Get 10 electronic signatures and 6 EU Qualified for free. Try Tresorit eSign nowFREE
Free Live Webinar

Who’s Next, Leveraging Compliance for Success

  • 13 June, 2024
  • 3pm CET
  • Platform: Zoom
  • English
Discovering the benefits of being compliant.
Register now

Upcoming webinars and events

Live Event

Infosecurity Europe

  • 4-6 June, 2024
  • London, UK
We are delighted to be joining InfoSec once again in 2024. Pop along to visit our team on stand Stand No. C110 to see our latest developments in action.
Event details
Webinar

Who’s Next, Leveraging Compliance for Success

  • 13 June, 2024
  • 3pm CET
  • Platform: Zoom
  • English
Discovering the benefits of being compliant.
Register now
Live Event

ITsa Expo & Congress

  • 22-24 October, 2024
  • Nuremberg, Germany
We are delighted to be joining ITsa once again in 2024. Pop along to visit our team on stand Stand No. 9-520 to see our latest developments in action.
Event details

Previous webinars

Missed a webinar? No worries, you can watch our past webinars on-demand.
Previous webinars
play

Why Secure enough is NOT an option

  • 2024
  • 36:06
Card Description: The importance of fortifying your organization's defense mechanisms. Watch our chat with Henk-Jan Angerman, CVO, SecWatch, a seasoned professional with extensive experience in the field of pen-testing and security consulting. In this insightful session, we looked at security vulnerabilities encountered during ‘red-team’ engagements, shedding light on common pitfalls and providing actionable insights to fortify your organization's defense mechanisms. We took a deeper look at implementing security controls, providing a foundation for adequate logging, reporting, and overall security governance. Missing the finer points of data security and misconceptions surrounding cloud environments can lead organizations to face a significant gap in their security strategy. What you will learn: - Gain a deeper understanding of how permissions issues can be exploited, leading to potential security breaches. - Discover the nuances that organizations often overlook, and uncover strategies to enhance your cloud security posture. - Learn about the challenges and opportunities of compliance frameworks like ISO27001/NIS2. Meet our speakers: Peter Budai, CTO, Tresorit Peter Budai is a Chief Technology Officer (CTO) renowned for his expertise in developing secure solutions that rely on strong end-to-end encryption. With a strong focus on both security and usability, Peter enables organizations to protect their data while maintaining exceptional user experiences. Henk-Jan Angerman, CVO, SecWatch Henk-Jan, started his career in 1999 as an engineer in the field of security, mainly around malware, antivirus and firewalls. He founded his first company in 2001, and founded SECWATCH in 2005. Focusing on information security consultancy services, like threat intelligence and hunting, penetration testing and red teaming. He merged the companies in 2019 into SECWATCH BV with a sole focus on information security services.
Watch now
Previous webinars
play

Empower your workforce to be your greatest fortification.

  • 2024
  • 37:11
From phishing link to ransomware scenarios, we'll explore real-life examples Hear from Sjoerd van den Bedem, IT Manager, Northwave Cybersecurity, as he chats with us about the critical junction of security and productivity with examples from Sjoerd’s broad experience helping companies fortify their security infrastructure. From phishing link victims to ransomware scenarios, we'll explore real-life data breach examples highlighting how harnessing your workforce can be your greatest fortification. Through these examples, we aim to provide tangible insights into the challenges faced by organizations and the strategies employed to mitigate risks effectively. We'll shed light on the connection between Compliance and Security and have a look at the ways your organization can stay secure without sacrificing productivity. What you will learn: *Strategies for maintaining an efficient and functional workforce *Best practices in establishing cross-functional, collaboration *Real life examples of what to avoid *Insights into the misconceptions surrounding compliance and productivity Meet our Speakers: Miklós Dénes, Head of Customer Service, Tresorit Sjoerd van den Bedem, IT Manager, Northwave Cybersecurity Sjoerd van den Bedem is an expert in managing large technical eco-systems and cybersecurity. He loves to continually improve stability, scalability and security in larger environments. Currently he secures the IT of the European company Northwave Cybersecurity. He is flown in for complex cyber incidents as a Senior Recovery expert, helping companies get back in business.
Watch now
Previous webinars
play

Renew your commitment to Zero Trust Privacy

  • 2024
  • 43:22
Unlock the synergy between security and privacy between security and privacy.
Watch now
Previous webinars
play

How to ensure secure collaboration in the workplace with Tresorit & Threema'

  • 2023
  • 24:46
For both Threema and Tresorit, data protection and privacy are a top priority. In a joint webinar, Miguel Rodríguez and Peter Stössel, Chief Revenue Officers at Threema and Tresorit, will talk about secure collaboration in companies and give practical advice using Threema Work and Tresorit as examples. Meet our Speakers: Peter Stössel, Chief Revenue Officer, Tresorit Peter is member of Tresorit's executive board and responsible for all sales and revenue related activities at Tresorit, especially for the international sales team, the customer success and the support department Miguel Rodríguez, Chief Revenue Officer, Threema As Threema’s Chief Revenue Officer, Miguel Rodriguez leads the sales team for the business solution Threema Work. The experienced sales manager is also responsible for the customer success management and holds a BA degree in business administration.
Watch now
Previous webinars
play

Maintaining Compliance without Compromise

  • 2023
  • 17:45
Compliance without compromise Modern CISOs must juggle the ever-changing compliance requirements, determined data criminals and ensure their workforce remain productive. What do we need to create a safe environment where collaboration is not compromised, and creativity can flourish. Join us to explore how forward-thinking companies can maintain efficiency and functionality and avoid the scourge of shadow IT. What you will learn: *How you can strengthen compliance in your organization *The role of confidentiality in business success *How End-to-End-Encryption can contribute towards your security measures and combat Shadow IT Meet our Speaker: Peter Budai - Chief Technology Officer, Tresorit Peter Budai is a Chief Technology Officer (CTO) renowned for his expertise in developing secure solutions that rely on strong end-to-end encryption. With a strong focus on both security and usability, Peter enables organizations to protect their data while maintaining exceptional user experiences. By combining his expertise in security architecture with user-centric design principles, he creates intuitive workflows that optimize productivity without compromising data security. This approach ensures widespread user adoption and satisfaction. Recognized for his expertise, Peter actively shares insights on integrating security into ecosystems and collaborating with industry experts. His focus on developing secure, user-friendly solutions drives conversations and advancements in the field. Areas of Expertise: Encryption Topics IT Security Principles https://www.linkedin.com/in/pbudai/
Watch now
Previous webinars
play

Who’s Next: Strategies for Cyber Resilience

  • 2023
  • 51:53
Join us, as we delve into the crucial topic of cyber resilience, together with IT Risk expert Ben de la Salle. Discover practical strategies to fortify your defenses, enhance incident response capabilities, and ensure business continuity in the face of cyberattacks. Whether or not your organization has a dedicated Chief Information Security Officer (CISO) - you can think and act like one! Learn how End to End Encryption plays a crucial role in bolstering your organization's cyber resilience by rendering sensitive data unreadable to unauthorized parties. Explore the power of encryption in mitigating the impact of data breaches and reinforcing the security of your valuable information assets. Uncover the significance of training your employees, improving usability, and addressing the challenges posed by Shadow IT. Understand the role of user education in preventing cyber threats, optimizing system usability for enhanced security, and mitigating risks associated with unauthorized software and systems used by employees. In this webinar you will learn: CISOs best practises against cyber threats and reputational loss How to layer your security and the role of encryption Tips to mitigate against the human factor Meet our speakers: Peter Budai, Chief Technology Officer, Tresorit Peter Budai is a Chief Technology Officer (CTO) renowned for his expertise in developing secure solutions that rely on strong end-to-end encryption. With a strong focus on both security and usability, Peter enables organizations to protect their data while maintaining exceptional user experiences. Ben de la Salle, Director, ICA Consultancy icaconsultancy.co.uk Ben de la Salle is the founder of ICA Consultancy, a firm that provides information/cyber security and Data Protection consultancy services, interim and fractional resourcing and specialist security services. Ben’s breadth of experience & industry knowledge spans across roles including Chief Information Security Officer at a financial services group and various other roles at Serco, KPMG and Sun Microsystems, amongst other firms.
Watch now
Open YouTube playlist