Home
Categories
EXPLORE
True Crime
Comedy
Society & Culture
Business
Sports
Technology
Health & Fitness
About Us
Contact Us
Copyright
© 2024 PodJoint
00:00 / 00:00
Podjoint Logo
US
Sign in

or

Don't have an account?
Sign up
Forgot password
https://is1-ssl.mzstatic.com/image/thumb/Podcasts221/v4/f6/2e/cb/f62ecb0c-7ac3-3c4d-3a38-9791b4c5ce7c/mza_4600279956401830785.jpg/600x600bb.jpg
under CTRL
Tresorit
64 episodes
1 month ago
Tresorit's own produced podcast, bringing you biweekly insights on business, security and technology. If you have any questions or feedback, please write to us at podcast@tresorit.com.
Show more...
Technology
Business,
Management
RSS
All content for under CTRL is the property of Tresorit and is served directly from their servers with no modification, redirects, or rehosting. The podcast is not affiliated with or endorsed by Podjoint in any way.
Tresorit's own produced podcast, bringing you biweekly insights on business, security and technology. If you have any questions or feedback, please write to us at podcast@tresorit.com.
Show more...
Technology
Business,
Management
Episodes (20/64)
under CTRL
A year of NIS2 in action: Bridging policy and practice
Key insights and practical tips from the first year of NIS2 to help improve your cybersecurity, compliance, and supply chain resilience. It’s been nearly a year since NIS2 came into force, marking a significant shift in how organizations approach cybersecurity and risk management. The first year has brought valuable lessons, revealed common pitfalls, and highlighted the importance of proactive, well-aligned technical and organizational measures — especially when it comes to supply chain resilience and regulatory compliance. What you will learn: *Stock taking and lessons learned from the first year of NIS2 implementation *Practical steps for improving compliance and security posture with special focus on the supply chain *Effective technical and organizational measures to avoid common pitfalls and meet NIS2 standards Meet the Speakers: Turul Balogh, Group Information Security and Data Protection Officer, Tresorit For the past 10 years, Turul has been helping companies achieve their business goals more effectively and efficiently — both strategically and tactically — while ensuring the right level of IT, data protection, and information security. Koen Verbeke, Lecturer & Researcher at Howest & Lead Auditor at Brand Compliance Koen is a data protection and information security expert. As former CTO at CRANIUM, he led knowledge and solution development and built the company’s cybersecurity practice. He now conducts certification audits to support organizations on their path to NIS2 compliance. Koen also lectures and conducts research at Howest, a Belgian university of applied sciences, where he founded the spin-off NetGuard.
Show more...
1 month ago
28 minutes 25 seconds

under CTRL
My Data Room, your Patient Portal: How Dr. Shields uses Engage rooms for secure patient engagement
My Data Room, your Patient Portal What if every patient had a dedicated, secure digital space — designed just for them? Join us to hear how Dr. Shields uses Tresorit Engage to turn virtual data rooms into personalized patient portals, enabling secure, transparent communication and document sharing throughout the care journey. From onboarding and consent forms to care plans, Engage rooms give patients one place to access what matters — while ensuring sensitive data stays protected. What you'll learn: How Dr. Shields uses Engage rooms to simplify secure, compliant collaboration with patients Why virtual data rooms are the next step beyond traditional EHRs Practical tips for protecting patient data while improving engagement and efficiency Meet the Speakers: Aaron Stillman, Head of Product Marketing, Tresorit Aaron is a dynamic and seasoned leader, possessing more than 15 years of experience in the B2B SaaS sector across diverse industries. His expertise lies in crafting compelling narratives and devising effective go-to-market strategies which empower companies to thrive and drive innovation, all while fostering a culture of enjoyment and creativity. Dr. Jenny Shields, Psychologist and healthcare ethicist, Shields Psychology & Consulting Dr. Jenny Shields is a licensed psychologist and healthcare ethicist specializing in privacy-first mental health care for high-stakes professionals. With a background spanning academic medicine, clinical psychology, and institutional ethics, she brings deep expertise in the unique security, documentation, and compliance needs of healthcare providers navigating burnout, trauma, and organizational complexity. As the founder of a solo practice built around secure, non-networked infrastructure, Dr. Shields actively explores privacy-preserving technologies and workflow solutions that align with both HIPAA and human dignity. She is passionate about helping healthcare leaders and clinicians create systems that are not only compliant, but safe, ethical, and sustainable.
Show more...
3 months ago
32 minutes 9 seconds

under CTRL
Introducing Tresorit Engage – Secure, customizable workspaces for seamless client and partner collaboration
Join us for an insider’s view at why and how we built Tresorit Engage — our latest solution designed to streamline external collaboration with clients and partners. We’ll walk you through the journey that led to Engage Rooms and how it helps businesses run projects at full speed and collaborate with full confidence. We’ll look into how to spin up data rooms for prospects, clients, and partners, whilst keeping every project on track from onboarding to sign-off — all in one end-to-end encrypted, branded space. Please note that this Podcast does include a demo, if you would like to watch this demo please check out the YouTube video in the Tresorit Insights playlist here: https://www.youtube.com/playlist?list=PL8jhd85gmH1hOsMDJ1NfnsYP2bpVbi2Ed What you will learn: *What is Tresorit Engage and why we built it *Who is Engage built for? *Key features of Engage *How Engage solves your daily challenges and how to get it Meet the Speakers: Stefan Blaschke, Senior Product Manager, Tresorit With over 10 years of experience in SaaS, Stefan’s expertise lies in connecting customer needs with product innovation. As Senior Product Marketing Manager at Tresorit, Stefan focuses on developing solutions that solve real-world problems, meet regulatory requirements, and deliver lasting value. Erzsébet Hartung-Marjai, Senior Product Manager, Tresorit After several years of leading Tresorit’s customer marketing, Böbe now focuses on product development as a Senior Product Manager. She works on designing and refining Tresorit’s secure and user-friendly solutions that help simplify your everyday workflows.
Show more...
4 months ago
19 minutes 5 seconds

under CTRL
Überblick über das Webinar: Rechtskonform und wettbewerbsfähig bleiben: NIS2-Konformität für KMU im Unternehmens-Ökosystem
Überblick über das Webinar: Rechtskonform und wettbewerbsfähig bleiben: NIS2-Konformität für KMU im Unternehmens-Ökosystem   Die zweite EU-Richtlinie zur Netzwerk- und Informationssicherheit (NIS 2) ist nun in Kraft und von der Richtlinie betroffene Großunternehmen arbeiten intensiv daran, deren strenge Auflagen zu erfüllen. Was sind jedoch die Konsequenzen für kleinere Unternehmen im Supplier-Netzwerk?  Für KMUs geht es nicht nur um die Erfüllung von Compliance-Anforderungen. Die Einhaltung von NIS-2-Prinzipien, selbst wenn diese nicht gesetzlich vorgeschrieben sind, kann einen strategischen Vorteil verschaffen, indem die betriebliche Effizienz angekurbelt und Ihr Unternehmen zu einem attraktiveren Partner im Business Ecosystem gemacht wird.  Die zentralen Punkte: Die Auswirkung von NIS 2 auf KMUs verstehen Praktische Schritte für die Einhaltung von NIS 2, um wettbewerbsfähig und sicher zu bleiben Das Vertrauen von Großunternehmen in Ihr KMU stärken, indem Sie Ihr Engagement in Sachen Sicherheit und Compliance unter Beweis stellen Ihre Moderatoren:  Stefan Blaschke, Leitender Produktmanager, Tresorit Mit über 10 Jahren Erfahrung in SaaS-Unternehmen liegt Stefans Expertise darin, die Lücke zwischen Kundenbedürfnissen und Produktinnovation zu schließen. Bei Tresorit stellt Stefan sicher, dass jede von uns entwickelte Lösung reale Herausforderungen angeht, regulatorische Anforderungen erfüllt und sinnvollen, langfristigen Wert schafft. Fokko Oldewurtel, Domenig & Partner  Fokko Oldewurtel ist ein Rechtsanwalt und zertifizierter Datenschutz-Rechtsexperte, der sich auf die Bereiche IT, IP, Datenschutzgesetze und Cybersicherheit spezialisiert hat. Er veröffentlicht regelmäßig Blogbeiträge zu diesen Schwerpunkten und tritt in den Medien als Experte auf. Fokko Oldewurtel berät Großunternehmen, KMUs, Behörden und Start-ups in Rechtsfragen bezüglich Digitalisierung und Datenschutz.
Show more...
6 months ago
35 minutes 48 seconds

under CTRL
Regulations, not restrictions: How compliance can drive security & business growth
Compliance with regulations like GDPR, NIS2, or DORA is often seen as a burden, adding complexity and restrictions to business operations. But what if compliance could actually enhance security, streamline workflows, and build trust with customers? In this podcast we explore how businesses can go beyond a checkbox approach to compliance and turn regulatory requirements into a competitive advantage. We’ll also discuss the growing importance of data residency and why where your data is stored matters just as much as how it’s protected. What you will learn: *How to implement security measures that go beyond compliance to strengthen business resilience. *Practical strategies to meet security requirements without disrupting workflows. *The critical role of data residency and how to make informed decisions about data storage.
Show more...
7 months ago
21 minutes 53 seconds

under CTRL
Data exchange in Healthcare: protecting organizations and patients
The healthcare sector faces unique challenges when it comes to secure data exchange. Sensitive patient information, compliance with stringent regulations, and growing cyber threats require organizations to adopt robust solutions to safeguard their operations and patient trust. In this webinar, we’ll discuss how healthcare organizations can protect themselves and their patients by leveraging secure data practices. Whether you’re navigating HIPAA, GDPR, or other industry-specific regulations, this session will provide actionable insights to fortify your organization’s data resilience. What You Will Learn: Secure data exchange essentials: Understand the risks, benefits, and tools for safeguarding sensitive patient information. Compliance simplified: Key regulatory requirements like HIPAA, GDPR, and NIS2, and how to meet them effectively. Safe data practices & resilience beyond compliance: Practical steps to protect data and ensure long-term security. Meet the Speakers: Aaron Stillman, Head of Product Marketing, Tresorit Aaron is a dynamic and seasoned leader, possessing more than 15 years of experience in the B2B SaaS sector across diverse industries. His expertise lies in crafting compelling narratives and devising effective go-to-market strategies which empower companies to thrive and drive innovation, all while fostering a culture of enjoyment and creativity. Miguel Gurrola, Managing Partner Conscious Performance GmbH With over 24 years of corporate experience, Miguel has held strategic roles in HR and human capital across diverse industries, including aeronautics, consumer goods, chemical, mental health, mechanical, mining, and pharmaceuticals. He brings more than 30 years of experience in strategic planning, human resources management, leadership development, and change management within international organizations.
Show more...
8 months ago
31 minutes 30 seconds

under CTRL
DORA: Are you late to the party? A critical review of the DORA requirements and the importance of being DORA compliant.
Digital Operational Resilience Act (DORA), is now mandatory for financial firms as of January 2025. Designed to fortify the information and communication technology (ICT) posture of the financial sector, DORA aims to ensure organizations can withstand, recover, and thrive after cyber disruptions. Now that the deadline has come and gone, where does your business stand? Whether you’re on track, behind, or just starting, this session is your guide to achieve and maintain compliance with the regulation moving forward. What you will learn: A breakdown of DORA’s key requirements Steps to catch up if you missed the deadline How to maintain compliance Meet the Speakers: Aaron Stillman, Head of Product Marketing, Tresorit Aaron is a dynamic and seasoned leader, possessing more than 15 years of experience in the B2B SaaS sector across diverse industries. His expertise lies in crafting compelling narratives and devising effective go-to-market strategies which empower companies to thrive and drive innovation, all while fostering a culture of enjoyment and creativity. Ben de la Salle, Director, ICA Consultancy Ltd Ben de la Salle is the founder of ICA Consultancy, a firm that provides information/cyber security and Data Protection consultancy services, interim and fractional resourcing and specialist security services. Ben’s breadth of experience & industry knowledge spans across roles including Chief Information Security Officer at a financial services group and various other roles at Serco, KPMG and Sun Microsystems, amongst other firms.
Show more...
9 months ago
28 minutes 38 seconds

under CTRL
Introducing Tresorit’s Cooperative Link - State of the Union Winter Edition 2024
Tresorit has always been a Pioneer in creating secure file sharing solutions and our newest feature addresses the challenge of collaborating on sensitive files.
Show more...
11 months ago
29 minutes 30 seconds

under CTRL
How SMEs can stay legal & efficient in the enterprise supplier network & pragmatically adopt NIS2
The Network and Information Security Directive 2 (NIS2) is now in effect, and larger enterprises, affected by the regulation, are working hard on meeting its stringent requirements. But where does that leave smaller organizations in the supply chain? For SMEs, it's not just about meeting compliance mandates. Following NIS2 principles, even if not required by law, can offer a strategic advantage—boosting operational efficiency and making you a more attractive partner in the enterprise ecosystem. Key Takeaways: Understanding NIS2’s impact on SMEs Practical steps for aligning with NIS2 to stay competitive and secure Enhancing trust with larger organizations by demonstrating a commitment to security and compliance Meet the Speakers: Boglárka Fekecs, Legal Counsel, Tresorit Boglarka Fekecs has worked as Legal Counsel in the tech industry for the past five years. At Tresorit, she helps ensure compliance with the evolving legislative landscape, with a particular focus on data protection and technology-related regulations. Fokko Oldewurtel, Domenig & Partner Fokko Oldewurtel is attorney at law and certified data protection law expert. He specializes in IT, IP and data protection law as well as cybersecurity. He regularly publishes blog posts in his areas of specialization and appears in the media as an expert. Fokko Oldewurtel advises corporations, SMEs, public authorities and start-ups on legal issues relating to digitalization and data protection.
Show more...
11 months ago
34 minutes 59 seconds

under CTRL
Working together and keeping data apart: unlocking the power of Data Rooms
Whether you are working in the finance, healthcare, legal or manufacturing industries, sharing data with multiple external associates is part of your daily life. Fact. In a compliance focused-environment, how do you ensure you remain compliant and efficient whilst honoring the integrity of third-party data? Look no further, data rooms are here to save the day. We will look at the challenges of collaborating whilst adhering to strict data segregation requirements with Cyber Security expert Marton Miklos from ACPM IT. From GDPR to NIS2, we will provide insights into how you can stay efficient while giving your clients and partners the confidentiality they deserve? Meet the Speakers: Aaron Stillman, Head of Product Marketing, Tresorit Aaron is a dynamic and seasoned leader, possessing more than 15 years of experience in the B2B SaaS sector across diverse industries. His expertise lies in crafting compelling narratives and devising effective go-to-market strategies which empower companies to thrive and drive innovation, all while fostering a culture of enjoyment and creativity. Miklós Márton, Founder & MD, ACPM IT With over 20 years of experience in IT Project Management and IT Audit, Marton provides expert advice in IT consulting to major corporations, financial entities and government organizations. His particular focus is in IT Security and Business Intelligence.
Show more...
1 year ago
32 minutes 18 seconds

under CTRL
What you need to know about NIS2 and how to prepare
In this podcast, we will delve into the key elements of NIS2 and explore its far-reaching impact on organizations. Our experts will provide a comprehensive overview of the Directive and highlight the steps organizations need to take to achieve compliance.
Show more...
1 year ago
30 minutes 36 seconds

under CTRL
Data Security Strategies for the Finance Industry
In this webinar we will explore the data security challenges faced by the financial industry and how finance organizations can improve productivity using collaborative tools.
Show more...
1 year ago
36 minutes 4 seconds

under CTRL
How to leverage compliance for success
Learn how compliance can be a powerful driver of business growth. When digital rules and regulations seem to be increasing every day, it is easy to lose sight of the benefits that can be gained from living by them.
Show more...
1 year ago
41 minutes 13 seconds

under CTRL
Neue Funktionen von Tresorit (Spring Updates, 2024)
Entdecken Sie die neuesten Updates aus der Entwicklungsabteilung von Tresorit und werfen Sie einen Blick auf die Roadmap für 2024.
Show more...
1 year ago
26 minutes 55 seconds

under CTRL
New Features and Functions of Tresorit (Spring Updates, 2024)
Discover the latest updates from Tresorit's R&D department and take a look at the roadmap for 2024.
Show more...
1 year ago
31 minutes 42 seconds

under CTRL
IT Security: How encryption can protect - and deceive you
Many companies promise to offer robust E2EE, but under the hood, the level of protection may not live up to the promises.
Show more...
1 year ago
29 minutes 27 seconds

under CTRL
Why secure enough is NOT an option
1 year ago
36 minutes 5 seconds

under CTRL
How to fortify your security with your workforce
🛡️From phishing link victims to ransomware scenarios, we'll explore real-life data breach examples highlighting how harnessing your workforce can be your greatest fortification. Through these examples, we aim to provide tangible insights into the challenges faced by organizations and the strategies employed to mitigate risks effectively. Join our webinar, with Sjoerd van den Bedem, IT Manager, Northwave Cybersecurity 🛡️
Show more...
1 year ago
37 minutes 10 seconds

under CTRL
Dive into Cybersecurity: Zero Trust Privacy
Listen to Dr. Lisa McKee, Founding Partner at American Security & Privacy and Aaron Stillman, Tresorit’s Head of Product Marketing as they unravel the intricate relationship between zero trust and privacy.
Show more...
1 year ago
43 minutes 20 seconds

under CTRL
Tresorit Winter-Updates und Jahresrückblick Beschreibung
1 year ago
30 minutes 7 seconds

under CTRL
Tresorit's own produced podcast, bringing you biweekly insights on business, security and technology. If you have any questions or feedback, please write to us at podcast@tresorit.com.