Cyber sale is here! Save big, store safely, share confidently. Explore discounts
Free Live Webinar

State of the Union 2024, Winter Edition, English

  • 28 November, 2024
  • 3pm CET
  • Platform: Zoom
  • English
Tresorit has always been a Pioneer in creating secure file sharing solutions and our newest feature addresses the challenge of collaborating on sensitive files.
Register now

Upcoming webinars and events

Webinar

State of the Union 2024, Winter Edition, English

  • 28 November, 2024
  • 3pm CET
  • Platform: Zoom
  • English
Tresorit has always been a Pioneer in creating secure file sharing solutions and our newest feature addresses the challenge of collaborating on sensitive files.
Register now
Live Event

Healthcare Cyber Security Conference and Exhibition 2024

  • 03 December, 2024
  • Manchester, UK
Healthcare Cyber Security Conference and Exhibition 2024, will explore strategies for minimizing cybersecurity risks for health and social care organizations.
Event details

Previous webinars

Missed a webinar? No worries, you can watch our past webinars on-demand.
Previous webinars
play

How SMEs can stay legal & efficient in the enterprise supplier network and pragmatically adopt NIS2

    The Network and Information Security Directive 2 (NIS2) is now in effect, and larger enterprises, affected by the regulation, are working hard on meeting its stringent requirements. But where does that leave smaller organizations in the supply chain? For SMEs, it's not just about meeting compliance mandates. Following NIS2 principles, even if not required by law, can offer a strategic advantage—boosting operational efficiency and making you a more attractive partner in the enterprise ecosystem. Key Takeaways: Understanding NIS2’s impact on SMEs Practical steps for aligning with NIS2 to stay competitive and secure Enhancing trust with larger organizations by demonstrating a commitment to security and compliance Meet the Speakers: Boglárka Fekecs, Legal Counsel, Tresorit Fokko Oldewurtel, Domenig & Partner Fokko Oldewurtel is attorney at law and certified data protection law expert. He specializes in IT, IP and data protection law as well as cybersecurity. He regularly publishes blog posts in his areas of specialization and appears in the media as an expert. Fokko Oldewurtel advises corporations, SMEs, public authorities and start-ups on legal issues relating to digitalization and data protection.
    Watch now
    Previous webinars
    play

    The power of data rooms: Working together and keeping data apart

    • 32:19
    Whether you are working in the finance, healthcare, legal or manufacturing industries, sharing data with multiple external associates is part of your daily life. Fact. In a compliance focused-environment, how do you ensure you remain compliant and efficient whilst honoring the integrity of third-party data? Look no further, data rooms are here to save the day. We will look at the challenges of collaborating whilst adhering to strict data segregation requirements with Cyber Security expert Marton Miklos from ACPM IT. From GDPR to NIS2, we will provide insights into how you can stay efficient while giving your clients and partners the confidentiality they deserve? Meet the Speakers: Aaron Stillman, Head of Product Marketing, Tresorit Aaron is a dynamic and seasoned leader, possessing more than 15 years of experience in the B2B SaaS sector across diverse industries. His expertise lies in crafting compelling narratives and devising effective go-to-market strategies which empower companies to thrive and drive innovation, all while fostering a culture of enjoyment and creativity. Miklós Márton, Founder & MD, ACPM IT With over 20 years of experience in IT Project Management and IT Audit, Marton provides expert advice in IT consulting to major corporations, financial entities and government organizations. His particular focus is in IT Security and Business Intelligence.
    Watch now
    Previous webinars
    play

    What you need to know about NIS2 and how to prepare

    • 30:37
    As the Network and Information Security Directive 2 (NIS2) is set to take effect in October, businesses need to prepare to comply with its requirements. This is a crucial deadline as non-compliance with the Directive can lead to significant repercussions, including financial penalties and reputational harm. In this webinar, we will delve into the key elements of NIS2 and explore its far-reaching impact on organizations. Our experts will provide a comprehensive overview of the Directive and highlight the steps organizations need to take to achieve compliance. What you will learn: Understanding of the core objectives and requirements of NIS2, and which sectors and types of organizations are affected What steps to take to assess and enhance your organization's cybersecurity posture, together with best practices for implementing NIS2 compliance measures How to prepare for audits and reporting obligations under NIS2 and what role your management and staff will play in maintaining compliance While the specific implementation of NIS2 may vary from country to country, this webinar will provide you with a solid foundation to navigate the Directive’s key requirements and essential steps to take towards compliance. Meet the Speakers: Turul Balogh, Group Information Security and Data Protection Officer, Tresorit For the past 10 years, Turul has been helping companies achieve their business goals more effectively and efficiently on both a strategical and tactical level whilst ensuring the appropriate level of IT, data protection and information security. Koen Verbeke, CTO, Cranium Koen began his career as a consultant, gaining experience primarily in the life sciences and fintech industries. He has served for several years as a Data Protection Officer and Information Security Officer at multiple organizations. In 2022, he had the opportunity to lead CRANIUM’s security department, where he was responsible for sales, account management, and driving further growth. Currently, he oversees the areas of knowledge management, solution development, and service delivery. In this capacity, he contributes to shaping the strategy for addressing current issues such as the AI Act and NIS2.
    Watch now
    Previous webinars
    play

    Data Security Strategies for the Finance Industry

    • 36:05
    In this webinar we explore the data security challenges faced by the financial industry and how finance organizations can improve productivity using collaborative tools. It is not surprising that Finance is the second most targeted industry to be hit by cyberattacks. With threats on the rise, increased demand for mobile working and the U.S. Securities and Exchange Commission’s (SEC) new cybersecurity rules (effective from December 2023) data security is non-negotiable in the finance sector. When average losses are around $5.9 million per cyber incident and most leaks contain clients' personal data and commercial information, financial organizations can no longer hide breaches and must find solutions to improve efficiency and security by design. What you will learn: *Pitfalls and challenges to avoid when ensuring data security in the Finance industry *How Finance professionals can save valuable time and resources while ensuring compliance and confidentiality throughout the due diligence lifecycle. *How Data rooms can provide a secure, efficient, and collaborative platform for managing critical financial transactions and documents. Meet the Speakers: Aaron Stillman, Head of Product Marketing, Tresorit Aaron is a dynamic and seasoned leader, possessing more than 15 years of experience in the B2B SaaS sector across diverse industries. His expertise lies in crafting compelling narratives and devising effective go-to-market strategies, which empower companies to thrive and drive innovation, all while fostering a culture of enjoyment and creativity. Dr Lisa McKee, Founding Partner at American Security and Privacy Dr. Lisa McKee has over 20 years of industry experience. She provides services, assessments, training, program development and leadership as a virtual Data Protection Officer (vDPO) for companies globally. Lisa has a PhD in Cyber Defense with an emphasis in Privacy. She is a highly regarded privacy expert and international speaker and event keynoter. As a member of the Accredited Standards Committee X9, she provides input on industry standards. As an APMG ISACA Certified Trainer, she is passionate about privacy and volunteers on boards for several professional groups, mentors, and adjunct professor for graduate students. She has authored several publications including a Data Privacy Management textbook.
    Watch now
    Previous webinars
    play

    How to leverage compliance for success

    • 41:14
    Learn how compliance can be a powerful driver of business growth. When digital rules and regulations seem to be increasing every day, it is easy to lose sight of the benefits that can be gained from living by them. See by Bavo Van den Heuvel, CEO of Cranium, share how compliance can elevate your brand and drive revenue, streamline processes, and boost productivity. Say goodbye to the notion that compliance is a hassle, and learn how it can be a strategic asset that propels your business forward. Don't miss this opportunity to uncover the untapped potential within your organization. What you will learn: How internal compliance review and investigation can support your business processes How the action plans of IT, facility management, environment, HR and others, can make your compliance more efficient How there can be a “return on compliance” Meet the Speakers: Peter Budai, CTO, Tresorit Peter Budai is a Chief Technology Officer (CTO) renowned for his expertise in developing secure solutions that rely on strong end-to-end encryption. With a strong focus on both security and usability, Peter enables organizations to protect their data while maintaining exceptional user experiences. Bavo Van den Heuvel, Co-Founder and Partner at Cranium Bavo started his career in biometrics in 1996, started working in security afterwards and is a full time privacy expert since 2004. Translating the data protection needs between legal/business and IT-(security) people is his daily challenge at Cranium.
    Watch now
    Previous webinars
    play

    ITsa How encryption can protect and deceive you

    • 29:10
    Learn about the fine details of end-to-end encryption (E2EE) with Tresorit’s CTO Peter Budai. While E2EE is a powerful security tool, Peter will shed light on the nuances that, if overlooked in implementation, can pose serious risks. Uncover the challenges, from the robustness of encryption to key rotation complexities, and gain practical insights on mitigating these risks effectively. Many companies promise robust E2EE, but behind the scenes, the level of protection may not meet expectations. Some restrict E2EE to specific configurations, leaving users vulnerable in other scenarios. Meet the Speaker: Peter Budai, CTO, Tresorit Peter Budai is a Chief Technology Officer (CTO) renowned for his expertise in developing secure solutions that rely on strong end-to-end encryption. With a strong focus on both security and usability, Peter enables organizations to protect their data while maintaining exceptional user experiences.
    Watch now
    Open YouTube playlist