Free Live Webinar
Who’s Next: Working together and keeping data apart: unlocking the power of Data Rooms
- 17 October, 2024
- 3pm CET
- Platform: Zoom
- English
Remaining compliant & efficient whilst honoring the integrity of 3rd party data.
Upcoming webinars and events
Webinar
Who’s Next: Working together and keeping data apart: unlocking the power of Data Rooms
- 17 October, 2024
- 3pm CET
- Platform: Zoom
- English
Remaining compliant & efficient whilst honoring the integrity of 3rd party data.
Register now
Live Event
ITsa Expo & Congress
- 22-24 October, 2024
- Nuremberg, Germany
We are delighted to be joining ITsa once again in 2024. Pop along to visit our team on stand Stand No. 9-520 to see our latest developments in action.
Event details
Webinar
Who’s Next? How SMEs Can Stay Legal and Efficient in the Enterprise Supplier Network
- 7 November, 2024
- 3pm CET
- Platform: Zoom
- English
… and pragmatically adopt NIS2
Register now
Previous webinars
Missed a webinar? No worries, you can watch our past webinars on-demand.
Data Security Strategies for the Finance Industry
- 36:04
In this webinar we explore the data security challenges faced by the financial industry and how finance organizations can improve productivity using collaborative tools.
It is not surprising that Finance is the second most targeted industry to be hit by cyberattacks. With threats on the rise, increased demand for mobile working and the U.S. Securities and Exchange Commission’s (SEC) new cybersecurity rules (effective from December 2023) data security is non-negotiable in the finance sector.
When average losses are around $5.9 million per cyber incident and most leaks contain clients' personal data and commercial information, financial organizations can no longer hide breaches and must find solutions to improve efficiency and security by design.
What you will learn:
*Pitfalls and challenges to avoid when ensuring data security in the Finance industry
*How Finance professionals can save valuable time and resources while ensuring compliance and confidentiality throughout the due diligence lifecycle.
*How Data rooms can provide a secure, efficient, and collaborative platform for managing critical financial transactions and documents.
Meet the Speakers:
Aaron Stillman, Head of Product Marketing, Tresorit
Aaron is a dynamic and seasoned leader, possessing more than 15 years of experience in the B2B SaaS sector across diverse industries. His expertise lies in crafting compelling narratives and devising effective go-to-market strategies, which empower companies to thrive and drive innovation, all while fostering a culture of enjoyment and creativity.
Dr Lisa McKee, Founding Partner at American Security and Privacy
Dr. Lisa McKee has over 20 years of industry experience. She provides services, assessments, training, program development and leadership as a virtual Data Protection Officer (vDPO) for companies globally. Lisa has a PhD in Cyber Defense with an emphasis in Privacy. She is a highly regarded privacy expert and international speaker and event keynoter. As a member of the Accredited Standards Committee X9, she provides input on industry standards. As an APMG ISACA Certified Trainer, she is passionate about privacy and volunteers on boards for several professional groups, mentors, and adjunct professor for graduate students. She has authored several publications including a Data Privacy Management textbook.
Watch now
How to leverage compliance for success
- 41:14
Learn how compliance can be a powerful driver of business growth.
When digital rules and regulations seem to be increasing every day, it is easy to lose sight of the benefits that can be gained from living by them.
See by Bavo Van den Heuvel, CEO of Cranium, share how compliance can elevate your brand and drive revenue, streamline processes, and boost productivity. Say goodbye to the notion that compliance is a hassle, and learn how it can be a strategic asset that propels your business forward. Don't miss this opportunity to uncover the untapped potential within your organization.
What you will learn:
How internal compliance review and investigation can support your business processes
How the action plans of IT, facility management, environment, HR and others, can make your compliance more efficient
How there can be a “return on compliance”
Meet the Speakers:
Peter Budai, CTO, Tresorit
Peter Budai is a Chief Technology Officer (CTO) renowned for his expertise in developing secure solutions that rely on strong end-to-end encryption. With a strong focus on both security and usability, Peter enables organizations to protect their data while maintaining exceptional user experiences.
Bavo Van den Heuvel, Co-Founder and Partner at Cranium
Bavo started his career in biometrics in 1996, started working in security afterwards and is a full time privacy expert since 2004. Translating the data protection needs between legal/business and IT-(security) people is his daily challenge at Cranium.
Watch now
ITsa How encryption can protect and deceive you
- 29:10
Learn about the fine details of end-to-end encryption (E2EE) with Tresorit’s CTO Peter Budai.
While E2EE is a powerful security tool, Peter will shed light on the nuances that, if overlooked in implementation, can pose serious risks. Uncover the challenges, from the robustness of encryption to key rotation complexities, and gain practical insights on mitigating these risks effectively.
Many companies promise robust E2EE, but behind the scenes, the level of protection may not meet expectations. Some restrict E2EE to specific configurations, leaving users vulnerable in other scenarios.
Meet the Speaker:
Peter Budai, CTO, Tresorit
Peter Budai is a Chief Technology Officer (CTO) renowned for his expertise in developing secure solutions that rely on strong end-to-end encryption. With a strong focus on both security and usability, Peter enables organizations to protect their data while maintaining exceptional user experiences.
Watch now
State of the Union 2024, Spring Launch announcements in action, English
- 31:36
Qualified e-signatures & Data residency enhancements are part of our recent exciting launch.
At Tresorit we believe that you and only you should control your data.
This is why our goal is to keep Tresorit as simple as possible, so that people can stay secure without having to take extra steps to protect their data.
By continually listening to our customers, we are able to shape the future of the product together and ensure it remains easy to use.
We are really excited about our launch announcement and can’t wait to share some of our favorite elements with you!
In this webinar, you will learn:
*All about how to upgrade your document workflows with not only electronic signatures, but also EU qualified electronic signatures. Elevate your document signing experience within one end-to-end encrypted platform without needing multiple tools.
*How you can set data residency options at company and user level to facilitate collaboration across boarders while maintaining strict adherence to diverse data protection laws.
Meet the Speakers:
Zsofia Molnar, Product Marketing Manager, Tresorit
Zsófia is a product marketing manager with expertise in B2B SaaS product positioning, messaging, and developing effective go-to-market strategies, which empower companies to thrive and drive innovation.
Andrea Skaliczki, Chief Financial Officer, Tresorit
Andrea is a passionate and results-driven finance leader with over 15 years of experience in building up and leading successful finance teams. Besides being a CFO, she is leading the Legal and Compliance functions at Tresorit. Her expertise lies in optimizing financial performance, driving growth through insightful analysis and navigating complex regulatory, legal landscapes.
Watch now
Why Secure enough is NOT an option
- 36:06
Card Description: The importance of fortifying your organization's defense mechanisms.
Watch our chat with Henk-Jan Angerman, CVO, SecWatch, a seasoned professional with extensive experience in the field of pen-testing and security consulting.
In this insightful session, we looked at security vulnerabilities encountered during ‘red-team’ engagements, shedding light on common pitfalls and providing actionable insights to fortify your organization's defense mechanisms.
We took a deeper look at implementing security controls, providing a foundation for adequate logging, reporting, and overall security governance.
Missing the finer points of data security and misconceptions surrounding cloud environments can lead organizations to face a significant gap in their security strategy.
What you will learn:
- Gain a deeper understanding of how permissions issues can be exploited, leading to potential security breaches.
- Discover the nuances that organizations often overlook, and uncover strategies to enhance your cloud security posture.
- Learn about the challenges and opportunities of compliance frameworks like ISO27001/NIS2.
Meet our speakers:
Peter Budai, CTO, Tresorit
Peter Budai is a Chief Technology Officer (CTO) renowned for his expertise in developing secure solutions that rely on strong end-to-end encryption. With a strong focus on both security and usability, Peter enables organizations to protect their data while maintaining exceptional user experiences.
Henk-Jan Angerman, CVO, SecWatch
Henk-Jan, started his career in 1999 as an engineer in the field of security, mainly around malware, antivirus and firewalls. He founded his first company in 2001, and founded SECWATCH in 2005. Focusing on information security consultancy services, like threat intelligence and hunting, penetration testing and red teaming. He merged the companies in 2019 into SECWATCH BV with a sole focus on information security services.
Watch now
Email Encryption 2.0
- 23:06
In 2022, more than 336 billion emails will be sent daily. Find out how to decrease the risk email poses to your organization.
What you Will Learn:
What risks email poses to organizations
Recommended emailing habits to mitigate those risks
Email encryption solutions and selection criteria
Meet our speakers:
Norbert Hegyaljai, Senior Product Manager, Tresorit
Norbert Hegyaljai is the Product Manager responsible for Tresorit Email encryption and our email plugins. He is dedicated to delivering significant value to our customers by helping them seamlessly integrate Tresorit into their workflows.
Olivia Kofler, Sales Manager, Tresorit
Olivia Kofler is Tresorit's Sales Manager for Enterprise Clients. She assists our customers in their journey with Tresorit by analyzing their use cases and technical requirements, as well as offering consultation about Tresorit solutions and workflows.
Watch now