Get 10 electronic signatures and 6 EU Qualified for free. Try Tresorit eSign nowFREE
Free Live Webinar

State of the Union 2024, Spring Edition, German

  • 16 May, 2024
  • 3pm CET
  • Platform: Zoom
  • German
Learn more about our most recent market launch announcement!
Register now

Upcoming webinars and events

Webinar

State of the Union 2024, Spring Edition, German

  • 16 May, 2024
  • 3pm CET
  • Platform: Zoom
  • German
Learn more about our most recent market launch announcement!
Register now
Live Event

Infosecurity Europe

  • 4-6 June, 2024
  • London, UK
We are delighted to be joining InfoSec once again in 2024. Pop along to visit our team on stand Stand No. C110 to see our latest developments in action.
Event details
Webinar

Who’s Next, Leveraging Compliance for Success

  • 13 June, 2024
  • 3pm CET
  • Platform: Zoom
  • English
Discovering the benefits of being compliant.
Register now
Live Event

ITsa Expo & Congress

  • 22-24 October, 2024
  • Nuremberg, Germany
We are delighted to be joining ITsa once again in 2024. Pop along to visit our team on stand Stand No. 9-520 to see our latest developments in action.
Event details

Previous webinars

Missed a webinar? No worries, you can watch our past webinars on-demand.
Previous webinars
play

Empower your workforce to be your greatest fortification.

  • 2024
  • 37:11
From phishing link to ransomware scenarios, we'll explore real-life examples Hear from Sjoerd van den Bedem, IT Manager, Northwave Cybersecurity, as he chats with us about the critical junction of security and productivity with examples from Sjoerd’s broad experience helping companies fortify their security infrastructure. From phishing link victims to ransomware scenarios, we'll explore real-life data breach examples highlighting how harnessing your workforce can be your greatest fortification. Through these examples, we aim to provide tangible insights into the challenges faced by organizations and the strategies employed to mitigate risks effectively. We'll shed light on the connection between Compliance and Security and have a look at the ways your organization can stay secure without sacrificing productivity. What you will learn: *Strategies for maintaining an efficient and functional workforce *Best practices in establishing cross-functional, collaboration *Real life examples of what to avoid *Insights into the misconceptions surrounding compliance and productivity Meet our Speakers: Miklós Dénes, Head of Customer Service, Tresorit Sjoerd van den Bedem, IT Manager, Northwave Cybersecurity Sjoerd van den Bedem is an expert in managing large technical eco-systems and cybersecurity. He loves to continually improve stability, scalability and security in larger environments. Currently he secures the IT of the European company Northwave Cybersecurity. He is flown in for complex cyber incidents as a Senior Recovery expert, helping companies get back in business.
Watch now
Previous webinars
play

Renew your commitment to Zero Trust Privacy

  • 2024
  • 43:22
Unlock the synergy between security and privacy between security and privacy.
Watch now
Previous webinars
play

How to ensure secure collaboration in the workplace with Tresorit & Threema'

  • 2023
  • 24:46
For both Threema and Tresorit, data protection and privacy are a top priority. In a joint webinar, Miguel Rodríguez and Peter Stössel, Chief Revenue Officers at Threema and Tresorit, will talk about secure collaboration in companies and give practical advice using Threema Work and Tresorit as examples. Meet our Speakers: Peter Stössel, Chief Revenue Officer, Tresorit Peter is member of Tresorit's executive board and responsible for all sales and revenue related activities at Tresorit, especially for the international sales team, the customer success and the support department Miguel Rodríguez, Chief Revenue Officer, Threema As Threema’s Chief Revenue Officer, Miguel Rodriguez leads the sales team for the business solution Threema Work. The experienced sales manager is also responsible for the customer success management and holds a BA degree in business administration.
Watch now
Previous webinars
play

Maintaining Compliance without Compromise

  • 2023
  • 17:45
Compliance without compromise Modern CISOs must juggle the ever-changing compliance requirements, determined data criminals and ensure their workforce remain productive. What do we need to create a safe environment where collaboration is not compromised, and creativity can flourish. Join us to explore how forward-thinking companies can maintain efficiency and functionality and avoid the scourge of shadow IT. What you will learn: *How you can strengthen compliance in your organization *The role of confidentiality in business success *How End-to-End-Encryption can contribute towards your security measures and combat Shadow IT Meet our Speaker: Peter Budai - Chief Technology Officer, Tresorit Peter Budai is a Chief Technology Officer (CTO) renowned for his expertise in developing secure solutions that rely on strong end-to-end encryption. With a strong focus on both security and usability, Peter enables organizations to protect their data while maintaining exceptional user experiences. By combining his expertise in security architecture with user-centric design principles, he creates intuitive workflows that optimize productivity without compromising data security. This approach ensures widespread user adoption and satisfaction. Recognized for his expertise, Peter actively shares insights on integrating security into ecosystems and collaborating with industry experts. His focus on developing secure, user-friendly solutions drives conversations and advancements in the field. Areas of Expertise: Encryption Topics IT Security Principles https://www.linkedin.com/in/pbudai/
Watch now
Previous webinars
play

Who’s Next: Strategies for Cyber Resilience

  • 2023
  • 51:53
Join us, as we delve into the crucial topic of cyber resilience, together with IT Risk expert Ben de la Salle. Discover practical strategies to fortify your defenses, enhance incident response capabilities, and ensure business continuity in the face of cyberattacks. Whether or not your organization has a dedicated Chief Information Security Officer (CISO) - you can think and act like one! Learn how End to End Encryption plays a crucial role in bolstering your organization's cyber resilience by rendering sensitive data unreadable to unauthorized parties. Explore the power of encryption in mitigating the impact of data breaches and reinforcing the security of your valuable information assets. Uncover the significance of training your employees, improving usability, and addressing the challenges posed by Shadow IT. Understand the role of user education in preventing cyber threats, optimizing system usability for enhanced security, and mitigating risks associated with unauthorized software and systems used by employees. In this webinar you will learn: CISOs best practises against cyber threats and reputational loss How to layer your security and the role of encryption Tips to mitigate against the human factor Meet our speakers: Peter Budai, Chief Technology Officer, Tresorit Peter Budai is a Chief Technology Officer (CTO) renowned for his expertise in developing secure solutions that rely on strong end-to-end encryption. With a strong focus on both security and usability, Peter enables organizations to protect their data while maintaining exceptional user experiences. Ben de la Salle, Director, ICA Consultancy icaconsultancy.co.uk Ben de la Salle is the founder of ICA Consultancy, a firm that provides information/cyber security and Data Protection consultancy services, interim and fractional resourcing and specialist security services. Ben’s breadth of experience & industry knowledge spans across roles including Chief Information Security Officer at a financial services group and various other roles at Serco, KPMG and Sun Microsystems, amongst other firms.
Watch now
Previous webinars
play

Collaborating for a Better World: Unleashing the power of encryption for NGOs

  • 2023
  • 40:23
From aiding industrialized conflict zones to far-flung epidemic areas, non-governmental organizations (NGOs) are the real superheroes, bringing justice, hope and assistance to people in need worldwide. Join us as explore the incredible work of these organizations and see how Tresorit contributes with a secure way to exchange information that might be a matter of life and death. During this webinar, you'll discover how NGOs deliver on their obligation to protect the data under their care by overcoming geographical barriers and collaborating seamlessly across thousands of miles. We will unveil an important factor to their success – a solution that combines secure and unbreakable encryption with easy-to-use data exchange. Jason Keller, Digital Strategy Lead, from Vistant, will share personal insights into the remarkable work of an organization that prioritizes people over profit. What you will learn: *Embracing Innovation: Learn about new approaches tailored for unstable environments, enabling NGOs to tackle challenges with unparalleled efficiency. *Trust and Funding: Explore the vital aspects of trust-building that ultimately lead to increased funding and sustained support for the causes NGOs champion. *Building Diverse Teams: Discover effective strategies for managing and onboarding diverse teams, fostering an inclusive work environment that drives positive change. *Navigating Global Regulatory Affairs: Get a glimpse into the world of global regulations and understand how NGOs adapt to ensure compliance and maximize their impact. *Scaling Up Campaigning: Unlock best practices to scale up campaigning efforts, making a greater difference in the lives of those in need.Let's explore how technology, like Tresorit's advanced encryption, can revolutionize the operations of any NGO and non-profit organization. Reserve your spot now and join us for this webinar. Meet our speakers: Aaron Stillman, Head of Product Marketing, Tresorit Aaron is a dynamic and seasoned leader, possessing more than 15 years of experience in the B2B SaaS sector across diverse industries. His expertise lies in crafting compelling narratives and devising effective go-to-market strategies, which empower companies to thrive and drive innovation, all while fostering a culture of enjoyment and creativity. Jason Keller, Digital Strategy Lead, Vistant Jason has 20 years of nonprofit experience with a broad range of organizations from the veteran space to disaster response. Prior to joining Vistant he served as an intelligence analyst with military special operations units. After leaving the military, Jason served ten years as a U.S. Government civilian in homeland security and defense roles. Jason has a Masters in International Relations from Syracuse University and is a trained ethical hacker. James Eaton-Lee, Chief Information Security Officer (CISO), NetHope James has spent 20 years in the tech sector - the last 15 in cybersecurity and data protection roles, including 9 years in consulting roles working a range of customers across government, tech, retail, telecoms, and the financial sector and - more recently - leading the cybersecurity/privacy teams at Oxfam and Simprints. James leads NetHope's Digital Protection Program, which supports cybersecurity and data protection improvement across the nonprofit sector and in particular supports NetHope's Members to be safe, responsible digital humanitarians, development and conservation actors.
Watch now
Open YouTube playlist