Episodes
-
Join our webinar, with Sjoerd van den Bedem, IT Manager, Northwave Cybersecurity, where we will have a look at the critical junction of security and productivity with examples from Sjoerdâs broad experience helping companies fortify their security infrastructure.đĄïž
From phishing link victims to ransomware scenarios, we'll explore real-life data breach examples highlighting how harnessing your workforce can be your greatest fortification. Through these examples, we aim to provide tangible insights into the challenges faced by organizations and the strategies employed to mitigate risks effectively.
We'll shed light on the connection between Compliance and Security and have a look at the ways your organization can stay secure without sacrificing productivity.
What you will learn:
Strategies for maintaining an efficient and functional workforceBest practices in establishing cross-functional, collaborationReal life examples of what to avoidInsights into the misconceptions surrounding compliance and productivityMeet our Speakers: MiklĂłs DĂ©nes, Head of Customer Service, Tresorit Miklos is a charismatic Customer Service and Success lead renowned for his expertise in elevating customer support. With a wealth of experience in the tech industry and a passion for ensuring customer satisfaction, he has been instrumental in shaping Tresorit's customer service division in the last 10 years.
Sjoerd van den Bedem, IT Manager, Northwave Cybersecurity Sjoerd is an expert in managing large technical eco-systems and cybersecurity. He loves to continually improve stability, scalability and security in larger environments. Currently he secures the IT of the European company Northwave Cybersecurity. He is flown in for complex cyber incidents as a Senior Recovery expert, helping companies get back in business.
-
đ Listen to Dr. Lisa McKee, Founding Partner at American Security & Privacy and Aaron Stillman, Tresoritâs Head of Product Marketing as they unravel the intricate relationship between zero trust and privacy. đĄïž
In this episode youâll learn:
Steps to take when reviewing your data strategiesCommon mistakes to avoid while working with dataHow to implement Zero Trust Privacy strategies -
Missing episodes?
-
In this episode of Under CTRL, Tresoritâs Chief Revenue Officer, Peter Stössel, is joined by Elisabeth Rötsch, an account executive for secure messaging app Threema.
Theyâll be discussing why secure communication should be a top priority for modern workforces, and how digitization can improve connectivity for global businesses.
The episode will also be digging in to the common problems embedded in mainstream communication apps â including insufficient encryption, lack of compliance, and poor configuration â and talk about how companies can avoid these often-hidden pitfalls.
-
Wie kann Ihr Unternehmen die Sicherheit und PrivatsphĂ€re seiner Daten in Ăbereinstimmung mit aktuellen Datenschutzbestimmungen gewĂ€hrleisten, ohne seinen Mitarbeitern das Leben â und die interne und externe Zusammenarbeit â schwer zu machen? In dieser gemeinschaftlich von Threema.Work und Tresorit produzierten Podcast-Episode erhalten Sie die Antwort von Elisabeth Rötsch, Account Executive bei Threema, und Peter Stössel, Chief Revenue Officer bei Tresorit.
Sie diskutieren die aktuellen Cyberbedrohungen und Datenschutzanforderungen, denen Unternehmen sich gegenĂŒbersehen, und wie Ende-zu-Ende-verschlĂŒsselte Lösungen wie Threema.Work und Tresorit mit ihrer breiten Produktpalette benutzerfreundlicher Apps, Integrationen und Add-ons helfen können, Risiken einzudĂ€mmen und Compliance mit z. B. der DSGVO, NIS2 und DORA zu erzielen. Anhand von Threemas und Tresorits Entstehungsgeschichte, ihren aktuellen Erfolgskennzahlen und positiven Kundenerfahrungen wird beleuchtet, wie der Schutz von PrivatsphĂ€re â ein grundlegendes Menschenrecht und die Mission beider Plattformen â gewĂ€hrleistet werden kann, ohne dabei die Usability aufs Spiel zu setzen.
WĂ€hrend Threema.Work als Messenger-Dienst den Schwerpunkt auf geschĂŒtzte Unternehmenskommunikation gelegt hat und Tresorits Fokus auf sicheren Datentausch gerichtet ist, haben die Anwendungen in Sachen Bedienbarkeit und Nutzerkomfort ein gemeinsames Ziel: ihren Kunden eine intuitiv nutzbare Ende-zu-Ende-VerschlĂŒsselung mit Zero-Knowledge-Prinzip zu bieten, die sich nahtlos in bereits bestehende ArbeitsablĂ€ufe und Systeme einfĂŒgt.
Sie möchten mehr ĂŒber Tresorits sicheren Workspace in der Cloud erfahren? Besuchen Sie unsere Webseite oder kontaktieren Sie uns.
Lesen Sie die im Podcast erwÀhnten BeitrÀge zur Nutzung von Tresorit in Unternehmen und NGOs:
Kundenstimme Viessmann
Wenn Datenschutz eine Frage von Leben und Tod ist â ein GesprĂ€ch mit Menschenrechtsaktivist Ethan Gutmann
Folgen Sie uns auf unseren Social-Media-KanÀlen:
XFacebookInstagramLinkedIn -
Join PĂ©ter Budai, Tresoitâs Chief Product Officer, as he breaks down the data compliance landscape in Europe and the United States and looks at how firms can get the most from their data protection policies.
Initially, compliance can seem daunting. But taking the time to evaluate your companyâs digital infrastructure isnât just about managing potential risks â it can also help managers identify bottlenecks, boost everyday office efficiency, and gain an edge over competitors.
As well as explaining some key tools that companies can use to meet common data protection laws â including end-to-end encryption, privacy by design, and data minimization â PĂ©ter will also discuss how companies can use compliance to build trusting customer relationships with an emphasis on ethical behavior, customer protection, social responsibility.
-
In this episode of Under CTRL, Tresoritâs Chief Technology Officer, PĂ©ter Budai, joins ICA Consultancyâs Ben De La Salle to discuss how organizations can not only withstand cyberattacks, but also recover from them.
For truly resilient companies, cyber security isnât just seen as an IT issue, but as everyoneâs responsibility. Thatâs because the fallout from a digital attack can be felt across an organization, from disrupting workflows to damaging customer trust.
We look at how IT teams can prepare for potential cyber events by getting serious about risk assessment, as well as collaborating and building strong company-wide connections.
Weâll also talk about the benefits the companies can gain by prioritizing their assets, no matter their organizationâs size or budget.
-
In this episode of Under CTRL, Tresoritâs Aaron Stillman talks with Jason Keller, digital strategy developer for Vistant, and James Eaton-Lee, CISO for NetHope, on how NGOs can protect their most important assets in the online age.
Non-profits are often used to working in demanding environments, but they also face unique challenges in the digital realm. Operating out in the field can strain connectivity, while an ever-changing roster of volunteers, freelancers, and partners poses problems for both security and accessibility. Most worrying of all is the increasing threat of state-backed actors, who can dedicate large amounts of resources to attack or discredit activist groups.
Together, Aaron, James, and Jason break down how NGOs can face these threats head-on by investing in technical tools such as encryption, as well as practical measures such as training and usability. We also look at the wider tech landscape, and how investing in security can help non-profits safeguard not only key assets, but also their ethical responsibilities and reputation.
-
Bei Tresorit arbeiten wir stĂ€ndig hinter den Kulissen an den Funktionen und Lösungen, die Ihre persönlichen Daten schĂŒtzen.
Und da die meisten unserer Verbesserungen auf das Feedback unserer Kunden zurĂŒckgehen, stellen wir sicher, dass unsere Nutzer bei der Vorstellung unserer neuesten Updates einen Platz in der ersten Reihe erhalten.
Wie immer in unseren State of the Union-Webinaren gehen wir auf die neuesten Tresorit-Releases der letzten sechs Monate ein und geben einen kleinen Ausblick auf das, was als nÀchstes kommt.
In dieser Folge sind Chief Revenue Officer Peter Stössel und die Senior Product Manager David Imre Szarvas und Norbert Hegyaljai anwesend, um ĂŒber Funktionen wie Tresorit eSign, OrdnerĂŒbernahme und -organisation sowie unsere anpassbaren Subdomains zu sprechen.
In einer speziellen Fragerunde kommen auch Experten fĂŒr Cybersicherheit zu Wort, und wir sprechen ĂŒber einige spannende Neuigkeiten von der RSA-Konferenz in San Francisco.
-
At Tresorit, weâre always working behind the scenes on the features and solutions that keep your personal data safe.
And as most of our improvements are driven by customer feedback, we make sure our users get a front-row seat as we unveil our latest updates.
As always in our State of the Union webinars, weâll be diving into the latest Tresorit releases from the past six months, and getting a small preview of whatâs coming next.
In this episode, chief revenue officer Peter Stössel and senior product managers David Imre Szarvas and Norbert Hegyaljai are all on hand to discuss features such as Tresorit eSign, folder takeovers and organization, and our customizable subdomains.
We also hear from cybersecurity professionals in a special Q&A session, and talk about some exciting news from the RSA conference in San Francisco.
-
Across the globe, governments are using cutting-edge technology to surveil their citizens en masse. In oppressive or autocratic regimes, state security services regularly exploit tools such as facial recognition and GPS tracking to find and imprison political dissidents.
Luckily, digital innovation is also unlocking new possibilities for human rights defenders who need to protect both themselves and the vital testimonies they gather.
In this episode, researcher, author, and Nobel prize-nominee Ethan Gutmann joins Tresoritâs Stefan Killer-Haug to discuss how end-to-end encryption and zero-knowledge principles can help human rights advocates to carry out their important work.
As well as recounting his personal experiences of evading state surveillance while gathering evidence of Chinaâs forced organ harvesting program, Ethan discusses the solutions heâs found to protect the lives of those fleeing persecution â and what the future could hold for human rights defenders in a world of AI.
-
Vertrauen ist das HerzstĂŒck produktiver GeschĂ€ftsbeziehungen.
Doch die Verbraucher zögern oft, ihr Vertrauen in die digitalen Technologien zu setzen, die moderne und bahnbrechende Unternehmen vorantreiben.
In dieser Folge setzt sich Stefan Killer-Haug von Tresorit mit Nicolas Zahn von der Swiss Digital Initiative zusammen, um ĂŒber die Besonderheiten des digitalen Vertrauens zu sprechen und zu erklĂ€ren, warum der Aufbau von Verbrauchervertrauen entscheidend ist, wenn Unternehmen die Vorteile der Spitzentechnologie wirklich nutzen wollen.
Wir gehen auch auf einige der wichtigsten Themen ein, die den Umgang von Unternehmen mit Daten heute und in Zukunft bestimmen: von der Frage, wie sich die Vorstellung von digitalem Vertrauen in den verschiedenen internationalen MĂ€rkten unterscheidet, bis hin zum Erhalt des Kundenvertrauens in einer Welt der KI.
Wenn Sie in Zukunft mehr von unseren Webinaren sehen möchten, vergessen Sie nicht, sich hier beim LinkedIn-Kanal von Tresorit anzumelden.
-
End-to-end encryption (E2EE) is increasingly mainstream, appearing in everything from mass-market instant messaging apps to high-end password managers.
But for E2EE to truly reach its potential, it needs to act as just one part of a secure IT infrastructure. And while more IT products than ever before claim to use end-to-end encryption to keep your data safe, many of these solutions also cut vital corners in their cryptography protocols â putting your information at risk.
In this special webinar podcast direct from ITsa365, Tresorit co-founder and CISO, Szilveszter Szebeni, talks to Encryption Europeâs James Briscoe about down the different types of encryption, how end-to-end encryption works, and what organizations need to be looking for in their secure IT solutions.
Weâll also be discussing why email as we know it today will never be secure, and the myth that easy-to-use products are more vulnerable to cyberattacks.
-
In this episode, Tresoritâs Stefan Killer-Haug joins security consultant and private investigator Shannon Miller to discuss the importance of cybersecurity for remote workers and how to your data safe while working from home.
The popularity of flexible and hybrid working has exploded in recent years â and if youâre one of the many who has swapped the office for WFH, then itâs never been more important to keep your home network secure.
Listen in as Shannon discusses her experiences dealing with cybercriminals in domestic settings, the common ways that scammers and hackers identify their targets, and how easy-to-implement steps such as strong encryption can protect your and your familyâs data.
We also take a special look at how outside attackers can use the Internet of Things (IoT) â including internet-enabled TVs, gaming consoles, and even smart toasters and refrigerators â to find vulnerabilities in your computer systems.
-
In this podcast episode, Stefan Killer-Haug, Tresorit's representative, and Diana Kaliff, product lead for Swiss Digital Initiative, discussed the importance of digital trust and certifications. They talked about the Swiss Digital Trust label launched in 2022, the importance of building trust online as well as in the physical world, having a user-centric mindset and prioritizing trust for B2B companies. The speakers also noted that with the growing consumer demand for data privacy, businesses need to actively plan for the future and adapt their technology, security, and data protection policies.
-
Discover how eSignatures improve cybersecurity & streamline workflows in this exciting podcast with Tresorit's CEO.
-
Erfahren Sie von Ferenc Margel und Peter Stössel die neuesten Verbesserungen und Funktionen der letzten Monate sowie einen Einblick in die Produkt-Roadmap 2023.
-
In our latest webinar, we reveal our roadmap for everything from electronic signatures to encrypted e-mail. Our CEO and co-founder István Lám is also on hand to provide the latest insider updates on what’s in store for 2023.
-
How making IT tools private by design helps businesses flourish? In this episode you'll understand how to to boost efficiency and cybersecurity at your company.
- Show more