Free Live Webinar
State of the Union 2024, Spring Edition, English
- 2 May, 2024
- 3pm CET
- Platform: Zoom
- English
Learn more about our most recent launch announcement!
Upcoming webinars and events
Webinar
State of the Union 2024, Spring Edition, English
- 2 May, 2024
- 3pm CET
- Platform: Zoom
- English
Learn more about our most recent launch announcement!
Register now
Live Event
RSAC
- 6-9 May, 2024
- San Francisco, USA
We are delighted to be sponsoring RSAC once again. Pop along to visit our team on stand 4518 in the North Hall, to see our latest developments in action.
Event details
Webinar
State of the Union 2024, Spring Edition, German
- 16 May, 2024
- 3pm CET
- Platform: Zoom
- German
Learn more about our most recent market launch announcement!
Register now
Live Event
Infosecurity Europe
- 4-6 June, 2024
- London, UK
We are delighted to be joining InfoSec once again in 2024. Pop along to visit our team on stand Stand No. C110 to see our latest developments in action.
Event details
Webinar
Whoโs Next, Leveraging Compliance for Success
- 13 June, 2024
- 3pm CET
- Platform: Zoom
- English
Discovering the benefits of being compliant.
Register now
Live Event
ITsa Expo & Congress
- 22-24 October, 2024
- Nuremberg, Germany
We are delighted to be joining ITsa once again in 2024. Pop along to visit our team on stand Stand No. 9-520 to see our latest developments in action.
Event details
Previous webinars
Missed a webinar? No worries, you can watch our past webinars on-demand.
Empower your workforce to be your greatest fortification.
- 2024
- 37:11
From phishing link to ransomware scenarios, we'll explore real-life examples
Hear from Sjoerd van den Bedem, IT Manager, Northwave Cybersecurity, as he chats with us about the critical junction of security and productivity with examples from Sjoerdโs broad experience helping companies fortify their security infrastructure.
From phishing link victims to ransomware scenarios, we'll explore real-life data breach examples highlighting how harnessing your workforce can be your greatest fortification.
Through these examples, we aim to provide tangible insights into the challenges faced by organizations and the strategies employed to mitigate risks effectively.
We'll shed light on the connection between Compliance and Security and have a look at the ways your organization can stay secure without sacrificing productivity.
What you will learn:
*Strategies for maintaining an efficient and functional workforce
*Best practices in establishing cross-functional, collaboration
*Real life examples of what to avoid
*Insights into the misconceptions surrounding compliance and productivity
Meet our Speakers:
Miklรณs Dรฉnes, Head of Customer Service, Tresorit
Sjoerd van den Bedem, IT Manager, Northwave Cybersecurity
Sjoerd van den Bedem is an expert in managing large technical eco-systems and cybersecurity. He loves to continually improve stability, scalability and security in larger environments.
Currently he secures the IT of the European company Northwave Cybersecurity. He is flown in for complex cyber incidents as a Senior Recovery expert, helping companies get back in business.
Watch now
Renew your commitment to Zero Trust Privacy
- 2024
- 43:22
Unlock the synergy between security and privacy between security and privacy.
Watch now
Tresorit Winter updates and year ahead review
- 2023
- 47:32
Discover the latest updates from the Tresoritโs R&D factory and a sneak peek into the 2024 product plans.
When data breaches are a case of when and not IF, are you 'insured' against data exposure? At Tresorit we are secure by design, always prepared for the inevitable breeches and focused on your productivity when storing, sharing and signing.
๐ต๐๐๐ ๐ฉ๐ ๐๐ฃ๐๐ฌ ๐ข๐๐ง๐?
Watch this most recent state of Union to explore the latest updates and developments that have been coming out of Tresoritโs R&D factory.
Over the last half-year, weโve incorporated your feedback and delivered valuable enhancements and features focused on maintaining the level of security, privacy, control you expect from Tresorit with the usability needed to grow your business productively.
Youโll get firsthand insight by watching the product and associated value in action, such as:
*Secure video/digital evidence file sharing
*A new unified sharing experience
*Introduction to a helpful new add on
๐๐๐๐ญ ๐จ๐ฎ๐ซ ๐ฌ๐ฉ๐๐๐ค๐๐ซ๐ฌ:
๐๐๐ซ๐จ๐ง ๐๐ญ๐ข๐ฅ๐ฅ๐ฆ๐๐ง, ๐๐๐๐ ๐จ๐ ๐๐ซ๐จ๐๐ฎ๐๐ญ ๐๐๐ซ๐ค๐๐ญ๐ข๐ง๐ , ๐๐ซ๐๐ฌ๐จ๐ซ๐ข๐ญ
Aaron is a dynamic and seasoned leader, possessing more than 15 years of experience in the B2B SaaS sector across diverse industries. His expertise lies in crafting compelling narratives and devising effective go-to-market strategies, which empower companies to thrive and drive innovation, all while fostering a culture of enjoyment and creativity.
๐๐ฬ๐ซ๐ข๐ ๐๐ฅ๐จ๐ง๐ ๐๐จ๐ซ๐ฏ๐ฬ๐ญ๐ก, ๐๐ ๐๐๐ฌ๐๐๐ซ๐๐ก๐๐ซ ๐๐๐๐ฆ ๐๐๐๐, ๐๐ซ๐๐ฌ๐จ๐ซ๐ข๐ญ
Maria is a user research lead with expertise in product discovery, best practices around new product and feature launches, and a special enthusiasm for ResearchOps.
#Tresorit #encryption #productivty #digitalsignature
Watch now
How to ensure secure collaboration in the workplace with Tresorit & Threema'
- 2023
- 24:46
For both Threema and Tresorit, data protection and privacy are a top priority. In a joint webinar, Miguel Rodrรญguez and Peter Stรถssel, Chief Revenue Officers at Threema and Tresorit, will talk about secure collaboration in companies and give practical advice using Threema Work and Tresorit as examples.
Meet our Speakers:
Peter Stรถssel, Chief Revenue Officer, Tresorit
Peter is member of Tresorit's executive board and responsible for all sales and revenue related activities at Tresorit, especially for the international sales team, the customer success and the support department
Miguel Rodrรญguez, Chief Revenue Officer, Threema
As Threemaโs Chief Revenue Officer, Miguel Rodriguez leads the sales team for the business solution Threema Work. The experienced sales manager is also responsible for the customer success management and holds a BA degree in business administration.
Watch now
Maintaining Compliance without Compromise
- 2023
- 17:45
Compliance without compromise
Modern CISOs must juggle the ever-changing compliance requirements, determined data criminals and ensure their workforce remain productive. What do we need to create a safe environment where collaboration is not compromised, and creativity can flourish. Join us to explore how forward-thinking companies can maintain efficiency and functionality and avoid the scourge of shadow IT.
What you will learn:
*How you can strengthen compliance in your organization
*The role of confidentiality in business success
*How End-to-End-Encryption can contribute towards your security measures and combat Shadow IT
Meet our Speaker:
Peter Budai - Chief Technology Officer, Tresorit
Peter Budai is a Chief Technology Officer (CTO) renowned for his expertise in developing secure solutions that rely on strong end-to-end encryption. With a strong focus on both security and usability, Peter enables organizations to protect their data while maintaining exceptional user experiences.
By combining his expertise in security architecture with user-centric design principles, he creates intuitive workflows that optimize productivity without compromising data security. This approach ensures widespread user adoption and satisfaction.
Recognized for his expertise, Peter actively shares insights on integrating security into ecosystems and collaborating with industry experts. His focus on developing secure, user-friendly solutions drives conversations and advancements in the field.
Areas of Expertise:
Encryption Topics
IT Security Principles
https://www.linkedin.com/in/pbudai/
Watch now
Whoโs Next: Strategies for Cyber Resilience
- 2023
- 51:53
Join us, as we delve into the crucial topic of cyber resilience, together with IT Risk expert Ben de la Salle.
Discover practical strategies to fortify your defenses, enhance incident response capabilities, and ensure business continuity in the face of cyberattacks. Whether or not your organization has a dedicated Chief Information Security Officer (CISO) - you can think and act like one!
Learn how End to End Encryption plays a crucial role in bolstering your organization's cyber resilience by rendering sensitive data unreadable to unauthorized parties. Explore the power of encryption in mitigating the impact of data breaches and reinforcing the security of your valuable information assets.
Uncover the significance of training your employees, improving usability, and addressing the challenges posed by Shadow IT. Understand the role of user education in preventing cyber threats, optimizing system usability for enhanced security, and mitigating risks associated with unauthorized software and systems used by employees.
In this webinar you will learn:
CISOs best practises against cyber threats and reputational loss
How to layer your security and the role of encryption
Tips to mitigate against the human factor
Meet our speakers:
Peter Budai, Chief Technology Officer, Tresorit
Peter Budai is a Chief Technology Officer (CTO) renowned for his expertise in developing secure solutions that rely on strong end-to-end encryption. With a strong focus on both security and usability, Peter enables organizations to protect their data while maintaining exceptional user experiences.
Ben de la Salle, Director, ICA Consultancy
icaconsultancy.co.uk
Ben de la Salle is the founder of ICA Consultancy, a firm that provides information/cyber security and Data Protection consultancy services, interim and fractional resourcing and specialist security services. Benโs breadth of experience & industry knowledge spans across roles including Chief Information Security Officer at a financial services group and various other roles at Serco, KPMG and Sun Microsystems, amongst other firms.
Watch now