Webinars

Upcoming Webinar:

What's New in Lepide Data Security Platform 24.4?

Thursday 16th January 2025

Register now
In-Browser Demo Thumb
Sort by
The Lepide Data Security Platform – A Guided Tour

What's New in Lepide Data Security Platform 24.4?

Thursday 16th January 2025

Register now arrow icon
Webinar thumb - image 24

Microsoft 365 Copilot Security: What Are the Risks and How Do You Overcome Them?

Thursday 30th January 2025

Register for 2PM EST arrow icon Register for 2PM GMT arrow icon
Webinar thumb - image 24

Generative AI Security Risks and How to Mitigate Them

Thursday 13th February 2025

Register for 2PM EST arrow icon Register for 2PM GMT arrow icon
Webinar thumb - image 24

How to Implement Least Privilege for Your Sensitive Data

Thursday 27th February 2025

Register for 2PM EST arrow icon Register for 2PM GMT arrow icon
Webinar thumb - image 24

Microsoft 365 Copilot Security: What Are the Risks and How Do You Overcome Them?

Thursday 13th March 2025

Register for 2PM EDT arrow icon Register for 2PM GMT arrow icon
Webinar thumb - image 24

What Does Zero Trust Look Like In Practice?

Thursday 27th March 2025

Register for 2PM EDT arrow icon Register for 2PM GMT arrow icon
The Lepide Data Security Platform – A Guided Tour

The Lepide Data Security Platform – A Guided Tour

View Recording arrow icon
Lepide Guide to Effective Data Access Governance - webinar thumb

Data Detection and Response : A New Approach to Protect Your Sensitive Data

Recorded on: 03 Oct 2024

View Recording arrow icon
A Roadmap for Zero Trust - webinar thumb

A Roadmap for Zero Trust: Implementation Strategies and Case Studies

Recorded on: 01 Aug 2024

View Recording arrow icon
Lepide Guide to Effective Data Access Governance - webinar thumb

Generative AI Security Risks and How to Overcome Them

Recorded on: 11 July 2024

View Recording arrow icon
Lepide Guide to Effective Data Access Governance - webinar thumb

Lepide Guide to Effective Data Access Governance

Recorded on: 28 March 2024

View Recording arrow icon
Lepide Guide to Ransomware Detection and Response - webinar thumb

Lepide Guide to Ransomware Detection and Response

Recorded on: 07 March 2024

View Recording arrow icon
How to Effectively Audit File Server for Data Protection and Compliance - webinar thumb

How to Effectively Audit File Server for Data Protection and Compliance

Recorded on: 22 February 2024

View Recording arrow icon
Lepide Guide to Active Directory Security - webinar thumb

Lepide Guide to Active Directory Security

Recorded on: 08 February 2024

View Recording arrow icon
Webinar thumb - 25 jan 2024

Using Lepide to Detect Threats, Protect Data, and Meet Compliance

Recorded on: 25 January 2024

View Recording arrow icon
Webinar thumb - image 1

Data Protection Strategies to Adopt This Year

Recorded on: 13 July 2023

View Recording arrow icon
Webinar thumb - image 2

How to Enable Lepide for Privileged Access Management

Recorded on: 22 June 2023

View Recording arrow icon
Webinar thumb - image 3

How to Better Understand Your Privileged Users in Active Directory

Recorded on: 08 June 2023

View Recording arrow icon
Webinar thumb - image 4

How to Enable Lepide for Compliance

Recorded on: 25 May 2023

View Recording arrow icon
Webinar thumb - image 5

A Complete Guide to the NIST Cybersecurity Framework

Recorded on: 11 May 2023

View Recording arrow icon
Webinar thumb - image 6

How to Detect and Prevent Data Breaches with the Lepide Data Security Platform

Recorded on: 20 April 2023

View Recording arrow icon
Webinar thumb - image 7

How to Enable Lepide for Data Loss Prevention

Recorded on: 23 March 2023

View Recording arrow icon
Webinar thumb - image 8

How to Enable Lepide for Digital Transformation

Recorded on: 09 March 2023

View Recording arrow icon
Webinar thumb - image 9

How to Enable Lepide for Data Access Governance

Recorded on: 23 February 2023

View Recording arrow icon
Webinar thumb - image 10

The Complete Guide to Ransomware [Updated for 2022]

Recorded on: 25 August 2022

View Recording arrow icon
Webinar thumb - image 11

The Lepide Guide to Essential Penetration Testing Techniques

Recorded on: 21 April 2022

View Recording arrow icon
Webinar thumb - image 12

Common Causes of Account Lockouts in AD and How to Troubleshoot them

Recorded on: 31 March 2022

View Recording arrow icon
Webinar thumb - image 13

Top Security Events to Monitor in Microsoft 365

Recorded on: 17 March 2022

View Recording arrow icon
Webinar thumb - image 14

Active Directory and Windows Infrastructure as a Malware Tool

Recorded on: 27 Jan 2022

View Recording arrow icon
Webinar thumb - image 15

Executive's Guide to the Business of Malware

Recorded on: 16 Dec 2021

View Recording arrow icon
Webinar thumb - image 16

Lepide (powered by tenfold) Live Demonstration

Recorded on: 25 Nov 2021

View Recording arrow icon
Webinar thumb - image 17

How to Detect Threats to Data Security and Better Govern Access?

Recorded on: 26 Aug 2021

View Recording arrow icon
Webinar thumb - image 18

The New US Data Privacy Environment: Are You Ready?

Recorded on: 10 Aug 2021

View Recording arrow icon
Webinar thumb - image 19

A Four Step Roadmap to Complying with the GLBA Safeguards Rule

Recorded on: 24 June 2021

View Recording arrow icon
Webinar thumb - image 20

The Four Secrets of US HIPAA Compliance

Recorded on: 20 May 2021

View Recording arrow icon
Webinar thumb - image 21

How to Improve Your Data Security By Addressing the Insider Threat

Recorded on: 07 Jan 2021

View Recording arrow icon
Webinar thumb - image 22

Office 365 Security: How to Protect Sensitive Data Whilst Using MS Teams

Recorded on: 19 Nov 2020

View Recording arrow icon
Webinar thumb - image 23

Learn How to Be Cyber-Smart for This Year's Cybersecurity Awareness Month

Recorded on: 08 Oct 2020

View Recording arrow icon
Webinar thumb - image 24

Is “Zero Trust” the Magic Bullet for Data Security?

Recorded on: 20 Aug 2020

View Recording arrow icon
Webinar thumb - image 25

Is "Trust but Verify" the Most Important Security Strategy?

Recorded on: 27 Aug 2020

View Recording arrow icon
Webinar thumb - image 26

How to Detect and Respond to a Ransomware Attack

Recorded on: 09 July 2020

View Recording arrow icon
Webinar thumb - image 27

How to Build a Business Case for Information Security

Recorded on: 25 June 2020

View Recording arrow icon
Webinar thumb - image 28

How to Deal with the Rise of Security Threats Affecting Your Sensitive Data

Recorded on: 28 May 2020

View Recording arrow icon
Webinar thumb - image 29

Why Your Legacy Security Will Fail to Protect Against Home Workers

Recorded on: 30 April 2020

View Recording arrow icon
Webinar thumb - image 30

How to Implement Zero Trust with Remote Workers

Recorded on: 16 April 2020

View Recording arrow icon
Webinar thumb - image 31

How to Keep Track of What Remote Workers Are Doing with Your Sensitive Data

Recorded on: 09 April 2020

View Recording arrow icon
Webinar thumb - image 32

How to Maintain Data Security and Productivity with Remote Workers

Recorded on: 02 April 2020

View Recording arrow icon
Webinar thumb - image 33

How to Achieve & Maintain CCPA Compliance

Recorded on: 21 November 2019

View Recording arrow icon
Webinar thumb - image 34

Cyber Attacks: A Suggested Approach to Proactively Mitigate Risk

Recorded on: 8 March 2018

View Recording arrow icon

Ready to simplify your data security?

Book a Live Demo