under CTRL

Tresorit

Tresorit's own produced podcast, bringing you biweekly insights on business, security and technology. If you have any questions or feedback, please write to us at podcast@tresorit.com.

  1. 3 HR AGO

    A year of NIS2 in action: Bridging policy and practice

    Key insights and practical tips from the first year of NIS2 to help improve your cybersecurity, compliance, and supply chain resilience. It’s been nearly a year since NIS2 came into force, marking a significant shift in how organizations approach cybersecurity and risk management. The first year has brought valuable lessons, revealed common pitfalls, and highlighted the importance of proactive, well-aligned technical and organizational measures — especially when it comes to supply chain resilience and regulatory compliance. What you will learn: *Stock taking and lessons learned from the first year of NIS2 implementation *Practical steps for improving compliance and security posture with special focus on the supply chain *Effective technical and organizational measures to avoid common pitfalls and meet NIS2 standards Meet the Speakers: Turul Balogh, Group Information Security and Data Protection Officer, Tresorit For the past 10 years, Turul has been helping companies achieve their business goals more effectively and efficiently — both strategically and tactically — while ensuring the right level of IT, data protection, and information security. Koen Verbeke, Lecturer & Researcher at Howest & Lead Auditor at Brand Compliance Koen is a data protection and information security expert. As former CTO at CRANIUM, he led knowledge and solution development and built the company’s cybersecurity practice. He now conducts certification audits to support organizations on their path to NIS2 compliance. Koen also lectures and conducts research at Howest, a Belgian university of applied sciences, where he founded the spin-off NetGuard. Find out more at www.tresorit.com

    28 min
  2. 9 JUL

    My Data Room, your Patient Portal: How Dr. Shields uses Engage rooms for secure patient engagement

    My Data Room, your Patient Portal What if every patient had a dedicated, secure digital space — designed just for them? Join us to hear how Dr. Shields uses Tresorit Engage to turn virtual data rooms into personalized patient portals, enabling secure, transparent communication and document sharing throughout the care journey. From onboarding and consent forms to care plans, Engage rooms give patients one place to access what matters — while ensuring sensitive data stays protected. What you'll learn: How Dr. Shields uses Engage rooms to simplify secure, compliant collaboration with patients Why virtual data rooms are the next step beyond traditional EHRs Practical tips for protecting patient data while improving engagement and efficiency Meet the Speakers: Aaron Stillman, Head of Product Marketing, Tresorit Aaron is a dynamic and seasoned leader, possessing more than 15 years of experience in the B2B SaaS sector across diverse industries. His expertise lies in crafting compelling narratives and devising effective go-to-market strategies which empower companies to thrive and drive innovation, all while fostering a culture of enjoyment and creativity. Dr. Jenny Shields, Psychologist and healthcare ethicist, Shields Psychology & Consulting Dr. Jenny Shields is a licensed psychologist and healthcare ethicist specializing in privacy-first mental health care for high-stakes professionals. With a background spanning academic medicine, clinical psychology, and institutional ethics, she brings deep expertise in the unique security, documentation, and compliance needs of healthcare providers navigating burnout, trauma, and organizational complexity. As the founder of a solo practice built around secure, non-networked infrastructure, Dr. Shields actively explores privacy-preserving technologies and workflow solutions that align with both HIPAA and human dignity. She is passionate about helping healthcare leaders and clinicians create systems that are not only compliant, but safe, ethical, and sustainable.Find out more at www.tresorit.com

    32 min
  3. 15 JUN

    Introducing Tresorit Engage – Secure, customizable workspaces for seamless client and partner collaboration

    Join us for an insider’s view at why and how we built Tresorit Engage — our latest solution designed to streamline external collaboration with clients and partners. We’ll walk you through the journey that led to Engage Rooms and how it helps businesses run projects at full speed and collaborate with full confidence. We’ll look into how to spin up data rooms for prospects, clients, and partners, whilst keeping every project on track from onboarding to sign-off — all in one end-to-end encrypted, branded space. Please note that this Podcast does include a demo, if you would like to watch this demo please check out the YouTube video in the Tresorit Insights playlist here: https://www.youtube.com/playlist?list=PL8jhd85gmH1hOsMDJ1NfnsYP2bpVbi2Ed What you will learn: *What is Tresorit Engage and why we built it *Who is Engage built for? *Key features of Engage *How Engage solves your daily challenges and how to get it Meet the Speakers: Stefan Blaschke, Senior Product Manager, Tresorit With over 10 years of experience in SaaS, Stefan’s expertise lies in connecting customer needs with product innovation. As Senior Product Marketing Manager at Tresorit, Stefan focuses on developing solutions that solve real-world problems, meet regulatory requirements, and deliver lasting value. Erzsébet Hartung-Marjai, Senior Product Manager, Tresorit After several years of leading Tresorit’s customer marketing, Böbe now focuses on product development as a Senior Product Manager. She works on designing and refining Tresorit’s secure and user-friendly solutions that help simplify your everyday workflows.Find out more at www.tresorit.com

    19 min
  4. 30 APR

    Überblick über das Webinar: Rechtskonform und wettbewerbsfähig bleiben: NIS2-Konformität für KMU im Unternehmens-Ökosystem

    Überblick über das Webinar: Rechtskonform und wettbewerbsfähig bleiben: NIS2-Konformität für KMU im Unternehmens-Ökosystem   Die zweite EU-Richtlinie zur Netzwerk- und Informationssicherheit (NIS 2) ist nun in Kraft und von der Richtlinie betroffene Großunternehmen arbeiten intensiv daran, deren strenge Auflagen zu erfüllen. Was sind jedoch die Konsequenzen für kleinere Unternehmen im Supplier-Netzwerk?  Für KMUs geht es nicht nur um die Erfüllung von Compliance-Anforderungen. Die Einhaltung von NIS-2-Prinzipien, selbst wenn diese nicht gesetzlich vorgeschrieben sind, kann einen strategischen Vorteil verschaffen, indem die betriebliche Effizienz angekurbelt und Ihr Unternehmen zu einem attraktiveren Partner im Business Ecosystem gemacht wird.  Die zentralen Punkte: Die Auswirkung von NIS 2 auf KMUs verstehen Praktische Schritte für die Einhaltung von NIS 2, um wettbewerbsfähig und sicher zu bleiben Das Vertrauen von Großunternehmen in Ihr KMU stärken, indem Sie Ihr Engagement in Sachen Sicherheit und Compliance unter Beweis stellen Ihre Moderatoren:  Stefan Blaschke, Leitender Produktmanager, Tresorit Mit über 10 Jahren Erfahrung in SaaS-Unternehmen liegt Stefans Expertise darin, die Lücke zwischen Kundenbedürfnissen und Produktinnovation zu schließen. Bei Tresorit stellt Stefan sicher, dass jede von uns entwickelte Lösung reale Herausforderungen angeht, regulatorische Anforderungen erfüllt und sinnvollen, langfristigen Wert schafft. Fokko Oldewurtel, Domenig & Partner  Fokko Oldewurtel ist ein Rechtsanwalt und zertifizierter Datenschutz-Rechtsexperte, der sich auf die Bereiche IT, IP, Datenschutzgesetze und Cybersicherheit spezialisiert hat. Er veröffentlicht regelmäßig Blogbeiträge zu diesen Schwerpunkten und tritt in den Medien als Experte auf. Fokko Oldewurtel berät Großunternehmen, KMUs, Behörden und Start-ups in Rechtsfragen bezüglich Digitalisierung und Datenschutz.Find out more at www.tresorit.com

    36 min
  5. 27 FEB

    Data exchange in Healthcare: protecting organizations and patients

    The healthcare sector faces unique challenges when it comes to secure data exchange. Sensitive patient information, compliance with stringent regulations, and growing cyber threats require organizations to adopt robust solutions to safeguard their operations and patient trust. In this webinar, we’ll discuss how healthcare organizations can protect themselves and their patients by leveraging secure data practices. Whether you’re navigating HIPAA, GDPR, or other industry-specific regulations, this session will provide actionable insights to fortify your organization’s data resilience. What You Will Learn: Secure data exchange essentials: Understand the risks, benefits, and tools for safeguarding sensitive patient information. Compliance simplified: Key regulatory requirements like HIPAA, GDPR, and NIS2, and how to meet them effectively. Safe data practices & resilience beyond compliance: Practical steps to protect data and ensure long-term security. Meet the Speakers: Aaron Stillman, Head of Product Marketing, Tresorit Aaron is a dynamic and seasoned leader, possessing more than 15 years of experience in the B2B SaaS sector across diverse industries. His expertise lies in crafting compelling narratives and devising effective go-to-market strategies which empower companies to thrive and drive innovation, all while fostering a culture of enjoyment and creativity. Miguel Gurrola, Managing Partner Conscious Performance GmbH With over 24 years of corporate experience, Miguel has held strategic roles in HR and human capital across diverse industries, including aeronautics, consumer goods, chemical, mental health, mechanical, mining, and pharmaceuticals. He brings more than 30 years of experience in strategic planning, human resources management, leadership development, and change management within international organizations.Find out more at www.tresorit.com

    32 min
  6. 2 FEB

    DORA: Are you late to the party? A critical review of the DORA requirements and the importance of being DORA compliant.

    Digital Operational Resilience Act (DORA), is now mandatory for financial firms as of January 2025. Designed to fortify the information and communication technology (ICT) posture of the financial sector, DORA aims to ensure organizations can withstand, recover, and thrive after cyber disruptions. Now that the deadline has come and gone, where does your business stand? Whether you’re on track, behind, or just starting, this session is your guide to achieve and maintain compliance with the regulation moving forward. What you will learn: A breakdown of DORA’s key requirements Steps to catch up if you missed the deadline How to maintain compliance Meet the Speakers: Aaron Stillman, Head of Product Marketing, Tresorit Aaron is a dynamic and seasoned leader, possessing more than 15 years of experience in the B2B SaaS sector across diverse industries. His expertise lies in crafting compelling narratives and devising effective go-to-market strategies which empower companies to thrive and drive innovation, all while fostering a culture of enjoyment and creativity. Ben de la Salle, Director, ICA Consultancy Ltd Ben de la Salle is the founder of ICA Consultancy, a firm that provides information/cyber security and Data Protection consultancy services, interim and fractional resourcing and specialist security services. Ben’s breadth of experience & industry knowledge spans across roles including Chief Information Security Officer at a financial services group and various other roles at Serco, KPMG and Sun Microsystems, amongst other firms.Find out more at www.tresorit.com

    29 min
  7. 03/12/2024

    Introducing Tresorit’s Cooperative Link - State of the Union Winter Edition 2024

    Our business customers have been facing challenges when collaborating on sensitive files with external and internal partners. One-way file sharing was often insufficient for confidential projects that required multiple review cycles Our newest feature addresses this need for a more dynamic way of file collaboration, building on our industry-leading security features and ensuring that shared files are encrypted – both when sent out and when received. This new development goes a step further in making two-way file sharing and reviewing easier and smoother than ever – all with one encrypted link and with no registration needed for external partners. We can’t wait to share our newest feature with you! Join us to learn more about: Why and when businesses need secure channels for two-way collaboration How users and collaborators – even without a Tresorit account – can share and receive updated files via one secure link How they can maintain control and visibility over version history  Meet the Speakers: Sarolta Gájer, Product Marketing Analyst, Tresorit Sarolta is a Product Marketing Analyst at Tresorit, with 15 years of diverse professional experience. With 1 year in product marketing and previous roles in HR and Account-Based Marketing, Sarolta is passionate about differentiating Tresorit’s offerings in a competitive market and empowering sales and marketing teams to drive success. Miguel Gurrola, Managing Partner Conscious Performance With over 24 years of corporate experience, Miguel has held strategic roles in HR and human capital across diverse industries, including aeronautics, consumer goods, chemical, mental health, mechanical, mining, and pharmaceuticals. He brings more than 30 years of experience in strategic planning, human resources management, leadership development, and change management within international organizations. Find out more at www.tresorit.com

    30 min

Ratings & Reviews

5
out of 5
8 Ratings

About

Tresorit's own produced podcast, bringing you biweekly insights on business, security and technology. If you have any questions or feedback, please write to us at podcast@tresorit.com.