIST Cybersecurity Framework

Recorded on: 11 May 2023

View Recording

How to Detect and Prevent Data Breaches with the Lepide Data Security Platform

Recorded on: 20 April 2023

View Recording

How to Enable Lepide for Data Loss Prevention

Recorded on: 23 March 2023

View Recording

How to Enable Lepide for Digital Transformation

Recorded on: 09 March 2023

View Recording

How to Enable Lepide for Data Access Governance

Recorded on: 23 February 2023

View Recording
The Complete Guide to Ransomware

The Complete Guide to Ransomware [Updated for 2022]

Recorded on: 25 August 2022

View Recording
Lepide Guide to Essential Penetration Testing Techniques

The Lepide Guide to Essential Penetration Testing Techniques

Recorded on: 21 April 2022

View Recording
Common Causes of Account Lockouts in AD

Common Causes of Account Lockouts in AD and How to Troubleshoot them

Recorded on: 31 March 2022

View Recording
Top Security Events to Monitor in Microsoft 365

Top Security Events to Monitor in Microsoft 365

Recorded on: 17 March 2022

View Recording
Active Directory and Windows Infrastructure as a Malware Tool

Active Directory and Windows Infrastructure as a Malware Tool

Recorded on: 27 Jan 2022

View Recording
Executive's Guide to the Business of Malware

Executive's Guide to the Business of Malware

Recorded on: 16 Dec 2021

View Recording
Lepide (powered by tenfold) Live Demonstration

Lepide (powered by tenfold) Live Demonstration

Recorded on: 25 Nov 2021

View Recording
How to Detect Threats to Data Security

How to Detect Threats to Data Security and Better Govern Access?

Recorded on: 26 Aug 2021

View Recording
The New US Data Privacy Environment

The New US Data Privacy Environment: Are You Ready?

Recorded on: 10 Aug 2021

View Recording
A Four Step Roadmap to Complying with the GLBA Safeguards Rule

A Four Step Roadmap to Complying with the GLBA Safeguards Rule

Recorded on: 24 June 2021

View Recording
The Four Secrets of US HIPAA Compliance

The Four Secrets of US HIPAA Compliance

Recorded on: 20 May 2021

View Recording
How to Improve Your Data Security By Addressing the Insider Threat

How to Improve Your Data Security By Addressing the Insider Threat

Recorded on: 07 Jan 2021

View Recording
How to Protect Sensitive Data Whilst Using MS Teams

Office 365 Security: How to Protect Sensitive Data Whilst Using MS Teams

Recorded on: 19 Nov 2020

View Recording
Learn How to Be Cyber-Smart for This Year

Learn How to Be Cyber-Smart for This Year's Cybersecurity Awareness Month

Recorded on: 08 Oct 2020

View Recording
Is “Zero Trust” the Magic Bullet for Data Security

Is “Zero Trust” the Magic Bullet for Data Security?

Recorded on: 20 Aug 2020

View Recording
Is “Trust but Verify” the Most Important Security Strategy

Is "Trust but Verify" the Most Important Security Strategy?

Recorded on: 27 Aug 2020

View Recording
How to Detect and Respond to a Ransomware Attack

How to Detect and Respond to a Ransomware Attack

Recorded on: 09 July 2020

View Recording
How to Build a Business Case for Information Security

How to Build a Business Case for Information Security

Recorded on: 25 June 2020

View Recording
How to Deal with the Rise of Security Threats Affecting Your Sensitive Data

How to Deal with the Rise of Security Threats Affecting Your Sensitive Data

Recorded on: 28 May 2020

View Recording
Why Your Legacy Security Will Fail to Protect Against Home Workers

Why Your Legacy Security Will Fail to Protect Against Home Workers

Recorded on: 30 April 2020

View Recording
How to Implement Zero Trust with Remote Workers

How to Implement Zero Trust with Remote Workers

Recorded on: 16 April 2020

View Recording
How to Keep Track of What Remote Workers Are Doing with Your Sensitive Data

How to Keep Track of What Remote Workers Are Doing with Your Sensitive Data

Recorded on: 09 April 2020

View Recording
How to Maintain Data Security and Productivity with Remote Workers

How to Maintain Data Security and Productivity with Remote Workers

Recorded on: 02 April 2020

View Recording
How to Achieve & Maintain CCPA Compliance

How to Achieve & Maintain CCPA Compliance

Recorded on: 21 November 2019

View Recording
A Suggested Approach to Proactively Mitigate Risk

Cyber Attacks: A Suggested Approach to Proactively Mitigate Risk

Recorded on: 8 March 2018

View Recording