


How to Better Understand Your Privileged Users in Active Directory
Recorded on: 08 June 2023
View Recording


How to Detect and Prevent Data Breaches with the Lepide Data Security Platform
Recorded on: 20 April 2023
View Recording




The Lepide Guide to Essential Penetration Testing Techniques
Recorded on: 21 April 2022
View Recording
Common Causes of Account Lockouts in AD and How to Troubleshoot them
Recorded on: 31 March 2022
View Recording

Active Directory and Windows Infrastructure as a Malware Tool
Recorded on: 27 Jan 2022
View Recording


How to Detect Threats to Data Security and Better Govern Access?
Recorded on: 26 Aug 2021
View Recording

A Four Step Roadmap to Complying with the GLBA Safeguards Rule
Recorded on: 24 June 2021
View Recording

How to Improve Your Data Security By Addressing the Insider Threat
Recorded on: 07 Jan 2021
View Recording
Office 365 Security: How to Protect Sensitive Data Whilst Using MS Teams
Recorded on: 19 Nov 2020
View Recording
Learn How to Be Cyber-Smart for This Year's Cybersecurity Awareness Month
Recorded on: 08 Oct 2020
View Recording




How to Deal with the Rise of Security Threats Affecting Your Sensitive Data
Recorded on: 28 May 2020
View Recording
Why Your Legacy Security Will Fail to Protect Against Home Workers
Recorded on: 30 April 2020
View Recording

How to Keep Track of What Remote Workers Are Doing with Your Sensitive Data
Recorded on: 09 April 2020
View Recording
How to Maintain Data Security and Productivity with Remote Workers
Recorded on: 02 April 2020
View Recording

Cyber Attacks: A Suggested Approach to Proactively Mitigate Risk
Recorded on: 8 March 2018
View Recording