Compliance ohne Kompromisse
- 2. November 2023
- 15 Uhr (UTC+1)
- Online: Zoom
Wie erschaffen Unternehmen ein sicheres IT-Arbeitsumfeld, in dem die Zusammenarbeit nicht leidet und sich die Kreativität entfalten kann?
Alle vergangenen Events erkunden
Webinar verpasst? Keine Sorge, all unsere vergangenen Webinare gibt es On-Demand.
Renowned researcher and human rights advocate, Ethan Gutmann, shares how technology safeguards valuable information when data privacy isn’t recognized as a human right. In our webinar with human rights activist, Ethan Gutmann, we will be looking at the role of technology in protecting valuable information such as research data, interviews with victims & whistleblower files. Ethan Gutmann is a renowned researcher, human rights advocate, and 2017 Nobel Peace Prize nominee. He known for his impactful work documenting and investigating human rights abuses, especially in China. His contributions in exposing forced organ harvesting and widespread human rights violations have been key in raising awareness and advocating for justice. Watch to learn more about: Ethan's work around the world and his experience with 'exporting’ sensitive information across borders The role of technology in the face of government suppression and countermeasures Governmental control over data and strategies for trustworthy systems Meet our speakers: Stefan Killer-Haug, PR and Communications DACH, Tresorit Stefan manages communications in Germany, Austria, and Switzerland. He is a trained journalist, certified data protection officer (DPO-TUEV), and an advocate of new work. LinkedIn profile: linkedin.com/in/stefan-killer-haug Ethan Gutmann, China Studies Research Fellow Ethan Gutmann, China analyst and human-rights investigator, is a Senior Research Fellow in China Studies for the Victims of Communism Memorial Foundation and co-founder of the International Coalition to End Transplant Abuse in China (ETAC). He has written for publications such as the Wall Street Journal Asia, The Weekly Standard, National Review, and Investor’s Business Daily, and has provided briefings for the United States Congress, the Central Intelligence Agency, the European Parliament, and the United Nations. LinkedIn profile: https://www.linkedin.com/in/ethan-gutmann-75a2068/
What should you look for when choosing an encryption solution for your needs? Join us to learn more about the different types of encryption and how bad implementations can ruin your data privacy. Encryption has come along way from the tool of choice for top secret state affairs to solutions everybody can find in their smartphones and messaging apps. However, not all encryption is created equal and in a lot of cases you don’t get the security that was promised. From bad implementation to backdoors to over-complicated usability - there are many reasons your most valuable data might end up unprotected. In this webinar, we will talk about what you should look for when choosing an encryption solution for your needs. Watch to learn more about: The finer details of true end-to-end encryption How zero knowledge can improve your sleep How only ease of use can eliminate the human factor How breaches of encrypted data can still ruin security and why key rotation is key Meet our speaker: Szilveszter Szebeni, Chief Data & Compliance Officer and Co-Founder, Tresorit As a Chief Data and Compliance Officer, Szilveszter is responsible for the seamless operation of Tresorit’s information management and compliance. With his experience in Business Intelligence and Data Analytics, Szilveszter supports all departments, by continually updating and improving decision making tools. Szilveszter holds an MSc degree in Computer Science from the Budapest University of Technology and Economics (BUTE). LinkedIn: https://www.linkedin.com/in/szilveszterszebeni/
Hackers are exploiting digital and hybrid work realities. Join our top speakers to equip yourself with tips on how to protect both your family and co-workers. While the internet of things offers numerous benefits, it also presents significant security and privacy risks that can be exploited by cybercriminals. Be it the connected device measuring your blood pressure or simply your business cell phone, hackers can identify its weakness and invade both your business and (family’s) privacy. This webinar covers five of the most common ways cybercriminals identify you as their next target. What’s more, webinar host Stefan Killer-Haug and his guest, security consultant Shannon Miller, provide you with an action plan to defend against scammers, secure connected devices, and ensure the safety of your home network. Watch to learn more about: Recognize (remote work) vulnerabilities Protect yourself, family, and co-workers from cybercriminals First-hand insights into the experiences and practices of security professionals Meet our speakers: Stefan Killer-Haug, PR and Communications DACH, Tresorit Stefan manages communications in Germany, Austria, and Switzerland. He is a trained journalist, certified data protection officer (DPO-TUEV), and an advocate of new work. LinkedIn profile: linkedin.com/in/stefan-killer-haug Shannon Miller, Security Consultant, Lockdown your life Shannon is a Security Consultant and Private Investigator who helps protect privacy, profit & peace of mind. She owns Lock Down Your Life, a company that simplifies security & privacy to prepare and protect individuals and businesses when the worst happens.
In an increasingly digitalized and data-oriented world, the Swiss Digital Initiative shares how the Digital Trust Label helps in building trustworthy digital services. How is trust built and maintained in the digital world? The Digital Trust Label is a solution suitable for digital services that collect sensitive data where breaches or losses can have a significant impact. In an increasingly digitalized and data-oriented world, the Swiss Digital Initiative shares how the Digital Trust Label helps in building trustworthy digital services. Watch to learn more about: What Digital Trust Labels mean for the Security Landscape Why are labels and certifications important when choosing your supplier? Why digital trust matters for the success of your products and services? and how the Digital Trust Label helps them with this? Meet our speakers: Stefan Killer-Haug, PR and Communications DACH, Tresorit Stefan manages communications in Germany, Austria, and Switzerland. He is a trained journalist, certified data protection officer (DPO-TUEV), and an advocate of new work. LinkedIn profile: linkedin.com/in/stefan-killer-haug Diana Kaliff, Product Lead, Digital Trust Label, Swiss Digital Initiative Diana is product lead for the Digital Trust Label. She has a background in Engineering and Sustainability Science and the Stockholm and Geneva start-up scene. Passionate about innovations that connect technology to people and the planet. LinkedIn: linkedin.com/in/diana-kaliff-61b92098
István Lám, CEO and founder of Tresorit talks about secure collaboration and trust across multiple teams and external partners. In our Webinar István Lám, CEO and co-founder of Tresorit talks about secure collaboration and trust across multiple teams and external partners. He shares insights and best practices to prevent shadow IT and security breaches and focuses on the role of smooth and efficient workflows combined with high usability. One example of those processes around digital signing. István explains how simple and qualified electronic signatures can be used efficiently in different settings and workflow scenarios. Target audience: Decision makers interested in creating an eSign workflow that guarantees safety and efficiency around legally binding documents. Watch to learn more about: Securing workflows and the role of usability in security Benefits of the electronic signature The three security levels of electronic signature Meet our speaker: Istvan Lam, CEO & Co-Founder, Tresorit István Lám is a cryptographer, computer scientist, and entrepreneur. He is co-founder & CEO of Tresorit, the cloud encryption company. As a researcher of cryptographic key sharing and distributed systems at Crysys Labs, Hungary and the Ecole Polytechnique Fédérale de Lausanne (EPFL), Switzerland, he specialized in cryptography engineering and co-founded Tresorit, whilst still at university. https://www.linkedin.com/in/istvanlam/
𝗛𝗶𝗴𝗵 𝘀𝗲𝗰𝘂𝗿𝗶𝘁𝘆 𝗹𝗲𝘃𝗲𝗹𝘀 𝗿𝗲𝗾𝘂𝗶𝗿𝗲 𝗴𝗿𝗲𝗮𝘁 𝘂𝘀𝗲𝗿 𝗲𝘅𝗽𝗲𝗿𝗶𝗲𝗻𝗰𝗲𝘀 Give your IT admins the tools they need to empower users without having to jump through loops to meet your company's internal data security policies and industry/governmental regulations. In this webinar, we review the challenges that maintaining data privacy poses for the IT admin and then share our top tips for making your admin’s life much easier by giving more control. Watch to learn more about: easily create specific policy templates for different data privacy levels enforce those policies across departments, job functions and/or roles report in real-time on internal/external sensitive data sharing Happy Admins. Happy Users. Secured by Design. Meet our speakers: Peter Budai, Chief Product Officer, Tresorit Peter is responsible for defining and executing the product strategy of Tresorit’s end-to-end encrypted productivity solutions, making sure that our customers get the best tool for secure document exchange and collaboration. https://www.linkedin.com/in/pbudai/ Tamás Molnár, Senior Sales Manager, Tresorit Tamas is responsible for customers’ needs and goals across Northern Europe, the UK, and the Baltics. He closely supports a broad range of customers to help them secure their business-critical sensitive data and collaborate efficiently. https://www.linkedin.com/in/tamasmolnarbp/