Technology
Business
Tresorit
Tresorit's own produced podcast, bringing you biweekly insights on business, security and technology. If you have any questions or feedback, please write to us at [email protected].
Total 55 episodes
1
2
Go to
11/11/2024

How SMEs can stay legal & efficient in the enterprise supplier network & pragmatically adopt NIS2

The Network and Information Security Directive 2 (NIS2) is now in effect, and larger enterprises, affected by the regulation, are working hard on meeting its stringent requirements. But where does that leave smaller organizations in the supply chain? For SMEs, it's not just about meeting compliance mandates. Following NIS2 principles, even if not required by law, can offer a strategic advantage—boosting operational efficiency and making you a more attractive partner in the enterprise ecosystem. Key Takeaways: Understanding NIS2’s impact on SMEs Practical steps for aligning with NIS2 to stay competitive and secure Enhancing trust with larger organizations by demonstrating a commitment to security and compliance Meet the Speakers: Boglárka Fekecs, Legal Counsel, Tresorit Boglarka Fekecs has worked as Legal Counsel in the tech industry for the past five years. At Tresorit, she helps ensure compliance with the evolving legislative landscape, with a particular focus on data protection and technology-related regulations. Fokko Oldewurtel, Domenig & Partner Fokko Oldewurtel is attorney at law and certified data protection law expert. He specializes in IT, IP and data protection law as well as cybersecurity. He regularly publishes blog posts in his areas of specialization and appears in the media as an expert. Fokko Oldewurtel advises corporations, SMEs, public authorities and start-ups on legal issues relating to digitalization and data protection.Find out more at www.tresorit.com
34m
23/10/2024

Working together and keeping data apart: unlocking the power of Data Rooms

Whether you are working in the finance, healthcare, legal or manufacturing industries, sharing data with multiple external associates is part of your daily life. Fact. In a compliance focused-environment, how do you ensure you remain compliant and efficient whilst honoring the integrity of third-party data? Look no further, data rooms are here to save the day. We will look at the challenges of collaborating whilst adhering to strict data segregation requirements with Cyber Security expert Marton Miklos from ACPM IT. From GDPR to NIS2, we will provide insights into how you can stay efficient while giving your clients and partners the confidentiality they deserve? Meet the Speakers: Aaron Stillman, Head of Product Marketing, Tresorit Aaron is a dynamic and seasoned leader, possessing more than 15 years of experience in the B2B SaaS sector across diverse industries. His expertise lies in crafting compelling narratives and devising effective go-to-market strategies which empower companies to thrive and drive innovation, all while fostering a culture of enjoyment and creativity. Miklós Márton, Founder & MD, ACPM IT With over 20 years of experience in IT Project Management and IT Audit, Marton provides expert advice in IT consulting to major corporations, financial entities and government organizations. His particular focus is in IT Security and Business Intelligence.Find out more at www.tresorit.com
32m
11/10/2024

What you need to know about NIS2 and how to prepare

In this podcast, we will delve into the key elements of NIS2 and explore its far-reaching impact on organizations. Our experts will provide a comprehensive overview of the Directive and highlight the steps organizations need to take to achieve compliance.What you will learn:Understanding of the core objectives and requirements of NIS2, and which sectors and types of organizations are affectedWhat steps to take to assess and enhance your organization's cybersecurity posture, together with best practices for implementing NIS2 compliance measuresHow to prepare for audits and reporting obligations under NIS2 and what role your management and staff will play in maintaining complianceWhile the specific implementation of NIS2 may vary from country to country, this webinar will provide you with a solid foundation to navigate the Directive’s key requirements and essential steps to take towards compliance. Meet the Speakers:Turul Balogh, Group Information Security and Data Protection Officer, TresoritFor the past 10 years, Turul has been helping companies achieve their business goals more effectively and efficiently on both a strategical and tactical level whilst ensuring the appropriate level of IT, data protection and information security.Koen Verbeke, CTO, CraniumKoen began his career as a consultant, gaining experience primarily in the life sciences and fintech industries. He has served for several years as a Data Protection Officer and Information Security Officer at multiple organizations. In 2022, he had the opportunity to lead CRANIUM’s security department, where he was responsible for sales, account management, and driving further growth. Currently, he oversees the areas of knowledge management, solution development, and service delivery. In this capacity, he contributes to shaping the strategy for addressing current issues such as the AI Act and NIS2.Thank you for your help in advance!Confluence content Find out more at www.tresorit.com
30m
17/07/2024

Data Security Strategies for the Finance Industry

In this webinar we will explore the data security challenges faced by the financial industry and how finance organizations can improve productivity using collaborative tools. What you will learn:Pitfalls and challenges to avoid when ensuring data security in the Finance industryHow Finance professionals can save valuable time and resources while ensuring compliance and confidentiality throughout the due diligence lifecycle.How Data rooms can provide a secure, efficient, and collaborative platform for managing critical financial transactions and documents.   Meet the Speakers: Aaron Stillman, Head of Product Marketing, Tresorit Aaron is a dynamic and seasoned leader, possessing more than 15 years of experience in the B2B SaaS sector across diverse industries. His expertise lies in crafting compelling narratives and devising effective go-to-market strategies, which empower companies to thrive and drive innovation, all while fostering a culture of enjoyment and creativity. Dr Lisa McKee, Founding Partner at American Security and Privacy Dr. Lisa McKee has over 20 years of industry experience. She provides services, assessments, training, program development and leadership as a virtual Data Protection Officer (vDPO) for companies globally. Lisa has a PhD in Cyber Defense with an emphasis in Privacy. She is a highly regarded privacy expert and international speaker and event keynoter. As a member of the Accredited Standards Committee X9, she provides input on industry standards. As an APMG ISACA Certified Trainer, she is passionate about privacy and volunteers on boards for several professional groups, mentors, and adjunct professor for graduate students. She has authored several publications including a Data Privacy Management textbook. Find out more at www.tresorit.com
36m
20/06/2024

How to leverage compliance for success

Learn how compliance can be a powerful driver of business growth. When digital rules and regulations seem to be increasing every day, it is easy to lose sight of the benefits that can be gained from living by them. See by Bavo Van den Heuvel, CEO of Cranium, share how compliance can elevate your brand and drive revenue, streamline processes, and boost productivity. Say goodbye to the notion that compliance is a hassle, and learn how it can be a strategic asset that propels your business forward. Don't miss this opportunity to uncover the untapped potential within your organization. What you will learn: How internal compliance review and investigation can support your business processes How the action plans of IT, facility management, environment, HR and others, can make your compliance more efficient How there can be a “return on compliance” Meet the Speakers: Peter Budai, CTO, Tresorit Peter Budai is a Chief Technology Officer (CTO) renowned for his expertise in developing secure solutions that rely on strong end-to-end encryption. With a strong focus on both security and usability, Peter enables organizations to protect their data while maintaining exceptional user experiences. Bavo Van den Heuvel, Co-Founder and Partner at Cranium Bavo started his career in biometrics in 1996, started working in security afterwards and is a full time privacy expert since 2004. Translating the data protection needs between legal/business and IT-(security) people is his daily challenge at Cranium. Find out more at www.tresorit.com
41m
14/03/2024

How to fortify your security with your workforce

Join our webinar, with Sjoerd van den Bedem, IT Manager, Northwave Cybersecurity, where we will have a look at the critical junction of security and productivity with examples from Sjoerd’s broad experience helping companies fortify their security infrastructure.🛡️From phishing link victims to ransomware scenarios, we'll explore real-life data breach examples highlighting how harnessing your workforce can be your greatest fortification. Through these examples, we aim to provide tangible insights into the challenges faced by organizations and the strategies employed to mitigate risks effectively.We'll shed light on the connection between Compliance and Security and have a look at the ways your organization can stay secure without sacrificing productivity.What you will learn:Strategies for maintaining an efficient and functional workforceBest practices in establishing cross-functional, collaborationReal life examples of what to avoidInsights into the misconceptions surrounding compliance and productivityMeet our Speakers: Miklós Dénes, Head of Customer Service, Tresorit Miklos is a charismatic Customer Service and Success lead renowned for his expertise in elevating customer support. With a wealth of experience in the tech industry and a passion for ensuring customer satisfaction, he has been instrumental in shaping Tresorit's customer service division in the last 10 years.Sjoerd van den Bedem, IT Manager, Northwave Cybersecurity Sjoerd is an expert in managing large technical eco-systems and cybersecurity. He loves to continually improve stability, scalability and security in larger environments. Currently he secures the IT of the European company Northwave Cybersecurity. He is flown in for complex cyber incidents as a Senior Recovery expert, helping companies get back in business. Find out more at www.tresorit.com
37m
29/11/2023

Sicherheit und Benutzerfreundlichkeit in Harmonie

Wie kann Ihr Unternehmen die Sicherheit und Privatsphäre seiner Daten in Übereinstimmung mit aktuellen Datenschutzbestimmungen gewährleisten, ohne seinen Mitarbeitern das Leben – und die interne und externe Zusammenarbeit – schwer zu machen?  In dieser gemeinschaftlich von Threema.Work und Tresorit produzierten Podcast-Episode erhalten Sie die Antwort von Elisabeth Rötsch, Account Executive bei Threema, und Peter Stössel, Chief Revenue Officer bei Tresorit.Sie diskutieren die aktuellen Cyberbedrohungen und Datenschutzanforderungen, denen Unternehmen sich gegenübersehen, und wie Ende-zu-Ende-verschlüsselte Lösungen wie Threema.Work und Tresorit mit ihrer breiten Produktpalette benutzerfreundlicher Apps, Integrationen und Add-ons helfen können, Risiken einzudämmen und Compliance mit z. B. der DSGVO, NIS2 und DORA zu erzielen. Anhand von Threemas und Tresorits Entstehungsgeschichte, ihren aktuellen Erfolgskennzahlen und positiven Kundenerfahrungen wird beleuchtet, wie der Schutz von Privatsphäre – ein grundlegendes Menschenrecht und die Mission beider Plattformen – gewährleistet werden kann, ohne dabei die Usability aufs Spiel zu setzen. Während Threema.Work als Messenger-Dienst den Schwerpunkt auf geschützte Unternehmenskommunikation gelegt hat und Tresorits Fokus auf sicheren Datentausch gerichtet ist, haben die Anwendungen in Sachen Bedienbarkeit und Nutzerkomfort ein gemeinsames Ziel: ihren Kunden eine intuitiv nutzbare Ende-zu-Ende-Verschlüsselung mit Zero-Knowledge-Prinzip zu bieten, die sich nahtlos in bereits bestehende Arbeitsabläufe und Systeme einfügt.Sie möchten mehr über Tresorits sicheren Workspace in der Cloud erfahren? Besuchen Sie unsere Webseite oder kontaktieren Sie uns.Lesen Sie die im Podcast erwähnten Beiträge zur Nutzung von Tresorit in Unternehmen und NGOs: Kundenstimme ViessmannWenn Datenschutz eine Frage von Leben und Tod ist – ein Gespräch mit Menschenrechtsaktivist Ethan GutmannFolgen Sie uns auf unseren Social-Media-Kanälen:XFacebookInstagramLinkedIn Find out more at www.tresorit.com
25m