Player FM - Internet Radio Done Right
0-10 subscribers
Checked 24d ago
تمت الإضافة منذ قبل five أعوام
المحتوى المقدم من Tresorit. يتم تحميل جميع محتويات البودكاست بما في ذلك الحلقات والرسومات وأوصاف البودكاست وتقديمها مباشرة بواسطة Tresorit أو شريك منصة البودكاست الخاص بهم. إذا كنت تعتقد أن شخصًا ما يستخدم عملك المحمي بحقوق الطبع والنشر دون إذنك، فيمكنك اتباع العملية الموضحة هنا https://ar.player.fm/legal.
Player FM - تطبيق بودكاست
انتقل إلى وضع عدم الاتصال باستخدام تطبيق Player FM !
انتقل إلى وضع عدم الاتصال باستخدام تطبيق Player FM !
المدونة الصوتية تستحق الاستماع
برعاية
S
Skip Intro

Zoey Deutch returns to Skip Intro to talk about her latest transformation in Nouvelle Vague as American actress Jean Seberg. Directed by acclaimed filmmaker Richard Linklater — and a love letter to the French New Wave classic Breathless — Nouvelle Vague wasn’t the first time that Linklater and Deutch shared a film set. Deutch shares how Linklater compares rehearsals to athletics, starting exciting new chapters in her personal life, hilarious irrational fears, and the deep love she has for her sister, Maddie. Video episodes are also available on the Still Watching Netflix YouTube Channel. Listen to more from Netflix Podcasts .…
under CTRL
وسم كل الحلقات كغير/(كـ)مشغلة
Manage series 2769887
المحتوى المقدم من Tresorit. يتم تحميل جميع محتويات البودكاست بما في ذلك الحلقات والرسومات وأوصاف البودكاست وتقديمها مباشرة بواسطة Tresorit أو شريك منصة البودكاست الخاص بهم. إذا كنت تعتقد أن شخصًا ما يستخدم عملك المحمي بحقوق الطبع والنشر دون إذنك، فيمكنك اتباع العملية الموضحة هنا https://ar.player.fm/legal.
Tresorit's own produced podcast, bringing you biweekly insights on business, security and technology. If you have any questions or feedback, please write to us at podcast@tresorit.com.
…
continue reading
65 حلقات
وسم كل الحلقات كغير/(كـ)مشغلة
Manage series 2769887
المحتوى المقدم من Tresorit. يتم تحميل جميع محتويات البودكاست بما في ذلك الحلقات والرسومات وأوصاف البودكاست وتقديمها مباشرة بواسطة Tresorit أو شريك منصة البودكاست الخاص بهم. إذا كنت تعتقد أن شخصًا ما يستخدم عملك المحمي بحقوق الطبع والنشر دون إذنك، فيمكنك اتباع العملية الموضحة هنا https://ar.player.fm/legal.
Tresorit's own produced podcast, bringing you biweekly insights on business, security and technology. If you have any questions or feedback, please write to us at podcast@tresorit.com.
…
continue reading
65 حلقات
كل الحلقات
×1 How Engage helps teams scale client collaboration securely 18:19
18:19
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب18:19
It’s been 5 months since Tresorit Engage launched, offering organizations a new way to manage client and partner collaboration securely and efficiently. In this time, teams across industries have begun to discover the real-world benefits of customizable data rooms offering transparent task management and seamless, secure information sharing. This podcast highlights practical insights from actual projects, showing how Engage not only protects sensitive data but also streamlines digital workflows and improves client engagement. What you will learn: How to centralize project workflows and client communication securely Ways Engage improves transparency, efficiency, and client experience Engage in action: learn from a real project example Meet the speakers: Aaron Stillman, Head of Product Marketing, Tresorit Aaron is a dynamic and seasoned leader, possessing more than 15 years of experience in the B2B SaaS sector across diverse industries. His expertise lies in crafting compelling narratives and devising effective go-to-market strategies which empower companies to thrive and drive innovation, all while fostering a culture of enjoyment and creativity. Mick Deben MSc., Senior Cybersecurity Consultant, DMC Group Mick is a passionate cybersecurity consultant who aids organizations in defending their assets against cyber threats. He also researches cybercrime and when he's not defending or researching, he's at home with his four kids, who keep him motivated to make the internet safer for everyone. Find out more at www.tresorit.com…
1 A year of NIS2 in action: Bridging policy and practice 28:25
28:25
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب28:25
Key insights and practical tips from the first year of NIS2 to help improve your cybersecurity, compliance, and supply chain resilience. It’s been nearly a year since NIS2 came into force, marking a significant shift in how organizations approach cybersecurity and risk management. The first year has brought valuable lessons, revealed common pitfalls, and highlighted the importance of proactive, well-aligned technical and organizational measures — especially when it comes to supply chain resilience and regulatory compliance. What you will learn: *Stock taking and lessons learned from the first year of NIS2 implementation *Practical steps for improving compliance and security posture with special focus on the supply chain *Effective technical and organizational measures to avoid common pitfalls and meet NIS2 standards Meet the Speakers: Turul Balogh, Group Information Security and Data Protection Officer, Tresorit For the past 10 years, Turul has been helping companies achieve their business goals more effectively and efficiently — both strategically and tactically — while ensuring the right level of IT, data protection, and information security. Koen Verbeke, Lecturer & Researcher at Howest & Lead Auditor at Brand Compliance Koen is a data protection and information security expert. As former CTO at CRANIUM, he led knowledge and solution development and built the company’s cybersecurity practice. He now conducts certification audits to support organizations on their path to NIS2 compliance. Koen also lectures and conducts research at Howest, a Belgian university of applied sciences, where he founded the spin-off NetGuard. Find out more at www.tresorit.com…
1 My Data Room, your Patient Portal: How Dr. Shields uses Engage rooms for secure patient engagement 32:09
32:09
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب32:09
My Data Room, your Patient Portal What if every patient had a dedicated, secure digital space — designed just for them? Join us to hear how Dr. Shields uses Tresorit Engage to turn virtual data rooms into personalized patient portals, enabling secure, transparent communication and document sharing throughout the care journey. From onboarding and consent forms to care plans, Engage rooms give patients one place to access what matters — while ensuring sensitive data stays protected. What you'll learn: How Dr. Shields uses Engage rooms to simplify secure, compliant collaboration with patients Why virtual data rooms are the next step beyond traditional EHRs Practical tips for protecting patient data while improving engagement and efficiency Meet the Speakers: Aaron Stillman, Head of Product Marketing, Tresorit Aaron is a dynamic and seasoned leader, possessing more than 15 years of experience in the B2B SaaS sector across diverse industries. His expertise lies in crafting compelling narratives and devising effective go-to-market strategies which empower companies to thrive and drive innovation, all while fostering a culture of enjoyment and creativity. Dr. Jenny Shields, Psychologist and healthcare ethicist, Shields Psychology & Consulting Dr. Jenny Shields is a licensed psychologist and healthcare ethicist specializing in privacy-first mental health care for high-stakes professionals. With a background spanning academic medicine, clinical psychology, and institutional ethics, she brings deep expertise in the unique security, documentation, and compliance needs of healthcare providers navigating burnout, trauma, and organizational complexity. As the founder of a solo practice built around secure, non-networked infrastructure, Dr. Shields actively explores privacy-preserving technologies and workflow solutions that align with both HIPAA and human dignity. She is passionate about helping healthcare leaders and clinicians create systems that are not only compliant, but safe, ethical, and sustainable. Find out more at www.tresorit.com…
1 Introducing Tresorit Engage – Secure, customizable workspaces for seamless client and partner collaboration 19:05
19:05
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب19:05
Join us for an insider’s view at why and how we built Tresorit Engage — our latest solution designed to streamline external collaboration with clients and partners. We’ll walk you through the journey that led to Engage Rooms and how it helps businesses run projects at full speed and collaborate with full confidence. We’ll look into how to spin up data rooms for prospects, clients, and partners, whilst keeping every project on track from onboarding to sign-off — all in one end-to-end encrypted, branded space. Please note that this Podcast does include a demo, if you would like to watch this demo please check out the YouTube video in the Tresorit Insights playlist here: https://www.youtube.com/playlist?list=PL8jhd85gmH1hOsMDJ1NfnsYP2bpVbi2Ed What you will learn: *What is Tresorit Engage and why we built it *Who is Engage built for? *Key features of Engage *How Engage solves your daily challenges and how to get it Meet the Speakers: Stefan Blaschke, Senior Product Manager, Tresorit With over 10 years of experience in SaaS, Stefan’s expertise lies in connecting customer needs with product innovation. As Senior Product Marketing Manager at Tresorit, Stefan focuses on developing solutions that solve real-world problems, meet regulatory requirements, and deliver lasting value. Erzsébet Hartung-Marjai, Senior Product Manager, Tresorit After several years of leading Tresorit’s customer marketing, Böbe now focuses on product development as a Senior Product Manager. She works on designing and refining Tresorit’s secure and user-friendly solutions that help simplify your everyday workflows. Find out more at www.tresorit.com…
1 Überblick über das Webinar: Rechtskonform und wettbewerbsfähig bleiben: NIS2-Konformität für KMU im Unternehmens-Ökosystem 35:48
35:48
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب35:48
Überblick über das Webinar: Rechtskonform und wettbewerbsfähig bleiben: NIS2-Konformität für KMU im Unternehmens-Ökosystem Die zweite EU-Richtlinie zur Netzwerk- und Informationssicherheit (NIS 2) ist nun in Kraft und von der Richtlinie betroffene Großunternehmen arbeiten intensiv daran, deren strenge Auflagen zu erfüllen. Was sind jedoch die Konsequenzen für kleinere Unternehmen im Supplier-Netzwerk? Für KMUs geht es nicht nur um die Erfüllung von Compliance-Anforderungen. Die Einhaltung von NIS-2-Prinzipien, selbst wenn diese nicht gesetzlich vorgeschrieben sind, kann einen strategischen Vorteil verschaffen, indem die betriebliche Effizienz angekurbelt und Ihr Unternehmen zu einem attraktiveren Partner im Business Ecosystem gemacht wird. Die zentralen Punkte: Die Auswirkung von NIS 2 auf KMUs verstehen Praktische Schritte für die Einhaltung von NIS 2, um wettbewerbsfähig und sicher zu bleiben Das Vertrauen von Großunternehmen in Ihr KMU stärken, indem Sie Ihr Engagement in Sachen Sicherheit und Compliance unter Beweis stellen Ihre Moderatoren: Stefan Blaschke, Leitender Produktmanager, Tresorit Mit über 10 Jahren Erfahrung in SaaS-Unternehmen liegt Stefans Expertise darin, die Lücke zwischen Kundenbedürfnissen und Produktinnovation zu schließen. Bei Tresorit stellt Stefan sicher, dass jede von uns entwickelte Lösung reale Herausforderungen angeht, regulatorische Anforderungen erfüllt und sinnvollen, langfristigen Wert schafft. Fokko Oldewurtel, Domenig & Partner Fokko Oldewurtel ist ein Rechtsanwalt und zertifizierter Datenschutz-Rechtsexperte, der sich auf die Bereiche IT, IP, Datenschutzgesetze und Cybersicherheit spezialisiert hat. Er veröffentlicht regelmäßig Blogbeiträge zu diesen Schwerpunkten und tritt in den Medien als Experte auf. Fokko Oldewurtel berät Großunternehmen, KMUs, Behörden und Start-ups in Rechtsfragen bezüglich Digitalisierung und Datenschutz. Find out more at www.tresorit.com…
1 Regulations, not restrictions: How compliance can drive security & business growth 21:53
21:53
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب21:53
Compliance with regulations like GDPR, NIS2, or DORA is often seen as a burden, adding complexity and restrictions to business operations. But what if compliance could actually enhance security, streamline workflows, and build trust with customers? In this podcast we explore how businesses can go beyond a checkbox approach to compliance and turn regulatory requirements into a competitive advantage. We’ll also discuss the growing importance of data residency and why where your data is stored matters just as much as how it’s protected. What you will learn: *How to implement security measures that go beyond compliance to strengthen business resilience. *Practical strategies to meet security requirements without disrupting workflows. *The critical role of data residency and how to make informed decisions about data storage. Find out more at www.tresorit.com…
1 Data exchange in Healthcare: protecting organizations and patients 31:30
31:30
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب31:30
The healthcare sector faces unique challenges when it comes to secure data exchange. Sensitive patient information, compliance with stringent regulations, and growing cyber threats require organizations to adopt robust solutions to safeguard their operations and patient trust. In this webinar, we’ll discuss how healthcare organizations can protect themselves and their patients by leveraging secure data practices. Whether you’re navigating HIPAA, GDPR, or other industry-specific regulations, this session will provide actionable insights to fortify your organization’s data resilience. What You Will Learn: Secure data exchange essentials: Understand the risks, benefits, and tools for safeguarding sensitive patient information. Compliance simplified: Key regulatory requirements like HIPAA, GDPR, and NIS2, and how to meet them effectively. Safe data practices & resilience beyond compliance: Practical steps to protect data and ensure long-term security. Meet the Speakers: Aaron Stillman, Head of Product Marketing, Tresorit Aaron is a dynamic and seasoned leader, possessing more than 15 years of experience in the B2B SaaS sector across diverse industries. His expertise lies in crafting compelling narratives and devising effective go-to-market strategies which empower companies to thrive and drive innovation, all while fostering a culture of enjoyment and creativity. Miguel Gurrola, Managing Partner Conscious Performance GmbH With over 24 years of corporate experience, Miguel has held strategic roles in HR and human capital across diverse industries, including aeronautics, consumer goods, chemical, mental health, mechanical, mining, and pharmaceuticals. He brings more than 30 years of experience in strategic planning, human resources management, leadership development, and change management within international organizations. Find out more at www.tresorit.com…
1 DORA: Are you late to the party? A critical review of the DORA requirements and the importance of being DORA compliant. 28:38
28:38
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب28:38
Digital Operational Resilience Act (DORA), is now mandatory for financial firms as of January 2025. Designed to fortify the information and communication technology (ICT) posture of the financial sector, DORA aims to ensure organizations can withstand, recover, and thrive after cyber disruptions. Now that the deadline has come and gone, where does your business stand? Whether you’re on track, behind, or just starting, this session is your guide to achieve and maintain compliance with the regulation moving forward. What you will learn: A breakdown of DORA’s key requirements Steps to catch up if you missed the deadline How to maintain compliance Meet the Speakers: Aaron Stillman, Head of Product Marketing, Tresorit Aaron is a dynamic and seasoned leader, possessing more than 15 years of experience in the B2B SaaS sector across diverse industries. His expertise lies in crafting compelling narratives and devising effective go-to-market strategies which empower companies to thrive and drive innovation, all while fostering a culture of enjoyment and creativity. Ben de la Salle, Director, ICA Consultancy Ltd Ben de la Salle is the founder of ICA Consultancy, a firm that provides information/cyber security and Data Protection consultancy services, interim and fractional resourcing and specialist security services. Ben’s breadth of experience & industry knowledge spans across roles including Chief Information Security Officer at a financial services group and various other roles at Serco, KPMG and Sun Microsystems, amongst other firms. Find out more at www.tresorit.com…
1 Introducing Tresorit’s Cooperative Link - State of the Union Winter Edition 2024 29:30
29:30
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب29:30
Our business customers have been facing challenges when collaborating on sensitive files with external and internal partners. One-way file sharing was often insufficient for confidential projects that required multiple review cycles Our newest feature addresses this need for a more dynamic way of file collaboration, building on our industry-leading security features and ensuring that shared files are encrypted – both when sent out and when received. This new development goes a step further in making two-way file sharing and reviewing easier and smoother than ever – all with one encrypted link and with no registration needed for external partners. We can’t wait to share our newest feature with you! Join us to learn more about: Why and when businesses need secure channels for two-way collaboration How users and collaborators – even without a Tresorit account – can share and receive updated files via one secure link How they can maintain control and visibility over version history Meet the Speakers: Sarolta Gájer, Product Marketing Analyst, Tresorit Sarolta is a Product Marketing Analyst at Tresorit, with 15 years of diverse professional experience. With 1 year in product marketing and previous roles in HR and Account-Based Marketing, Sarolta is passionate about differentiating Tresorit’s offerings in a competitive market and empowering sales and marketing teams to drive success. Miguel Gurrola, Managing Partner Conscious Performance With over 24 years of corporate experience, Miguel has held strategic roles in HR and human capital across diverse industries, including aeronautics, consumer goods, chemical, mental health, mechanical, mining, and pharmaceuticals. He brings more than 30 years of experience in strategic planning, human resources management, leadership development, and change management within international organizations. Find out more at www.tresorit.com…
1 How SMEs can stay legal & efficient in the enterprise supplier network & pragmatically adopt NIS2 34:59
34:59
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب34:59
The Network and Information Security Directive 2 (NIS2) is now in effect, and larger enterprises, affected by the regulation, are working hard on meeting its stringent requirements. But where does that leave smaller organizations in the supply chain? For SMEs, it's not just about meeting compliance mandates. Following NIS2 principles, even if not required by law, can offer a strategic advantage—boosting operational efficiency and making you a more attractive partner in the enterprise ecosystem. Key Takeaways: Understanding NIS2’s impact on SMEs Practical steps for aligning with NIS2 to stay competitive and secure Enhancing trust with larger organizations by demonstrating a commitment to security and compliance Meet the Speakers: Boglárka Fekecs, Legal Counsel, Tresorit Boglarka Fekecs has worked as Legal Counsel in the tech industry for the past five years. At Tresorit, she helps ensure compliance with the evolving legislative landscape, with a particular focus on data protection and technology-related regulations. Fokko Oldewurtel, Domenig & Partner Fokko Oldewurtel is attorney at law and certified data protection law expert. He specializes in IT, IP and data protection law as well as cybersecurity. He regularly publishes blog posts in his areas of specialization and appears in the media as an expert. Fokko Oldewurtel advises corporations, SMEs, public authorities and start-ups on legal issues relating to digitalization and data protection. Find out more at www.tresorit.com…
1 Working together and keeping data apart: unlocking the power of Data Rooms 32:18
32:18
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب32:18
Whether you are working in the finance, healthcare, legal or manufacturing industries, sharing data with multiple external associates is part of your daily life. Fact. In a compliance focused-environment, how do you ensure you remain compliant and efficient whilst honoring the integrity of third-party data? Look no further, data rooms are here to save the day. We will look at the challenges of collaborating whilst adhering to strict data segregation requirements with Cyber Security expert Marton Miklos from ACPM IT. From GDPR to NIS2, we will provide insights into how you can stay efficient while giving your clients and partners the confidentiality they deserve? Meet the Speakers: Aaron Stillman, Head of Product Marketing, Tresorit Aaron is a dynamic and seasoned leader, possessing more than 15 years of experience in the B2B SaaS sector across diverse industries. His expertise lies in crafting compelling narratives and devising effective go-to-market strategies which empower companies to thrive and drive innovation, all while fostering a culture of enjoyment and creativity. Miklós Márton, Founder & MD, ACPM IT With over 20 years of experience in IT Project Management and IT Audit, Marton provides expert advice in IT consulting to major corporations, financial entities and government organizations. His particular focus is in IT Security and Business Intelligence. Find out more at www.tresorit.com…
1 What you need to know about NIS2 and how to prepare 30:36
30:36
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب30:36
In this podcast, we will delve into the key elements of NIS2 and explore its far-reaching impact on organizations. Our experts will provide a comprehensive overview of the Directive and highlight the steps organizations need to take to achieve compliance. What you will learn: Understanding of the core objectives and requirements of NIS2, and which sectors and types of organizations are affected What steps to take to assess and enhance your organization's cybersecurity posture, together with best practices for implementing NIS2 compliance measures How to prepare for audits and reporting obligations under NIS2 and what role your management and staff will play in maintaining compliance While the specific implementation of NIS2 may vary from country to country, this webinar will provide you with a solid foundation to navigate the Directive’s key requirements and essential steps to take towards compliance. Meet the Speakers: Turul Balogh, Group Information Security and Data Protection Officer, Tresorit For the past 10 years, Turul has been helping companies achieve their business goals more effectively and efficiently on both a strategical and tactical level whilst ensuring the appropriate level of IT, data protection and information security. Koen Verbeke, CTO, Cranium Koen began his career as a consultant, gaining experience primarily in the life sciences and fintech industries. He has served for several years as a Data Protection Officer and Information Security Officer at multiple organizations. In 2022, he had the opportunity to lead CRANIUM’s security department, where he was responsible for sales, account management, and driving further growth. Currently, he oversees the areas of knowledge management, solution development, and service delivery. In this capacity, he contributes to shaping the strategy for addressing current issues such as the AI Act and NIS2. Thank you for your help in advance! Confluence content Find out more at www.tresorit.com…
1 Data Security Strategies for the Finance Industry 36:04
36:04
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب36:04
In this webinar we will explore the data security challenges faced by the financial industry and how finance organizations can improve productivity using collaborative tools. What you will learn: Pitfalls and challenges to avoid when ensuring data security in the Finance industry How Finance professionals can save valuable time and resources while ensuring compliance and confidentiality throughout the due diligence lifecycle. How Data rooms can provide a secure, efficient, and collaborative platform for managing critical financial transactions and documents. Meet the Speakers: Aaron Stillman, Head of Product Marketing, Tresorit Aaron is a dynamic and seasoned leader, possessing more than 15 years of experience in the B2B SaaS sector across diverse industries. His expertise lies in crafting compelling narratives and devising effective go-to-market strategies, which empower companies to thrive and drive innovation, all while fostering a culture of enjoyment and creativity. Dr Lisa McKee, Founding Partner at American Security and Privacy Dr. Lisa McKee has over 20 years of industry experience. She provides services, assessments, training, program development and leadership as a virtual Data Protection Officer (vDPO) for companies globally. Lisa has a PhD in Cyber Defense with an emphasis in Privacy. She is a highly regarded privacy expert and international speaker and event keynoter. As a member of the Accredited Standards Committee X9, she provides input on industry standards. As an APMG ISACA Certified Trainer, she is passionate about privacy and volunteers on boards for several professional groups, mentors, and adjunct professor for graduate students. She has authored several publications including a Data Privacy Management textbook. Find out more at www.tresorit.com…
1 How to leverage compliance for success 41:13
41:13
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب41:13
Learn how compliance can be a powerful driver of business growth. When digital rules and regulations seem to be increasing every day, it is easy to lose sight of the benefits that can be gained from living by them. See by Bavo Van den Heuvel, CEO of Cranium, share how compliance can elevate your brand and drive revenue, streamline processes, and boost productivity. Say goodbye to the notion that compliance is a hassle, and learn how it can be a strategic asset that propels your business forward. Don't miss this opportunity to uncover the untapped potential within your organization. What you will learn: How internal compliance review and investigation can support your business processes How the action plans of IT, facility management, environment, HR and others, can make your compliance more efficient How there can be a “return on compliance” Meet the Speakers: Peter Budai, CTO, Tresorit Peter Budai is a Chief Technology Officer (CTO) renowned for his expertise in developing secure solutions that rely on strong end-to-end encryption. With a strong focus on both security and usability, Peter enables organizations to protect their data while maintaining exceptional user experiences. Bavo Van den Heuvel, Co-Founder and Partner at Cranium Bavo started his career in biometrics in 1996, started working in security afterwards and is a full time privacy expert since 2004. Translating the data protection needs between legal/business and IT-(security) people is his daily challenge at Cranium. Find out more at www.tresorit.com…
1 Neue Funktionen von Tresorit (Spring Updates, 2024) 26:55
26:55
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب26:55
Entdecken Sie die neuesten Updates aus der Entwicklungsabteilung von Tresorit und werfen Sie einen Blick auf die Roadmap für 2024. Find out more at www.tresorit.com
u
under CTRL
1 New Features and Functions of Tresorit (Spring Updates, 2024) 31:42
31:42
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب31:42
Discover the latest updates from Tresorit's R&D department and take a look at the roadmap for 2024. Find out more at www.tresorit.com
u
under CTRL
1 IT Security: How encryption can protect - and deceive you 29:27
29:27
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب29:27
Many companies promise to offer robust E2EE, but under the hood, the level of protection may not live up to the promises. Find out more at www.tresorit.com
u
under CTRL
Find out more at www.tresorit.com
u
under CTRL
1 How to fortify your security with your workforce 37:10
37:10
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب37:10
Join our webinar, with Sjoerd van den Bedem, IT Manager, Northwave Cybersecurity, where we will have a look at the critical junction of security and productivity with examples from Sjoerd’s broad experience helping companies fortify their security infrastructure.🛡️ From phishing link victims to ransomware scenarios, we'll explore real-life data breach examples highlighting how harnessing your workforce can be your greatest fortification. Through these examples, we aim to provide tangible insights into the challenges faced by organizations and the strategies employed to mitigate risks effectively. We'll shed light on the connection between Compliance and Security and have a look at the ways your organization can stay secure without sacrificing productivity. What you will learn: Strategies for maintaining an efficient and functional workforce Best practices in establishing cross-functional, collaboration Real life examples of what to avoid Insights into the misconceptions surrounding compliance and productivity Meet our Speakers: Miklós Dénes, Head of Customer Service, Tresorit Miklos is a charismatic Customer Service and Success lead renowned for his expertise in elevating customer support. With a wealth of experience in the tech industry and a passion for ensuring customer satisfaction, he has been instrumental in shaping Tresorit's customer service division in the last 10 years. Sjoerd van den Bedem, IT Manager, Northwave Cybersecurity Sjoerd is an expert in managing large technical eco-systems and cybersecurity. He loves to continually improve stability, scalability and security in larger environments. Currently he secures the IT of the European company Northwave Cybersecurity. He is flown in for complex cyber incidents as a Senior Recovery expert, helping companies get back in business. Find out more at www.tresorit.com…
u
under CTRL
1 Dive into Cybersecurity: Zero Trust Privacy 43:20
43:20
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب43:20
🔒 Listen to Dr. Lisa McKee, Founding Partner at American Security & Privacy and Aaron Stillman, Tresorit’s Head of Product Marketing as they unravel the intricate relationship between zero trust and privacy. 🛡️ In this episode you’ll learn: Steps to take when reviewing your data strategies Common mistakes to avoid while working with data How to implement Zero Trust Privacy strategies Find out more at www.tresorit.com…
u
under CTRL
1 Tresorit Winter-Updates und Jahresrückblick Beschreibung 30:07
30:07
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب30:07
Find out more at www.tresorit.com
u
under CTRL
1 Tresorit Winter updates and year ahead review 47:31
47:31
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب47:31
Find out more at www.tresorit.com
u
under CTRL
1 Keeping workplace collaboration cybersecure 24:45
24:45
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب24:45
In this episode of Under CTRL, Tresorit’s Chief Revenue Officer, Peter Stössel, is joined by Elisabeth Rötsch, an account executive for secure messaging app Threema. They’ll be discussing why secure communication should be a top priority for modern workforces, and how digitization can improve connectivity for global businesses. The episode will also be digging in to the common problems embedded in mainstream communication apps — including insufficient encryption, lack of compliance, and poor configuration — and talk about how companies can avoid these often-hidden pitfalls. Find out more at www.tresorit.com…
u
under CTRL
1 Sicherheit und Benutzerfreundlichkeit in Harmonie 25:38
25:38
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب25:38
Wie kann Ihr Unternehmen die Sicherheit und Privatsphäre seiner Daten in Übereinstimmung mit aktuellen Datenschutzbestimmungen gewährleisten, ohne seinen Mitarbeitern das Leben – und die interne und externe Zusammenarbeit – schwer zu machen? In dieser gemeinschaftlich von Threema.Work und Tresorit produzierten Podcast-Episode erhalten Sie die Antwort von Elisabeth Rötsch, Account Executive bei Threema, und Peter Stössel, Chief Revenue Officer bei Tresorit. Sie diskutieren die aktuellen Cyberbedrohungen und Datenschutzanforderungen, denen Unternehmen sich gegenübersehen, und wie Ende-zu-Ende-verschlüsselte Lösungen wie Threema.Work und Tresorit mit ihrer breiten Produktpalette benutzerfreundlicher Apps, Integrationen und Add-ons helfen können, Risiken einzudämmen und Compliance mit z. B. der DSGVO, NIS2 und DORA zu erzielen. Anhand von Threemas und Tresorits Entstehungsgeschichte, ihren aktuellen Erfolgskennzahlen und positiven Kundenerfahrungen wird beleuchtet, wie der Schutz von Privatsphäre – ein grundlegendes Menschenrecht und die Mission beider Plattformen – gewährleistet werden kann, ohne dabei die Usability aufs Spiel zu setzen. Während Threema.Work als Messenger-Dienst den Schwerpunkt auf geschützte Unternehmenskommunikation gelegt hat und Tresorits Fokus auf sicheren Datentausch gerichtet ist, haben die Anwendungen in Sachen Bedienbarkeit und Nutzerkomfort ein gemeinsames Ziel: ihren Kunden eine intuitiv nutzbare Ende-zu-Ende-Verschlüsselung mit Zero-Knowledge-Prinzip zu bieten, die sich nahtlos in bereits bestehende Arbeitsabläufe und Systeme einfügt. Sie möchten mehr über Tresorits sicheren Workspace in der Cloud erfahren? Besuchen Sie unsere Webseite oder kontaktieren Sie uns . Lesen Sie die im Podcast erwähnten Beiträge zur Nutzung von Tresorit in Unternehmen und NGOs: Kundenstimme Viessmann Wenn Datenschutz eine Frage von Leben und Tod ist – ein Gespräch mit Menschenrechtsaktivist Ethan Gutmann Folgen Sie uns auf unseren Social-Media-Kanälen: X Facebook Instagram LinkedIn Find out more at www.tresorit.com…
Join Péter Budai, Tresoit’s Chief Product Officer, as he breaks down the data compliance landscape in Europe and the United States and looks at how firms can get the most from their data protection policies. Initially, compliance can seem daunting. But taking the time to evaluate your company’s digital infrastructure isn’t just about managing potential risks — it can also help managers identify bottlenecks, boost everyday office efficiency, and gain an edge over competitors. As well as explaining some key tools that companies can use to meet common data protection laws — including end-to-end encryption, privacy by design, and data minimization — Péter will also discuss how companies can use compliance to build trusting customer relationships with an emphasis on ethical behavior, customer protection, social responsibility. Find out more at www.tresorit.com…
u
under CTRL
1 How to build businesses’ cyber-resilience 51:52
51:52
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب51:52
In this episode of Under CTRL, Tresorit’s Chief Technology Officer, Péter Budai, joins ICA Consultancy’s Ben De La Salle to discuss how organizations can not only withstand cyberattacks, but also recover from them. For truly resilient companies, cyber security isn’t just seen as an IT issue, but as everyone’s responsibility. That’s because the fallout from a digital attack can be felt across an organization, from disrupting workflows to damaging customer trust. We look at how IT teams can prepare for potential cyber events by getting serious about risk assessment, as well as collaborating and building strong company-wide connections. We’ll also talk about the benefits the companies can gain by prioritizing their assets, no matter their organization’s size or budget. Find out more at www.tresorit.com…
u
under CTRL
In this episode of Under CTRL, Tresorit’s Aaron Stillman talks with Jason Keller, digital strategy developer for Vistant, and James Eaton-Lee, CISO for NetHope, on how NGOs can protect their most important assets in the online age. Non-profits are often used to working in demanding environments, but they also face unique challenges in the digital realm. Operating out in the field can strain connectivity, while an ever-changing roster of volunteers, freelancers, and partners poses problems for both security and accessibility. Most worrying of all is the increasing threat of state-backed actors, who can dedicate large amounts of resources to attack or discredit activist groups. Together, Aaron, James, and Jason break down how NGOs can face these threats head-on by investing in technical tools such as encryption, as well as practical measures such as training and usability. We also look at the wider tech landscape, and how investing in security can help non-profits safeguard not only key assets, but also their ethical responsibilities and reputation. Find out more at www.tresorit.com…
u
under CTRL
1 State of the Union: Tresorits aktuelle Features für Sommer 2023 32:41
32:41
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب32:41
Bei Tresorit arbeiten wir ständig hinter den Kulissen an den Funktionen und Lösungen, die Ihre persönlichen Daten schützen. Und da die meisten unserer Verbesserungen auf das Feedback unserer Kunden zurückgehen, stellen wir sicher, dass unsere Nutzer bei der Vorstellung unserer neuesten Updates einen Platz in der ersten Reihe erhalten. Wie immer in unseren State of the Union-Webinaren gehen wir auf die neuesten Tresorit-Releases der letzten sechs Monate ein und geben einen kleinen Ausblick auf das, was als nächstes kommt. In dieser Folge sind Chief Revenue Officer Peter Stössel und die Senior Product Manager David Imre Szarvas und Norbert Hegyaljai anwesend, um über Funktionen wie Tresorit eSign, Ordnerübernahme und -organisation sowie unsere anpassbaren Subdomains zu sprechen. In einer speziellen Fragerunde kommen auch Experten für Cybersicherheit zu Wort, und wir sprechen über einige spannende Neuigkeiten von der RSA-Konferenz in San Francisco. Find out more at www.tresorit.com…
u
under CTRL
1 State of the Union: what’s next for Tresorit in 2023 31:36
31:36
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب31:36
At Tresorit, we’re always working behind the scenes on the features and solutions that keep your personal data safe. And as most of our improvements are driven by customer feedback, we make sure our users get a front-row seat as we unveil our latest updates. As always in our State of the Union webinars, we’ll be diving into the latest Tresorit releases from the past six months, and getting a small preview of what’s coming next. In this episode, chief revenue officer Peter Stössel and senior product managers David Imre Szarvas and Norbert Hegyaljai are all on hand to discuss features such as Tresorit eSign, folder takeovers and organization, and our customizable subdomains. We also hear from cybersecurity professionals in a special Q&A session, and talk about some exciting news from the RSA conference in San Francisco. Find out more at www.tresorit.com…
u
under CTRL
1 When data privacy means life or death, with Ethan Gutmann 1:27:17
1:27:17
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب1:27:17
Across the globe, governments are using cutting-edge technology to surveil their citizens en masse. In oppressive or autocratic regimes, state security services regularly exploit tools such as facial recognition and GPS tracking to find and imprison political dissidents. Luckily, digital innovation is also unlocking new possibilities for human rights defenders who need to protect both themselves and the vital testimonies they gather. In this episode, researcher, author, and Nobel prize-nominee Ethan Gutmann joins Tresorit’s Stefan Killer-Haug to discuss how end-to-end encryption and zero-knowledge principles can help human rights advocates to carry out their important work. As well as recounting his personal experiences of evading state surveillance while gathering evidence of China’s forced organ harvesting program, Ethan discusses the solutions he’s found to protect the lives of those fleeing persecution — and what the future could hold for human rights defenders in a world of AI. Find out more at www.tresorit.com…
u
under CTRL
Vertrauen ist das Herzstück produktiver Geschäftsbeziehungen. Doch die Verbraucher zögern oft, ihr Vertrauen in die digitalen Technologien zu setzen, die moderne und bahnbrechende Unternehmen vorantreiben. In dieser Folge setzt sich Stefan Killer-Haug von Tresorit mit Nicolas Zahn von der Swiss Digital Initiative zusammen, um über die Besonderheiten des digitalen Vertrauens zu sprechen und zu erklären, warum der Aufbau von Verbrauchervertrauen entscheidend ist, wenn Unternehmen die Vorteile der Spitzentechnologie wirklich nutzen wollen. Wir gehen auch auf einige der wichtigsten Themen ein, die den Umgang von Unternehmen mit Daten heute und in Zukunft bestimmen: von der Frage, wie sich die Vorstellung von digitalem Vertrauen in den verschiedenen internationalen Märkten unterscheidet, bis hin zum Erhalt des Kundenvertrauens in einer Welt der KI. Wenn Sie in Zukunft mehr von unseren Webinaren sehen möchten, vergessen Sie nicht, sich hier beim LinkedIn-Kanal von Tresorit anzumelden. Find out more at www.tresorit.com…
u
under CTRL
1 How companies can go beyond end-to-end encryption 31:17
31:17
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب31:17
End-to-end encryption (E2EE) is increasingly mainstream, appearing in everything from mass-market instant messaging apps to high-end password managers. But for E2EE to truly reach its potential, it needs to act as just one part of a secure IT infrastructure. And while more IT products than ever before claim to use end-to-end encryption to keep your data safe, many of these solutions also cut vital corners in their cryptography protocols — putting your information at risk. In this special webinar podcast direct from ITsa365, Tresorit co-founder and CISO, Szilveszter Szebeni, talks to Encryption Europe’s James Briscoe about down the different types of encryption, how end-to-end encryption works, and what organizations need to be looking for in their secure IT solutions. We’ll also be discussing why email as we know it today will never be secure, and the myth that easy-to-use products are more vulnerable to cyberattacks. Find out more at www.tresorit.com…
u
under CTRL
1 The work from home guide to cybersecurity 51:52
51:52
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب51:52
In this episode, Tresorit’s Stefan Killer-Haug joins security consultant and private investigator Shannon Miller to discuss the importance of cybersecurity for remote workers and how to your data safe while working from home. The popularity of flexible and hybrid working has exploded in recent years — and if you’re one of the many who has swapped the office for WFH, then it’s never been more important to keep your home network secure. Listen in as Shannon discusses her experiences dealing with cybercriminals in domestic settings, the common ways that scammers and hackers identify their targets, and how easy-to-implement steps such as strong encryption can protect your and your family’s data. We also take a special look at how outside attackers can use the Internet of Things (IoT) — including internet-enabled TVs, gaming consoles, and even smart toasters and refrigerators — to find vulnerabilities in your computer systems. Find out more at www.tresorit.com…
u
under CTRL
1 Webinar - Harnessing the Power of Digital Trust 43:23
43:23
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب43:23
In this podcast episode, Stefan Killer-Haug, Tresorit's representative, and Diana Kaliff, product lead for Swiss Digital Initiative, discussed the importance of digital trust and certifications. They talked about the Swiss Digital Trust label launched in 2022, the importance of building trust online as well as in the physical world, having a user-centric mindset and prioritizing trust for B2B companies. The speakers also noted that with the growing consumer demand for data privacy, businesses need to actively plan for the future and adapt their technology, security, and data protection policies. Find out more at www.tresorit.com…
u
under CTRL
1 Webinar - How eSign keeps your business workflows encrypted and secure 53:15
53:15
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب53:15
Discover how eSignatures improve cybersecurity & streamline workflows in this exciting podcast with Tresorit's CEO. Find out more at www.tresorit.com
u
under CTRL
1 State of the Union: A Look Back at 2022 and a Glimpse into 2023 (German) 24:40
24:40
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب24:40
Erfahren Sie von Ferenc Margel und Peter Stössel die neuesten Verbesserungen und Funktionen der letzten Monate sowie einen Einblick in die Produkt-Roadmap 2023. Find out more at www.tresorit.com
u
under CTRL
1 Webinar: State of the Union - Tresorit’s latest releases for 2023 39:55
39:55
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب39:55
In our latest webinar, we reveal our roadmap for everything from electronic signatures to encrypted e-mail. Our CEO and co-founder István Lám is also on hand to provide the latest insider updates on what’s in store for 2023. Find out more at www.tresorit.com
u
under CTRL
How making IT tools private by design helps businesses flourish? In this episode you'll understand how to to boost efficiency and cybersecurity at your company. Find out more at www.tresorit.com
u
under CTRL
1 Webinar - Tresorit eSign, the simple e-signature solution 28:06
28:06
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب28:06
Tresorit becomes the platform to store sensitive documents, share confidential files and sign all types of business-critical agreements. In this episode you will meet Tresorit eSign, the simple, secure e-signature solution to sign all your confidential documents. Find out more at www.tresorit.com
u
under CTRL
In this webinar, we guide you through Tresorit’s latest updates, from easier admin to encrypted e-mail. Find out more at www.tresorit.com
u
under CTRL
1 Webinar - 3 best practices for legal firms to protect client privilege 22:36
22:36
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب22:36
Legal firms face a raft of digital threats — but almost all can be mitigated with a few simple steps. Find out more at www.tresorit.com
u
under CTRL
1 Webinar - Secure your digital business communications 29:20
29:20
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب29:20
In this webinar, you'll learn: What are the challenges of remote and hybrid ways of working How to safeguard your digital business interactions by means of end-to-end encryption Why Tresorit is a great service for secure file sharing and email Why 7,000 companies have opted for Threema secure messaging Reduce the risks of sharing information with peers, clients and other external parties. Find out more at www.tresorit.com…
u
under CTRL
1 Webinar - Email Encryption in the new normal 31:44
31:44
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب31:44
You’ll learn: Why encrypting emails should be top of your list to protect business data How to secure your hybrid workspace with email encryption How to easily integrate secure emailing to your existing workflows Reduce the risks of sharing information with peers, clients and other external parties. Find out more at www.tresorit.com…
u
under CTRL
1 Matt Mitchell: Making digital hygiene skills available for everyone 48:06
48:06
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب48:06
The current cyberspace landscape is a reflection of the world's social, political, and economic phenomena, mirroring the social inequality, discrimination and privacy violations that occur in society (and, in many cases, amplifying them). In our next podcast episode, we’ll dive deeper into these issues with celebrated human rights defender, hacker, and security trainer Matt Mitchell who, after direct experience in employee-monitoring roles, felt compelled to use his knowledge of surveillance practices for good - by helping high-risk individuals, marginalized groups, and journalists secure their identity and work online. As a tech fellow of the Ford Foundation and co-founder of CryptoHarlem, NYC-based Matt is on a mission to help NGOs and minority communities acquire basic digital hygiene skills and reach their full potential. Listen on for real-life examples and stories of a quest to safeguard privacy of those who need it most. Find out more at www.tresorit.com…
u
under CTRL
1 Ex-NSA engineer Alex White: Mobile security for high-risk individuals 1:04:29
1:04:29
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب1:04:29
The myriad routines connected to them have made smartphones essential tools in our work and private lives. These days, mobile devices account for over half of global web traffic. Unsurprisingly, cybercriminals have also set their sights on this goldmine of data. Consumers and organizations alike have seen a surge in attacks on mobile devices due to the global shift to remote work. To explore the quickly changing landscape of mobile threats and how mobile security can be increased, we spoke to ex-NSA engineer and Glacier’ s co-founder Alex White . Having witnessed the growing demand for security in the mobile market, Glacier’s team is on a mission to offer tailor-made protection for high-risk devices and individuals. If you want to hear more about techniques to protect mobile data, the NSA’s ways of working, and some highlights from the privacy scene, listen to our podcast- hosted by Balázs Judik . Find out more at www.tresorit.com…
مرحبًا بك في مشغل أف ام!
يقوم برنامج مشغل أف أم بمسح الويب للحصول على بودكاست عالية الجودة لتستمتع بها الآن. إنه أفضل تطبيق بودكاست ويعمل على أجهزة اندرويد والأيفون والويب. قم بالتسجيل لمزامنة الاشتراكات عبر الأجهزة.



















