Get 10 electronic signatures and 6 EU Qualified for free. Try Tresorit eSign nowFREE

Who’s Next: Why Secure enough is NOT an option

  • 11 April, 2024
  • 3pm CET
  • Platform: Zoom
  • English
The importance of fortifying your organization's defense mechanisms.
Register now

Upcoming webinars and events

Webinar

Who’s Next: Why Secure enough is NOT an option

  • 11 April, 2024
  • 3pm CET
  • Platform: Zoom
  • English
The importance of fortifying your organization's defense mechanisms.
Register now
Webinar

How encryption can protect and deceive you

  • 17 April, 2024
  • 2:30pm CET
  • Platform: ITsa Talks 365
  • English
Learn about the fine details of end-to-end encryption (E2EE).
Register now
Webinar

State of the Union 2024, Spring Edition, English

  • 2 May, 2024
  • 3pm CET
  • Platform: Zoom
  • English
Learn more about our most recent launch announcement!
Register now
Live Event

RSAC

  • 6-9 May, 2024
  • San Francisco, USA
We are delighted to be sponsoring RSAC once again. Pop along to visit our team on stand 4518 in the North Hall, to see our latest developments in action.
Event details
Webinar

State of the Union 2024, Spring Edition, German

  • 16 May, 2024
  • 3pm CET
  • Platform: Zoom
  • German
Learn more about our most recent market launch announcement!
Register now
Live Event

Infosecurity Europe

  • 4-6 June, 2024
  • London, UK
We are delighted to be joining InfoSec once again in 2024. Pop along to visit our team on stand Stand No. C110 to see our latest developments in action.
Event details
Live Event

ITsa Expo & Congress

  • 22-24 October, 2024
  • Nuremberg, Germany
We are delighted to be joining ITsa once again in 2024. Pop along to visit our team on stand Stand No. 9-520 to see our latest developments in action.
Event details

Previous webinars

Missed a webinar? No worries, you can watch our past webinars on-demand.
Previous webinars
play

Empower your workforce to be your greatest fortification.

  • 2024
  • 37:11
From phishing link to ransomware scenarios, we'll explore real-life examples Hear from Sjoerd van den Bedem, IT Manager, Northwave Cybersecurity, as he chats with us about the critical junction of security and productivity with examples from Sjoerd’s broad experience helping companies fortify their security infrastructure. From phishing link victims to ransomware scenarios, we'll explore real-life data breach examples highlighting how harnessing your workforce can be your greatest fortification. Through these examples, we aim to provide tangible insights into the challenges faced by organizations and the strategies employed to mitigate risks effectively. We'll shed light on the connection between Compliance and Security and have a look at the ways your organization can stay secure without sacrificing productivity. What you will learn: *Strategies for maintaining an efficient and functional workforce *Best practices in establishing cross-functional, collaboration *Real life examples of what to avoid *Insights into the misconceptions surrounding compliance and productivity Meet our Speakers: Miklós Dénes, Head of Customer Service, Tresorit Sjoerd van den Bedem, IT Manager, Northwave Cybersecurity Sjoerd van den Bedem is an expert in managing large technical eco-systems and cybersecurity. He loves to continually improve stability, scalability and security in larger environments. Currently he secures the IT of the European company Northwave Cybersecurity. He is flown in for complex cyber incidents as a Senior Recovery expert, helping companies get back in business.
Watch now
Previous webinars
play

Renew your commitment to Zero Trust Privacy

  • 2024
  • 43:22
Unlock the synergy between security and privacy between security and privacy.
Watch now
Previous webinars
play

Tresorit Winter updates and year ahead review

  • 2023
  • 47:32
Discover the latest updates from the Tresorit’s R&D factory and a sneak peek into the 2024 product plans. When data breaches are a case of when and not IF, are you 'insured' against data exposure? At Tresorit we are secure by design, always prepared for the inevitable breeches and focused on your productivity when storing, sharing and signing. 𝑵𝙚𝒆𝙙 𝙩𝒐 𝒌𝙣𝒐𝙬 𝙢𝒐𝙧𝒆? Watch this most recent state of Union to explore the latest updates and developments that have been coming out of Tresorit’s R&D factory. Over the last half-year, we’ve incorporated your feedback and delivered valuable enhancements and features focused on maintaining the level of security, privacy, control you expect from Tresorit with the usability needed to grow your business productively. You’ll get firsthand insight by watching the product and associated value in action, such as: *Secure video/digital evidence file sharing *A new unified sharing experience *Introduction to a helpful new add on 𝐌𝐞𝐞𝐭 𝐨𝐮𝐫 𝐬𝐩𝐞𝐚𝐤𝐞𝐫𝐬: 𝐀𝐚𝐫𝐨𝐧 𝐒𝐭𝐢𝐥𝐥𝐦𝐚𝐧, 𝐇𝐞𝐚𝐝 𝐨𝐟 𝐏𝐫𝐨𝐝𝐮𝐜𝐭 𝐌𝐚𝐫𝐤𝐞𝐭𝐢𝐧𝐠, 𝐓𝐫𝐞𝐬𝐨𝐫𝐢𝐭 Aaron is a dynamic and seasoned leader, possessing more than 15 years of experience in the B2B SaaS sector across diverse industries. His expertise lies in crafting compelling narratives and devising effective go-to-market strategies, which empower companies to thrive and drive innovation, all while fostering a culture of enjoyment and creativity. 𝐌𝐚́𝐫𝐢𝐚 𝐈𝐥𝐨𝐧𝐚 𝐇𝐨𝐫𝐯𝐚́𝐭𝐡, 𝐔𝐗 𝐑𝐞𝐬𝐞𝐚𝐫𝐜𝐡𝐞𝐫 𝐓𝐞𝐚𝐦 𝐋𝐞𝐚𝐝, 𝐓𝐫𝐞𝐬𝐨𝐫𝐢𝐭 Maria is a user research lead with expertise in product discovery, best practices around new product and feature launches, and a special enthusiasm for ResearchOps. #Tresorit #encryption #productivty #digitalsignature
Watch now
Previous webinars
play

How to ensure secure collaboration in the workplace with Tresorit & Threema'

  • 2023
  • 24:46
For both Threema and Tresorit, data protection and privacy are a top priority. In a joint webinar, Miguel Rodríguez and Peter Stössel, Chief Revenue Officers at Threema and Tresorit, will talk about secure collaboration in companies and give practical advice using Threema Work and Tresorit as examples. Meet our Speakers: Peter Stössel, Chief Revenue Officer, Tresorit Peter is member of Tresorit's executive board and responsible for all sales and revenue related activities at Tresorit, especially for the international sales team, the customer success and the support department Miguel Rodríguez, Chief Revenue Officer, Threema As Threema’s Chief Revenue Officer, Miguel Rodriguez leads the sales team for the business solution Threema Work. The experienced sales manager is also responsible for the customer success management and holds a BA degree in business administration.
Watch now
Previous webinars
play

Maintaining Compliance without Compromise

  • 2023
  • 17:45
Compliance without compromise Modern CISOs must juggle the ever-changing compliance requirements, determined data criminals and ensure their workforce remain productive. What do we need to create a safe environment where collaboration is not compromised, and creativity can flourish. Join us to explore how forward-thinking companies can maintain efficiency and functionality and avoid the scourge of shadow IT. What you will learn: *How you can strengthen compliance in your organization *The role of confidentiality in business success *How End-to-End-Encryption can contribute towards your security measures and combat Shadow IT Meet our Speaker: Peter Budai - Chief Technology Officer, Tresorit Peter Budai is a Chief Technology Officer (CTO) renowned for his expertise in developing secure solutions that rely on strong end-to-end encryption. With a strong focus on both security and usability, Peter enables organizations to protect their data while maintaining exceptional user experiences. By combining his expertise in security architecture with user-centric design principles, he creates intuitive workflows that optimize productivity without compromising data security. This approach ensures widespread user adoption and satisfaction. Recognized for his expertise, Peter actively shares insights on integrating security into ecosystems and collaborating with industry experts. His focus on developing secure, user-friendly solutions drives conversations and advancements in the field. Areas of Expertise: Encryption Topics IT Security Principles https://www.linkedin.com/in/pbudai/
Watch now
Previous webinars
play

Who’s Next: Strategies for Cyber Resilience

  • 2023
  • 51:53
Join us, as we delve into the crucial topic of cyber resilience, together with IT Risk expert Ben de la Salle. Discover practical strategies to fortify your defenses, enhance incident response capabilities, and ensure business continuity in the face of cyberattacks. Whether or not your organization has a dedicated Chief Information Security Officer (CISO) - you can think and act like one! Learn how End to End Encryption plays a crucial role in bolstering your organization's cyber resilience by rendering sensitive data unreadable to unauthorized parties. Explore the power of encryption in mitigating the impact of data breaches and reinforcing the security of your valuable information assets. Uncover the significance of training your employees, improving usability, and addressing the challenges posed by Shadow IT. Understand the role of user education in preventing cyber threats, optimizing system usability for enhanced security, and mitigating risks associated with unauthorized software and systems used by employees. In this webinar you will learn: CISOs best practises against cyber threats and reputational loss How to layer your security and the role of encryption Tips to mitigate against the human factor Meet our speakers: Peter Budai, Chief Technology Officer, Tresorit Peter Budai is a Chief Technology Officer (CTO) renowned for his expertise in developing secure solutions that rely on strong end-to-end encryption. With a strong focus on both security and usability, Peter enables organizations to protect their data while maintaining exceptional user experiences. Ben de la Salle, Director, ICA Consultancy icaconsultancy.co.uk Ben de la Salle is the founder of ICA Consultancy, a firm that provides information/cyber security and Data Protection consultancy services, interim and fractional resourcing and specialist security services. Ben’s breadth of experience & industry knowledge spans across roles including Chief Information Security Officer at a financial services group and various other roles at Serco, KPMG and Sun Microsystems, amongst other firms.
Watch now
Open YouTube playlist