Free Live Webinar:
Who’s Next: Strategies for Cyber Resilience
28 September, 2023
3pm CEST
Online: Zoom
English
Fortify your defences in the face of cyber attacks. Gain insights from leading IT Risk professionals on how to protect your valuable assets against data breaches, reputational loss and ransomware attacks.

Upcoming webinars and events
Live Event
International Cyber Expo
26-27 September, 2023
Olympia London, UK
Come and say hello to the Tresorit team on stand L20. International Cyber Expo provides a platform to debate current challenges with world-renowned experts, share knowledge and updates with colleagues and source the latest technologies, products and services from leading cyber security suppliers.
Webinar
Who’s Next: Strategies for Cyber Resilience
28 September, 2023
3pm CEST
Online: Zoom
English
Fortify your defences in the face of cyber attacks. Gain insights from leading IT Risk professionals on how to protect your valuable assets against data breaches, reputational loss and ransomware attacks.
Live Event
GDS CIO SUMMIT - EU
17-19 October, 2023
Online
Security leaders are having to be more proactive in meeting the growing complexity of the Cyber threat which means more compliance, risk management and protection. Tresorit are delighted to be taking part in this online event for the European market.
Live Event
GDS CIO SUMMIT - USA
5-7 December, 2023
Online
Security leaders are having to be more proactive in meeting the growing complexity of the Cyber threat which means more compliance, risk management and protection. Tresorit are delighted to be taking part in this online event for the USA market.
Previous webinars
Missed a webinar? No worries, you can watch our past webinars on-demand.
2023
01:27:18
Renowned researcher and human rights advocate, Ethan Gutmann, shares how technology safeguards valuable information when data privacy isn’t recognized as a human right.
In our webinar with human rights activist, Ethan Gutmann, we will be looking at the role of technology in protecting valuable information such as research data, interviews with victims & whistleblower files.
Ethan Gutmann is a renowned researcher, human rights advocate, and 2017 Nobel Peace Prize nominee. He known for his impactful work documenting and investigating human rights abuses, especially in China. His contributions in exposing forced organ harvesting and widespread human rights violations have been key in raising awareness and advocating for justice.
Watch to learn more about:
Ethan's work around the world and his experience with 'exporting’ sensitive information across borders
The role of technology in the face of government suppression and countermeasures
Governmental control over data and strategies for trustworthy systems
Meet our speakers:
Stefan Killer-Haug, PR and Communications DACH, Tresorit
Stefan manages communications in Germany, Austria, and Switzerland. He is a trained journalist, certified data protection officer (DPO-TUEV), and an advocate of new work.
LinkedIn profile: linkedin.com/in/stefan-killer-haug
Ethan Gutmann, China Studies Research Fellow
Ethan Gutmann, China analyst and human-rights investigator, is a Senior Research Fellow in China Studies for the Victims of Communism Memorial Foundation and co-founder of the International Coalition to End Transplant Abuse in China (ETAC). He has written for publications such as the Wall Street Journal Asia, The Weekly Standard, National Review, and Investor’s Business Daily, and has provided briefings for the United States Congress, the Central Intelligence Agency, the European Parliament, and the United Nations.
LinkedIn profile: https://www.linkedin.com/in/ethan-gutmann-75a2068/
2023
31:18
What should you look for when choosing an encryption solution for your needs? Join us to learn more about the different types of encryption and how bad implementations can ruin your data privacy.
Encryption has come along way from the tool of choice for top secret state affairs to solutions everybody can find in their smartphones and messaging apps. However, not all encryption is created equal and in a lot of cases you don’t get the security that was promised. From bad implementation to backdoors to over-complicated usability - there are many reasons your most valuable data might end up unprotected.
In this webinar, we will talk about what you should look for when choosing an encryption solution for your needs.
Watch to learn more about:
The finer details of true end-to-end encryption
How zero knowledge can improve your sleep
How only ease of use can eliminate the human factor
How breaches of encrypted data can still ruin security and why key rotation is key
Meet our speaker:
Szilveszter Szebeni, Chief Data & Compliance Officer and Co-Founder, Tresorit
As a Chief Data and Compliance Officer, Szilveszter is responsible for the seamless operation of Tresorit’s information management and compliance. With his experience in Business Intelligence and Data Analytics, Szilveszter supports all departments, by continually updating and improving decision making tools. Szilveszter holds an MSc degree in Computer Science from the Budapest University of Technology and Economics (BUTE).
LinkedIn: https://www.linkedin.com/in/szilveszterszebeni/
2023
51:53
Hackers are exploiting digital and hybrid work realities. Join our top speakers to equip yourself with tips on how to protect both your family and co-workers.
While the internet of things offers numerous benefits, it also presents significant security and privacy risks that can be exploited by cybercriminals. Be it the connected device measuring your blood pressure or simply your business cell phone, hackers can identify its weakness and invade both your business and (family’s) privacy.
This webinar covers five of the most common ways cybercriminals identify you as their next target. What’s more, webinar host Stefan Killer-Haug and his guest, security consultant Shannon Miller, provide you with an action plan to defend against scammers, secure connected devices, and ensure the safety of your home network.
Watch to learn more about:
Recognize (remote work) vulnerabilities
Protect yourself, family, and co-workers from cybercriminals
First-hand insights into the experiences and practices of security professionals
Meet our speakers:
Stefan Killer-Haug, PR and Communications DACH, Tresorit
Stefan manages communications in Germany, Austria, and Switzerland. He is a trained journalist, certified data protection officer (DPO-TUEV), and an advocate of new work.
LinkedIn profile: linkedin.com/in/stefan-killer-haug
Shannon Miller, Security Consultant, Lockdown your life
Shannon is a Security Consultant and Private Investigator who helps protect privacy, profit & peace of mind.
She owns Lock Down Your Life, a company that simplifies security & privacy to prepare and protect individuals and businesses when the worst happens.
2023
43:23
In an increasingly digitalized and data-oriented world, the Swiss Digital Initiative shares how the Digital Trust Label helps in building trustworthy digital services.
How is trust built and maintained in the digital world?
The Digital Trust Label is a solution suitable for digital services that collect sensitive data where breaches or losses can have a significant impact.
In an increasingly digitalized and data-oriented world, the Swiss Digital Initiative shares how the Digital Trust Label helps in building trustworthy digital services.
Watch to learn more about:
What Digital Trust Labels mean for the Security Landscape
Why are labels and certifications important when choosing your supplier?
Why digital trust matters for the success of your products and services? and how the Digital Trust Label helps them with this?
Meet our speakers:
Stefan Killer-Haug, PR and Communications DACH, Tresorit
Stefan manages communications in Germany, Austria, and Switzerland. He is a trained journalist, certified data protection officer (DPO-TUEV), and an advocate of new work.
LinkedIn profile: linkedin.com/in/stefan-killer-haug
Diana Kaliff, Product Lead, Digital Trust Label, Swiss Digital Initiative
Diana is product lead for the Digital Trust Label. She has a background in Engineering and Sustainability Science and the Stockholm and Geneva start-up scene. Passionate about innovations that connect technology to people and the planet.
LinkedIn: linkedin.com/in/diana-kaliff-61b92098
2023
53:22
István Lám, CEO and founder of Tresorit talks about secure collaboration and trust across multiple teams and external partners.
In our Webinar István Lám, CEO and co-founder of Tresorit talks about secure collaboration and trust across multiple teams and external partners. He shares insights and best practices to prevent shadow IT and security breaches and focuses on the role of smooth and efficient workflows combined with high usability. One example of those processes around digital signing. István explains how simple and qualified electronic signatures can be used efficiently in different settings and workflow scenarios.
Target audience: Decision makers interested in creating an eSign workflow that guarantees safety and efficiency around legally binding documents.
Watch to learn more about:
Securing workflows and the role of usability in security
Benefits of the electronic signature
The three security levels of electronic signature
Meet our speaker:
Istvan Lam, CEO & Co-Founder, Tresorit
István Lám is a cryptographer, computer scientist, and entrepreneur. He is co-founder & CEO of Tresorit, the cloud encryption company. As a researcher of cryptographic key sharing and distributed systems at Crysys Labs, Hungary and the Ecole Polytechnique Fédérale de Lausanne (EPFL), Switzerland, he specialized in cryptography engineering and co-founded Tresorit, whilst still at university.
https://www.linkedin.com/in/istvanlam/
2023
29:35
𝗛𝗶𝗴𝗵 𝘀𝗲𝗰𝘂𝗿𝗶𝘁𝘆 𝗹𝗲𝘃𝗲𝗹𝘀 𝗿𝗲𝗾𝘂𝗶𝗿𝗲 𝗴𝗿𝗲𝗮𝘁 𝘂𝘀𝗲𝗿 𝗲𝘅𝗽𝗲𝗿𝗶𝗲𝗻𝗰𝗲𝘀
Give your IT admins the tools they need to empower users without having to jump through loops to meet your company's internal data security policies and industry/governmental regulations.
In this webinar, we review the challenges that maintaining data privacy poses for the IT admin and then share our top tips for making your admin’s life much easier by giving more control.
Watch to learn more about:
easily create specific policy templates for different data privacy levels
enforce those policies across departments, job functions and/or roles
report in real-time on internal/external sensitive data sharing
Happy Admins. Happy Users. Secured by Design.
Meet our speakers:
Peter Budai, Chief Product Officer, Tresorit
Peter is responsible for defining and executing the product strategy of Tresorit’s end-to-end encrypted productivity solutions, making sure that our customers get the best tool for secure document exchange and collaboration.
https://www.linkedin.com/in/pbudai/
Tamás Molnár, Senior Sales Manager, Tresorit
Tamas is responsible for customers’ needs and goals across Northern Europe, the UK, and the Baltics. He closely supports a broad range of customers to help them secure their business-critical sensitive data and collaborate efficiently.
https://www.linkedin.com/in/tamasmolnarbp/