محتوای ارائه شده توسط Tresorit. تمام محتوای پادکست شامل قسمتها، گرافیکها و توضیحات پادکست مستقیماً توسط Tresorit یا شریک پلتفرم پادکست آنها آپلود و ارائه میشوند. اگر فکر میکنید شخصی بدون اجازه شما از اثر دارای حق نسخهبرداری شما استفاده میکند، میتوانید روندی که در اینجا شرح داده شده است را دنبال کنید.https://fa.player.fm/legal
The American healthcare system is one of the most innovative in the world. But it’s also riddled with complex challenges, such as access to affordable medications, inefficiency and administrative burdens, and communication barriers between providers. There’s clearly a better way—and at Surescripts, we have a unique sightline into what that may be. In this series, host Melanie Marcus, Chief Marketing Officer of Surescripts, sits down with today’s most inspiring and innovative leaders in healt ...
The power of Data is undeniable. And unharnessed - it’s nothing but chaos. Making data your ally. Using it to lead with confidence and clarity. Host Jess Carter is solving problems in real-time to reveal what’s possible. Helping communities and people thrive. This is Data Driven Leadership, a show brought to you by Resultant.
How does artificial intelligence change when people — not profit — truly come first? Join IRL’s host Bridget Todd, as she meets people around the world building responsible alternatives to the tech that’s changing how we work, communicate, and even listen to music.
Big tech is transforming every aspect of our world. But how, and at what cost? This season of Land of the Giants – The Disney Dilemma – focuses on Disney’s ability to weather the ups and downs of the business cycle and changing tastes and explores what has kept it successful for over 100 years. The entertainment giant has leveraged nostalgia and its intellectual property to build a beloved brand, but after an acquisition spree that included Marvel, Lucasfilm, and 20th Century Fox, can it sus ...
Welcome to the Security Weekly Podcast Network, your all-in-one source for the latest in cybersecurity! This feed features a diverse lineup of shows, including Application Security Weekly, Business Security Weekly, Paul's Security Weekly, Enterprise Security Weekly, and Security Weekly News. Whether you're a cybersecurity professional, business leader, or tech enthusiast, we cover all angles of the cybersecurity landscape. Tune in for in-depth panel discussions, expert guest interviews, and ...
Get the most out of your home theater with the latest advances, product reviews, and all things audio and video. Every Thursday, Scott Wilkinson shares his expertise, energy, and enthusiasm about how to make your A/V system sound and look its best. In this short-format podcast, Scott brings you news, reviews, interviews, and commentary, and answers your questions. You can join Club TWiT for $7 a month and get ad-free audio and video feeds for all our shows plus everything else the club offer ...
Android Backstage, a podcast by and for Android developers. Hosted by developers from the Android engineering team, this show covers topics of interest to Android programmers, with in-depth discussions and interviews with engineers on the Android team at Google. Subscribe to Android Developers YouTube → https://goo.gle/AndroidDevs
Grumpy helps a reader choose the best hydrangea for their hometown. Plus, Grumpy’s gripe of the week. You can find us online at southernliving.com/askgrumpy Ask Grumpy Credits: Steve Bender aka The Grumpy Gardener - Host Nellah McGough - Co-Host Krissy Tiglias - GM, Southern Living Lottie Leymarie - Executive Producer Michael Onufrak - Audio Engineer/Producer Isaac Nunn - Recording Tech Learn more about your ad choices. Visit podcastchoices.com/adchoices…
محتوای ارائه شده توسط Tresorit. تمام محتوای پادکست شامل قسمتها، گرافیکها و توضیحات پادکست مستقیماً توسط Tresorit یا شریک پلتفرم پادکست آنها آپلود و ارائه میشوند. اگر فکر میکنید شخصی بدون اجازه شما از اثر دارای حق نسخهبرداری شما استفاده میکند، میتوانید روندی که در اینجا شرح داده شده است را دنبال کنید.https://fa.player.fm/legal
Whether you are working in the finance, healthcare, legal or manufacturing industries, sharing data with multiple external associates is part of your daily life. Fact. In a compliance focused-environment, how do you ensure you remain compliant and efficient whilst honoring the integrity of third-party data? Look no further, data rooms are here to save the day. We will look at the challenges of collaborating whilst adhering to strict data segregation requirements with Cyber Security expert Marton Miklos from ACPM IT. From GDPR to NIS2, we will provide insights into how you can stay efficient while giving your clients and partners the confidentiality they deserve? Meet the Speakers: Aaron Stillman, Head of Product Marketing, Tresorit Aaron is a dynamic and seasoned leader, possessing more than 15 years of experience in the B2B SaaS sector across diverse industries. His expertise lies in crafting compelling narratives and devising effective go-to-market strategies which empower companies to thrive and drive innovation, all while fostering a culture of enjoyment and creativity. Miklós Márton, Founder & MD, ACPM IT With over 20 years of experience in IT Project Management and IT Audit, Marton provides expert advice in IT consulting to major corporations, financial entities and government organizations. His particular focus is in IT Security and Business Intelligence.Find out more at www.tresorit.com
محتوای ارائه شده توسط Tresorit. تمام محتوای پادکست شامل قسمتها، گرافیکها و توضیحات پادکست مستقیماً توسط Tresorit یا شریک پلتفرم پادکست آنها آپلود و ارائه میشوند. اگر فکر میکنید شخصی بدون اجازه شما از اثر دارای حق نسخهبرداری شما استفاده میکند، میتوانید روندی که در اینجا شرح داده شده است را دنبال کنید.https://fa.player.fm/legal
Whether you are working in the finance, healthcare, legal or manufacturing industries, sharing data with multiple external associates is part of your daily life. Fact. In a compliance focused-environment, how do you ensure you remain compliant and efficient whilst honoring the integrity of third-party data? Look no further, data rooms are here to save the day. We will look at the challenges of collaborating whilst adhering to strict data segregation requirements with Cyber Security expert Marton Miklos from ACPM IT. From GDPR to NIS2, we will provide insights into how you can stay efficient while giving your clients and partners the confidentiality they deserve? Meet the Speakers: Aaron Stillman, Head of Product Marketing, Tresorit Aaron is a dynamic and seasoned leader, possessing more than 15 years of experience in the B2B SaaS sector across diverse industries. His expertise lies in crafting compelling narratives and devising effective go-to-market strategies which empower companies to thrive and drive innovation, all while fostering a culture of enjoyment and creativity. Miklós Márton, Founder & MD, ACPM IT With over 20 years of experience in IT Project Management and IT Audit, Marton provides expert advice in IT consulting to major corporations, financial entities and government organizations. His particular focus is in IT Security and Business Intelligence.Find out more at www.tresorit.com
Überblick über das Webinar: Rechtskonform und wettbewerbsfähig bleiben: NIS2-Konformität für KMU im Unternehmens-Ökosystem Die zweite EU-Richtlinie zur Netzwerk- und Informationssicherheit (NIS 2) ist nun in Kraft und von der Richtlinie betroffene Großunternehmen arbeiten intensiv daran, deren strenge Auflagen zu erfüllen. Was sind jedoch die Konsequenzen für kleinere Unternehmen im Supplier-Netzwerk? Für KMUs geht es nicht nur um die Erfüllung von Compliance-Anforderungen. Die Einhaltung von NIS-2-Prinzipien, selbst wenn diese nicht gesetzlich vorgeschrieben sind, kann einen strategischen Vorteil verschaffen, indem die betriebliche Effizienz angekurbelt und Ihr Unternehmen zu einem attraktiveren Partner im Business Ecosystem gemacht wird. Die zentralen Punkte: Die Auswirkung von NIS 2 auf KMUs verstehen Praktische Schritte für die Einhaltung von NIS 2, um wettbewerbsfähig und sicher zu bleiben Das Vertrauen von Großunternehmen in Ihr KMU stärken, indem Sie Ihr Engagement in Sachen Sicherheit und Compliance unter Beweis stellen Ihre Moderatoren: Stefan Blaschke, Leitender Produktmanager, Tresorit Mit über 10 Jahren Erfahrung in SaaS-Unternehmen liegt Stefans Expertise darin, die Lücke zwischen Kundenbedürfnissen und Produktinnovation zu schließen. Bei Tresorit stellt Stefan sicher, dass jede von uns entwickelte Lösung reale Herausforderungen angeht, regulatorische Anforderungen erfüllt und sinnvollen, langfristigen Wert schafft. Fokko Oldewurtel, Domenig & Partner Fokko Oldewurtel ist ein Rechtsanwalt und zertifizierter Datenschutz-Rechtsexperte, der sich auf die Bereiche IT, IP, Datenschutzgesetze und Cybersicherheit spezialisiert hat. Er veröffentlicht regelmäßig Blogbeiträge zu diesen Schwerpunkten und tritt in den Medien als Experte auf. Fokko Oldewurtel berät Großunternehmen, KMUs, Behörden und Start-ups in Rechtsfragen bezüglich Digitalisierung und Datenschutz.Find out more at www.tresorit.com…
Compliance with regulations like GDPR, NIS2, or DORA is often seen as a burden, adding complexity and restrictions to business operations. But what if compliance could actually enhance security, streamline workflows, and build trust with customers? In this podcast we explore how businesses can go beyond a checkbox approach to compliance and turn regulatory requirements into a competitive advantage. We’ll also discuss the growing importance of data residency and why where your data is stored matters just as much as how it’s protected. What you will learn: *How to implement security measures that go beyond compliance to strengthen business resilience. *Practical strategies to meet security requirements without disrupting workflows. *The critical role of data residency and how to make informed decisions about data storage.Find out more at www.tresorit.com…
The healthcare sector faces unique challenges when it comes to secure data exchange. Sensitive patient information, compliance with stringent regulations, and growing cyber threats require organizations to adopt robust solutions to safeguard their operations and patient trust. In this webinar, we’ll discuss how healthcare organizations can protect themselves and their patients by leveraging secure data practices. Whether you’re navigating HIPAA, GDPR, or other industry-specific regulations, this session will provide actionable insights to fortify your organization’s data resilience. What You Will Learn: Secure data exchange essentials: Understand the risks, benefits, and tools for safeguarding sensitive patient information. Compliance simplified: Key regulatory requirements like HIPAA, GDPR, and NIS2, and how to meet them effectively. Safe data practices & resilience beyond compliance: Practical steps to protect data and ensure long-term security. Meet the Speakers: Aaron Stillman, Head of Product Marketing, Tresorit Aaron is a dynamic and seasoned leader, possessing more than 15 years of experience in the B2B SaaS sector across diverse industries. His expertise lies in crafting compelling narratives and devising effective go-to-market strategies which empower companies to thrive and drive innovation, all while fostering a culture of enjoyment and creativity. Miguel Gurrola, Managing Partner Conscious Performance GmbH With over 24 years of corporate experience, Miguel has held strategic roles in HR and human capital across diverse industries, including aeronautics, consumer goods, chemical, mental health, mechanical, mining, and pharmaceuticals. He brings more than 30 years of experience in strategic planning, human resources management, leadership development, and change management within international organizations.Find out more at www.tresorit.com…
Digital Operational Resilience Act (DORA), is now mandatory for financial firms as of January 2025. Designed to fortify the information and communication technology (ICT) posture of the financial sector, DORA aims to ensure organizations can withstand, recover, and thrive after cyber disruptions. Now that the deadline has come and gone, where does your business stand? Whether you’re on track, behind, or just starting, this session is your guide to achieve and maintain compliance with the regulation moving forward. What you will learn: A breakdown of DORA’s key requirements Steps to catch up if you missed the deadline How to maintain compliance Meet the Speakers: Aaron Stillman, Head of Product Marketing, Tresorit Aaron is a dynamic and seasoned leader, possessing more than 15 years of experience in the B2B SaaS sector across diverse industries. His expertise lies in crafting compelling narratives and devising effective go-to-market strategies which empower companies to thrive and drive innovation, all while fostering a culture of enjoyment and creativity. Ben de la Salle, Director, ICA Consultancy Ltd Ben de la Salle is the founder of ICA Consultancy, a firm that provides information/cyber security and Data Protection consultancy services, interim and fractional resourcing and specialist security services. Ben’s breadth of experience & industry knowledge spans across roles including Chief Information Security Officer at a financial services group and various other roles at Serco, KPMG and Sun Microsystems, amongst other firms.Find out more at www.tresorit.com…
Our business customers have been facing challenges when collaborating on sensitive files with external and internal partners. One-way file sharing was often insufficient for confidential projects that required multiple review cycles Our newest feature addresses this need for a more dynamic way of file collaboration, building on our industry-leading security features and ensuring that shared files are encrypted – both when sent out and when received. This new development goes a step further in making two-way file sharing and reviewing easier and smoother than ever – all with one encrypted link and with no registration needed for external partners. We can’t wait to share our newest feature with you! Join us to learn more about: Why and when businesses need secure channels for two-way collaboration How users and collaborators – even without a Tresorit account – can share and receive updated files via one secure link How they can maintain control and visibility over version history Meet the Speakers: Sarolta Gájer, Product Marketing Analyst, Tresorit Sarolta is a Product Marketing Analyst at Tresorit, with 15 years of diverse professional experience. With 1 year in product marketing and previous roles in HR and Account-Based Marketing, Sarolta is passionate about differentiating Tresorit’s offerings in a competitive market and empowering sales and marketing teams to drive success. Miguel Gurrola, Managing Partner Conscious Performance With over 24 years of corporate experience, Miguel has held strategic roles in HR and human capital across diverse industries, including aeronautics, consumer goods, chemical, mental health, mechanical, mining, and pharmaceuticals. He brings more than 30 years of experience in strategic planning, human resources management, leadership development, and change management within international organizations. Find out more at www.tresorit.com…
The Network and Information Security Directive 2 (NIS2) is now in effect, and larger enterprises, affected by the regulation, are working hard on meeting its stringent requirements. But where does that leave smaller organizations in the supply chain? For SMEs, it's not just about meeting compliance mandates. Following NIS2 principles, even if not required by law, can offer a strategic advantage—boosting operational efficiency and making you a more attractive partner in the enterprise ecosystem. Key Takeaways: Understanding NIS2’s impact on SMEs Practical steps for aligning with NIS2 to stay competitive and secure Enhancing trust with larger organizations by demonstrating a commitment to security and compliance Meet the Speakers: Boglárka Fekecs, Legal Counsel, Tresorit Boglarka Fekecs has worked as Legal Counsel in the tech industry for the past five years. At Tresorit, she helps ensure compliance with the evolving legislative landscape, with a particular focus on data protection and technology-related regulations. Fokko Oldewurtel, Domenig & Partner Fokko Oldewurtel is attorney at law and certified data protection law expert. He specializes in IT, IP and data protection law as well as cybersecurity. He regularly publishes blog posts in his areas of specialization and appears in the media as an expert. Fokko Oldewurtel advises corporations, SMEs, public authorities and start-ups on legal issues relating to digitalization and data protection.Find out more at www.tresorit.com…
Whether you are working in the finance, healthcare, legal or manufacturing industries, sharing data with multiple external associates is part of your daily life. Fact. In a compliance focused-environment, how do you ensure you remain compliant and efficient whilst honoring the integrity of third-party data? Look no further, data rooms are here to save the day. We will look at the challenges of collaborating whilst adhering to strict data segregation requirements with Cyber Security expert Marton Miklos from ACPM IT. From GDPR to NIS2, we will provide insights into how you can stay efficient while giving your clients and partners the confidentiality they deserve? Meet the Speakers: Aaron Stillman, Head of Product Marketing, Tresorit Aaron is a dynamic and seasoned leader, possessing more than 15 years of experience in the B2B SaaS sector across diverse industries. His expertise lies in crafting compelling narratives and devising effective go-to-market strategies which empower companies to thrive and drive innovation, all while fostering a culture of enjoyment and creativity. Miklós Márton, Founder & MD, ACPM IT With over 20 years of experience in IT Project Management and IT Audit, Marton provides expert advice in IT consulting to major corporations, financial entities and government organizations. His particular focus is in IT Security and Business Intelligence.Find out more at www.tresorit.com…
In this podcast, we will delve into the key elements of NIS2 and explore its far-reaching impact on organizations. Our experts will provide a comprehensive overview of the Directive and highlight the steps organizations need to take to achieve compliance. What you will learn: Understanding of the core objectives and requirements of NIS2, and which sectors and types of organizations are affected What steps to take to assess and enhance your organization's cybersecurity posture, together with best practices for implementing NIS2 compliance measures How to prepare for audits and reporting obligations under NIS2 and what role your management and staff will play in maintaining compliance While the specific implementation of NIS2 may vary from country to country, this webinar will provide you with a solid foundation to navigate the Directive’s key requirements and essential steps to take towards compliance. Meet the Speakers: Turul Balogh, Group Information Security and Data Protection Officer, Tresorit For the past 10 years, Turul has been helping companies achieve their business goals more effectively and efficiently on both a strategical and tactical level whilst ensuring the appropriate level of IT, data protection and information security. Koen Verbeke, CTO, Cranium Koen began his career as a consultant, gaining experience primarily in the life sciences and fintech industries. He has served for several years as a Data Protection Officer and Information Security Officer at multiple organizations. In 2022, he had the opportunity to lead CRANIUM’s security department, where he was responsible for sales, account management, and driving further growth. Currently, he oversees the areas of knowledge management, solution development, and service delivery. In this capacity, he contributes to shaping the strategy for addressing current issues such as the AI Act and NIS2. Thank you for your help in advance! Confluence content Find out more at www.tresorit.com…
In this webinar we will explore the data security challenges faced by the financial industry and how finance organizations can improve productivity using collaborative tools. What you will learn: Pitfalls and challenges to avoid when ensuring data security in the Finance industry How Finance professionals can save valuable time and resources while ensuring compliance and confidentiality throughout the due diligence lifecycle. How Data rooms can provide a secure, efficient, and collaborative platform for managing critical financial transactions and documents. Meet the Speakers: Aaron Stillman, Head of Product Marketing, Tresorit Aaron is a dynamic and seasoned leader, possessing more than 15 years of experience in the B2B SaaS sector across diverse industries. His expertise lies in crafting compelling narratives and devising effective go-to-market strategies, which empower companies to thrive and drive innovation, all while fostering a culture of enjoyment and creativity. Dr Lisa McKee, Founding Partner at American Security and Privacy Dr. Lisa McKee has over 20 years of industry experience. She provides services, assessments, training, program development and leadership as a virtual Data Protection Officer (vDPO) for companies globally. Lisa has a PhD in Cyber Defense with an emphasis in Privacy. She is a highly regarded privacy expert and international speaker and event keynoter. As a member of the Accredited Standards Committee X9, she provides input on industry standards. As an APMG ISACA Certified Trainer, she is passionate about privacy and volunteers on boards for several professional groups, mentors, and adjunct professor for graduate students. She has authored several publications including a Data Privacy Management textbook. Find out more at www.tresorit.com…
Learn how compliance can be a powerful driver of business growth. When digital rules and regulations seem to be increasing every day, it is easy to lose sight of the benefits that can be gained from living by them. See by Bavo Van den Heuvel, CEO of Cranium, share how compliance can elevate your brand and drive revenue, streamline processes, and boost productivity. Say goodbye to the notion that compliance is a hassle, and learn how it can be a strategic asset that propels your business forward. Don't miss this opportunity to uncover the untapped potential within your organization. What you will learn: How internal compliance review and investigation can support your business processes How the action plans of IT, facility management, environment, HR and others, can make your compliance more efficient How there can be a “return on compliance” Meet the Speakers: Peter Budai, CTO, Tresorit Peter Budai is a Chief Technology Officer (CTO) renowned for his expertise in developing secure solutions that rely on strong end-to-end encryption. With a strong focus on both security and usability, Peter enables organizations to protect their data while maintaining exceptional user experiences. Bavo Van den Heuvel, Co-Founder and Partner at Cranium Bavo started his career in biometrics in 1996, started working in security afterwards and is a full time privacy expert since 2004. Translating the data protection needs between legal/business and IT-(security) people is his daily challenge at Cranium. Find out more at www.tresorit.com…
Entdecken Sie die neuesten Updates aus der Entwicklungsabteilung von Tresorit und werfen Sie einen Blick auf die Roadmap für 2024. Find out more at www.tresorit.com
Many companies promise to offer robust E2EE, but under the hood, the level of protection may not live up to the promises.Find out more at www.tresorit.com
Join our webinar, with Sjoerd van den Bedem, IT Manager, Northwave Cybersecurity, where we will have a look at the critical junction of security and productivity with examples from Sjoerd’s broad experience helping companies fortify their security infrastructure.🛡️ From phishing link victims to ransomware scenarios, we'll explore real-life data breach examples highlighting how harnessing your workforce can be your greatest fortification. Through these examples, we aim to provide tangible insights into the challenges faced by organizations and the strategies employed to mitigate risks effectively. We'll shed light on the connection between Compliance and Security and have a look at the ways your organization can stay secure without sacrificing productivity. What you will learn: Strategies for maintaining an efficient and functional workforce Best practices in establishing cross-functional, collaboration Real life examples of what to avoid Insights into the misconceptions surrounding compliance and productivity Meet our Speakers: Miklós Dénes, Head of Customer Service, Tresorit Miklos is a charismatic Customer Service and Success lead renowned for his expertise in elevating customer support. With a wealth of experience in the tech industry and a passion for ensuring customer satisfaction, he has been instrumental in shaping Tresorit's customer service division in the last 10 years. Sjoerd van den Bedem, IT Manager, Northwave Cybersecurity Sjoerd is an expert in managing large technical eco-systems and cybersecurity. He loves to continually improve stability, scalability and security in larger environments. Currently he secures the IT of the European company Northwave Cybersecurity. He is flown in for complex cyber incidents as a Senior Recovery expert, helping companies get back in business. Find out more at www.tresorit.com…
🔒 Listen to Dr. Lisa McKee, Founding Partner at American Security & Privacy and Aaron Stillman, Tresorit’s Head of Product Marketing as they unravel the intricate relationship between zero trust and privacy. 🛡️ In this episode you’ll learn: Steps to take when reviewing your data strategies Common mistakes to avoid while working with data How to implement Zero Trust Privacy strategies Find out more at www.tresorit.com…
In this episode of Under CTRL, Tresorit’s Chief Revenue Officer, Peter Stössel, is joined by Elisabeth Rötsch, an account executive for secure messaging app Threema. They’ll be discussing why secure communication should be a top priority for modern workforces, and how digitization can improve connectivity for global businesses. The episode will also be digging in to the common problems embedded in mainstream communication apps — including insufficient encryption, lack of compliance, and poor configuration — and talk about how companies can avoid these often-hidden pitfalls. Find out more at www.tresorit.com…
Wie kann Ihr Unternehmen die Sicherheit und Privatsphäre seiner Daten in Übereinstimmung mit aktuellen Datenschutzbestimmungen gewährleisten, ohne seinen Mitarbeitern das Leben – und die interne und externe Zusammenarbeit – schwer zu machen? In dieser gemeinschaftlich von Threema.Work und Tresorit produzierten Podcast-Episode erhalten Sie die Antwort von Elisabeth Rötsch, Account Executive bei Threema, und Peter Stössel, Chief Revenue Officer bei Tresorit. Sie diskutieren die aktuellen Cyberbedrohungen und Datenschutzanforderungen, denen Unternehmen sich gegenübersehen, und wie Ende-zu-Ende-verschlüsselte Lösungen wie Threema.Work und Tresorit mit ihrer breiten Produktpalette benutzerfreundlicher Apps, Integrationen und Add-ons helfen können, Risiken einzudämmen und Compliance mit z. B. der DSGVO, NIS2 und DORA zu erzielen. Anhand von Threemas und Tresorits Entstehungsgeschichte, ihren aktuellen Erfolgskennzahlen und positiven Kundenerfahrungen wird beleuchtet, wie der Schutz von Privatsphäre – ein grundlegendes Menschenrecht und die Mission beider Plattformen – gewährleistet werden kann, ohne dabei die Usability aufs Spiel zu setzen. Während Threema.Work als Messenger-Dienst den Schwerpunkt auf geschützte Unternehmenskommunikation gelegt hat und Tresorits Fokus auf sicheren Datentausch gerichtet ist, haben die Anwendungen in Sachen Bedienbarkeit und Nutzerkomfort ein gemeinsames Ziel: ihren Kunden eine intuitiv nutzbare Ende-zu-Ende-Verschlüsselung mit Zero-Knowledge-Prinzip zu bieten, die sich nahtlos in bereits bestehende Arbeitsabläufe und Systeme einfügt. Sie möchten mehr über Tresorits sicheren Workspace in der Cloud erfahren? Besuchen Sie unsere Webseite oder kontaktieren Sie uns . Lesen Sie die im Podcast erwähnten Beiträge zur Nutzung von Tresorit in Unternehmen und NGOs: Kundenstimme Viessmann Wenn Datenschutz eine Frage von Leben und Tod ist – ein Gespräch mit Menschenrechtsaktivist Ethan Gutmann Folgen Sie uns auf unseren Social-Media-Kanälen: X Facebook Instagram LinkedIn Find out more at www.tresorit.com…
Join Péter Budai, Tresoit’s Chief Product Officer, as he breaks down the data compliance landscape in Europe and the United States and looks at how firms can get the most from their data protection policies. Initially, compliance can seem daunting. But taking the time to evaluate your company’s digital infrastructure isn’t just about managing potential risks — it can also help managers identify bottlenecks, boost everyday office efficiency, and gain an edge over competitors. As well as explaining some key tools that companies can use to meet common data protection laws — including end-to-end encryption, privacy by design, and data minimization — Péter will also discuss how companies can use compliance to build trusting customer relationships with an emphasis on ethical behavior, customer protection, social responsibility. Find out more at www.tresorit.com…
In this episode of Under CTRL, Tresorit’s Chief Technology Officer, Péter Budai, joins ICA Consultancy’s Ben De La Salle to discuss how organizations can not only withstand cyberattacks, but also recover from them. For truly resilient companies, cyber security isn’t just seen as an IT issue, but as everyone’s responsibility. That’s because the fallout from a digital attack can be felt across an organization, from disrupting workflows to damaging customer trust. We look at how IT teams can prepare for potential cyber events by getting serious about risk assessment, as well as collaborating and building strong company-wide connections. We’ll also talk about the benefits the companies can gain by prioritizing their assets, no matter their organization’s size or budget. Find out more at www.tresorit.com…
In this episode of Under CTRL, Tresorit’s Aaron Stillman talks with Jason Keller, digital strategy developer for Vistant, and James Eaton-Lee, CISO for NetHope, on how NGOs can protect their most important assets in the online age. Non-profits are often used to working in demanding environments, but they also face unique challenges in the digital realm. Operating out in the field can strain connectivity, while an ever-changing roster of volunteers, freelancers, and partners poses problems for both security and accessibility. Most worrying of all is the increasing threat of state-backed actors, who can dedicate large amounts of resources to attack or discredit activist groups. Together, Aaron, James, and Jason break down how NGOs can face these threats head-on by investing in technical tools such as encryption, as well as practical measures such as training and usability. We also look at the wider tech landscape, and how investing in security can help non-profits safeguard not only key assets, but also their ethical responsibilities and reputation. Find out more at www.tresorit.com…
Bei Tresorit arbeiten wir ständig hinter den Kulissen an den Funktionen und Lösungen, die Ihre persönlichen Daten schützen. Und da die meisten unserer Verbesserungen auf das Feedback unserer Kunden zurückgehen, stellen wir sicher, dass unsere Nutzer bei der Vorstellung unserer neuesten Updates einen Platz in der ersten Reihe erhalten. Wie immer in unseren State of the Union-Webinaren gehen wir auf die neuesten Tresorit-Releases der letzten sechs Monate ein und geben einen kleinen Ausblick auf das, was als nächstes kommt. In dieser Folge sind Chief Revenue Officer Peter Stössel und die Senior Product Manager David Imre Szarvas und Norbert Hegyaljai anwesend, um über Funktionen wie Tresorit eSign, Ordnerübernahme und -organisation sowie unsere anpassbaren Subdomains zu sprechen. In einer speziellen Fragerunde kommen auch Experten für Cybersicherheit zu Wort, und wir sprechen über einige spannende Neuigkeiten von der RSA-Konferenz in San Francisco. Find out more at www.tresorit.com…
At Tresorit, we’re always working behind the scenes on the features and solutions that keep your personal data safe. And as most of our improvements are driven by customer feedback, we make sure our users get a front-row seat as we unveil our latest updates. As always in our State of the Union webinars, we’ll be diving into the latest Tresorit releases from the past six months, and getting a small preview of what’s coming next. In this episode, chief revenue officer Peter Stössel and senior product managers David Imre Szarvas and Norbert Hegyaljai are all on hand to discuss features such as Tresorit eSign, folder takeovers and organization, and our customizable subdomains. We also hear from cybersecurity professionals in a special Q&A session, and talk about some exciting news from the RSA conference in San Francisco. Find out more at www.tresorit.com…
Across the globe, governments are using cutting-edge technology to surveil their citizens en masse. In oppressive or autocratic regimes, state security services regularly exploit tools such as facial recognition and GPS tracking to find and imprison political dissidents. Luckily, digital innovation is also unlocking new possibilities for human rights defenders who need to protect both themselves and the vital testimonies they gather. In this episode, researcher, author, and Nobel prize-nominee Ethan Gutmann joins Tresorit’s Stefan Killer-Haug to discuss how end-to-end encryption and zero-knowledge principles can help human rights advocates to carry out their important work. As well as recounting his personal experiences of evading state surveillance while gathering evidence of China’s forced organ harvesting program, Ethan discusses the solutions he’s found to protect the lives of those fleeing persecution — and what the future could hold for human rights defenders in a world of AI. Find out more at www.tresorit.com…
Vertrauen ist das Herzstück produktiver Geschäftsbeziehungen. Doch die Verbraucher zögern oft, ihr Vertrauen in die digitalen Technologien zu setzen, die moderne und bahnbrechende Unternehmen vorantreiben. In dieser Folge setzt sich Stefan Killer-Haug von Tresorit mit Nicolas Zahn von der Swiss Digital Initiative zusammen, um über die Besonderheiten des digitalen Vertrauens zu sprechen und zu erklären, warum der Aufbau von Verbrauchervertrauen entscheidend ist, wenn Unternehmen die Vorteile der Spitzentechnologie wirklich nutzen wollen. Wir gehen auch auf einige der wichtigsten Themen ein, die den Umgang von Unternehmen mit Daten heute und in Zukunft bestimmen: von der Frage, wie sich die Vorstellung von digitalem Vertrauen in den verschiedenen internationalen Märkten unterscheidet, bis hin zum Erhalt des Kundenvertrauens in einer Welt der KI. Wenn Sie in Zukunft mehr von unseren Webinaren sehen möchten, vergessen Sie nicht, sich hier beim LinkedIn-Kanal von Tresorit anzumelden. Find out more at www.tresorit.com…
End-to-end encryption (E2EE) is increasingly mainstream, appearing in everything from mass-market instant messaging apps to high-end password managers. But for E2EE to truly reach its potential, it needs to act as just one part of a secure IT infrastructure. And while more IT products than ever before claim to use end-to-end encryption to keep your data safe, many of these solutions also cut vital corners in their cryptography protocols — putting your information at risk. In this special webinar podcast direct from ITsa365, Tresorit co-founder and CISO, Szilveszter Szebeni, talks to Encryption Europe’s James Briscoe about down the different types of encryption, how end-to-end encryption works, and what organizations need to be looking for in their secure IT solutions. We’ll also be discussing why email as we know it today will never be secure, and the myth that easy-to-use products are more vulnerable to cyberattacks. Find out more at www.tresorit.com…
In this episode, Tresorit’s Stefan Killer-Haug joins security consultant and private investigator Shannon Miller to discuss the importance of cybersecurity for remote workers and how to your data safe while working from home. The popularity of flexible and hybrid working has exploded in recent years — and if you’re one of the many who has swapped the office for WFH, then it’s never been more important to keep your home network secure. Listen in as Shannon discusses her experiences dealing with cybercriminals in domestic settings, the common ways that scammers and hackers identify their targets, and how easy-to-implement steps such as strong encryption can protect your and your family’s data. We also take a special look at how outside attackers can use the Internet of Things (IoT) — including internet-enabled TVs, gaming consoles, and even smart toasters and refrigerators — to find vulnerabilities in your computer systems. Find out more at www.tresorit.com…
In this podcast episode, Stefan Killer-Haug, Tresorit's representative, and Diana Kaliff, product lead for Swiss Digital Initiative, discussed the importance of digital trust and certifications. They talked about the Swiss Digital Trust label launched in 2022, the importance of building trust online as well as in the physical world, having a user-centric mindset and prioritizing trust for B2B companies. The speakers also noted that with the growing consumer demand for data privacy, businesses need to actively plan for the future and adapt their technology, security, and data protection policies. Find out more at www.tresorit.com…
به Player FM خوش آمدید!
Player FM در سراسر وب را برای یافتن پادکست های با کیفیت اسکن می کند تا همین الان لذت ببرید. این بهترین برنامه ی پادکست است که در اندروید، آیفون و وب کار می کند. ثبت نام کنید تا اشتراک های شما در بین دستگاه های مختلف همگام سازی شود.
The American healthcare system is one of the most innovative in the world. But it’s also riddled with complex challenges, such as access to affordable medications, inefficiency and administrative burdens, and communication barriers between providers. There’s clearly a better way—and at Surescripts, we have a unique sightline into what that may be. In this series, host Melanie Marcus, Chief Marketing Officer of Surescripts, sits down with today’s most inspiring and innovative leaders in healt ...
The power of Data is undeniable. And unharnessed - it’s nothing but chaos. Making data your ally. Using it to lead with confidence and clarity. Host Jess Carter is solving problems in real-time to reveal what’s possible. Helping communities and people thrive. This is Data Driven Leadership, a show brought to you by Resultant.
How does artificial intelligence change when people — not profit — truly come first? Join IRL’s host Bridget Todd, as she meets people around the world building responsible alternatives to the tech that’s changing how we work, communicate, and even listen to music.
Big tech is transforming every aspect of our world. But how, and at what cost? This season of Land of the Giants – The Disney Dilemma – focuses on Disney’s ability to weather the ups and downs of the business cycle and changing tastes and explores what has kept it successful for over 100 years. The entertainment giant has leveraged nostalgia and its intellectual property to build a beloved brand, but after an acquisition spree that included Marvel, Lucasfilm, and 20th Century Fox, can it sus ...
Welcome to the Security Weekly Podcast Network, your all-in-one source for the latest in cybersecurity! This feed features a diverse lineup of shows, including Application Security Weekly, Business Security Weekly, Paul's Security Weekly, Enterprise Security Weekly, and Security Weekly News. Whether you're a cybersecurity professional, business leader, or tech enthusiast, we cover all angles of the cybersecurity landscape. Tune in for in-depth panel discussions, expert guest interviews, and ...
Get the most out of your home theater with the latest advances, product reviews, and all things audio and video. Every Thursday, Scott Wilkinson shares his expertise, energy, and enthusiasm about how to make your A/V system sound and look its best. In this short-format podcast, Scott brings you news, reviews, interviews, and commentary, and answers your questions. You can join Club TWiT for $7 a month and get ad-free audio and video feeds for all our shows plus everything else the club offer ...
Android Backstage, a podcast by and for Android developers. Hosted by developers from the Android engineering team, this show covers topics of interest to Android programmers, with in-depth discussions and interviews with engineers on the Android team at Google. Subscribe to Android Developers YouTube → https://goo.gle/AndroidDevs
به بهترین برنامه ی پادکست جهان ملحق شوید تا نمایش های مورد علاقه ی خود را در برنامه های اندروید و iOS آنلاین مدیریت کنید و آفلاین پخش کنید. خیلی راحت و کاملا رایگان!