![Lepide Guide to Effective Data Access Governance - webinar thumb](../imagesrd/webinars-thumb/webinar-zerotrust-thumb.jpg)
![Lepide Guide to Effective Data Access Governance - webinar thumb](../imagesrd/webinars-thumb/webinar-insider-threat-thumb.jpg)
![Lepide Guide to Effective Data Access Governance - webinar thumb](../imagesrd/webinars-thumb/webinar-ai-security-thumb.jpg)
![Lepide Guide to Effective Data Access Governance - webinar thumb](../imagesrd/webinars-thumb/webinar-23-feb-2023-thumb.jpg)
![Lepide Guide to Ransomware Detection and Response - webinar thumb](../imagesrd/webinars-thumb/How-to-Detect-and-Respond-to-a-Ransomware-Attack-thumb.jpg)
![How to Effectively Audit File Server for Data Protection and Compliance - webinar thumb](../imagesrd/webinars-thumb/fsa-data-protection-and-compliance-webinar-thumb.jpg)
How to Effectively Audit File Server for Data Protection and Compliance
Recorded on: 22 February 2024
View Recording![Lepide Guide to Active Directory Security - webinar thumb](../imagesrd/webinars-thumb/ad-security-webinar-thumb.jpg)
![Webinar thumb - 25 jan 2024](../imagesrd/webinars-thumb/webinar-25jan-2024.jpg)
Using Lepide to Detect Threats, Protect Data, and Meet Compliance
Recorded on: 25 January 2024
View Recording![Webinar thumb - image 1](../imagesrd/webinars-thumb/data-protection-webinar.jpg)
![Webinar thumb - image 2](../imagesrd/webinars-thumb/privileged-access-management-webinar.jpg)
![Webinar thumb - image 3](../imagesrd/webinars-thumb/how-to-better-understand-your-privileged-users-in-active-directory-thumb.jpg)
How to Better Understand Your Privileged Users in Active Directory
Recorded on: 08 June 2023
View Recording![Webinar thumb - image 4](../imagesrd/webinars-thumb/webinar-08june-23.jpg)
![Webinar thumb - image 5](../imagesrd/webinars-thumb/NIST-Cybersecurity-Framework-webiran-thumb.jpg)
![Webinar thumb - image 6](../imagesrd/webinars-thumb/webinar-20-april-2023-thumb.jpg)
How to Detect and Prevent Data Breaches with the Lepide Data Security Platform
Recorded on: 20 April 2023
View Recording![Webinar thumb - image 7](../imagesrd/webinars-thumb/23-march-2023-webinar-thumb.jpg)
![Webinar thumb - image 8](../imagesrd/webinars-thumb/webinar-09-march-2023-thumb.jpg)
![Webinar thumb - image 9](../imagesrd/webinars-thumb/webinar-23-feb-2023-thumb.jpg)
![Webinar thumb - image 10](../imagesrd/webinars-thumb/webinar-21-may-22.jpg)
![Webinar thumb - image 11](../imagesrd/webinars-thumb/webinar-21april-22.jpg)
The Lepide Guide to Essential Penetration Testing Techniques
Recorded on: 21 April 2022
View Recording![Webinar thumb - image 12](../imagesrd/webinars-thumb/webinar-31march-22.jpg)
Common Causes of Account Lockouts in AD and How to Troubleshoot them
Recorded on: 31 March 2022
View Recording![Webinar thumb - image 13](../imagesrd/webinars-thumb/webinar-17march-22.jpg)
![Webinar thumb - image 14](../imagesrd/webinars-thumb/webinar-27jan-22.jpg)
Active Directory and Windows Infrastructure as a Malware Tool
Recorded on: 27 Jan 2022
View Recording![Webinar thumb - image 15](../imagesrd/webinars-thumb/executives-guide-to-the-business-of-malware-webinar.jpg)
![Webinar thumb - image 16](../imagesrd/webinars-thumb/rec_2_thumb.jpg)
![Webinar thumb - image 17](../imagesrd/webinars-thumb/How-to-Detect-Threats-to-Data-Security-and-Better-Govern-Access-webinar-thumb.jpg)
How to Detect Threats to Data Security and Better Govern Access?
Recorded on: 26 Aug 2021
View Recording![Webinar thumb - image 18](../imagesrd/webinars-thumb/US-Data-Privacy-Environment-webinar-thumb.jpg)
![Webinar thumb - image 19](../imagesrd/webinars-thumb/glba-safeguard-webinar-thumb.jpg)
A Four Step Roadmap to Complying with the GLBA Safeguards Rule
Recorded on: 24 June 2021
View Recording![Webinar thumb - image 20](../imagesrd/webinars-thumb/the-four-secrets-of-us-hipaa-compliance-thumb.jpg)
![Webinar thumb - image 21](../imagesrd/webinars-thumb/webinar-thumb-How-to-Improve-Your-Data-Security-By-Addressing-the-Insider-Threat.jpg)
How to Improve Your Data Security By Addressing the Insider Threat
Recorded on: 07 Jan 2021
View Recording![Webinar thumb - image 22](../imagesrd/webinars-thumb/ms-team-webinar.png)
Office 365 Security: How to Protect Sensitive Data Whilst Using MS Teams
Recorded on: 19 Nov 2020
View Recording![Webinar thumb - image 23](../imagesrd/webinars-thumb/Cybersecurity-Awareness-Month-thumb.jpg)
Learn How to Be Cyber-Smart for This Year's Cybersecurity Awareness Month
Recorded on: 08 Oct 2020
View Recording![Webinar thumb - image 24](../imagesrd/webinars-thumb/A-Security-Debate-Zero-Trust-or-Trust-but-Verify-thumb.jpg)
![Webinar thumb - image 25](../imagesrd/webinars-thumb/Trust-but-Verify-thumb.jpg)
![Webinar thumb - image 26](../imagesrd/webinars-thumb/How-to-Detect-and-Respond-to-a-Ransomware-Attack-thumb.jpg)
![Webinar thumb - image 27](../imagesrd/webinars-thumb/How-to-Build-a-Business-Case-for-Information-Security-thumb.png)
![Webinar thumb - image 28](../imagesrd/webinars-thumb/security-threats-affecting-your-sensitive-data-thumb.jpg)
How to Deal with the Rise of Security Threats Affecting Your Sensitive Data
Recorded on: 28 May 2020
View Recording![Webinar thumb - image 29](../imagesrd/webinars-thumb/Protect-Against-Home-Workers.jpg)
Why Your Legacy Security Will Fail to Protect Against Home Workers
Recorded on: 30 April 2020
View Recording![Webinar thumb - image 30](../imagesrd/webinars-thumb/How-to-Implement-Zero-Trust-with-Remote-Workers-thumb.jpg)
![Webinar thumb - image 31](../imagesrd/webinars-thumb/Keep-Track-Remote-Workers-thumb.jpg)
How to Keep Track of What Remote Workers Are Doing with Your Sensitive Data
Recorded on: 09 April 2020
View Recording![Webinar thumb - image 32](../imagesrd/webinars-thumb/webinar-remote-workers1.jpg)
How to Maintain Data Security and Productivity with Remote Workers
Recorded on: 02 April 2020
View Recording![Webinar thumb - image 33](../imagesrd/webinars-thumb/CCPA-Compliance.jpg)
![Webinar thumb - image 34](../imagesrd/webinars-thumb/rec_4_thumb.jpg)
Cyber Attacks: A Suggested Approach to Proactively Mitigate Risk
Recorded on: 8 March 2018
View Recording