<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:googleplay="http://www.google.com/schemas/play-podcasts/1.0" xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" xmlns:media="http://search.yahoo.com/mrss/" xmlns:podcast="https://podcastindex.org/namespace/1.0">
  <channel>
    <atom:link href="https://feeds.simplecast.com/9hgsF902" rel="self" title="MP3 Audio" type="application/atom+xml"/>
    <atom:link href="https://simplecast.superfeedr.com" rel="hub" xmlns="http://www.w3.org/2005/Atom"/>
    <generator>https://simplecast.com</generator>
    <title>under CTRL</title>
    <description>Tresorit&apos;s own produced podcast, bringing you biweekly insights on business, security and technology. If you have any questions or feedback, please write to us at podcast@tresorit.com.</description>
    <copyright>2023 Tresorit. All rights reserved.</copyright>
    <language>en</language>
    <pubDate>Mon, 16 Feb 2026 13:21:21 +0000</pubDate>
    <lastBuildDate>Mon, 16 Feb 2026 13:21:32 +0000</lastBuildDate>
    <image>
      <link>https://under-ctrl.simplecast.com</link>
      <title>under CTRL</title>
      <url>https://image.simplecastcdn.com/images/6bb881ee-2fad-49e8-b005-03e4cd35d484/eb833e24-8608-464f-864a-16e2b8616610/3000x3000/underctrl-artwork-newlogo-2.jpg?aid=rss_feed</url>
    </image>
    <link>https://under-ctrl.simplecast.com</link>
    <itunes:type>episodic</itunes:type>
    <itunes:summary>Tresorit&apos;s own produced podcast, bringing you biweekly insights on business, security and technology. If you have any questions or feedback, please write to us at podcast@tresorit.com.</itunes:summary>
    <itunes:author>Tresorit</itunes:author>
    <itunes:explicit>false</itunes:explicit>
    <itunes:image href="https://image.simplecastcdn.com/images/6bb881ee-2fad-49e8-b005-03e4cd35d484/eb833e24-8608-464f-864a-16e2b8616610/3000x3000/underctrl-artwork-newlogo-2.jpg?aid=rss_feed"/>
    <itunes:new-feed-url>https://feeds.simplecast.com/9hgsF902</itunes:new-feed-url>
    <itunes:keywords>security, privacy, data security, digital privacy, technology, podcast, cyber security, cloudstorage, cyber threats, collaboration tools, cloud collaboration</itunes:keywords>
    <itunes:owner>
      <itunes:name>Tresorit</itunes:name>
      <itunes:email>spotify-podcaster@tresorit.com</itunes:email>
    </itunes:owner>
    <itunes:category text="Technology"/>
    <itunes:category text="Business">
      <itunes:category text="Management"/>
    </itunes:category>
    <item>
      <guid isPermaLink="false">7ddede64-591b-4c8d-9e38-78d6eefe23ba</guid>
      <title>How project management has become Secwatch’s competitive edge in security consulting</title>
      <description><![CDATA[<p>In this webinar, Secwatch shares how they transformed their security consulting delivery by moving away from scattered tools and email-heavy workflows — and why they chose to buy, rather than build, a secure data room. </p><p>Managing hundreds of penetration tests alongside other security projects each year means handling a large volume of highly sensitive data, tight compliance requirements, and very different client expectations. In this webinar, Secwatch shares how they transformed their security consulting delivery by moving away from scattered tools and email-heavy workflows — and why they chose to buy, rather than build, a secure data room. </p><p><strong>What you’ll learn</strong>:</p><p>- Why project management is a critical differentiator in modern security consulting </p><p>- What to consider when deciding between building your own solution or adopting a secure, ready-made product from a trusted provider</p><p>- How Secwatch streamlined their security consulting workflows with Engage</p><p><strong>Meet the speakers:</strong></p><p><strong>Aaron Stillman</strong>, Head of Product Marketing & Lifecycle Management, Tresorit</p><p>Aaron is a dynamic and seasoned leader, possessing more than 15 years of experience in the B2B SaaS sector across diverse industries. His expertise lies in crafting compelling narratives and devising effective go-to-market & growth strategies which empower companies to thrive and drive innovation, all while fostering a culture of enjoyment and creativity.</p><p><strong>Henk-Jan Angerman</strong>, Secwatch founder and Chief Visionary Officer</p><p>Henk-Jan, started his career in 1999 as an engineer in the field of security, mainly around malware, antivirus and firewalls. He founded his first company in 2001, and founded SECWATCH in 2005. Focusing on information security consultancy services, like threat intelligence and hunting, penetration testing and red teaming. He merged the companies in 2019 into SECWATCH BV with a sole focus on information security services.</p>
<p><p>Find out more at www.tresorit.com</p></p>]]></description>
      <pubDate>Mon, 16 Feb 2026 13:21:21 +0000</pubDate>
      <author>spotify-podcaster@tresorit.com (Tresorit)</author>
      <link>https://under-ctrl.simplecast.com/episodes/how-project-management-has-become-secwatchs-competitive-edge-in-security-consulting-BNxGQLnz</link>
      <content:encoded><![CDATA[<p>In this webinar, Secwatch shares how they transformed their security consulting delivery by moving away from scattered tools and email-heavy workflows — and why they chose to buy, rather than build, a secure data room. </p><p>Managing hundreds of penetration tests alongside other security projects each year means handling a large volume of highly sensitive data, tight compliance requirements, and very different client expectations. In this webinar, Secwatch shares how they transformed their security consulting delivery by moving away from scattered tools and email-heavy workflows — and why they chose to buy, rather than build, a secure data room. </p><p><strong>What you’ll learn</strong>:</p><p>- Why project management is a critical differentiator in modern security consulting </p><p>- What to consider when deciding between building your own solution or adopting a secure, ready-made product from a trusted provider</p><p>- How Secwatch streamlined their security consulting workflows with Engage</p><p><strong>Meet the speakers:</strong></p><p><strong>Aaron Stillman</strong>, Head of Product Marketing & Lifecycle Management, Tresorit</p><p>Aaron is a dynamic and seasoned leader, possessing more than 15 years of experience in the B2B SaaS sector across diverse industries. His expertise lies in crafting compelling narratives and devising effective go-to-market & growth strategies which empower companies to thrive and drive innovation, all while fostering a culture of enjoyment and creativity.</p><p><strong>Henk-Jan Angerman</strong>, Secwatch founder and Chief Visionary Officer</p><p>Henk-Jan, started his career in 1999 as an engineer in the field of security, mainly around malware, antivirus and firewalls. He founded his first company in 2001, and founded SECWATCH in 2005. Focusing on information security consultancy services, like threat intelligence and hunting, penetration testing and red teaming. He merged the companies in 2019 into SECWATCH BV with a sole focus on information security services.</p>
<p><p>Find out more at www.tresorit.com</p></p>]]></content:encoded>
      <enclosure length="36012229" type="audio/mpeg" url="https://chrt.fm/track/1A2EF3/cdn.simplecast.com/audio/ae66bc11-4050-400a-9f39-99119f3f24d3/episodes/c9fc05d5-151e-416e-8f8c-af7676ec2dea/audio/fe01cd57-647d-4319-a147-92cf2715919f/default_tc.mp3?aid=rss_feed&amp;feed=9hgsF902"/>
      <itunes:title>How project management has become Secwatch’s competitive edge in security consulting</itunes:title>
      <itunes:author>Tresorit</itunes:author>
      <itunes:duration>00:37:27</itunes:duration>
      <itunes:summary>Discover how Secwatch turned structured, security-first collaboration into a competitive advantage with Tresorit Engage.</itunes:summary>
      <itunes:subtitle>Discover how Secwatch turned structured, security-first collaboration into a competitive advantage with Tresorit Engage.</itunes:subtitle>
      <itunes:keywords>data security, engage, tresorit, collaboration</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>67</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">004deeff-defc-47f1-a203-15f6781053a8</guid>
      <title>How Engage helps teams scale client collaboration securely</title>
      <description><![CDATA[<p>It’s been 5 months since Tresorit Engage launched, offering organizations a new way to manage client and partner collaboration securely and efficiently. In this time, teams across industries have begun to discover the real-world benefits of customizable data rooms offering transparent task management and seamless, secure information sharing.</p><p>This podcast highlights practical insights from actual projects, showing how Engage not only protects sensitive data but also streamlines digital workflows and improves client engagement.</p><p><strong>What you will learn:</strong></p><ul><li>How to centralize project workflows and client communication securely</li><li>Ways Engage improves transparency, efficiency, and client experience</li><li>Engage in action: learn from a real project example</li></ul><p><strong>Meet the speakers:</strong></p><p><strong>Aaron Stillman, Head of Product Marketing,</strong> <strong>Tresorit</strong></p><p>Aaron is a dynamic and seasoned leader, possessing more than 15 years of experience in the B2B SaaS sector across diverse industries. His expertise lies in crafting compelling narratives and devising effective go-to-market strategies which empower companies to thrive and drive innovation, all while fostering a culture of enjoyment and creativity.</p><p><strong>Mick Deben MSc., </strong>Senior Cybersecurity Consultant, DMC Group</p><p>Mick is a passionate cybersecurity consultant who aids organizations in defending their assets against cyber threats. He also researches cybercrime and when he's not defending or researching, he's at home with his four kids, who keep him motivated to make the internet safer for everyone.</p>
<p><p>Find out more at www.tresorit.com</p></p>]]></description>
      <pubDate>Wed, 5 Nov 2025 10:04:50 +0000</pubDate>
      <author>spotify-podcaster@tresorit.com (Tresorit)</author>
      <link>https://under-ctrl.simplecast.com/episodes/66-how-engage-helps-teams-scale-client-collaboration-securely-upktYrit</link>
      <content:encoded><![CDATA[<p>It’s been 5 months since Tresorit Engage launched, offering organizations a new way to manage client and partner collaboration securely and efficiently. In this time, teams across industries have begun to discover the real-world benefits of customizable data rooms offering transparent task management and seamless, secure information sharing.</p><p>This podcast highlights practical insights from actual projects, showing how Engage not only protects sensitive data but also streamlines digital workflows and improves client engagement.</p><p><strong>What you will learn:</strong></p><ul><li>How to centralize project workflows and client communication securely</li><li>Ways Engage improves transparency, efficiency, and client experience</li><li>Engage in action: learn from a real project example</li></ul><p><strong>Meet the speakers:</strong></p><p><strong>Aaron Stillman, Head of Product Marketing,</strong> <strong>Tresorit</strong></p><p>Aaron is a dynamic and seasoned leader, possessing more than 15 years of experience in the B2B SaaS sector across diverse industries. His expertise lies in crafting compelling narratives and devising effective go-to-market strategies which empower companies to thrive and drive innovation, all while fostering a culture of enjoyment and creativity.</p><p><strong>Mick Deben MSc., </strong>Senior Cybersecurity Consultant, DMC Group</p><p>Mick is a passionate cybersecurity consultant who aids organizations in defending their assets against cyber threats. He also researches cybercrime and when he's not defending or researching, he's at home with his four kids, who keep him motivated to make the internet safer for everyone.</p>
<p><p>Find out more at www.tresorit.com</p></p>]]></content:encoded>
      <enclosure length="17659765" type="audio/mpeg" url="https://chrt.fm/track/1A2EF3/cdn.simplecast.com/audio/ae66bc11-4050-400a-9f39-99119f3f24d3/episodes/d73412ca-6f3e-45b1-812e-37d487891131/audio/a61aafa9-378b-477b-8f07-3ef1e240fd61/default_tc.mp3?aid=rss_feed&amp;feed=9hgsF902"/>
      <itunes:title>How Engage helps teams scale client collaboration securely</itunes:title>
      <itunes:author>Tresorit</itunes:author>
      <itunes:duration>00:18:19</itunes:duration>
      <itunes:summary>Key insights and practical tips on using secure data rooms to streamline client collaboration.</itunes:summary>
      <itunes:subtitle>Key insights and practical tips on using secure data rooms to streamline client collaboration.</itunes:subtitle>
      <itunes:keywords>data security, engage, tresorit, collaboration</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>66</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">6df76283-1ee0-49d6-a80d-54d27990930d</guid>
      <title>A year of NIS2 in action: Bridging policy and practice</title>
      <description><![CDATA[Key insights and practical tips from the first year of NIS2 to help improve your cybersecurity, compliance, and supply chain resilience.

It’s been nearly a year since NIS2 came into force, marking a significant shift in how organizations approach cybersecurity and risk management. The first year has brought valuable lessons, revealed common pitfalls, and highlighted the importance of proactive, well-aligned technical and organizational measures — especially when it comes to supply chain resilience and regulatory compliance.

What you will learn:
*Stock taking and lessons learned from the first year of NIS2 implementation
*Practical steps for improving compliance and security posture with special focus on the supply chain
*Effective technical and organizational measures to avoid common pitfalls and meet NIS2 standards

Meet the Speakers:
Turul Balogh, Group Information Security and Data Protection Officer, Tresorit
For the past 10 years, Turul has been helping companies achieve their business goals more effectively and efficiently — both strategically and tactically — while ensuring the right level of IT, data protection, and information security.

Koen Verbeke, Lecturer & Researcher at Howest & Lead Auditor at Brand Compliance
Koen is a data protection and information security expert. As former CTO at CRANIUM, he led knowledge and solution development and built the company’s cybersecurity practice. He now conducts certification audits to support organizations on their path to NIS2 compliance. Koen also lectures and conducts research at Howest, a Belgian university of applied sciences, where he founded the spin-off NetGuard. Find out more at www.tresorit.com
]]></description>
      <pubDate>Tue, 9 Sep 2025 09:31:26 +0000</pubDate>
      <author>spotify-podcaster@tresorit.com (Tresorit)</author>
      <link>https://under-ctrl.simplecast.com/episodes/a-year-of-nis2-in-action-bridging-policy-and-practice-9zqJJJY_</link>
      <enclosure length="27315241" type="audio/mpeg" url="https://chrt.fm/track/1A2EF3/cdn.simplecast.com/audio/ae66bc11-4050-400a-9f39-99119f3f24d3/episodes/d56341b4-809e-4015-ad28-955a1277753a/audio/02ee119d-1c1d-4843-a07c-a63e1083fe41/default_tc.mp3?aid=rss_feed&amp;feed=9hgsF902"/>
      <itunes:title>A year of NIS2 in action: Bridging policy and practice</itunes:title>
      <itunes:author>Tresorit</itunes:author>
      <itunes:duration>00:28:25</itunes:duration>
      <itunes:summary>Key insights and practical tips from the first year of NIS2 to help improve your cybersecurity, compliance, and supply chain resilience.

It’s been nearly a year since NIS2 came into force, marking a significant shift in how organizations approach cybersecurity and risk management. The first year has brought valuable lessons, revealed common pitfalls, and highlighted the importance of proactive, well-aligned technical and organizational measures — especially when it comes to supply chain resilience and regulatory compliance.

What you will learn:
*Stock taking and lessons learned from the first year of NIS2 implementation
*Practical steps for improving compliance and security posture with special focus on the supply chain
*Effective technical and organizational measures to avoid common pitfalls and meet NIS2 standards

Meet the Speakers:
Turul Balogh, Group Information Security and Data Protection Officer, Tresorit
For the past 10 years, Turul has been helping companies achieve their business goals more effectively and efficiently — both strategically and tactically — while ensuring the right level of IT, data protection, and information security.

Koen Verbeke, Lecturer &amp; Researcher at Howest &amp; Lead Auditor at Brand Compliance
Koen is a data protection and information security expert. As former CTO at CRANIUM, he led knowledge and solution development and built the company’s cybersecurity practice. He now conducts certification audits to support organizations on their path to NIS2 compliance. Koen also lectures and conducts research at Howest, a Belgian university of applied sciences, where he founded the spin-off NetGuard.</itunes:summary>
      <itunes:subtitle>Key insights and practical tips from the first year of NIS2 to help improve your cybersecurity, compliance, and supply chain resilience.

It’s been nearly a year since NIS2 came into force, marking a significant shift in how organizations approach cybersecurity and risk management. The first year has brought valuable lessons, revealed common pitfalls, and highlighted the importance of proactive, well-aligned technical and organizational measures — especially when it comes to supply chain resilience and regulatory compliance.

What you will learn:
*Stock taking and lessons learned from the first year of NIS2 implementation
*Practical steps for improving compliance and security posture with special focus on the supply chain
*Effective technical and organizational measures to avoid common pitfalls and meet NIS2 standards

Meet the Speakers:
Turul Balogh, Group Information Security and Data Protection Officer, Tresorit
For the past 10 years, Turul has been helping companies achieve their business goals more effectively and efficiently — both strategically and tactically — while ensuring the right level of IT, data protection, and information security.

Koen Verbeke, Lecturer &amp; Researcher at Howest &amp; Lead Auditor at Brand Compliance
Koen is a data protection and information security expert. As former CTO at CRANIUM, he led knowledge and solution development and built the company’s cybersecurity practice. He now conducts certification audits to support organizations on their path to NIS2 compliance. Koen also lectures and conducts research at Howest, a Belgian university of applied sciences, where he founded the spin-off NetGuard.</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>65</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">9b867286-15a1-4f95-8614-23132d3bf0c5</guid>
      <title>My Data Room, your Patient Portal: How Dr. Shields uses Engage rooms for secure patient engagement</title>
      <description><![CDATA[My Data Room, your Patient Portal
What if every patient had a dedicated, secure digital space — designed just for them?
Join us to hear how Dr. Shields uses Tresorit Engage to turn virtual data rooms into personalized patient portals, enabling secure, transparent communication and document sharing throughout the care journey. From onboarding and consent forms to care plans, Engage rooms give patients one place to access what matters — while ensuring sensitive data stays protected.
What you'll learn:

How Dr. Shields uses Engage rooms to simplify secure, compliant collaboration with patients

Why virtual data rooms are the next step beyond traditional EHRs

Practical tips for protecting patient data while improving engagement and efficiency

Meet the Speakers:

Aaron Stillman, Head of Product Marketing, Tresorit

Aaron is a dynamic and seasoned leader, possessing more than 15 years of experience in the B2B SaaS sector across diverse industries. His expertise lies in crafting compelling narratives and devising effective go-to-market strategies which empower companies to thrive and drive innovation, all while fostering a culture of enjoyment and creativity.

Dr. Jenny Shields, Psychologist and healthcare ethicist, Shields Psychology & Consulting

Dr. Jenny Shields is a licensed psychologist and healthcare ethicist specializing in privacy-first mental health care for high-stakes professionals. With a background spanning academic medicine, clinical psychology, and institutional ethics, she brings deep expertise in the unique security, documentation, and compliance needs of healthcare providers navigating burnout, trauma, and organizational complexity.

As the founder of a solo practice built around secure, non-networked infrastructure, Dr. Shields actively explores privacy-preserving technologies and workflow solutions that align with both HIPAA and human dignity. She is passionate about helping healthcare leaders and clinicians create systems that are not only compliant, but safe, ethical, and sustainable. Find out more at www.tresorit.com
]]></description>
      <pubDate>Wed, 9 Jul 2025 22:00:00 +0000</pubDate>
      <author>spotify-podcaster@tresorit.com (Tresorit)</author>
      <link>https://under-ctrl.simplecast.com/episodes/my-data-room-your-patient-portal-BWLTc__n</link>
      <enclosure length="30930786" type="audio/mpeg" url="https://chrt.fm/track/1A2EF3/cdn.simplecast.com/audio/ae66bc11-4050-400a-9f39-99119f3f24d3/episodes/f53be23e-55e8-491c-87ef-f480ac851d70/audio/889fb5f5-8dfa-4e39-91df-7b688fd38a0d/default_tc.mp3?aid=rss_feed&amp;feed=9hgsF902"/>
      <itunes:title>My Data Room, your Patient Portal: How Dr. Shields uses Engage rooms for secure patient engagement</itunes:title>
      <itunes:author>Tresorit</itunes:author>
      <itunes:duration>00:32:09</itunes:duration>
      <itunes:summary>My Data Room, your Patient Portal
What if every patient had a dedicated, secure digital space — designed just for them?
Join us to hear how Dr. Shields uses Tresorit Engage to turn virtual data rooms into personalized patient portals, enabling secure, transparent communication and document sharing throughout the care journey. From onboarding and consent forms to care plans, Engage rooms give patients one place to access what matters — while ensuring sensitive data stays protected.
What you&apos;ll learn:

How Dr. Shields uses Engage rooms to simplify secure, compliant collaboration with patients

Why virtual data rooms are the next step beyond traditional EHRs

Practical tips for protecting patient data while improving engagement and efficiency

Meet the Speakers:

Aaron Stillman, Head of Product Marketing, Tresorit

Aaron is a dynamic and seasoned leader, possessing more than 15 years of experience in the B2B SaaS sector across diverse industries. His expertise lies in crafting compelling narratives and devising effective go-to-market strategies which empower companies to thrive and drive innovation, all while fostering a culture of enjoyment and creativity.

Dr. Jenny Shields, Psychologist and healthcare ethicist, Shields Psychology &amp; Consulting

Dr. Jenny Shields is a licensed psychologist and healthcare ethicist specializing in privacy-first mental health care for high-stakes professionals. With a background spanning academic medicine, clinical psychology, and institutional ethics, she brings deep expertise in the unique security, documentation, and compliance needs of healthcare providers navigating burnout, trauma, and organizational complexity.

As the founder of a solo practice built around secure, non-networked infrastructure, Dr. Shields actively explores privacy-preserving technologies and workflow solutions that align with both HIPAA and human dignity. She is passionate about helping healthcare leaders and clinicians create systems that are not only compliant, but safe, ethical, and sustainable.</itunes:summary>
      <itunes:subtitle>My Data Room, your Patient Portal
What if every patient had a dedicated, secure digital space — designed just for them?
Join us to hear how Dr. Shields uses Tresorit Engage to turn virtual data rooms into personalized patient portals, enabling secure, transparent communication and document sharing throughout the care journey. From onboarding and consent forms to care plans, Engage rooms give patients one place to access what matters — while ensuring sensitive data stays protected.
What you&apos;ll learn:

How Dr. Shields uses Engage rooms to simplify secure, compliant collaboration with patients

Why virtual data rooms are the next step beyond traditional EHRs

Practical tips for protecting patient data while improving engagement and efficiency

Meet the Speakers:

Aaron Stillman, Head of Product Marketing, Tresorit

Aaron is a dynamic and seasoned leader, possessing more than 15 years of experience in the B2B SaaS sector across diverse industries. His expertise lies in crafting compelling narratives and devising effective go-to-market strategies which empower companies to thrive and drive innovation, all while fostering a culture of enjoyment and creativity.

Dr. Jenny Shields, Psychologist and healthcare ethicist, Shields Psychology &amp; Consulting

Dr. Jenny Shields is a licensed psychologist and healthcare ethicist specializing in privacy-first mental health care for high-stakes professionals. With a background spanning academic medicine, clinical psychology, and institutional ethics, she brings deep expertise in the unique security, documentation, and compliance needs of healthcare providers navigating burnout, trauma, and organizational complexity.

As the founder of a solo practice built around secure, non-networked infrastructure, Dr. Shields actively explores privacy-preserving technologies and workflow solutions that align with both HIPAA and human dignity. She is passionate about helping healthcare leaders and clinicians create systems that are not only compliant, but safe, ethical, and sustainable.</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>64</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">611835d1-89a9-408b-98ce-f239df36adca</guid>
      <title>Introducing Tresorit Engage – Secure, customizable workspaces for seamless client and partner collaboration</title>
      <description><![CDATA[Join us for an insider’s view at why and how we built Tresorit Engage — our latest solution designed to streamline external collaboration with clients and partners.

We’ll walk you through the journey that led to Engage Rooms and how it helps businesses run projects at full speed and collaborate with full confidence. We’ll look into how to spin up data rooms for prospects, clients, and partners, whilst keeping every project on track from onboarding to sign-off — all in one end-to-end encrypted, branded space. Please note that this Podcast does include a demo, if you would like to watch this demo please check out the YouTube video in the Tresorit Insights playlist here: https://www.youtube.com/playlist?list=PL8jhd85gmH1hOsMDJ1NfnsYP2bpVbi2Ed

What you will learn:
*What is Tresorit Engage and why we built it
*Who is Engage built for?
*Key features of Engage
*How Engage solves your daily challenges and how to get it

Meet the Speakers:
Stefan Blaschke, Senior Product Manager, Tresorit
With over 10 years of experience in SaaS, Stefan’s expertise lies in connecting customer needs with product innovation. As Senior Product Marketing Manager at Tresorit, Stefan focuses on developing solutions that solve real-world problems, meet regulatory requirements, and deliver lasting value.

Erzsébet Hartung-Marjai, Senior Product Manager, Tresorit
After several years of leading Tresorit’s customer marketing, Böbe now focuses on product development as a Senior Product Manager. She works on designing and refining Tresorit’s secure and user-friendly solutions that help simplify your everyday workflows. Find out more at www.tresorit.com
]]></description>
      <pubDate>Sun, 15 Jun 2025 22:00:00 +0000</pubDate>
      <author>spotify-podcaster@tresorit.com (Tresorit)</author>
      <link>https://under-ctrl.simplecast.com/episodes/introducing-tresorit-engage-secure-customizable-workspaces-for-seamless-client-and-partner-collaboration-V6UJ5F6u</link>
      <enclosure length="18380824" type="audio/mpeg" url="https://chrt.fm/track/1A2EF3/cdn.simplecast.com/audio/ae66bc11-4050-400a-9f39-99119f3f24d3/episodes/87b3260a-5968-4c2d-beae-6d6e315ed50c/audio/1f062dde-d6d9-45a4-851a-4bb27d20c1b1/default_tc.mp3?aid=rss_feed&amp;feed=9hgsF902"/>
      <itunes:title>Introducing Tresorit Engage – Secure, customizable workspaces for seamless client and partner collaboration</itunes:title>
      <itunes:author>Tresorit</itunes:author>
      <itunes:duration>00:19:05</itunes:duration>
      <itunes:summary>Join us for an insider’s view at why and how we built Tresorit Engage — our latest solution designed to streamline external collaboration with clients and partners.

We’ll walk you through the journey that led to Engage Rooms and how it helps businesses run projects at full speed and collaborate with full confidence. We’ll look into how to spin up data rooms for prospects, clients, and partners, whilst keeping every project on track from onboarding to sign-off — all in one end-to-end encrypted, branded space. Please note that this Podcast does include a demo, if you would like to watch this demo please check out the YouTube video in the Tresorit Insights playlist here: https://www.youtube.com/playlist?list=PL8jhd85gmH1hOsMDJ1NfnsYP2bpVbi2Ed

What you will learn:
*What is Tresorit Engage and why we built it
*Who is Engage built for?
*Key features of Engage
*How Engage solves your daily challenges and how to get it

Meet the Speakers:
Stefan Blaschke, Senior Product Manager, Tresorit
With over 10 years of experience in SaaS, Stefan’s expertise lies in connecting customer needs with product innovation. As Senior Product Marketing Manager at Tresorit, Stefan focuses on developing solutions that solve real-world problems, meet regulatory requirements, and deliver lasting value.

Erzsébet Hartung-Marjai, Senior Product Manager, Tresorit
After several years of leading Tresorit’s customer marketing, Böbe now focuses on product development as a Senior Product Manager. She works on designing and refining Tresorit’s secure and user-friendly solutions that help simplify your everyday workflows.</itunes:summary>
      <itunes:subtitle>Join us for an insider’s view at why and how we built Tresorit Engage — our latest solution designed to streamline external collaboration with clients and partners.

We’ll walk you through the journey that led to Engage Rooms and how it helps businesses run projects at full speed and collaborate with full confidence. We’ll look into how to spin up data rooms for prospects, clients, and partners, whilst keeping every project on track from onboarding to sign-off — all in one end-to-end encrypted, branded space. Please note that this Podcast does include a demo, if you would like to watch this demo please check out the YouTube video in the Tresorit Insights playlist here: https://www.youtube.com/playlist?list=PL8jhd85gmH1hOsMDJ1NfnsYP2bpVbi2Ed

What you will learn:
*What is Tresorit Engage and why we built it
*Who is Engage built for?
*Key features of Engage
*How Engage solves your daily challenges and how to get it

Meet the Speakers:
Stefan Blaschke, Senior Product Manager, Tresorit
With over 10 years of experience in SaaS, Stefan’s expertise lies in connecting customer needs with product innovation. As Senior Product Marketing Manager at Tresorit, Stefan focuses on developing solutions that solve real-world problems, meet regulatory requirements, and deliver lasting value.

Erzsébet Hartung-Marjai, Senior Product Manager, Tresorit
After several years of leading Tresorit’s customer marketing, Böbe now focuses on product development as a Senior Product Manager. She works on designing and refining Tresorit’s secure and user-friendly solutions that help simplify your everyday workflows.</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>62</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">207e3966-ad2c-401f-aecc-4ac7262c9e16</guid>
      <title>Überblick über das Webinar: Rechtskonform und wettbewerbsfähig bleiben: NIS2-Konformität für KMU im Unternehmens-Ökosystem</title>
      <description><![CDATA[Überblick über das Webinar: Rechtskonform und wettbewerbsfähig bleiben: NIS2-Konformität für KMU im Unternehmens-Ökosystem 
 Die zweite EU-Richtlinie zur Netzwerk- und Informationssicherheit (NIS 2) ist nun in Kraft und von der Richtlinie betroffene Großunternehmen arbeiten intensiv daran, deren strenge Auflagen zu erfüllen. Was sind jedoch die Konsequenzen für kleinere Unternehmen im Supplier-Netzwerk?
 Für KMUs geht es nicht nur um die Erfüllung von Compliance-Anforderungen. Die Einhaltung von NIS-2-Prinzipien, selbst wenn diese nicht gesetzlich vorgeschrieben sind, kann einen strategischen Vorteil verschaffen, indem die betriebliche Effizienz angekurbelt und Ihr Unternehmen zu einem attraktiveren Partner im Business Ecosystem gemacht wird.
 Die zentralen Punkte:

Die Auswirkung von NIS 2 auf KMUs verstehen

Praktische Schritte für die Einhaltung von NIS 2, um wettbewerbsfähig und sicher zu bleiben

Das Vertrauen von Großunternehmen in Ihr KMU stärken, indem Sie Ihr Engagement in Sachen Sicherheit und Compliance unter Beweis stellen

Ihre Moderatoren:
 Stefan Blaschke, Leitender Produktmanager, Tresorit

Mit über 10 Jahren Erfahrung in SaaS-Unternehmen liegt Stefans Expertise darin, die Lücke zwischen Kundenbedürfnissen und Produktinnovation zu schließen. Bei Tresorit stellt Stefan sicher, dass jede von uns entwickelte Lösung reale Herausforderungen angeht, regulatorische Anforderungen erfüllt und sinnvollen, langfristigen Wert schafft.


Fokko Oldewurtel, Domenig & Partner
 Fokko Oldewurtel ist ein Rechtsanwalt und zertifizierter Datenschutz-Rechtsexperte, der sich auf die Bereiche IT, IP, Datenschutzgesetze und Cybersicherheit spezialisiert hat. Er veröffentlicht regelmäßig Blogbeiträge zu diesen Schwerpunkten und tritt in den Medien als Experte auf. Fokko Oldewurtel berät Großunternehmen, KMUs, Behörden und Start-ups in Rechtsfragen bezüglich Digitalisierung und Datenschutz. Find out more at www.tresorit.com
]]></description>
      <pubDate>Wed, 30 Apr 2025 22:00:00 +0000</pubDate>
      <author>spotify-podcaster@tresorit.com (Tresorit)</author>
      <link>https://under-ctrl.simplecast.com/episodes/uberblick-uber-das-webinar-rechtskonform-und-wettbewerbsfahig-bleiben-nis2-konformitat-fur-kmu-im-unternehmens-okosystem-TOgi747m</link>
      <enclosure length="34386140" type="audio/mpeg" url="https://chrt.fm/track/1A2EF3/cdn.simplecast.com/audio/ae66bc11-4050-400a-9f39-99119f3f24d3/episodes/7d6aef3b-56b0-4d2e-9491-08b7a67e02d0/audio/b49d55ae-7721-4423-b0a3-5cd024148556/default_tc.mp3?aid=rss_feed&amp;feed=9hgsF902"/>
      <itunes:title>Überblick über das Webinar: Rechtskonform und wettbewerbsfähig bleiben: NIS2-Konformität für KMU im Unternehmens-Ökosystem</itunes:title>
      <itunes:author>Tresorit</itunes:author>
      <itunes:duration>00:35:48</itunes:duration>
      <itunes:summary>Überblick über das Webinar: Rechtskonform und wettbewerbsfähig bleiben: NIS2-Konformität für KMU im Unternehmens-Ökosystem 
 Die zweite EU-Richtlinie zur Netzwerk- und Informationssicherheit (NIS 2) ist nun in Kraft und von der Richtlinie betroffene Großunternehmen arbeiten intensiv daran, deren strenge Auflagen zu erfüllen. Was sind jedoch die Konsequenzen für kleinere Unternehmen im Supplier-Netzwerk?
 Für KMUs geht es nicht nur um die Erfüllung von Compliance-Anforderungen. Die Einhaltung von NIS-2-Prinzipien, selbst wenn diese nicht gesetzlich vorgeschrieben sind, kann einen strategischen Vorteil verschaffen, indem die betriebliche Effizienz angekurbelt und Ihr Unternehmen zu einem attraktiveren Partner im Business Ecosystem gemacht wird.
 Die zentralen Punkte:

Die Auswirkung von NIS 2 auf KMUs verstehen

Praktische Schritte für die Einhaltung von NIS 2, um wettbewerbsfähig und sicher zu bleiben

Das Vertrauen von Großunternehmen in Ihr KMU stärken, indem Sie Ihr Engagement in Sachen Sicherheit und Compliance unter Beweis stellen

Ihre Moderatoren:
 Stefan Blaschke, Leitender Produktmanager, Tresorit

Mit über 10 Jahren Erfahrung in SaaS-Unternehmen liegt Stefans Expertise darin, die Lücke zwischen Kundenbedürfnissen und Produktinnovation zu schließen. Bei Tresorit stellt Stefan sicher, dass jede von uns entwickelte Lösung reale Herausforderungen angeht, regulatorische Anforderungen erfüllt und sinnvollen, langfristigen Wert schafft.


Fokko Oldewurtel, Domenig &amp; Partner
 Fokko Oldewurtel ist ein Rechtsanwalt und zertifizierter Datenschutz-Rechtsexperte, der sich auf die Bereiche IT, IP, Datenschutzgesetze und Cybersicherheit spezialisiert hat. Er veröffentlicht regelmäßig Blogbeiträge zu diesen Schwerpunkten und tritt in den Medien als Experte auf. Fokko Oldewurtel berät Großunternehmen, KMUs, Behörden und Start-ups in Rechtsfragen bezüglich Digitalisierung und Datenschutz.</itunes:summary>
      <itunes:subtitle>Überblick über das Webinar: Rechtskonform und wettbewerbsfähig bleiben: NIS2-Konformität für KMU im Unternehmens-Ökosystem 
 Die zweite EU-Richtlinie zur Netzwerk- und Informationssicherheit (NIS 2) ist nun in Kraft und von der Richtlinie betroffene Großunternehmen arbeiten intensiv daran, deren strenge Auflagen zu erfüllen. Was sind jedoch die Konsequenzen für kleinere Unternehmen im Supplier-Netzwerk?
 Für KMUs geht es nicht nur um die Erfüllung von Compliance-Anforderungen. Die Einhaltung von NIS-2-Prinzipien, selbst wenn diese nicht gesetzlich vorgeschrieben sind, kann einen strategischen Vorteil verschaffen, indem die betriebliche Effizienz angekurbelt und Ihr Unternehmen zu einem attraktiveren Partner im Business Ecosystem gemacht wird.
 Die zentralen Punkte:

Die Auswirkung von NIS 2 auf KMUs verstehen

Praktische Schritte für die Einhaltung von NIS 2, um wettbewerbsfähig und sicher zu bleiben

Das Vertrauen von Großunternehmen in Ihr KMU stärken, indem Sie Ihr Engagement in Sachen Sicherheit und Compliance unter Beweis stellen

Ihre Moderatoren:
 Stefan Blaschke, Leitender Produktmanager, Tresorit

Mit über 10 Jahren Erfahrung in SaaS-Unternehmen liegt Stefans Expertise darin, die Lücke zwischen Kundenbedürfnissen und Produktinnovation zu schließen. Bei Tresorit stellt Stefan sicher, dass jede von uns entwickelte Lösung reale Herausforderungen angeht, regulatorische Anforderungen erfüllt und sinnvollen, langfristigen Wert schafft.


Fokko Oldewurtel, Domenig &amp; Partner
 Fokko Oldewurtel ist ein Rechtsanwalt und zertifizierter Datenschutz-Rechtsexperte, der sich auf die Bereiche IT, IP, Datenschutzgesetze und Cybersicherheit spezialisiert hat. Er veröffentlicht regelmäßig Blogbeiträge zu diesen Schwerpunkten und tritt in den Medien als Experte auf. Fokko Oldewurtel berät Großunternehmen, KMUs, Behörden und Start-ups in Rechtsfragen bezüglich Digitalisierung und Datenschutz.</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>63</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">c51be346-e228-4fa7-9847-2126faf6155b</guid>
      <title>Regulations, not restrictions: How compliance can drive security &amp; business growth</title>
      <description><![CDATA[Compliance with regulations like GDPR, NIS2, or DORA is often seen as a burden, adding complexity and restrictions to business operations. But what if compliance could actually enhance security, streamline workflows, and build trust with customers?

In this podcast we explore how businesses can go beyond a checkbox approach to compliance and turn regulatory requirements into a competitive advantage. We’ll also discuss the growing importance of data residency and why where your data is stored matters just as much as how it’s protected.

What you will learn:
*How to implement security measures that go beyond compliance to strengthen business resilience.
*Practical strategies to meet security requirements without disrupting workflows.
*The critical role of data residency and how to make informed decisions about data storage. Find out more at www.tresorit.com
]]></description>
      <pubDate>Tue, 1 Apr 2025 07:05:56 +0000</pubDate>
      <author>spotify-podcaster@tresorit.com (Tresorit)</author>
      <link>https://under-ctrl.simplecast.com/episodes/regulations-not-restrictions-how-compliance-can-drive-security-business-growth-EEZCZ4ir</link>
      <enclosure length="21032534" type="audio/mpeg" url="https://chrt.fm/track/1A2EF3/cdn.simplecast.com/audio/ae66bc11-4050-400a-9f39-99119f3f24d3/episodes/7194a00d-7899-499e-8f8a-3e10c7acabfd/audio/4eedd612-32df-4c14-97e1-88243ebbcc49/default_tc.mp3?aid=rss_feed&amp;feed=9hgsF902"/>
      <itunes:title>Regulations, not restrictions: How compliance can drive security &amp; business growth</itunes:title>
      <itunes:author>Tresorit</itunes:author>
      <itunes:duration>00:21:53</itunes:duration>
      <itunes:summary>Compliance with regulations like GDPR, NIS2, or DORA is often seen as a burden, adding complexity and restrictions to business operations. But what if compliance could actually enhance security, streamline workflows, and build trust with customers?

In this podcast we explore how businesses can go beyond a checkbox approach to compliance and turn regulatory requirements into a competitive advantage. We’ll also discuss the growing importance of data residency and why where your data is stored matters just as much as how it’s protected.

What you will learn:
*How to implement security measures that go beyond compliance to strengthen business resilience.
*Practical strategies to meet security requirements without disrupting workflows.
*The critical role of data residency and how to make informed decisions about data storage.</itunes:summary>
      <itunes:subtitle>Compliance with regulations like GDPR, NIS2, or DORA is often seen as a burden, adding complexity and restrictions to business operations. But what if compliance could actually enhance security, streamline workflows, and build trust with customers?

In this podcast we explore how businesses can go beyond a checkbox approach to compliance and turn regulatory requirements into a competitive advantage. We’ll also discuss the growing importance of data residency and why where your data is stored matters just as much as how it’s protected.

What you will learn:
*How to implement security measures that go beyond compliance to strengthen business resilience.
*Practical strategies to meet security requirements without disrupting workflows.
*The critical role of data residency and how to make informed decisions about data storage.</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>61</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">5427395d-3524-4279-a4cc-a553dd3aef8f</guid>
      <title>Data exchange in Healthcare: protecting organizations and patients</title>
      <description><![CDATA[The healthcare sector faces unique challenges when it comes to secure data exchange. Sensitive patient information, compliance with stringent regulations, and growing cyber threats require organizations to adopt robust solutions to safeguard their operations and patient trust.
In this webinar, we’ll discuss how healthcare organizations can protect themselves and their patients by leveraging secure data practices. Whether you’re navigating HIPAA, GDPR, or other industry-specific regulations, this session will provide actionable insights to fortify your organization’s data resilience.

What You Will Learn:

Secure data exchange essentials: Understand the risks, benefits, and tools for safeguarding sensitive patient information.

Compliance simplified: Key regulatory requirements like HIPAA, GDPR, and NIS2, and how to meet them effectively.

Safe data practices & resilience beyond compliance: Practical steps to protect data and ensure long-term security.

Meet the Speakers:

Aaron Stillman, Head of Product Marketing, Tresorit

Aaron is a dynamic and seasoned leader, possessing more than 15 years of experience in the B2B SaaS sector across diverse industries. His expertise lies in crafting compelling narratives and devising effective go-to-market strategies which empower companies to thrive and drive innovation, all while fostering a culture of enjoyment and creativity.

Miguel Gurrola, Managing Partner Conscious Performance GmbH

With over 24 years of corporate experience, Miguel has held strategic roles in HR and human capital across diverse industries, including aeronautics, consumer goods, chemical, mental health, mechanical, mining, and pharmaceuticals. He brings more than 30 years of experience in strategic planning, human resources management, leadership development, and change management within international organizations. Find out more at www.tresorit.com
]]></description>
      <pubDate>Thu, 27 Feb 2025 11:25:01 +0000</pubDate>
      <author>spotify-podcaster@tresorit.com (Miguel Gurolla, Aaron Stillman)</author>
      <link>https://under-ctrl.simplecast.com/episodes/data-exchange-in-healthcare-protecting-organizations-and-patients-X7_xlNfr</link>
      <enclosure length="30297463" type="audio/mpeg" url="https://chrt.fm/track/1A2EF3/cdn.simplecast.com/audio/ae66bc11-4050-400a-9f39-99119f3f24d3/episodes/e42685ae-ddad-4f05-893e-6131c23cbde8/audio/3d627e75-4b0f-4da2-acd5-ed9d7ab6bbbb/default_tc.mp3?aid=rss_feed&amp;feed=9hgsF902"/>
      <itunes:title>Data exchange in Healthcare: protecting organizations and patients</itunes:title>
      <itunes:author>Miguel Gurolla, Aaron Stillman</itunes:author>
      <itunes:duration>00:31:30</itunes:duration>
      <itunes:summary>The healthcare sector faces unique challenges when it comes to secure data exchange. Sensitive patient information, compliance with stringent regulations, and growing cyber threats require organizations to adopt robust solutions to safeguard their operations and patient trust.
In this webinar, we’ll discuss how healthcare organizations can protect themselves and their patients by leveraging secure data practices. Whether you’re navigating HIPAA, GDPR, or other industry-specific regulations, this session will provide actionable insights to fortify your organization’s data resilience.

What You Will Learn:

Secure data exchange essentials: Understand the risks, benefits, and tools for safeguarding sensitive patient information.

Compliance simplified: Key regulatory requirements like HIPAA, GDPR, and NIS2, and how to meet them effectively.

Safe data practices &amp; resilience beyond compliance: Practical steps to protect data and ensure long-term security.

Meet the Speakers:

Aaron Stillman, Head of Product Marketing, Tresorit

Aaron is a dynamic and seasoned leader, possessing more than 15 years of experience in the B2B SaaS sector across diverse industries. His expertise lies in crafting compelling narratives and devising effective go-to-market strategies which empower companies to thrive and drive innovation, all while fostering a culture of enjoyment and creativity.

Miguel Gurrola, Managing Partner Conscious Performance GmbH

With over 24 years of corporate experience, Miguel has held strategic roles in HR and human capital across diverse industries, including aeronautics, consumer goods, chemical, mental health, mechanical, mining, and pharmaceuticals. He brings more than 30 years of experience in strategic planning, human resources management, leadership development, and change management within international organizations.</itunes:summary>
      <itunes:subtitle>The healthcare sector faces unique challenges when it comes to secure data exchange. Sensitive patient information, compliance with stringent regulations, and growing cyber threats require organizations to adopt robust solutions to safeguard their operations and patient trust.
In this webinar, we’ll discuss how healthcare organizations can protect themselves and their patients by leveraging secure data practices. Whether you’re navigating HIPAA, GDPR, or other industry-specific regulations, this session will provide actionable insights to fortify your organization’s data resilience.

What You Will Learn:

Secure data exchange essentials: Understand the risks, benefits, and tools for safeguarding sensitive patient information.

Compliance simplified: Key regulatory requirements like HIPAA, GDPR, and NIS2, and how to meet them effectively.

Safe data practices &amp; resilience beyond compliance: Practical steps to protect data and ensure long-term security.

Meet the Speakers:

Aaron Stillman, Head of Product Marketing, Tresorit

Aaron is a dynamic and seasoned leader, possessing more than 15 years of experience in the B2B SaaS sector across diverse industries. His expertise lies in crafting compelling narratives and devising effective go-to-market strategies which empower companies to thrive and drive innovation, all while fostering a culture of enjoyment and creativity.

Miguel Gurrola, Managing Partner Conscious Performance GmbH

With over 24 years of corporate experience, Miguel has held strategic roles in HR and human capital across diverse industries, including aeronautics, consumer goods, chemical, mental health, mechanical, mining, and pharmaceuticals. He brings more than 30 years of experience in strategic planning, human resources management, leadership development, and change management within international organizations.</itunes:subtitle>
      <itunes:keywords>healthcare data security challenges, healthcare data security</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>60</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">8b908ddb-39c3-4014-9056-d42fd5034e16</guid>
      <title>DORA: Are you late to the party? A critical review of the DORA requirements and the importance of being DORA compliant.</title>
      <description><![CDATA[Digital Operational Resilience Act (DORA), is now mandatory for financial firms as of January 2025. Designed to fortify the information and communication technology (ICT) posture of the financial sector, DORA aims to ensure organizations can withstand, recover, and thrive after cyber disruptions.

Now that the deadline has come and gone, where does your business stand? Whether you’re on track, behind, or just starting, this session is your guide to achieve and maintain compliance with the regulation moving forward.

What you will learn:

A breakdown of DORA’s key requirements

Steps to catch up if you missed the deadline

How to maintain compliance

Meet the Speakers:

Aaron Stillman, Head of Product Marketing, Tresorit

Aaron is a dynamic and seasoned leader, possessing more than 15 years of experience in the B2B SaaS sector across diverse industries. His expertise lies in crafting compelling narratives and devising effective go-to-market strategies which empower companies to thrive and drive innovation, all while fostering a culture of enjoyment and creativity.

Ben de la Salle, Director, ICA Consultancy Ltd

Ben de la Salle is the founder of ICA Consultancy, a firm that provides information/cyber security and Data Protection consultancy services, interim and fractional resourcing and specialist security services. Ben’s breadth of experience & industry knowledge spans across roles including Chief Information Security Officer at a financial services group and various other roles at Serco, KPMG and Sun Microsystems, amongst other firms. Find out more at www.tresorit.com
]]></description>
      <pubDate>Sun, 2 Feb 2025 23:00:00 +0000</pubDate>
      <author>spotify-podcaster@tresorit.com (Aaron Stillman, Ben De La Salle)</author>
      <link>https://under-ctrl.simplecast.com/episodes/dora-are-you-late-to-the-party-a-critical-review-of-the-dora-requirements-and-the-importance-of-being-dora-compliant-iAKhlYba</link>
      <enclosure length="27531811" type="audio/mpeg" url="https://chrt.fm/track/1A2EF3/cdn.simplecast.com/audio/ae66bc11-4050-400a-9f39-99119f3f24d3/episodes/a19fd67e-0999-4e7b-ba4c-aa6ef7ae592e/audio/12474a0a-0e66-4951-b0f5-54221d958e22/default_tc.mp3?aid=rss_feed&amp;feed=9hgsF902"/>
      <itunes:title>DORA: Are you late to the party? A critical review of the DORA requirements and the importance of being DORA compliant.</itunes:title>
      <itunes:author>Aaron Stillman, Ben De La Salle</itunes:author>
      <itunes:duration>00:28:38</itunes:duration>
      <itunes:summary>Digital Operational Resilience Act (DORA), is now mandatory for financial firms as of January 2025. Designed to fortify the information and communication technology (ICT) posture of the financial sector, DORA aims to ensure organizations can withstand, recover, and thrive after cyber disruptions.

Now that the deadline has come and gone, where does your business stand? Whether you’re on track, behind, or just starting, this session is your guide to achieve and maintain compliance with the regulation moving forward.

What you will learn:

A breakdown of DORA’s key requirements

Steps to catch up if you missed the deadline

How to maintain compliance

Meet the Speakers:

Aaron Stillman, Head of Product Marketing, Tresorit

Aaron is a dynamic and seasoned leader, possessing more than 15 years of experience in the B2B SaaS sector across diverse industries. His expertise lies in crafting compelling narratives and devising effective go-to-market strategies which empower companies to thrive and drive innovation, all while fostering a culture of enjoyment and creativity.

Ben de la Salle, Director, ICA Consultancy Ltd

Ben de la Salle is the founder of ICA Consultancy, a firm that provides information/cyber security and Data Protection consultancy services, interim and fractional resourcing and specialist security services. Ben’s breadth of experience &amp; industry knowledge spans across roles including Chief Information Security Officer at a financial services group and various other roles at Serco, KPMG and Sun Microsystems, amongst other firms.</itunes:summary>
      <itunes:subtitle>Digital Operational Resilience Act (DORA), is now mandatory for financial firms as of January 2025. Designed to fortify the information and communication technology (ICT) posture of the financial sector, DORA aims to ensure organizations can withstand, recover, and thrive after cyber disruptions.

Now that the deadline has come and gone, where does your business stand? Whether you’re on track, behind, or just starting, this session is your guide to achieve and maintain compliance with the regulation moving forward.

What you will learn:

A breakdown of DORA’s key requirements

Steps to catch up if you missed the deadline

How to maintain compliance

Meet the Speakers:

Aaron Stillman, Head of Product Marketing, Tresorit

Aaron is a dynamic and seasoned leader, possessing more than 15 years of experience in the B2B SaaS sector across diverse industries. His expertise lies in crafting compelling narratives and devising effective go-to-market strategies which empower companies to thrive and drive innovation, all while fostering a culture of enjoyment and creativity.

Ben de la Salle, Director, ICA Consultancy Ltd

Ben de la Salle is the founder of ICA Consultancy, a firm that provides information/cyber security and Data Protection consultancy services, interim and fractional resourcing and specialist security services. Ben’s breadth of experience &amp; industry knowledge spans across roles including Chief Information Security Officer at a financial services group and various other roles at Serco, KPMG and Sun Microsystems, amongst other firms.</itunes:subtitle>
      <itunes:keywords>dora, data security, compliance</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>59</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">e9c2e27c-168f-4103-9f97-456b502f8f12</guid>
      <title>Introducing Tresorit’s Cooperative Link - State of the Union Winter Edition 2024</title>
      <description><![CDATA[<table><tbody><tr><td><p>Our business customers have been facing challenges when collaborating on sensitive files with external and internal partners. One-way file sharing was often insufficient for confidential projects that required multiple review cycles</p><p>Our newest feature addresses this need for a more dynamic way of file collaboration, building on our industry-leading security features and ensuring that shared files are encrypted – both when sent out and when received. This new development goes a step further in making two-way file sharing and reviewing easier and smoother than ever – all with one encrypted link and with no registration needed for external partners.</p><p>We can’t wait to share our newest feature with you! Join us to learn more about:</p><p>Why and when businesses need secure channels for two-way collaboration</p><p>How users and collaborators – even without a Tresorit account – can share and receive updated files via <strong>one secure link</strong></p><p>How they can maintain control and visibility over version history </p><p><strong>Meet the Speakers:</strong></p><p><strong>Sarolta Gájer, Product Marketing Analyst, Tresorit</strong></p><p>Sarolta is a Product Marketing Analyst at Tresorit, with 15 years of diverse professional experience. With 1 year in product marketing and previous roles in HR and Account-Based Marketing, Sarolta is passionate about differentiating Tresorit’s offerings in a competitive market and empowering sales and marketing teams to drive success.</p><p><strong>Miguel Gurrola, Managing Partner Conscious Performance</strong></p><p>With over 24 years of corporate experience, Miguel has held strategic roles in HR and human capital across diverse industries, including aeronautics, consumer goods, chemical, mental health, mechanical, mining, and pharmaceuticals. He brings more than 30 years of experience in strategic planning, human resources management, leadership development, and change management within international organizations.</p></td></tr></tbody></table>
<p><p>Find out more at www.tresorit.com</p></p>]]></description>
      <pubDate>Tue, 3 Dec 2024 23:00:00 +0000</pubDate>
      <author>spotify-podcaster@tresorit.com (Tresorit)</author>
      <link>https://under-ctrl.simplecast.com/episodes/introducing-tresorits-cooperative-link-state-of-the-union-winter-edition-2024-97O_TVMD</link>
      <content:encoded><![CDATA[<table><tbody><tr><td><p>Our business customers have been facing challenges when collaborating on sensitive files with external and internal partners. One-way file sharing was often insufficient for confidential projects that required multiple review cycles</p><p>Our newest feature addresses this need for a more dynamic way of file collaboration, building on our industry-leading security features and ensuring that shared files are encrypted – both when sent out and when received. This new development goes a step further in making two-way file sharing and reviewing easier and smoother than ever – all with one encrypted link and with no registration needed for external partners.</p><p>We can’t wait to share our newest feature with you! Join us to learn more about:</p><p>Why and when businesses need secure channels for two-way collaboration</p><p>How users and collaborators – even without a Tresorit account – can share and receive updated files via <strong>one secure link</strong></p><p>How they can maintain control and visibility over version history </p><p><strong>Meet the Speakers:</strong></p><p><strong>Sarolta Gájer, Product Marketing Analyst, Tresorit</strong></p><p>Sarolta is a Product Marketing Analyst at Tresorit, with 15 years of diverse professional experience. With 1 year in product marketing and previous roles in HR and Account-Based Marketing, Sarolta is passionate about differentiating Tresorit’s offerings in a competitive market and empowering sales and marketing teams to drive success.</p><p><strong>Miguel Gurrola, Managing Partner Conscious Performance</strong></p><p>With over 24 years of corporate experience, Miguel has held strategic roles in HR and human capital across diverse industries, including aeronautics, consumer goods, chemical, mental health, mechanical, mining, and pharmaceuticals. He brings more than 30 years of experience in strategic planning, human resources management, leadership development, and change management within international organizations.</p></td></tr></tbody></table>
<p><p>Find out more at www.tresorit.com</p></p>]]></content:encoded>
      <enclosure length="28984722" type="audio/mpeg" url="https://chrt.fm/track/1A2EF3/cdn.simplecast.com/audio/ae66bc11-4050-400a-9f39-99119f3f24d3/episodes/3e88d2b6-48de-4a48-848b-94e7bb5482f7/audio/e19085b9-bac6-4413-affa-44a9439826a3/default_tc.mp3?aid=rss_feed&amp;feed=9hgsF902"/>
      <itunes:title>Introducing Tresorit’s Cooperative Link - State of the Union Winter Edition 2024</itunes:title>
      <itunes:author>Tresorit</itunes:author>
      <itunes:duration>00:29:30</itunes:duration>
      <itunes:summary>Tresorit has always been a Pioneer in creating secure file sharing solutions and our newest feature addresses the challenge of collaborating on sensitive files.</itunes:summary>
      <itunes:subtitle>Tresorit has always been a Pioneer in creating secure file sharing solutions and our newest feature addresses the challenge of collaborating on sensitive files.</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>58</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">c78ad77d-451c-4850-b2e1-e5f0c798f810</guid>
      <title>How SMEs can stay legal &amp; efficient in the enterprise supplier network &amp; pragmatically adopt NIS2</title>
      <description><![CDATA[The Network and Information Security Directive 2 (NIS2) is now in effect, and larger enterprises, affected by the regulation, are working hard on meeting its stringent requirements. But where does that leave smaller organizations in the supply chain?

For SMEs, it's not just about meeting compliance mandates. Following NIS2 principles, even if not required by law, can offer a strategic advantage—boosting operational efficiency and making you a more attractive partner in the enterprise ecosystem.

Key Takeaways:

Understanding NIS2’s impact on SMEs

Practical steps for aligning with NIS2 to stay competitive and secure

Enhancing trust with larger organizations by demonstrating a commitment to security and compliance





Meet the Speakers:

Boglárka Fekecs, Legal Counsel, Tresorit

Boglarka Fekecs has worked as Legal Counsel in the tech industry for the past five years. At Tresorit, she helps ensure compliance with the evolving legislative landscape, with a particular focus on data protection and technology-related regulations.

Fokko Oldewurtel,  Domenig & Partner

Fokko Oldewurtel is attorney at law and certified data protection law expert. He specializes in IT, IP and data protection law as well as cybersecurity. He regularly publishes blog posts in his areas of specialization and appears in the media as an expert. Fokko Oldewurtel advises corporations, SMEs, public authorities and start-ups on legal issues relating to digitalization and data protection. Find out more at www.tresorit.com
]]></description>
      <pubDate>Mon, 11 Nov 2024 13:08:08 +0000</pubDate>
      <author>spotify-podcaster@tresorit.com (Tresorit)</author>
      <link>https://under-ctrl.simplecast.com/episodes/how-smes-can-stay-legal-efficient-in-the-enterprise-supplier-network-pragmatically-adopt-nis2-Uh7KLvaE</link>
      <enclosure length="33645463" type="audio/mpeg" url="https://chrt.fm/track/1A2EF3/cdn.simplecast.com/audio/ae66bc11-4050-400a-9f39-99119f3f24d3/episodes/91099a80-0c9b-4879-816b-e2756826a997/audio/6e82cb9d-d523-46d7-baf3-3a23ad781c18/default_tc.mp3?aid=rss_feed&amp;feed=9hgsF902"/>
      <itunes:title>How SMEs can stay legal &amp; efficient in the enterprise supplier network &amp; pragmatically adopt NIS2</itunes:title>
      <itunes:author>Tresorit</itunes:author>
      <itunes:duration>00:34:59</itunes:duration>
      <itunes:summary>The Network and Information Security Directive 2 (NIS2) is now in effect, and larger enterprises, affected by the regulation, are working hard on meeting its stringent requirements. But where does that leave smaller organizations in the supply chain?

For SMEs, it&apos;s not just about meeting compliance mandates. Following NIS2 principles, even if not required by law, can offer a strategic advantage—boosting operational efficiency and making you a more attractive partner in the enterprise ecosystem.

Key Takeaways:

Understanding NIS2’s impact on SMEs

Practical steps for aligning with NIS2 to stay competitive and secure

Enhancing trust with larger organizations by demonstrating a commitment to security and compliance





Meet the Speakers:

Boglárka Fekecs, Legal Counsel, Tresorit

Boglarka Fekecs has worked as Legal Counsel in the tech industry for the past five years. At Tresorit, she helps ensure compliance with the evolving legislative landscape, with a particular focus on data protection and technology-related regulations.

Fokko Oldewurtel,  Domenig &amp; Partner

Fokko Oldewurtel is attorney at law and certified data protection law expert. He specializes in IT, IP and data protection law as well as cybersecurity. He regularly publishes blog posts in his areas of specialization and appears in the media as an expert. Fokko Oldewurtel advises corporations, SMEs, public authorities and start-ups on legal issues relating to digitalization and data protection.</itunes:summary>
      <itunes:subtitle>The Network and Information Security Directive 2 (NIS2) is now in effect, and larger enterprises, affected by the regulation, are working hard on meeting its stringent requirements. But where does that leave smaller organizations in the supply chain?

For SMEs, it&apos;s not just about meeting compliance mandates. Following NIS2 principles, even if not required by law, can offer a strategic advantage—boosting operational efficiency and making you a more attractive partner in the enterprise ecosystem.

Key Takeaways:

Understanding NIS2’s impact on SMEs

Practical steps for aligning with NIS2 to stay competitive and secure

Enhancing trust with larger organizations by demonstrating a commitment to security and compliance





Meet the Speakers:

Boglárka Fekecs, Legal Counsel, Tresorit

Boglarka Fekecs has worked as Legal Counsel in the tech industry for the past five years. At Tresorit, she helps ensure compliance with the evolving legislative landscape, with a particular focus on data protection and technology-related regulations.

Fokko Oldewurtel,  Domenig &amp; Partner

Fokko Oldewurtel is attorney at law and certified data protection law expert. He specializes in IT, IP and data protection law as well as cybersecurity. He regularly publishes blog posts in his areas of specialization and appears in the media as an expert. Fokko Oldewurtel advises corporations, SMEs, public authorities and start-ups on legal issues relating to digitalization and data protection.</itunes:subtitle>
      <itunes:keywords>nis2</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>57</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">95fad80c-6e83-4fb7-9b8f-fb9a62a94938</guid>
      <title>Working together and keeping data apart: unlocking the power of Data Rooms</title>
      <description><![CDATA[Whether you are working in the finance, healthcare, legal or manufacturing industries, sharing data with multiple external associates is part of your daily life. Fact. In a compliance focused-environment, how do you ensure you remain compliant and efficient whilst honoring the integrity of third-party data?

Look no further, data rooms are here to save the day. We will look at the challenges of collaborating whilst adhering to strict data segregation requirements with Cyber Security expert Marton Miklos from ACPM IT.

From GDPR to NIS2, we will provide insights into how you can stay efficient while giving your clients and partners the confidentiality they deserve?

Meet the Speakers:

Aaron Stillman, Head of Product Marketing, Tresorit
Aaron is a dynamic and seasoned leader, possessing more than 15 years of experience in the B2B SaaS sector across diverse industries. His expertise lies in crafting compelling narratives and devising effective go-to-market strategies which empower companies to thrive and drive innovation, all while fostering a culture of enjoyment and creativity.

Miklós Márton, Founder & MD, ACPM IT
With over 20 years of experience in IT Project Management and IT Audit, Marton provides expert advice in IT consulting to major corporations, financial entities and government organizations. His particular focus is in IT Security and Business Intelligence. Find out more at www.tresorit.com
]]></description>
      <pubDate>Wed, 23 Oct 2024 22:00:00 +0000</pubDate>
      <author>spotify-podcaster@tresorit.com (Aaron Stillman, Marton Miklos)</author>
      <link>https://under-ctrl.simplecast.com/episodes/working-together-and-keeping-data-apart-unlocking-the-power-of-data-rooms-iun5dNL_</link>
      <enclosure length="31283693" type="audio/mpeg" url="https://chrt.fm/track/1A2EF3/cdn.simplecast.com/audio/ae66bc11-4050-400a-9f39-99119f3f24d3/episodes/0037568c-b911-4498-808b-09385a412b77/audio/6212b549-49da-4d03-9701-ed16f16c6896/default_tc.mp3?aid=rss_feed&amp;feed=9hgsF902"/>
      <itunes:title>Working together and keeping data apart: unlocking the power of Data Rooms</itunes:title>
      <itunes:author>Aaron Stillman, Marton Miklos</itunes:author>
      <itunes:duration>00:32:18</itunes:duration>
      <itunes:summary>Whether you are working in the finance, healthcare, legal or manufacturing industries, sharing data with multiple external associates is part of your daily life. Fact. In a compliance focused-environment, how do you ensure you remain compliant and efficient whilst honoring the integrity of third-party data?

Look no further, data rooms are here to save the day. We will look at the challenges of collaborating whilst adhering to strict data segregation requirements with Cyber Security expert Marton Miklos from ACPM IT.

From GDPR to NIS2, we will provide insights into how you can stay efficient while giving your clients and partners the confidentiality they deserve?

Meet the Speakers:

Aaron Stillman, Head of Product Marketing, Tresorit
Aaron is a dynamic and seasoned leader, possessing more than 15 years of experience in the B2B SaaS sector across diverse industries. His expertise lies in crafting compelling narratives and devising effective go-to-market strategies which empower companies to thrive and drive innovation, all while fostering a culture of enjoyment and creativity.

Miklós Márton, Founder &amp; MD, ACPM IT
With over 20 years of experience in IT Project Management and IT Audit, Marton provides expert advice in IT consulting to major corporations, financial entities and government organizations. His particular focus is in IT Security and Business Intelligence.</itunes:summary>
      <itunes:subtitle>Whether you are working in the finance, healthcare, legal or manufacturing industries, sharing data with multiple external associates is part of your daily life. Fact. In a compliance focused-environment, how do you ensure you remain compliant and efficient whilst honoring the integrity of third-party data?

Look no further, data rooms are here to save the day. We will look at the challenges of collaborating whilst adhering to strict data segregation requirements with Cyber Security expert Marton Miklos from ACPM IT.

From GDPR to NIS2, we will provide insights into how you can stay efficient while giving your clients and partners the confidentiality they deserve?

Meet the Speakers:

Aaron Stillman, Head of Product Marketing, Tresorit
Aaron is a dynamic and seasoned leader, possessing more than 15 years of experience in the B2B SaaS sector across diverse industries. His expertise lies in crafting compelling narratives and devising effective go-to-market strategies which empower companies to thrive and drive innovation, all while fostering a culture of enjoyment and creativity.

Miklós Márton, Founder &amp; MD, ACPM IT
With over 20 years of experience in IT Project Management and IT Audit, Marton provides expert advice in IT consulting to major corporations, financial entities and government organizations. His particular focus is in IT Security and Business Intelligence.</itunes:subtitle>
      <itunes:keywords>data rooms, data security, compliance, nis2</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>56</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">8e6129ab-090e-4ff9-868d-15f3b0fd080e</guid>
      <title>What you need to know about NIS2 and how to prepare</title>
      <description><![CDATA[<table><tbody><tr><td><p>In this podcast, we will delve into the key elements of NIS2 and explore its far-reaching impact on organizations. Our experts will provide a comprehensive overview of the Directive and highlight the steps organizations need to take to achieve compliance.</p><p><strong>What you will learn:</strong></p><ul><li>Understanding of the core objectives and requirements of NIS2, and which sectors and types of organizations are affected</li><li>What steps to take to assess and enhance your organization's cybersecurity posture, together with best practices for implementing NIS2 compliance measures</li><li>How to prepare for audits and reporting obligations under NIS2 and what role your management and staff will play in maintaining compliance</li><li>While the specific implementation of NIS2 may vary from country to country, this webinar will provide you with a solid foundation to navigate the Directive’s key requirements and essential steps to take towards compliance.</li></ul><p> </p><p><strong>Meet the Speakers:</strong></p><p><strong>Turul Balogh, Group Information Security and Data Protection Officer, Tresorit</strong><br />For the past 10 years, Turul has been helping companies achieve their business goals more effectively and efficiently on both a strategical and tactical level whilst ensuring the appropriate level of IT, data protection and information security.</p><p><strong>Koen Verbeke, CTO, Cranium</strong><br />Koen began his career as a consultant, gaining experience primarily in the life sciences and fintech industries. He has served for several years as a Data Protection Officer and Information Security Officer at multiple organizations. In 2022, he had the opportunity to lead CRANIUM’s security department, where he was responsible for sales, account management, and driving further growth. Currently, he oversees the areas of knowledge management, solution development, and service delivery. In this capacity, he contributes to shaping the strategy for addressing current issues such as the AI Act and NIS2.</p></td></tr></tbody></table><p>Thank you for your help in advance!</p><h2>Confluence content</h2>
<p><p>Find out more at www.tresorit.com</p></p>]]></description>
      <pubDate>Fri, 11 Oct 2024 07:37:27 +0000</pubDate>
      <author>spotify-podcaster@tresorit.com (Tresorit)</author>
      <link>https://under-ctrl.simplecast.com/episodes/what-you-need-to-know-about-nis2-and-how-to-prepare-X_GBeGqR</link>
      <content:encoded><![CDATA[<table><tbody><tr><td><p>In this podcast, we will delve into the key elements of NIS2 and explore its far-reaching impact on organizations. Our experts will provide a comprehensive overview of the Directive and highlight the steps organizations need to take to achieve compliance.</p><p><strong>What you will learn:</strong></p><ul><li>Understanding of the core objectives and requirements of NIS2, and which sectors and types of organizations are affected</li><li>What steps to take to assess and enhance your organization's cybersecurity posture, together with best practices for implementing NIS2 compliance measures</li><li>How to prepare for audits and reporting obligations under NIS2 and what role your management and staff will play in maintaining compliance</li><li>While the specific implementation of NIS2 may vary from country to country, this webinar will provide you with a solid foundation to navigate the Directive’s key requirements and essential steps to take towards compliance.</li></ul><p> </p><p><strong>Meet the Speakers:</strong></p><p><strong>Turul Balogh, Group Information Security and Data Protection Officer, Tresorit</strong><br />For the past 10 years, Turul has been helping companies achieve their business goals more effectively and efficiently on both a strategical and tactical level whilst ensuring the appropriate level of IT, data protection and information security.</p><p><strong>Koen Verbeke, CTO, Cranium</strong><br />Koen began his career as a consultant, gaining experience primarily in the life sciences and fintech industries. He has served for several years as a Data Protection Officer and Information Security Officer at multiple organizations. In 2022, he had the opportunity to lead CRANIUM’s security department, where he was responsible for sales, account management, and driving further growth. Currently, he oversees the areas of knowledge management, solution development, and service delivery. In this capacity, he contributes to shaping the strategy for addressing current issues such as the AI Act and NIS2.</p></td></tr></tbody></table><p>Thank you for your help in advance!</p><h2>Confluence content</h2>
<p><p>Find out more at www.tresorit.com</p></p>]]></content:encoded>
      <enclosure length="29454504" type="audio/mpeg" url="https://chrt.fm/track/1A2EF3/cdn.simplecast.com/audio/ae66bc11-4050-400a-9f39-99119f3f24d3/episodes/a514f272-c7ef-461e-a7f6-aeada245cbb6/audio/1372082c-a091-4e87-8ce0-90172f4f48d8/default_tc.mp3?aid=rss_feed&amp;feed=9hgsF902"/>
      <itunes:title>What you need to know about NIS2 and how to prepare</itunes:title>
      <itunes:author>Tresorit</itunes:author>
      <itunes:duration>00:30:36</itunes:duration>
      <itunes:summary>In this podcast, we will delve into the key elements of NIS2 and explore its far-reaching impact on organizations. Our experts will provide a comprehensive overview of the Directive and highlight the steps organizations need to take to achieve compliance.</itunes:summary>
      <itunes:subtitle>In this podcast, we will delve into the key elements of NIS2 and explore its far-reaching impact on organizations. Our experts will provide a comprehensive overview of the Directive and highlight the steps organizations need to take to achieve compliance.</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>55</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">3b735b16-a2f0-4a94-819e-3eb756c2b1cd</guid>
      <title>Data Security Strategies for the Finance Industry</title>
      <description><![CDATA[<p>In this webinar we will explore the data security challenges faced by the financial industry and how finance organizations can improve productivity using collaborative tools.</p><p> </p><p>What you will learn:</p><ul><li>Pitfalls and challenges to avoid when ensuring data security in the Finance industry</li><li>How Finance professionals can save valuable time and resources while ensuring compliance and confidentiality throughout the due diligence lifecycle.</li><li>How Data rooms can provide a secure, efficient, and collaborative platform for managing critical financial transactions and documents.  </li></ul><p> </p><p>Meet the Speakers:</p><p> </p><p>Aaron Stillman, Head of Product Marketing, Tresorit</p><p> </p><p>Aaron is a dynamic and seasoned leader, possessing more than 15 years of experience in the B2B SaaS sector across diverse industries. His expertise lies in crafting compelling narratives and devising effective go-to-market strategies, which empower companies to thrive and drive innovation, all while fostering a culture of enjoyment and creativity.</p><p> </p><p>Dr Lisa McKee, Founding Partner at American Security and Privacy</p><p> </p><p>Dr. Lisa McKee has over 20 years of industry experience. She provides services, assessments, training, program development and leadership as a virtual Data Protection Officer (vDPO) for companies globally. Lisa has a PhD in Cyber Defense with an emphasis in Privacy. She is a highly regarded privacy expert and international speaker and event keynoter. As a member of the Accredited Standards Committee X9, she provides input on industry standards. As an APMG ISACA Certified Trainer, she is passionate about privacy and volunteers on boards for several professional groups, mentors, and adjunct professor for graduate students. She has authored several publications including a Data Privacy Management textbook.</p>
<p><p>Find out more at www.tresorit.com</p></p>]]></description>
      <pubDate>Wed, 17 Jul 2024 06:00:00 +0000</pubDate>
      <author>spotify-podcaster@tresorit.com (Tresorit)</author>
      <link>https://under-ctrl.simplecast.com/episodes/data-security-strategies-for-the-finance-industry-hGu9YEKC</link>
      <content:encoded><![CDATA[<p>In this webinar we will explore the data security challenges faced by the financial industry and how finance organizations can improve productivity using collaborative tools.</p><p> </p><p>What you will learn:</p><ul><li>Pitfalls and challenges to avoid when ensuring data security in the Finance industry</li><li>How Finance professionals can save valuable time and resources while ensuring compliance and confidentiality throughout the due diligence lifecycle.</li><li>How Data rooms can provide a secure, efficient, and collaborative platform for managing critical financial transactions and documents.  </li></ul><p> </p><p>Meet the Speakers:</p><p> </p><p>Aaron Stillman, Head of Product Marketing, Tresorit</p><p> </p><p>Aaron is a dynamic and seasoned leader, possessing more than 15 years of experience in the B2B SaaS sector across diverse industries. His expertise lies in crafting compelling narratives and devising effective go-to-market strategies, which empower companies to thrive and drive innovation, all while fostering a culture of enjoyment and creativity.</p><p> </p><p>Dr Lisa McKee, Founding Partner at American Security and Privacy</p><p> </p><p>Dr. Lisa McKee has over 20 years of industry experience. She provides services, assessments, training, program development and leadership as a virtual Data Protection Officer (vDPO) for companies globally. Lisa has a PhD in Cyber Defense with an emphasis in Privacy. She is a highly regarded privacy expert and international speaker and event keynoter. As a member of the Accredited Standards Committee X9, she provides input on industry standards. As an APMG ISACA Certified Trainer, she is passionate about privacy and volunteers on boards for several professional groups, mentors, and adjunct professor for graduate students. She has authored several publications including a Data Privacy Management textbook.</p>
<p><p>Find out more at www.tresorit.com</p></p>]]></content:encoded>
      <enclosure length="34641275" type="audio/mpeg" url="https://chrt.fm/track/1A2EF3/cdn.simplecast.com/audio/ae66bc11-4050-400a-9f39-99119f3f24d3/episodes/3f975709-d525-4538-85af-5379aab0f2ea/audio/cc2d295a-94ab-4880-ab77-7aee75e10d61/default_tc.mp3?aid=rss_feed&amp;feed=9hgsF902"/>
      <itunes:title>Data Security Strategies for the Finance Industry</itunes:title>
      <itunes:author>Tresorit</itunes:author>
      <itunes:duration>00:36:04</itunes:duration>
      <itunes:summary>In this webinar we will explore the data security challenges faced by the financial industry and how finance organizations can improve productivity using collaborative tools.</itunes:summary>
      <itunes:subtitle>In this webinar we will explore the data security challenges faced by the financial industry and how finance organizations can improve productivity using collaborative tools.</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>54</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">6faeeafe-8565-47a7-9ff5-e94ff0788199</guid>
      <title>How to leverage compliance for success</title>
      <description><![CDATA[<p>Learn how compliance can be a powerful driver of business growth. When digital rules and regulations seem to be increasing every day, it is easy to lose sight of the benefits that can be gained from living by them. See by Bavo Van den Heuvel, CEO of Cranium, share how compliance can elevate your brand and drive revenue, streamline processes, and boost productivity. Say goodbye to the notion that compliance is a hassle, and learn how it can be a strategic asset that propels your business forward. Don't miss this opportunity to uncover the untapped potential within your organization. What you will learn: How internal compliance review and investigation can support your business processes How the action plans of IT, facility management, environment, HR and others, can make your compliance more efficient How there can be a “return on compliance” Meet the Speakers: Peter Budai, CTO, Tresorit Peter Budai is a Chief Technology Officer (CTO) renowned for his expertise in developing secure solutions that rely on strong end-to-end encryption. With a strong focus on both security and usability, Peter enables organizations to protect their data while maintaining exceptional user experiences. Bavo Van den Heuvel, Co-Founder and Partner at Cranium Bavo started his career in biometrics in 1996, started working in security afterwards and is a full time privacy expert since 2004. Translating the data protection needs between legal/business and IT-(security) people is his daily challenge at Cranium.</p>
<p><p>Find out more at www.tresorit.com</p></p>]]></description>
      <pubDate>Thu, 20 Jun 2024 06:00:00 +0000</pubDate>
      <author>spotify-podcaster@tresorit.com (Tresorit)</author>
      <link>https://under-ctrl.simplecast.com/episodes/how-to-leverage-compliance-for-success-Fd6t9V5X</link>
      <content:encoded><![CDATA[<p>Learn how compliance can be a powerful driver of business growth. When digital rules and regulations seem to be increasing every day, it is easy to lose sight of the benefits that can be gained from living by them. See by Bavo Van den Heuvel, CEO of Cranium, share how compliance can elevate your brand and drive revenue, streamline processes, and boost productivity. Say goodbye to the notion that compliance is a hassle, and learn how it can be a strategic asset that propels your business forward. Don't miss this opportunity to uncover the untapped potential within your organization. What you will learn: How internal compliance review and investigation can support your business processes How the action plans of IT, facility management, environment, HR and others, can make your compliance more efficient How there can be a “return on compliance” Meet the Speakers: Peter Budai, CTO, Tresorit Peter Budai is a Chief Technology Officer (CTO) renowned for his expertise in developing secure solutions that rely on strong end-to-end encryption. With a strong focus on both security and usability, Peter enables organizations to protect their data while maintaining exceptional user experiences. Bavo Van den Heuvel, Co-Founder and Partner at Cranium Bavo started his career in biometrics in 1996, started working in security afterwards and is a full time privacy expert since 2004. Translating the data protection needs between legal/business and IT-(security) people is his daily challenge at Cranium.</p>
<p><p>Find out more at www.tresorit.com</p></p>]]></content:encoded>
      <enclosure length="39653180" type="audio/mpeg" url="https://chrt.fm/track/1A2EF3/cdn.simplecast.com/audio/ae66bc11-4050-400a-9f39-99119f3f24d3/episodes/ac9154c2-8e35-487e-8c15-1e53732c07ff/audio/0003cc49-cc4b-4a21-ba73-c506a5ba1a99/default_tc.mp3?aid=rss_feed&amp;feed=9hgsF902"/>
      <itunes:title>How to leverage compliance for success</itunes:title>
      <itunes:author>Tresorit</itunes:author>
      <itunes:duration>00:41:13</itunes:duration>
      <itunes:summary>Learn how compliance can be a powerful driver of business growth.
When digital rules and regulations seem to be increasing every day, it is easy to lose sight of the benefits that can be gained from living by them. </itunes:summary>
      <itunes:subtitle>Learn how compliance can be a powerful driver of business growth.
When digital rules and regulations seem to be increasing every day, it is easy to lose sight of the benefits that can be gained from living by them. </itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>53</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">e74f4aa6-65ac-4c00-a78d-4f8d975ddf9f</guid>
      <title>Neue Funktionen von Tresorit (Spring Updates, 2024)</title>
      <description><![CDATA[<p>Entdecken Sie die neuesten Updates aus der Entwicklungsabteilung von Tresorit und werfen Sie einen Blick auf die Roadmap für 2024. </p>
<p><p>Find out more at www.tresorit.com</p></p>]]></description>
      <pubDate>Thu, 30 May 2024 06:00:00 +0000</pubDate>
      <author>spotify-podcaster@tresorit.com (Tresorit)</author>
      <link>https://under-ctrl.simplecast.com/episodes/neue-funktionen-von-tresorit-spring-updates-2024-8Skr3o6X</link>
      <content:encoded><![CDATA[<p>Entdecken Sie die neuesten Updates aus der Entwicklungsabteilung von Tresorit und werfen Sie einen Blick auf die Roadmap für 2024. </p>
<p><p>Find out more at www.tresorit.com</p></p>]]></content:encoded>
      <enclosure length="25866297" type="audio/mpeg" url="https://chrt.fm/track/1A2EF3/cdn.simplecast.com/audio/ae66bc11-4050-400a-9f39-99119f3f24d3/episodes/43de3432-43ff-4741-abd3-9daf28e80339/audio/0818dc1d-0e9b-4698-a25f-4b90fc09b220/default_tc.mp3?aid=rss_feed&amp;feed=9hgsF902"/>
      <itunes:title>Neue Funktionen von Tresorit (Spring Updates, 2024)</itunes:title>
      <itunes:author>Tresorit</itunes:author>
      <itunes:duration>00:26:55</itunes:duration>
      <itunes:summary>Entdecken Sie die neuesten Updates aus der Entwicklungsabteilung von Tresorit und werfen Sie einen Blick auf die Roadmap für 2024.</itunes:summary>
      <itunes:subtitle>Entdecken Sie die neuesten Updates aus der Entwicklungsabteilung von Tresorit und werfen Sie einen Blick auf die Roadmap für 2024.</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>51</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">08c68f9f-f288-46d2-81a6-9dc21e0c39ff</guid>
      <title>New Features and Functions of Tresorit (Spring Updates, 2024)</title>
      <description><![CDATA[<p>Discover the latest updates from Tresorit's R&D department and take a look at the roadmap for 2024.</p>
<p><p>Find out more at www.tresorit.com</p></p>]]></description>
      <pubDate>Thu, 23 May 2024 06:00:00 +0000</pubDate>
      <author>spotify-podcaster@tresorit.com (Tresorit)</author>
      <link>https://under-ctrl.simplecast.com/episodes/new-features-and-functions-of-tresorit-spring-updates-2024-DB315dQD</link>
      <content:encoded><![CDATA[<p>Discover the latest updates from Tresorit's R&D department and take a look at the roadmap for 2024.</p>
<p><p>Find out more at www.tresorit.com</p></p>]]></content:encoded>
      <enclosure length="30454430" type="audio/mpeg" url="https://chrt.fm/track/1A2EF3/cdn.simplecast.com/audio/ae66bc11-4050-400a-9f39-99119f3f24d3/episodes/68700efe-3f41-4fcc-a23f-6b944acd5aaa/audio/bd977880-9cd4-4959-9b12-be260f2b37ff/default_tc.mp3?aid=rss_feed&amp;feed=9hgsF902"/>
      <itunes:title>New Features and Functions of Tresorit (Spring Updates, 2024)</itunes:title>
      <itunes:author>Tresorit</itunes:author>
      <itunes:duration>00:31:42</itunes:duration>
      <itunes:summary>Discover the latest updates from Tresorit&apos;s R&amp;D department and take a look at the roadmap for 2024.</itunes:summary>
      <itunes:subtitle>Discover the latest updates from Tresorit&apos;s R&amp;D department and take a look at the roadmap for 2024.</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>52</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">301f559a-615e-4e72-bea2-93c7d1310266</guid>
      <title>IT Security: How encryption can protect - and deceive you</title>
      <description><![CDATA[Many companies promise to offer robust E2EE, but under the hood, the level of protection may not live up to the promises. Find out more at www.tresorit.com
]]></description>
      <pubDate>Thu, 9 May 2024 06:00:00 +0000</pubDate>
      <author>spotify-podcaster@tresorit.com (Tresorit)</author>
      <link>https://under-ctrl.simplecast.com/episodes/it-security-how-encryption-can-protect-and-deceive-you-wnUSBlDd</link>
      <enclosure length="28284254" type="audio/mpeg" url="https://chrt.fm/track/1A2EF3/cdn.simplecast.com/audio/ae66bc11-4050-400a-9f39-99119f3f24d3/episodes/e07d8bad-6b3c-4cb5-a07d-afa2a8db6430/audio/9032e919-e88a-42a3-8b9c-85562a384838/default_tc.mp3?aid=rss_feed&amp;feed=9hgsF902"/>
      <itunes:title>IT Security: How encryption can protect - and deceive you</itunes:title>
      <itunes:author>Tresorit</itunes:author>
      <itunes:duration>00:29:27</itunes:duration>
      <itunes:summary>Many companies promise to offer robust E2EE, but under the hood, the level of protection may not live up to the promises.</itunes:summary>
      <itunes:subtitle>Many companies promise to offer robust E2EE, but under the hood, the level of protection may not live up to the promises.</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>50</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">4205ceb5-2c4f-49af-b24a-2eadf8b340f7</guid>
      <title>Why secure enough is NOT an option</title>
      <description><![CDATA[ Find out more at www.tresorit.com
]]></description>
      <pubDate>Thu, 18 Apr 2024 06:00:00 +0000</pubDate>
      <author>spotify-podcaster@tresorit.com (Tresorit)</author>
      <link>https://under-ctrl.simplecast.com/episodes/why-secure-enough-is-not-an-option-x3MQ6XxI</link>
      <enclosure length="34689161" type="audio/mpeg" url="https://chrt.fm/track/1A2EF3/cdn.simplecast.com/audio/ae66bc11-4050-400a-9f39-99119f3f24d3/episodes/b5459202-d9a7-44df-add3-e12130413ece/audio/d037268f-a33f-4c94-8b07-f3fe0167582c/default_tc.mp3?aid=rss_feed&amp;feed=9hgsF902"/>
      <itunes:title>Why secure enough is NOT an option</itunes:title>
      <itunes:author>Tresorit</itunes:author>
      <itunes:duration>00:36:05</itunes:duration>
      <itunes:summary></itunes:summary>
      <itunes:subtitle></itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>46</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">f0b50e1d-e45a-486e-a96a-620abf1ffc64</guid>
      <title>How to fortify your security with your workforce</title>
      <description><![CDATA[<h3>Join our webinar, with Sjoerd van den Bedem, IT Manager, Northwave Cybersecurity, where we will have a look at the critical junction of security and productivity with examples from Sjoerd’s broad experience helping companies fortify their security infrastructure.🛡️</h3><p>From phishing link victims to ransomware scenarios, we'll explore real-life data breach examples highlighting how harnessing your workforce can be your greatest fortification. Through these examples, we aim to provide tangible insights into the challenges faced by organizations and the strategies employed to mitigate risks effectively.</p><p>We'll shed light on the connection between Compliance and Security and have a look at the ways your organization can stay secure without sacrificing productivity.</p><p>What you will learn:</p><ul><li>Strategies for maintaining an efficient and functional workforce</li><li>Best practices in establishing cross-functional, collaboration</li><li>Real life examples of what to avoid</li><li>Insights into the misconceptions surrounding compliance and productivity</li></ul><p>Meet our Speakers: Miklós Dénes, Head of Customer Service, Tresorit Miklos is a charismatic Customer Service and Success lead renowned for his expertise in elevating customer support. With a wealth of experience in the tech industry and a passion for ensuring customer satisfaction, he has been instrumental in shaping Tresorit's customer service division in the last 10 years.</p><p>Sjoerd van den Bedem, IT Manager, Northwave Cybersecurity Sjoerd is an expert in managing large technical eco-systems and cybersecurity. He loves to continually improve stability, scalability and security in larger environments. Currently he secures the IT of the European company Northwave Cybersecurity. He is flown in for complex cyber incidents as a Senior Recovery expert, helping companies get back in business.</p>
<p><p>Find out more at www.tresorit.com</p></p>]]></description>
      <pubDate>Thu, 14 Mar 2024 07:00:00 +0000</pubDate>
      <author>spotify-podcaster@tresorit.com (Tresorit)</author>
      <link>https://under-ctrl.simplecast.com/episodes/how-to-fortify-your-security-with-your-workforce-zUbw3dc6</link>
      <content:encoded><![CDATA[<h3>Join our webinar, with Sjoerd van den Bedem, IT Manager, Northwave Cybersecurity, where we will have a look at the critical junction of security and productivity with examples from Sjoerd’s broad experience helping companies fortify their security infrastructure.🛡️</h3><p>From phishing link victims to ransomware scenarios, we'll explore real-life data breach examples highlighting how harnessing your workforce can be your greatest fortification. Through these examples, we aim to provide tangible insights into the challenges faced by organizations and the strategies employed to mitigate risks effectively.</p><p>We'll shed light on the connection between Compliance and Security and have a look at the ways your organization can stay secure without sacrificing productivity.</p><p>What you will learn:</p><ul><li>Strategies for maintaining an efficient and functional workforce</li><li>Best practices in establishing cross-functional, collaboration</li><li>Real life examples of what to avoid</li><li>Insights into the misconceptions surrounding compliance and productivity</li></ul><p>Meet our Speakers: Miklós Dénes, Head of Customer Service, Tresorit Miklos is a charismatic Customer Service and Success lead renowned for his expertise in elevating customer support. With a wealth of experience in the tech industry and a passion for ensuring customer satisfaction, he has been instrumental in shaping Tresorit's customer service division in the last 10 years.</p><p>Sjoerd van den Bedem, IT Manager, Northwave Cybersecurity Sjoerd is an expert in managing large technical eco-systems and cybersecurity. He loves to continually improve stability, scalability and security in larger environments. Currently he secures the IT of the European company Northwave Cybersecurity. He is flown in for complex cyber incidents as a Senior Recovery expert, helping companies get back in business.</p>
<p><p>Find out more at www.tresorit.com</p></p>]]></content:encoded>
      <enclosure length="35710675" type="audio/mpeg" url="https://chrt.fm/track/1A2EF3/cdn.simplecast.com/audio/ae66bc11-4050-400a-9f39-99119f3f24d3/episodes/0a67cfc6-54f6-40f7-9961-1a180c064063/audio/dc2c4bf8-1094-4f77-8311-b452a05e6e36/default_tc.mp3?aid=rss_feed&amp;feed=9hgsF902"/>
      <itunes:title>How to fortify your security with your workforce</itunes:title>
      <itunes:author>Tresorit</itunes:author>
      <itunes:duration>00:37:10</itunes:duration>
      <itunes:summary>🛡️From phishing link victims to ransomware scenarios, we&apos;ll explore real-life data breach examples highlighting how harnessing your workforce can be your greatest fortification. Through these examples, we aim to provide tangible insights into the challenges faced by organizations and the strategies employed to mitigate risks effectively. Join our webinar, with Sjoerd van den Bedem, IT Manager, Northwave Cybersecurity 🛡️</itunes:summary>
      <itunes:subtitle>🛡️From phishing link victims to ransomware scenarios, we&apos;ll explore real-life data breach examples highlighting how harnessing your workforce can be your greatest fortification. Through these examples, we aim to provide tangible insights into the challenges faced by organizations and the strategies employed to mitigate risks effectively. Join our webinar, with Sjoerd van den Bedem, IT Manager, Northwave Cybersecurity 🛡️</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>45</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">8376e0cf-3607-4a95-aa76-c2923ca25fb2</guid>
      <title>Dive into Cybersecurity: Zero Trust Privacy</title>
      <description><![CDATA[<p>🔒 Listen to Dr. Lisa McKee, Founding Partner at American Security & Privacy and Aaron Stillman, Tresorit’s Head of Product Marketing as they unravel the intricate relationship between zero trust and privacy. 🛡️</p><p>In this episode you’ll learn:</p><ul><li>Steps to take when reviewing your data strategies</li><li>Common mistakes to avoid while working with data</li><li>How to implement Zero Trust Privacy strategies</li></ul>
<p><p>Find out more at www.tresorit.com</p></p>]]></description>
      <pubDate>Thu, 15 Feb 2024 07:00:00 +0000</pubDate>
      <author>spotify-podcaster@tresorit.com (Dr. Lisa McKee, Aaron Stillman)</author>
      <link>https://under-ctrl.simplecast.com/episodes/dive-into-cybersecurity-zero-trust-privacy-pUEyVFMN</link>
      <content:encoded><![CDATA[<p>🔒 Listen to Dr. Lisa McKee, Founding Partner at American Security & Privacy and Aaron Stillman, Tresorit’s Head of Product Marketing as they unravel the intricate relationship between zero trust and privacy. 🛡️</p><p>In this episode you’ll learn:</p><ul><li>Steps to take when reviewing your data strategies</li><li>Common mistakes to avoid while working with data</li><li>How to implement Zero Trust Privacy strategies</li></ul>
<p><p>Find out more at www.tresorit.com</p></p>]]></content:encoded>
      <enclosure length="41607781" type="audio/mpeg" url="https://chrt.fm/track/1A2EF3/cdn.simplecast.com/audio/ae66bc11-4050-400a-9f39-99119f3f24d3/episodes/686de71d-323f-4f13-bfd9-42617bc1d02c/audio/4bb1385d-a791-40f1-a7d5-726901949dd1/default_tc.mp3?aid=rss_feed&amp;feed=9hgsF902"/>
      <itunes:title>Dive into Cybersecurity: Zero Trust Privacy</itunes:title>
      <itunes:author>Dr. Lisa McKee, Aaron Stillman</itunes:author>
      <itunes:duration>00:43:20</itunes:duration>
      <itunes:summary>Listen to Dr. Lisa McKee, Founding Partner at American Security &amp; Privacy and Aaron Stillman, Tresorit’s Head of Product Marketing as they unravel the intricate relationship between zero trust and privacy.</itunes:summary>
      <itunes:subtitle>Listen to Dr. Lisa McKee, Founding Partner at American Security &amp; Privacy and Aaron Stillman, Tresorit’s Head of Product Marketing as they unravel the intricate relationship between zero trust and privacy.</itunes:subtitle>
      <itunes:keywords>digital privacy, zero trust, digital trust, privacy</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>44</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">849846d8-55fd-48ae-8dfb-8b404b58bfcf</guid>
      <title>Tresorit Winter-Updates und Jahresrückblick Beschreibung</title>
      <description><![CDATA[ Find out more at www.tresorit.com
]]></description>
      <pubDate>Thu, 25 Jan 2024 07:00:00 +0000</pubDate>
      <author>spotify-podcaster@tresorit.com (Renáta Bárdos, Peter Stössel)</author>
      <link>https://under-ctrl.simplecast.com/episodes/tresorit-winter-updates-und-jahresruckblick-T2FCIK3A</link>
      <enclosure length="28942761" type="audio/mpeg" url="https://chrt.fm/track/1A2EF3/cdn.simplecast.com/audio/ae66bc11-4050-400a-9f39-99119f3f24d3/episodes/8472acec-a44b-4f7b-bf5c-31b7a436fbfc/audio/464c7e12-54f5-414e-8a0e-4a69c567359a/default_tc.mp3?aid=rss_feed&amp;feed=9hgsF902"/>
      <itunes:title>Tresorit Winter-Updates und Jahresrückblick Beschreibung</itunes:title>
      <itunes:author>Renáta Bárdos, Peter Stössel</itunes:author>
      <itunes:duration>00:30:07</itunes:duration>
      <itunes:summary></itunes:summary>
      <itunes:subtitle></itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>43</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">ed8a36c2-6198-4a16-842e-311a781b7401</guid>
      <title>Tresorit Winter updates and year ahead review</title>
      <description><![CDATA[ Find out more at www.tresorit.com
]]></description>
      <pubDate>Thu, 4 Jan 2024 07:00:00 +0000</pubDate>
      <author>spotify-podcaster@tresorit.com (Tresorit)</author>
      <link>https://under-ctrl.simplecast.com/episodes/tresorit-winter-updates-and-year-ahead-review-taMQc3EV</link>
      <enclosure length="45626735" type="audio/mpeg" url="https://chrt.fm/track/1A2EF3/cdn.simplecast.com/audio/ae66bc11-4050-400a-9f39-99119f3f24d3/episodes/9a8a6d20-8063-4259-88ef-7dfc92e2d68a/audio/f6e5012e-e5c2-4d83-954b-dedd9fef6a8f/default_tc.mp3?aid=rss_feed&amp;feed=9hgsF902"/>
      <itunes:title>Tresorit Winter updates and year ahead review</itunes:title>
      <itunes:author>Tresorit</itunes:author>
      <itunes:duration>00:47:31</itunes:duration>
      <itunes:summary></itunes:summary>
      <itunes:subtitle></itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>42</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">64c817fd-de77-4195-8718-2730a5083f52</guid>
      <title>Keeping workplace collaboration cybersecure</title>
      <description><![CDATA[<p>In this episode of Under CTRL, Tresorit’s Chief Revenue Officer, Peter Stössel, is joined by Elisabeth Rötsch, an account executive for secure messaging app Threema.</p><p> </p><p>They’ll be discussing why secure communication should be a top priority for modern workforces, and how digitization can improve connectivity for global businesses. </p><p> </p><p>The episode will also be digging in to the common problems embedded in mainstream communication apps — including insufficient encryption, lack of compliance, and poor configuration — and talk about how companies can avoid these often-hidden pitfalls. </p><p> </p>
<p><p>Find out more at www.tresorit.com</p></p>]]></description>
      <pubDate>Wed, 20 Dec 2023 12:35:00 +0000</pubDate>
      <author>spotify-podcaster@tresorit.com (Tresorit)</author>
      <link>https://under-ctrl.simplecast.com/episodes/keeping-workplace-collaboration-cybersecure-1ZIIRviP</link>
      <content:encoded><![CDATA[<p>In this episode of Under CTRL, Tresorit’s Chief Revenue Officer, Peter Stössel, is joined by Elisabeth Rötsch, an account executive for secure messaging app Threema.</p><p> </p><p>They’ll be discussing why secure communication should be a top priority for modern workforces, and how digitization can improve connectivity for global businesses. </p><p> </p><p>The episode will also be digging in to the common problems embedded in mainstream communication apps — including insufficient encryption, lack of compliance, and poor configuration — and talk about how companies can avoid these often-hidden pitfalls. </p><p> </p>
<p><p>Find out more at www.tresorit.com</p></p>]]></content:encoded>
      <enclosure length="23798035" type="audio/mpeg" url="https://chrt.fm/track/1A2EF3/cdn.simplecast.com/audio/ae66bc11-4050-400a-9f39-99119f3f24d3/episodes/e18ebe00-2d4c-4ba3-84d6-429bb66e3f12/audio/1e4e9bc4-97f8-4cb6-a598-ae32b25b4085/default_tc.mp3?aid=rss_feed&amp;feed=9hgsF902"/>
      <itunes:title>Keeping workplace collaboration cybersecure</itunes:title>
      <itunes:author>Tresorit</itunes:author>
      <itunes:duration>00:24:45</itunes:duration>
      <itunes:summary>In a special joint episode, Tresorit is teaming up with secure messaging app Threema to discuss how businesses can prioritize communication both inside and outside the workplace. We’ll be looking at how encryption can usability can combine to create smooth and easy-to-use solutions, without exposing your organization to potential cyber risks. </itunes:summary>
      <itunes:subtitle>In a special joint episode, Tresorit is teaming up with secure messaging app Threema to discuss how businesses can prioritize communication both inside and outside the workplace. We’ll be looking at how encryption can usability can combine to create smooth and easy-to-use solutions, without exposing your organization to potential cyber risks. </itunes:subtitle>
      <itunes:keywords>file sharing, messaging, gdpr, communications, data security, nist, cybersecurity, encrypted email, privacy, collaboration</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>41</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">b900be38-01e0-41c0-bcb0-0a819bff378e</guid>
      <title>Sicherheit und Benutzerfreundlichkeit in Harmonie</title>
      <description><![CDATA[<p>Wie kann Ihr Unternehmen die Sicherheit und Privatsphäre seiner Daten in Übereinstimmung mit aktuellen Datenschutzbestimmungen gewährleisten, ohne seinen Mitarbeitern das Leben – und die interne und externe Zusammenarbeit – schwer zu machen?  In dieser gemeinschaftlich von Threema.Work und Tresorit produzierten Podcast-Episode erhalten Sie die Antwort von Elisabeth Rötsch, Account Executive bei Threema, und Peter Stössel, Chief Revenue Officer bei Tresorit.</p><p>Sie diskutieren die aktuellen Cyberbedrohungen und Datenschutzanforderungen, denen Unternehmen sich gegenübersehen, und wie Ende-zu-Ende-verschlüsselte Lösungen wie Threema.Work und Tresorit mit ihrer breiten Produktpalette benutzerfreundlicher Apps, Integrationen und Add-ons helfen können, Risiken einzudämmen und Compliance mit z. B. der DSGVO, NIS2 und DORA zu erzielen. Anhand von Threemas und Tresorits Entstehungsgeschichte, ihren aktuellen Erfolgskennzahlen und positiven Kundenerfahrungen wird beleuchtet, wie der Schutz von Privatsphäre – ein grundlegendes Menschenrecht und die Mission beider Plattformen – gewährleistet werden kann, ohne dabei die Usability aufs Spiel zu setzen. </p><p>Während Threema.Work als Messenger-Dienst den Schwerpunkt auf geschützte Unternehmenskommunikation gelegt hat und Tresorits Fokus auf sicheren Datentausch gerichtet ist, haben die Anwendungen in Sachen Bedienbarkeit und Nutzerkomfort ein gemeinsames Ziel: ihren Kunden eine intuitiv nutzbare Ende-zu-Ende-Verschlüsselung mit Zero-Knowledge-Prinzip zu bieten, die sich nahtlos in bereits bestehende Arbeitsabläufe und Systeme einfügt.</p><p>Sie möchten mehr über Tresorits sicheren Workspace in der Cloud erfahren? Besuchen Sie unsere <a href="https://tresorit.com/de">Webseite</a> oder <a href="https://tresorit.com/de/kontakt">kontaktieren Sie uns</a>.</p><p>Lesen Sie die im Podcast erwähnten Beiträge zur Nutzung von Tresorit in Unternehmen und NGOs: </p><p><a href="https://tresorit.com/de/materialien/kundenstimmen/sicherer-datentausch-viessmann">Kundenstimme Viessmann</a></p><p><a href="https://tresorit.com/blog/de/wenn-datenschutz-eine-frage-von-leben-und-tod-ist/">Wenn Datenschutz eine Frage von Leben und Tod ist</a> – ein Gespräch mit Menschenrechtsaktivist Ethan Gutmann</p><p>Folgen Sie uns auf unseren Social-Media-Kanälen:</p><ul><li><a href="https://twitter.com/i/flow/login?redirect_after_login=%2FTresorit">X</a></li><li><a href="https://www.facebook.com/tresorit">Facebook</a></li><li><a href="https://www.instagram.com/tresorit_co/">Instagram</a></li><li><a href="https://www.linkedin.com/company/tresorit">LinkedIn</a></li></ul>
<p><p>Find out more at www.tresorit.com</p></p>]]></description>
      <pubDate>Wed, 29 Nov 2023 07:00:00 +0000</pubDate>
      <author>spotify-podcaster@tresorit.com (Elisabeth Rötsch, Peter Stössel)</author>
      <link>https://under-ctrl.simplecast.com/episodes/sicherheit-und-benutzerfreundlichkeit-in-harmonie-NxpKtsm4</link>
      <content:encoded><![CDATA[<p>Wie kann Ihr Unternehmen die Sicherheit und Privatsphäre seiner Daten in Übereinstimmung mit aktuellen Datenschutzbestimmungen gewährleisten, ohne seinen Mitarbeitern das Leben – und die interne und externe Zusammenarbeit – schwer zu machen?  In dieser gemeinschaftlich von Threema.Work und Tresorit produzierten Podcast-Episode erhalten Sie die Antwort von Elisabeth Rötsch, Account Executive bei Threema, und Peter Stössel, Chief Revenue Officer bei Tresorit.</p><p>Sie diskutieren die aktuellen Cyberbedrohungen und Datenschutzanforderungen, denen Unternehmen sich gegenübersehen, und wie Ende-zu-Ende-verschlüsselte Lösungen wie Threema.Work und Tresorit mit ihrer breiten Produktpalette benutzerfreundlicher Apps, Integrationen und Add-ons helfen können, Risiken einzudämmen und Compliance mit z. B. der DSGVO, NIS2 und DORA zu erzielen. Anhand von Threemas und Tresorits Entstehungsgeschichte, ihren aktuellen Erfolgskennzahlen und positiven Kundenerfahrungen wird beleuchtet, wie der Schutz von Privatsphäre – ein grundlegendes Menschenrecht und die Mission beider Plattformen – gewährleistet werden kann, ohne dabei die Usability aufs Spiel zu setzen. </p><p>Während Threema.Work als Messenger-Dienst den Schwerpunkt auf geschützte Unternehmenskommunikation gelegt hat und Tresorits Fokus auf sicheren Datentausch gerichtet ist, haben die Anwendungen in Sachen Bedienbarkeit und Nutzerkomfort ein gemeinsames Ziel: ihren Kunden eine intuitiv nutzbare Ende-zu-Ende-Verschlüsselung mit Zero-Knowledge-Prinzip zu bieten, die sich nahtlos in bereits bestehende Arbeitsabläufe und Systeme einfügt.</p><p>Sie möchten mehr über Tresorits sicheren Workspace in der Cloud erfahren? Besuchen Sie unsere <a href="https://tresorit.com/de">Webseite</a> oder <a href="https://tresorit.com/de/kontakt">kontaktieren Sie uns</a>.</p><p>Lesen Sie die im Podcast erwähnten Beiträge zur Nutzung von Tresorit in Unternehmen und NGOs: </p><p><a href="https://tresorit.com/de/materialien/kundenstimmen/sicherer-datentausch-viessmann">Kundenstimme Viessmann</a></p><p><a href="https://tresorit.com/blog/de/wenn-datenschutz-eine-frage-von-leben-und-tod-ist/">Wenn Datenschutz eine Frage von Leben und Tod ist</a> – ein Gespräch mit Menschenrechtsaktivist Ethan Gutmann</p><p>Folgen Sie uns auf unseren Social-Media-Kanälen:</p><ul><li><a href="https://twitter.com/i/flow/login?redirect_after_login=%2FTresorit">X</a></li><li><a href="https://www.facebook.com/tresorit">Facebook</a></li><li><a href="https://www.instagram.com/tresorit_co/">Instagram</a></li><li><a href="https://www.linkedin.com/company/tresorit">LinkedIn</a></li></ul>
<p><p>Find out more at www.tresorit.com</p></p>]]></content:encoded>
      <enclosure length="24645621" type="audio/mpeg" url="https://chrt.fm/track/1A2EF3/cdn.simplecast.com/audio/ae66bc11-4050-400a-9f39-99119f3f24d3/episodes/670adc22-99bd-4774-bc59-d6bb6541905f/audio/a2f612c6-5e2f-4275-9a9b-4f5d1a9a48d8/default_tc.mp3?aid=rss_feed&amp;feed=9hgsF902"/>
      <itunes:title>Sicherheit und Benutzerfreundlichkeit in Harmonie</itunes:title>
      <itunes:author>Elisabeth Rötsch, Peter Stössel</itunes:author>
      <itunes:duration>00:25:38</itunes:duration>
      <itunes:summary>Threemas Elisabeth Rötsch und Tresorits Peter Stössel widmen sich dem Thema sichere Zusammenarbeit in Unternehmen. Im Mittelpunkt steht die Wichtigkeit der Sicherheit und Benutzerfreundlichkeit von Apps und Plattformen, um Cyberbedrohungen abzuwenden und Schatten-IT zu vermeiden. Einblicke in die Entstehungsgeschichte von Threema und Tresorit, die aktuelle Produktpalette und Kundenerfahrungen illustrieren, wie die Ende-zu-Ende-verschlüsselten Lösungen Unternehmen helfen, ihre Privatsphäre und Daten zu schützen und Compliance mit Datenschutzauflagen zu gewährleisten. </itunes:summary>
      <itunes:subtitle>Threemas Elisabeth Rötsch und Tresorits Peter Stössel widmen sich dem Thema sichere Zusammenarbeit in Unternehmen. Im Mittelpunkt steht die Wichtigkeit der Sicherheit und Benutzerfreundlichkeit von Apps und Plattformen, um Cyberbedrohungen abzuwenden und Schatten-IT zu vermeiden. Einblicke in die Entstehungsgeschichte von Threema und Tresorit, die aktuelle Produktpalette und Kundenerfahrungen illustrieren, wie die Ende-zu-Ende-verschlüsselten Lösungen Unternehmen helfen, ihre Privatsphäre und Daten zu schützen und Compliance mit Datenschutzauflagen zu gewährleisten. </itunes:subtitle>
      <itunes:keywords>dsgvo, datenschutzauflagen, privatsphäre, dora, unternehmen, kollaboration, datenschutz, integrationen, add-ons, cyberbedrohungen, datenhoheit, hintertüren, compliance, nis2, usability, schatten-it, e2ee, benutzerfreundlichkeit, security by design, menschenrecht, ende-zu-ende-verschlüsselung, sicherheit, zusammenarbeit</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>40</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">4c08a259-0aca-419d-a524-585060cf9a80</guid>
      <title>Making compliance count</title>
      <description><![CDATA[<p>Join Péter Budai, Tresoit’s Chief Product Officer, as he breaks down the data compliance landscape in Europe and the United States and looks at how firms can get the most from their data protection policies. </p><p>Initially, compliance can seem daunting. But taking the time to evaluate your company’s digital infrastructure isn’t just about managing potential risks — it can also help managers identify bottlenecks, boost everyday office efficiency, and gain an edge over competitors.</p><p>As well as explaining some key tools that companies can use to meet common data protection laws — including end-to-end encryption, privacy by design, and data minimization — Péter will also discuss how companies can use compliance to build trusting customer relationships with an emphasis on ethical behavior, customer protection, social responsibility.</p>
<p><p>Find out more at www.tresorit.com</p></p>]]></description>
      <pubDate>Thu, 16 Nov 2023 07:00:00 +0000</pubDate>
      <author>spotify-podcaster@tresorit.com (Péter Budai)</author>
      <link>https://under-ctrl.simplecast.com/episodes/making-compliance-count-JBu0ES50</link>
      <content:encoded><![CDATA[<p>Join Péter Budai, Tresoit’s Chief Product Officer, as he breaks down the data compliance landscape in Europe and the United States and looks at how firms can get the most from their data protection policies. </p><p>Initially, compliance can seem daunting. But taking the time to evaluate your company’s digital infrastructure isn’t just about managing potential risks — it can also help managers identify bottlenecks, boost everyday office efficiency, and gain an edge over competitors.</p><p>As well as explaining some key tools that companies can use to meet common data protection laws — including end-to-end encryption, privacy by design, and data minimization — Péter will also discuss how companies can use compliance to build trusting customer relationships with an emphasis on ethical behavior, customer protection, social responsibility.</p>
<p><p>Find out more at www.tresorit.com</p></p>]]></content:encoded>
      <enclosure length="17040801" type="audio/mpeg" url="https://chrt.fm/track/1A2EF3/cdn.simplecast.com/audio/ae66bc11-4050-400a-9f39-99119f3f24d3/episodes/b18b2eff-99ef-4b78-b894-d9ee1b10a3d7/audio/bacf5283-b84d-4e14-8efa-75ce12b54e29/default_tc.mp3?aid=rss_feed&amp;feed=9hgsF902"/>
      <itunes:title>Making compliance count</itunes:title>
      <itunes:author>Péter Budai</itunes:author>
      <itunes:duration>00:17:44</itunes:duration>
      <itunes:summary>For many companies, complying with regulations such as GDPR and HIPAA is a legal requirement. But future-facing businesses can use compliance to their advantage to improve efficiency, increase competitiveness, and build trust with clients.</itunes:summary>
      <itunes:subtitle>For many companies, complying with regulations such as GDPR and HIPAA is a legal requirement. But future-facing businesses can use compliance to their advantage to improve efficiency, increase competitiveness, and build trust with clients.</itunes:subtitle>
      <itunes:keywords>gdpr, hipaa, data minimization, end-to-end encryption, data loss, cybersecurity, compliance, fcra, privacy by design, data privacy</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>39</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">db70347f-7fac-4d3a-9c34-c8430457a5d6</guid>
      <title>How to build businesses’ cyber-resilience</title>
      <description><![CDATA[<p>In this episode of Under CTRL, Tresorit’s Chief Technology Officer, Péter Budai, joins ICA Consultancy’s Ben De La Salle to discuss how organizations can not only withstand cyberattacks, but also recover from them.</p><p>For truly resilient companies, cyber security isn’t just seen as an IT issue, but as everyone’s responsibility. That’s because the fallout from a digital attack can be felt across an organization, from disrupting workflows to damaging customer trust. </p><p>We look at how IT teams can prepare for potential cyber events by getting serious about risk assessment, as well as collaborating and building strong company-wide connections.</p><p>We’ll also talk about the benefits the companies can gain by prioritizing their assets, no matter their organization’s size or budget.</p>
<p><p>Find out more at www.tresorit.com</p></p>]]></description>
      <pubDate>Thu, 19 Oct 2023 06:00:00 +0000</pubDate>
      <author>spotify-podcaster@tresorit.com (Ben De La Salle, Péter Budai)</author>
      <link>https://under-ctrl.simplecast.com/episodes/how-to-build-businesses-cyber-resilience-jby9khU9</link>
      <content:encoded><![CDATA[<p>In this episode of Under CTRL, Tresorit’s Chief Technology Officer, Péter Budai, joins ICA Consultancy’s Ben De La Salle to discuss how organizations can not only withstand cyberattacks, but also recover from them.</p><p>For truly resilient companies, cyber security isn’t just seen as an IT issue, but as everyone’s responsibility. That’s because the fallout from a digital attack can be felt across an organization, from disrupting workflows to damaging customer trust. </p><p>We look at how IT teams can prepare for potential cyber events by getting serious about risk assessment, as well as collaborating and building strong company-wide connections.</p><p>We’ll also talk about the benefits the companies can gain by prioritizing their assets, no matter their organization’s size or budget.</p>
<p><p>Find out more at www.tresorit.com</p></p>]]></content:encoded>
      <enclosure length="49803012" type="audio/mpeg" url="https://chrt.fm/track/1A2EF3/cdn.simplecast.com/audio/ae66bc11-4050-400a-9f39-99119f3f24d3/episodes/6ee8b3de-3ad4-4044-92e3-0fb94e517be6/audio/e50ba600-097b-4470-b2f1-40a5f44359c3/default_tc.mp3?aid=rss_feed&amp;feed=9hgsF902"/>
      <itunes:title>How to build businesses’ cyber-resilience</itunes:title>
      <itunes:author>Ben De La Salle, Péter Budai</itunes:author>
      <itunes:duration>00:51:52</itunes:duration>
      <itunes:summary>It’s every security team’s nightmare scenario: a malicious cyberattack that puts valuable company assets at risk. But when the worst has already happened, what should come next?

Cyber-resilience allows companies to quickly bounce back from digital events — and it has never been more vital for modern organizations. </itunes:summary>
      <itunes:subtitle>It’s every security team’s nightmare scenario: a malicious cyberattack that puts valuable company assets at risk. But when the worst has already happened, what should come next?

Cyber-resilience allows companies to quickly bounce back from digital events — and it has never been more vital for modern organizations. </itunes:subtitle>
      <itunes:keywords>encryption, workflows, ngos, trust, data security, cloud solutions, cyber-resilience, end-to-end, remote working, cybersecurity, privacy</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>38</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">3946c234-73cb-4210-9173-3ab95757d898</guid>
      <title>Unlocking encryption for NGOs</title>
      <description><![CDATA[<p>In this episode of Under CTRL, Tresorit’s Aaron Stillman talks with Jason Keller, digital strategy developer for Vistant, and James Eaton-Lee, CISO for NetHope, on how NGOs can protect their most important assets in the online age. </p><p> </p><p>Non-profits are often used to working in demanding environments, but they also face unique challenges in the digital realm. Operating out in the field can strain connectivity, while an ever-changing roster of volunteers, freelancers, and partners poses problems for both security and accessibility. Most worrying of all is the increasing threat of state-backed actors, who can dedicate large amounts of resources to attack or discredit activist groups. </p><p> </p><p>Together, Aaron, James, and Jason break down how NGOs can face these threats head-on by investing in technical tools such as encryption, as well as practical measures such as training and usability. We also look at the wider tech landscape, and how investing in security can help non-profits safeguard not only key assets, but also their ethical responsibilities and reputation. </p>
<p><p>Find out more at www.tresorit.com</p></p>]]></description>
      <pubDate>Thu, 5 Oct 2023 06:00:00 +0000</pubDate>
      <author>spotify-podcaster@tresorit.com (Tresorit)</author>
      <link>https://under-ctrl.simplecast.com/episodes/unlocking-encryption-for-ngos-3woOQJ5c</link>
      <content:encoded><![CDATA[<p>In this episode of Under CTRL, Tresorit’s Aaron Stillman talks with Jason Keller, digital strategy developer for Vistant, and James Eaton-Lee, CISO for NetHope, on how NGOs can protect their most important assets in the online age. </p><p> </p><p>Non-profits are often used to working in demanding environments, but they also face unique challenges in the digital realm. Operating out in the field can strain connectivity, while an ever-changing roster of volunteers, freelancers, and partners poses problems for both security and accessibility. Most worrying of all is the increasing threat of state-backed actors, who can dedicate large amounts of resources to attack or discredit activist groups. </p><p> </p><p>Together, Aaron, James, and Jason break down how NGOs can face these threats head-on by investing in technical tools such as encryption, as well as practical measures such as training and usability. We also look at the wider tech landscape, and how investing in security can help non-profits safeguard not only key assets, but also their ethical responsibilities and reputation. </p>
<p><p>Find out more at www.tresorit.com</p></p>]]></content:encoded>
      <enclosure length="38776823" type="audio/mpeg" url="https://chrt.fm/track/1A2EF3/cdn.simplecast.com/audio/ae66bc11-4050-400a-9f39-99119f3f24d3/episodes/27aaf6d1-2de2-4467-bf35-4f7e2232d90b/audio/60855e5e-48ba-4147-adcc-5fadc5770782/default_tc.mp3?aid=rss_feed&amp;feed=9hgsF902"/>
      <itunes:title>Unlocking encryption for NGOs</itunes:title>
      <itunes:author>Tresorit</itunes:author>
      <itunes:duration>00:40:23</itunes:duration>
      <itunes:summary>Non-profit organizations work directly with the world’s most vulnerable communities. But with shoestring budgets, how should NGOs protect important data from cyber threats that range from hostile state actors to accidental leaks?</itunes:summary>
      <itunes:subtitle>Non-profit organizations work directly with the world’s most vulnerable communities. But with shoestring budgets, how should NGOs protect important data from cyber threats that range from hostile state actors to accidental leaks?</itunes:subtitle>
      <itunes:keywords>non-profits, encryption, workflows, ngos, trust, data security, cloud solutions, end-to-end, remote working, cybersecurity, privacy</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>38</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">1c6e63af-d6c6-404b-81b8-e225960e8a83</guid>
      <title>State of the Union: Tresorits aktuelle Features für Sommer 2023</title>
      <description><![CDATA[<p>Bei Tresorit arbeiten wir ständig hinter den Kulissen an den Funktionen und Lösungen, die Ihre persönlichen Daten schützen.</p><p>Und da die meisten unserer Verbesserungen auf das Feedback unserer Kunden zurückgehen, stellen wir sicher, dass unsere Nutzer bei der Vorstellung unserer neuesten Updates einen Platz in der ersten Reihe erhalten.</p><p>Wie immer in unseren State of the Union-Webinaren gehen wir auf die neuesten Tresorit-Releases der letzten sechs Monate ein und geben einen kleinen Ausblick auf das, was als nächstes kommt.</p><p>In dieser Folge sind Chief Revenue Officer Peter Stössel und die Senior Product Manager David Imre Szarvas und Norbert Hegyaljai anwesend, um über Funktionen wie Tresorit eSign, Ordnerübernahme und -organisation sowie unsere anpassbaren Subdomains zu sprechen.</p><p>In einer speziellen Fragerunde kommen auch Experten für Cybersicherheit zu Wort, und wir sprechen über einige spannende Neuigkeiten von der RSA-Konferenz in San Francisco.</p>
<p><p>Find out more at www.tresorit.com</p></p>]]></description>
      <pubDate>Thu, 14 Sep 2023 06:00:00 +0000</pubDate>
      <author>spotify-podcaster@tresorit.com (Peter Stössel, Norbert Hegyaljai, Ferenc Margl)</author>
      <link>https://under-ctrl.simplecast.com/episodes/state-of-the-union-tresorits-aktuelle-features-fur-sommer-2023t-3cxOpa_1</link>
      <content:encoded><![CDATA[<p>Bei Tresorit arbeiten wir ständig hinter den Kulissen an den Funktionen und Lösungen, die Ihre persönlichen Daten schützen.</p><p>Und da die meisten unserer Verbesserungen auf das Feedback unserer Kunden zurückgehen, stellen wir sicher, dass unsere Nutzer bei der Vorstellung unserer neuesten Updates einen Platz in der ersten Reihe erhalten.</p><p>Wie immer in unseren State of the Union-Webinaren gehen wir auf die neuesten Tresorit-Releases der letzten sechs Monate ein und geben einen kleinen Ausblick auf das, was als nächstes kommt.</p><p>In dieser Folge sind Chief Revenue Officer Peter Stössel und die Senior Product Manager David Imre Szarvas und Norbert Hegyaljai anwesend, um über Funktionen wie Tresorit eSign, Ordnerübernahme und -organisation sowie unsere anpassbaren Subdomains zu sprechen.</p><p>In einer speziellen Fragerunde kommen auch Experten für Cybersicherheit zu Wort, und wir sprechen über einige spannende Neuigkeiten von der RSA-Konferenz in San Francisco.</p>
<p><p>Find out more at www.tresorit.com</p></p>]]></content:encoded>
      <enclosure length="31394917" type="audio/mpeg" url="https://chrt.fm/track/1A2EF3/cdn.simplecast.com/audio/ae66bc11-4050-400a-9f39-99119f3f24d3/episodes/d6e3bcc9-b7a1-439f-839e-1d810f778805/audio/12c17ca7-9cdb-4e9c-926a-b1ce4ae8815f/default_tc.mp3?aid=rss_feed&amp;feed=9hgsF902"/>
      <itunes:title>State of the Union: Tresorits aktuelle Features für Sommer 2023</itunes:title>
      <itunes:author>Peter Stössel, Norbert Hegyaljai, Ferenc Margl</itunes:author>
      <itunes:duration>00:32:41</itunes:duration>
      <itunes:summary>Es ist Zeit für Tresorits Rede zur Lage der Nation im Sommer 2023! Seien Sie dabei und erfahren Sie mehr über die neuesten Updates und Versionen des Unternehmens, einschließlich der Verbesserungen unserer e-Signatur-Lösung und der optimierten eigenständigen Dateifreigabe.</itunes:summary>
      <itunes:subtitle>Es ist Zeit für Tresorits Rede zur Lage der Nation im Sommer 2023! Seien Sie dabei und erfahren Sie mehr über die neuesten Updates und Versionen des Unternehmens, einschließlich der Verbesserungen unserer e-Signatur-Lösung und der optimierten eigenständigen Dateifreigabe.</itunes:subtitle>
      <itunes:keywords>file sharing, data protection, cybersecurity, e-sign encryption, collaboration, digital signatures</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>37</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">bc38a412-e1b8-4a31-80d6-c37386d7e30b</guid>
      <title>State of the Union: what’s next for Tresorit in 2023</title>
      <description><![CDATA[<p>At Tresorit, we’re always working behind the scenes on the features and solutions that keep your personal data safe.</p><p> </p><p>And as most of our improvements are driven by customer feedback, we make sure our users get a front-row seat as we unveil our latest updates.</p><p> </p><p>As always in our State of the Union webinars, we’ll be diving into the latest Tresorit releases from the past six months, and getting a small preview of what’s coming next. </p><p> </p><p>In this episode, chief revenue officer Peter Stössel and senior product managers David Imre Szarvas and Norbert Hegyaljai are all on hand to discuss features such as Tresorit eSign, folder takeovers and organization, and our customizable subdomains.</p><p> </p><p>We also hear from cybersecurity professionals in a special Q&A session, and talk about some exciting news from the RSA conference in San Francisco.</p>
<p><p>Find out more at www.tresorit.com</p></p>]]></description>
      <pubDate>Thu, 10 Aug 2023 06:00:00 +0000</pubDate>
      <author>spotify-podcaster@tresorit.com (Tresorit)</author>
      <link>https://under-ctrl.simplecast.com/episodes/state-of-the-union-whats-next-for-tresorit-in-2023-fXgj2boD</link>
      <content:encoded><![CDATA[<p>At Tresorit, we’re always working behind the scenes on the features and solutions that keep your personal data safe.</p><p> </p><p>And as most of our improvements are driven by customer feedback, we make sure our users get a front-row seat as we unveil our latest updates.</p><p> </p><p>As always in our State of the Union webinars, we’ll be diving into the latest Tresorit releases from the past six months, and getting a small preview of what’s coming next. </p><p> </p><p>In this episode, chief revenue officer Peter Stössel and senior product managers David Imre Szarvas and Norbert Hegyaljai are all on hand to discuss features such as Tresorit eSign, folder takeovers and organization, and our customizable subdomains.</p><p> </p><p>We also hear from cybersecurity professionals in a special Q&A session, and talk about some exciting news from the RSA conference in San Francisco.</p>
<p><p>Find out more at www.tresorit.com</p></p>]]></content:encoded>
      <enclosure length="30345173" type="audio/mpeg" url="https://chrt.fm/track/1A2EF3/cdn.simplecast.com/audio/ae66bc11-4050-400a-9f39-99119f3f24d3/episodes/bbcacbae-2193-46b4-b758-a7268dec6385/audio/918ab6d6-4c70-430a-8b42-e1aeba55a40e/default_tc.mp3?aid=rss_feed&amp;feed=9hgsF902"/>
      <itunes:title>State of the Union: what’s next for Tresorit in 2023</itunes:title>
      <itunes:author>Tresorit</itunes:author>
      <itunes:duration>00:31:36</itunes:duration>
      <itunes:summary>It’s time for Tresorit’s State of the Union address for summer 2023! Join us to hear more about the company’s latest updates and releases, including improvements to our e-sign solution and streamlined standalone filesharing.</itunes:summary>
      <itunes:subtitle>It’s time for Tresorit’s State of the Union address for summer 2023! Join us to hear more about the company’s latest updates and releases, including improvements to our e-sign solution and streamlined standalone filesharing.</itunes:subtitle>
      <itunes:keywords>file sharing, e-sign, encryption, data protection, cybersecurity, collaboration, digital signatures</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>36</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">8e2c04cb-2bdc-4e95-b4b9-2a24996205e2</guid>
      <title>When data privacy means life or death, with Ethan Gutmann</title>
      <description><![CDATA[<p>Across the globe, governments are using cutting-edge technology to surveil their citizens en masse. In oppressive or autocratic regimes, state security services regularly exploit tools such as facial recognition and GPS tracking to find and imprison political dissidents.</p><p>Luckily, digital innovation is also unlocking new possibilities for human rights defenders who need to protect both themselves and the vital testimonies they gather.</p><p>In this episode, researcher, author, and Nobel prize-nominee Ethan Gutmann joins Tresorit’s Stefan Killer-Haug to discuss how end-to-end encryption and zero-knowledge principles can help human rights advocates to carry out their important work.</p><p>As well as recounting his personal experiences of evading state surveillance while gathering evidence of China’s forced organ harvesting program, Ethan discusses the solutions he’s found to protect the lives of those fleeing persecution — and what the future could hold for human rights defenders in a world of AI. </p>
<p><p>Find out more at www.tresorit.com</p></p>]]></description>
      <pubDate>Thu, 13 Jul 2023 06:00:00 +0000</pubDate>
      <author>spotify-podcaster@tresorit.com (Ethan Gutmann, Stefan Killer-Haug)</author>
      <link>https://under-ctrl.simplecast.com/episodes/when-data-privacy-means-life-or-death-with-ethan-gutmann-m5IGjV5x</link>
      <content:encoded><![CDATA[<p>Across the globe, governments are using cutting-edge technology to surveil their citizens en masse. In oppressive or autocratic regimes, state security services regularly exploit tools such as facial recognition and GPS tracking to find and imprison political dissidents.</p><p>Luckily, digital innovation is also unlocking new possibilities for human rights defenders who need to protect both themselves and the vital testimonies they gather.</p><p>In this episode, researcher, author, and Nobel prize-nominee Ethan Gutmann joins Tresorit’s Stefan Killer-Haug to discuss how end-to-end encryption and zero-knowledge principles can help human rights advocates to carry out their important work.</p><p>As well as recounting his personal experiences of evading state surveillance while gathering evidence of China’s forced organ harvesting program, Ethan discusses the solutions he’s found to protect the lives of those fleeing persecution — and what the future could hold for human rights defenders in a world of AI. </p>
<p><p>Find out more at www.tresorit.com</p></p>]]></content:encoded>
      <enclosure length="83827334" type="audio/mpeg" url="https://chrt.fm/track/1A2EF3/cdn.simplecast.com/audio/ae66bc11-4050-400a-9f39-99119f3f24d3/episodes/f7621b3a-4b45-40ff-a706-5164dcde5d33/audio/c4ac9879-f354-45e3-9e89-7e9fc380d1b2/default_tc.mp3?aid=rss_feed&amp;feed=9hgsF902"/>
      <itunes:title>When data privacy means life or death, with Ethan Gutmann</itunes:title>
      <itunes:author>Ethan Gutmann, Stefan Killer-Haug</itunes:author>
      <itunes:duration>01:27:17</itunes:duration>
      <itunes:summary>Join human rights advocate Ethan Gutmann as he discusses how the right technology can protect whistle-blowers and witnesses in some of the world’s most oppressive regimes. </itunes:summary>
      <itunes:subtitle>Join human rights advocate Ethan Gutmann as he discusses how the right technology can protect whistle-blowers and witnesses in some of the world’s most oppressive regimes. </itunes:subtitle>
      <itunes:keywords>surveillance, encryption, data protection, uighur, central asia, cybersecurity, ai, xinjiang, privacy, china, human rights</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>35</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">c875f3dc-ea64-4f9f-9049-56e1b16fb69e</guid>
      <title>Warum digitales Vertrauen wichtig ist</title>
      <description><![CDATA[<p>Vertrauen ist das Herzstück produktiver Geschäftsbeziehungen. </p><p>Doch die Verbraucher zögern oft, ihr Vertrauen in die digitalen Technologien zu setzen, die moderne und bahnbrechende Unternehmen vorantreiben.</p><p>In dieser Folge setzt sich Stefan Killer-Haug von Tresorit mit Nicolas Zahn von der Swiss Digital Initiative zusammen, um über die Besonderheiten des digitalen Vertrauens zu sprechen und zu erklären, warum der Aufbau von Verbrauchervertrauen entscheidend ist, wenn Unternehmen die Vorteile der Spitzentechnologie wirklich nutzen wollen.</p><p>Wir gehen auch auf einige der wichtigsten Themen ein, die den Umgang von Unternehmen mit Daten heute und in Zukunft bestimmen: von der Frage, wie sich die Vorstellung von digitalem Vertrauen in den verschiedenen internationalen Märkten unterscheidet, bis hin zum Erhalt des Kundenvertrauens in einer Welt der KI.</p><p>Wenn Sie in Zukunft mehr von unseren Webinaren sehen möchten, vergessen Sie nicht, sich hier beim <a href="https://www.linkedin.com/company/tresorit/" target="_blank">LinkedIn-Kanal von Tresorit</a> anzumelden.</p>
<p><p>Find out more at www.tresorit.com</p></p>]]></description>
      <pubDate>Thu, 8 Jun 2023 09:22:43 +0000</pubDate>
      <author>spotify-podcaster@tresorit.com (Stafan Killer-Haug, Nicolas Zahn)</author>
      <link>https://under-ctrl.simplecast.com/episodes/warum-digitales-vertrauen-wichtig-ist-bN_nT1CJ</link>
      <content:encoded><![CDATA[<p>Vertrauen ist das Herzstück produktiver Geschäftsbeziehungen. </p><p>Doch die Verbraucher zögern oft, ihr Vertrauen in die digitalen Technologien zu setzen, die moderne und bahnbrechende Unternehmen vorantreiben.</p><p>In dieser Folge setzt sich Stefan Killer-Haug von Tresorit mit Nicolas Zahn von der Swiss Digital Initiative zusammen, um über die Besonderheiten des digitalen Vertrauens zu sprechen und zu erklären, warum der Aufbau von Verbrauchervertrauen entscheidend ist, wenn Unternehmen die Vorteile der Spitzentechnologie wirklich nutzen wollen.</p><p>Wir gehen auch auf einige der wichtigsten Themen ein, die den Umgang von Unternehmen mit Daten heute und in Zukunft bestimmen: von der Frage, wie sich die Vorstellung von digitalem Vertrauen in den verschiedenen internationalen Märkten unterscheidet, bis hin zum Erhalt des Kundenvertrauens in einer Welt der KI.</p><p>Wenn Sie in Zukunft mehr von unseren Webinaren sehen möchten, vergessen Sie nicht, sich hier beim <a href="https://www.linkedin.com/company/tresorit/" target="_blank">LinkedIn-Kanal von Tresorit</a> anzumelden.</p>
<p><p>Find out more at www.tresorit.com</p></p>]]></content:encoded>
      <enclosure length="55132545" type="audio/mpeg" url="https://chrt.fm/track/1A2EF3/cdn.simplecast.com/audio/ae66bc11-4050-400a-9f39-99119f3f24d3/episodes/cf159102-f63a-42e9-850d-4c5cc1af673b/audio/88b382fc-9310-43b8-af0d-5a62cf0559dd/default_tc.mp3?aid=rss_feed&amp;feed=9hgsF902"/>
      <itunes:title>Warum digitales Vertrauen wichtig ist</itunes:title>
      <itunes:author>Stafan Killer-Haug, Nicolas Zahn</itunes:author>
      <itunes:duration>00:57:25</itunes:duration>
      <itunes:summary>Wir leben in einer Welt der unbegrenzten digitalen Möglichkeiten. Warum also halten so viele Verbraucher - und so viele Unternehmen - immer noch an unzuverlässigen analogen Geschäftsinstrumenten fest?
Für viele ist die Antwort ganz einfach mangelndes Vertrauen: der Glaube, dass entweder Unternehmen oder ihre externen Partner ihre privaten oder sensiblen Daten nicht korrekt, ethisch korrekt und sicher behandeln werden.
Infolgedessen haben sowohl Verbraucher als auch Unternehmen Schwierigkeiten, das Beste, was die digitale Welt zu bieten hat, zu nutzen.  
In dieser Folge sprechen wir mit Nicolas Zahn von der Swiss Digital Initiative darüber, wie Organisationen digitales Vertrauen wiederherstellen können, um eine gerechtere und transparentere Gesellschaft zu schaffen - und wie Unternehmen dies zu ihrem Vorteil nutzen können. </itunes:summary>
      <itunes:subtitle>Wir leben in einer Welt der unbegrenzten digitalen Möglichkeiten. Warum also halten so viele Verbraucher - und so viele Unternehmen - immer noch an unzuverlässigen analogen Geschäftsinstrumenten fest?
Für viele ist die Antwort ganz einfach mangelndes Vertrauen: der Glaube, dass entweder Unternehmen oder ihre externen Partner ihre privaten oder sensiblen Daten nicht korrekt, ethisch korrekt und sicher behandeln werden.
Infolgedessen haben sowohl Verbraucher als auch Unternehmen Schwierigkeiten, das Beste, was die digitale Welt zu bieten hat, zu nutzen.  
In dieser Folge sprechen wir mit Nicolas Zahn von der Swiss Digital Initiative darüber, wie Organisationen digitales Vertrauen wiederherstellen können, um eine gerechtere und transparentere Gesellschaft zu schaffen - und wie Unternehmen dies zu ihrem Vorteil nutzen können. </itunes:subtitle>
      <itunes:keywords>künstliche intelligenz, konsumentenvertrauen, datenschutz, digitales vertrauen, cybersecurity, verschlüsselung, swiss digital trust label, datensicherheit, kryptographie, ai, e2ee, benutzerfreundlichkeit, ende-zu-ende-verschlüsselung</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>34</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">703a9986-0e4e-4b3d-8a13-b284c593e0a8</guid>
      <title>How companies can go beyond end-to-end encryption</title>
      <description><![CDATA[<p>End-to-end encryption (E2EE) is increasingly mainstream, appearing in everything from mass-market instant messaging apps to high-end password managers. </p><p>But for E2EE to truly reach its potential, it needs to act as just one part of a secure IT infrastructure. And while more IT products than ever before claim to use end-to-end encryption to keep your data safe, many of these solutions also cut vital corners in their cryptography protocols — putting your information at risk. </p><p>In this special webinar podcast direct from ITsa365, Tresorit co-founder and CISO, Szilveszter Szebeni, talks to Encryption Europe’s James Briscoe about down the different types of encryption, how end-to-end encryption works, and what organizations need to be looking for in their secure IT solutions. </p><p>We’ll also be discussing why email as we know it today will never be secure, and the myth that easy-to-use products are more vulnerable to cyberattacks.</p>
<p><p>Find out more at www.tresorit.com</p></p>]]></description>
      <pubDate>Wed, 24 May 2023 06:00:00 +0000</pubDate>
      <author>spotify-podcaster@tresorit.com (Szilveszter Szebeni)</author>
      <link>https://under-ctrl.simplecast.com/episodes/how-companies-can-go-beyond-end-to-end-encryption-FzO02pBg</link>
      <content:encoded><![CDATA[<p>End-to-end encryption (E2EE) is increasingly mainstream, appearing in everything from mass-market instant messaging apps to high-end password managers. </p><p>But for E2EE to truly reach its potential, it needs to act as just one part of a secure IT infrastructure. And while more IT products than ever before claim to use end-to-end encryption to keep your data safe, many of these solutions also cut vital corners in their cryptography protocols — putting your information at risk. </p><p>In this special webinar podcast direct from ITsa365, Tresorit co-founder and CISO, Szilveszter Szebeni, talks to Encryption Europe’s James Briscoe about down the different types of encryption, how end-to-end encryption works, and what organizations need to be looking for in their secure IT solutions. </p><p>We’ll also be discussing why email as we know it today will never be secure, and the myth that easy-to-use products are more vulnerable to cyberattacks.</p>
<p><p>Find out more at www.tresorit.com</p></p>]]></content:encoded>
      <enclosure length="30042706" type="audio/mpeg" url="https://chrt.fm/track/1A2EF3/cdn.simplecast.com/audio/ae66bc11-4050-400a-9f39-99119f3f24d3/episodes/f36ce2ae-3b86-4d1f-af21-c10564a9a5c8/audio/721b5d80-4122-4d56-b1a0-8edd565088f1/default_tc.mp3?aid=rss_feed&amp;feed=9hgsF902"/>
      <itunes:title>How companies can go beyond end-to-end encryption</itunes:title>
      <itunes:author>Szilveszter Szebeni</itunes:author>
      <itunes:duration>00:31:17</itunes:duration>
      <itunes:summary>End-to-end encryption (E2EE) is the best way to keep your personal data safe from prying eyes. But not every IT solution that uses E2EE truly delivers on its promise of security and transparency.
Join Tresorit co-founder and CISO, Szilveszter Szebeni, as he delves into what businesses should be looking for in their E2EE solutions, and how the right tools can be used to minimize human error.</itunes:summary>
      <itunes:subtitle>End-to-end encryption (E2EE) is the best way to keep your personal data safe from prying eyes. But not every IT solution that uses E2EE truly delivers on its promise of security and transparency.
Join Tresorit co-founder and CISO, Szilveszter Szebeni, as he delves into what businesses should be looking for in their E2EE solutions, and how the right tools can be used to minimize human error.</itunes:subtitle>
      <itunes:keywords>shadow it, encryption, password managers, data security, end-to-end encryption, cybersecurity, cryptography, usability, e2ee, data breaches</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>33</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">4e83aea2-2b5d-420e-8f17-469f41e9d119</guid>
      <title>The work from home guide to cybersecurity</title>
      <description><![CDATA[<p>In this episode, Tresorit’s <a href="https://www.linkedin.com/in/stefan-killer-haug/?trk=public_profile_recommendations&originalSubdomain=de" target="_blank"><strong>Stefan Killer-Haug </strong></a>joins security consultant and private investigator <strong>Shannon Miller </strong>to discuss the importance of cybersecurity for remote workers and how to your data safe while working from home. </p><p>The popularity of flexible and hybrid working has exploded in recent years — and if you’re one of the many who has swapped the office for WFH, then it’s never been more important to keep your home network secure. </p><p>Listen in as Shannon discusses her experiences dealing with cybercriminals in domestic settings, the common ways that scammers and hackers identify their targets, and how easy-to-implement steps such as strong encryption can protect your and your family’s data.</p><p>We also take a special look at how outside attackers can use the Internet of Things (IoT) — including internet-enabled TVs, gaming consoles, and even smart toasters and refrigerators — to find vulnerabilities in your computer systems.</p>
<p><p>Find out more at www.tresorit.com</p></p>]]></description>
      <pubDate>Thu, 11 May 2023 06:00:00 +0000</pubDate>
      <author>spotify-podcaster@tresorit.com (Shannon Miller, Stefan Killer-Haug)</author>
      <link>https://under-ctrl.simplecast.com/episodes/the-work-from-home-guide-to-cybersecurity-t7CouwrD</link>
      <content:encoded><![CDATA[<p>In this episode, Tresorit’s <a href="https://www.linkedin.com/in/stefan-killer-haug/?trk=public_profile_recommendations&originalSubdomain=de" target="_blank"><strong>Stefan Killer-Haug </strong></a>joins security consultant and private investigator <strong>Shannon Miller </strong>to discuss the importance of cybersecurity for remote workers and how to your data safe while working from home. </p><p>The popularity of flexible and hybrid working has exploded in recent years — and if you’re one of the many who has swapped the office for WFH, then it’s never been more important to keep your home network secure. </p><p>Listen in as Shannon discusses her experiences dealing with cybercriminals in domestic settings, the common ways that scammers and hackers identify their targets, and how easy-to-implement steps such as strong encryption can protect your and your family’s data.</p><p>We also take a special look at how outside attackers can use the Internet of Things (IoT) — including internet-enabled TVs, gaming consoles, and even smart toasters and refrigerators — to find vulnerabilities in your computer systems.</p>
<p><p>Find out more at www.tresorit.com</p></p>]]></content:encoded>
      <enclosure length="49810053" type="audio/mpeg" url="https://chrt.fm/track/1A2EF3/cdn.simplecast.com/audio/ae66bc11-4050-400a-9f39-99119f3f24d3/episodes/c1756117-0070-4911-999a-0e16e5817b38/audio/95a5ff6b-69a9-4ceb-bb41-097fdd140676/default_tc.mp3?aid=rss_feed&amp;feed=9hgsF902"/>
      <itunes:title>The work from home guide to cybersecurity</itunes:title>
      <itunes:author>Shannon Miller, Stefan Killer-Haug</itunes:author>
      <itunes:duration>00:51:52</itunes:duration>
      <itunes:summary>More of us than ever before are choosing to work remotely. But blurring the line between home and the office also creates privacy risks that can be exploited by cybercriminals.
In this episode, we talk to security consultant and private investigator Shannon Miller on how you can keep your home office safe from digital attacks.</itunes:summary>
      <itunes:subtitle>More of us than ever before are choosing to work remotely. But blurring the line between home and the office also creates privacy risks that can be exploited by cybercriminals.
In this episode, we talk to security consultant and private investigator Shannon Miller on how you can keep your home office safe from digital attacks.</itunes:subtitle>
      <itunes:keywords>remote work, internet of things, encryption, data security, wfh, cybersecurity, hybrid work, flexible work, iot, work from home</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>32</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">f6a2b7bf-d15e-4bf7-91df-547db08af39b</guid>
      <title>Webinar - Harnessing the Power of Digital Trust</title>
      <description><![CDATA[<p>In this podcast episode, Stefan Killer-Haug, Tresorit's representative, and Diana Kaliff, product lead for Swiss Digital Initiative, discussed the importance of digital trust and certifications. They talked about the Swiss Digital Trust label launched in 2022, the importance of building trust online as well as in the physical world, having a user-centric mindset and prioritizing trust for B2B companies. The speakers also noted that with the growing consumer demand for data privacy, businesses need to actively plan for the future and adapt their technology, security, and data protection policies.</p>
<p><p>Find out more at www.tresorit.com</p></p>]]></description>
      <pubDate>Fri, 7 Apr 2023 06:00:00 +0000</pubDate>
      <author>spotify-podcaster@tresorit.com (Diana Kaliff, Stefan Killer-Haug)</author>
      <link>https://under-ctrl.simplecast.com/episodes/webinar-harnessing-the-power-of-digital-trust-1k2sZkMu</link>
      <content:encoded><![CDATA[<p>In this podcast episode, Stefan Killer-Haug, Tresorit's representative, and Diana Kaliff, product lead for Swiss Digital Initiative, discussed the importance of digital trust and certifications. They talked about the Swiss Digital Trust label launched in 2022, the importance of building trust online as well as in the physical world, having a user-centric mindset and prioritizing trust for B2B companies. The speakers also noted that with the growing consumer demand for data privacy, businesses need to actively plan for the future and adapt their technology, security, and data protection policies.</p>
<p><p>Find out more at www.tresorit.com</p></p>]]></content:encoded>
      <enclosure length="41656000" type="audio/mpeg" url="https://chrt.fm/track/1A2EF3/cdn.simplecast.com/audio/ae66bc11-4050-400a-9f39-99119f3f24d3/episodes/cdfe1bc5-9d50-4b05-8707-93df3889f7fd/audio/15e78916-e650-4b85-bcaf-fb59dde1a849/default_tc.mp3?aid=rss_feed&amp;feed=9hgsF902"/>
      <itunes:title>Webinar - Harnessing the Power of Digital Trust</itunes:title>
      <itunes:author>Diana Kaliff, Stefan Killer-Haug</itunes:author>
      <itunes:duration>00:43:23</itunes:duration>
      <itunes:summary>Discover the latest tools and trends for building trust and protecting data online in this episode. Learn how to establish a trustworthy online presence and grow your business with these essential insights.</itunes:summary>
      <itunes:subtitle>Discover the latest tools and trends for building trust and protecting data online in this episode. Learn how to establish a trustworthy online presence and grow your business with these essential insights.</itunes:subtitle>
      <itunes:keywords>ethical data use, b2b, cyber threats, data protection, cybersecurity, security, swiss digital trust label, digital trust, future-proofing, tresorit, user-centric, certification, data privacy</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>31</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">71cb4a11-2d9a-4281-b3c7-90b385812182</guid>
      <title>Webinar - How eSign keeps your business workflows encrypted and secure</title>
      <description><![CDATA[Discover how eSignatures improve cybersecurity & streamline workflows in this exciting podcast with Tresorit's CEO. Find out more at www.tresorit.com
]]></description>
      <pubDate>Wed, 22 Mar 2023 07:00:00 +0000</pubDate>
      <author>spotify-podcaster@tresorit.com (István Lám)</author>
      <link>https://under-ctrl.simplecast.com/episodes/webinar-why-esign-keeps-your-business-workflows-encrypted-and-secure-wkkpg_8v</link>
      <enclosure length="51139980" type="audio/mpeg" url="https://chrt.fm/track/1A2EF3/cdn.simplecast.com/audio/ae66bc11-4050-400a-9f39-99119f3f24d3/episodes/96854996-1c39-43f9-a2a4-dd8d2c3189a1/audio/f8b32c5a-7688-4a99-ae71-23235b10bd57/default_tc.mp3?aid=rss_feed&amp;feed=9hgsF902"/>
      <itunes:title>Webinar - How eSign keeps your business workflows encrypted and secure</itunes:title>
      <itunes:author>István Lám</itunes:author>
      <itunes:duration>00:53:15</itunes:duration>
      <itunes:summary>Discover how eSignatures improve cybersecurity &amp; streamline workflows in this exciting podcast with Tresorit&apos;s CEO.</itunes:summary>
      <itunes:subtitle>Discover how eSignatures improve cybersecurity &amp; streamline workflows in this exciting podcast with Tresorit&apos;s CEO.</itunes:subtitle>
      <itunes:keywords>gdpr, remote work, secure environment, esignatures, podcast, spotify, end-to-end encryption, data protection, cybersecurity, digital workflows, user-friendly software, compliance, supply chain security, document security, tresorit, cyberattacks, case studies, digital signatures, secure digital workspace, data breaches</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>30</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">e0ba7920-f6e5-4c11-8698-3d3f1a9a3302</guid>
      <title>State of the Union: A Look Back at 2022 and a Glimpse into 2023 (German)</title>
      <description><![CDATA[Erfahren Sie von Ferenc Margel und Peter Stössel die neuesten Verbesserungen und Funktionen der letzten Monate sowie einen Einblick in die Produkt-Roadmap 2023. Find out more at www.tresorit.com
]]></description>
      <pubDate>Thu, 9 Mar 2023 07:00:00 +0000</pubDate>
      <author>spotify-podcaster@tresorit.com (Ferenc Margl, Peter Stössel)</author>
      <link>https://under-ctrl.simplecast.com/episodes/state-of-the-union-a-look-back-at-2022-and-a-glimpse-into-2023-german-nPKzlMpQ</link>
      <enclosure length="23699586" type="audio/mpeg" url="https://chrt.fm/track/1A2EF3/cdn.simplecast.com/audio/ae66bc11-4050-400a-9f39-99119f3f24d3/episodes/36bf62fa-9ce5-4b6c-b7f6-14875e5a595b/audio/fa5cc742-bccb-4d7d-aa11-d8b7093680ea/default_tc.mp3?aid=rss_feed&amp;feed=9hgsF902"/>
      <itunes:title>State of the Union: A Look Back at 2022 and a Glimpse into 2023 (German)</itunes:title>
      <itunes:author>Ferenc Margl, Peter Stössel</itunes:author>
      <itunes:duration>00:24:40</itunes:duration>
      <itunes:summary>Erfahren Sie von Ferenc Margel und Peter Stössel die neuesten Verbesserungen und Funktionen der letzten Monate sowie einen Einblick in die Produkt-Roadmap 2023.</itunes:summary>
      <itunes:subtitle>Erfahren Sie von Ferenc Margel und Peter Stössel die neuesten Verbesserungen und Funktionen der letzten Monate sowie einen Einblick in die Produkt-Roadmap 2023.</itunes:subtitle>
      <itunes:keywords>file sharing, encryption, state of the union, new features, product roadmap, security, cloud storage, tresorit, data privacy, collaboration</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>29</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">c4fefbf5-d2ca-4c7c-a260-59ca0f3730dd</guid>
      <title>Webinar: State of the Union - Tresorit’s latest releases for 2023</title>
      <description><![CDATA[In our latest webinar, we reveal our roadmap for everything from electronic signatures to encrypted e-mail. Our CEO and co-founder István Lám is also on hand to provide the latest insider updates on what’s in store for 2023. Find out more at www.tresorit.com
]]></description>
      <pubDate>Thu, 9 Feb 2023 06:00:00 +0000</pubDate>
      <author>spotify-podcaster@tresorit.com (István Lám, Olivia Michaud)</author>
      <link>https://under-ctrl.simplecast.com/episodes/state-of-the-union-tresorits-latest-releases-for-2023-_evYJlOV</link>
      <enclosure length="38337328" type="audio/mpeg" url="https://chrt.fm/track/1A2EF3/cdn.simplecast.com/audio/ae66bc11-4050-400a-9f39-99119f3f24d3/episodes/720f497d-3207-4985-ac02-0019e75d6ea0/audio/b5611b9d-ea55-4c82-981e-1355222b5e5d/default_tc.mp3?aid=rss_feed&amp;feed=9hgsF902"/>
      <itunes:title>Webinar: State of the Union - Tresorit’s latest releases for 2023</itunes:title>
      <itunes:author>István Lám, Olivia Michaud</itunes:author>
      <itunes:duration>00:39:55</itunes:duration>
      <itunes:summary>In our latest webinar, we reveal our roadmap for everything from electronic signatures to encrypted e-mail. Our CEO and co-founder István Lám is also on hand to provide the latest insider updates on what’s in store for 2023.</itunes:summary>
      <itunes:subtitle>In our latest webinar, we reveal our roadmap for everything from electronic signatures to encrypted e-mail. Our CEO and co-founder István Lám is also on hand to provide the latest insider updates on what’s in store for 2023.</itunes:subtitle>
      <itunes:keywords>automated encryption, email encryption, admin control, security, tresorit, usability, custom branding, revoke email, esign</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>28</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">7d2af018-737b-4696-aaaf-cabd0ec7cdb0</guid>
      <title>Webinar - Privacy by Design</title>
      <description><![CDATA[How making IT tools private by design helps businesses flourish? In this episode you'll understand how to to boost efficiency and cybersecurity at your company. Find out more at www.tresorit.com
]]></description>
      <pubDate>Tue, 20 Dec 2022 08:00:00 +0000</pubDate>
      <author>spotify-podcaster@tresorit.com (Péter Budai, Tamás Molnár)</author>
      <link>https://under-ctrl.simplecast.com/episodes/privacy-by-design-TtNVoU6y</link>
      <enclosure length="28397065" type="audio/mpeg" url="https://chrt.fm/track/1A2EF3/cdn.simplecast.com/audio/ae66bc11-4050-400a-9f39-99119f3f24d3/episodes/cc326bb7-d1c1-4b48-951d-627f229662d9/audio/d684937c-3f05-45ff-8f9b-0c3c18d4361e/default_tc.mp3?aid=rss_feed&amp;feed=9hgsF902"/>
      <itunes:title>Webinar - Privacy by Design</itunes:title>
      <itunes:author>Péter Budai, Tamás Molnár</itunes:author>
      <itunes:duration>00:29:34</itunes:duration>
      <itunes:summary>How making IT tools private by design helps businesses flourish? In this episode you&apos;ll understand how to to boost efficiency and cybersecurity at your company.</itunes:summary>
      <itunes:subtitle>How making IT tools private by design helps businesses flourish? In this episode you&apos;ll understand how to to boost efficiency and cybersecurity at your company.</itunes:subtitle>
      <itunes:keywords>employee, administrator, domain verification, control, tresorit, email tool, data, privacy, subscription, access</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>27</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">938b2fd2-6c89-4d43-a4df-018c3056f3e0</guid>
      <title>Webinar - Tresorit eSign, the simple e-signature solution</title>
      <description><![CDATA[Tresorit becomes the platform to store sensitive documents, share confidential files and sign all types of business-critical agreements. In this episode you will meet Tresorit eSign, the simple, secure e-signature solution to sign all your confidential documents. Find out more at www.tresorit.com
]]></description>
      <pubDate>Wed, 2 Nov 2022 09:00:00 +0000</pubDate>
      <author>spotify-podcaster@tresorit.com (Böbe Hartung-Marjai, Tamás Molnár)</author>
      <link>https://under-ctrl.simplecast.com/episodes/webinar-tresorit-esign-the-simple-e-signature-solution-ujTZ_dep</link>
      <enclosure length="26994381" type="audio/mpeg" url="https://chrt.fm/track/1A2EF3/cdn.simplecast.com/audio/ae66bc11-4050-400a-9f39-99119f3f24d3/episodes/d7aeb64c-0e85-4ad1-9e80-5e114a36c8e8/audio/46ed221c-85d6-4e7c-8029-717fbd71d283/default_tc.mp3?aid=rss_feed&amp;feed=9hgsF902"/>
      <itunes:title>Webinar - Tresorit eSign, the simple e-signature solution</itunes:title>
      <itunes:author>Böbe Hartung-Marjai, Tamás Molnár</itunes:author>
      <itunes:duration>00:28:06</itunes:duration>
      <itunes:summary>Tresorit becomes the platform to store sensitive documents, share confidential files and sign all types of business-critical agreements. In this episode you will meet Tresorit eSign, the simple, secure e-signature solution to sign all your confidential documents.</itunes:summary>
      <itunes:subtitle>Tresorit becomes the platform to store sensitive documents, share confidential files and sign all types of business-critical agreements. In this episode you will meet Tresorit eSign, the simple, secure e-signature solution to sign all your confidential documents.</itunes:subtitle>
      <itunes:keywords>confidential, sign, esignature, email encryption, security, privacy, esign</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>26</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">eabda122-131d-4880-89ee-2f48fa419fdf</guid>
      <title>Webinar - State of the Union</title>
      <description><![CDATA[In this webinar, we guide you through Tresorit’s latest updates, from easier admin to encrypted e-mail. Find out more at www.tresorit.com
]]></description>
      <pubDate>Wed, 21 Sep 2022 07:00:00 +0000</pubDate>
      <author>spotify-podcaster@tresorit.com (Tresorit)</author>
      <link>https://under-ctrl.simplecast.com/episodes/webinar-state-of-the-union-duEQ9d5s</link>
      <enclosure length="39906678" type="audio/mpeg" url="https://chrt.fm/track/1A2EF3/cdn.simplecast.com/audio/ae66bc11-4050-400a-9f39-99119f3f24d3/episodes/cf64e7db-b476-44b9-80ee-8f863ae9cdf9/audio/ad40e5bc-6e50-4183-8b85-65c5c26a0fa7/default_tc.mp3?aid=rss_feed&amp;feed=9hgsF902"/>
      <itunes:title>Webinar - State of the Union</itunes:title>
      <itunes:author>Tresorit</itunes:author>
      <itunes:duration>00:41:32</itunes:duration>
      <itunes:summary>In this webinar, we guide you through Tresorit’s latest updates, from easier admin to encrypted e-mail.</itunes:summary>
      <itunes:subtitle>In this webinar, we guide you through Tresorit’s latest updates, from easier admin to encrypted e-mail.</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>25</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">5a0f3b55-bc77-4a73-9d5d-3f3d92893286</guid>
      <title>Webinar - 3 best practices for legal firms to protect client privilege</title>
      <description><![CDATA[Legal firms face a raft of digital threats — but almost all can be mitigated with a few simple steps. Find out more at www.tresorit.com
]]></description>
      <pubDate>Wed, 14 Sep 2022 07:25:00 +0000</pubDate>
      <author>spotify-podcaster@tresorit.com (Tresorit)</author>
      <link>https://under-ctrl.simplecast.com/episodes/webinar-3-best-practices-for-legal-firms-to-protect-client-privilege-6w2gGb1A</link>
      <enclosure length="21719379" type="audio/mpeg" url="https://chrt.fm/track/1A2EF3/cdn.simplecast.com/audio/ae66bc11-4050-400a-9f39-99119f3f24d3/episodes/4e06e5b9-de9f-47ca-ac01-b2d78a399af5/audio/033eb552-d7a7-45b7-8642-ddba7ebfa39d/default_tc.mp3?aid=rss_feed&amp;feed=9hgsF902"/>
      <itunes:title>Webinar - 3 best practices for legal firms to protect client privilege</itunes:title>
      <itunes:author>Tresorit</itunes:author>
      <itunes:duration>00:22:36</itunes:duration>
      <itunes:summary>Legal firms face a raft of digital threats — but almost all can be mitigated with a few simple steps.</itunes:summary>
      <itunes:subtitle>Legal firms face a raft of digital threats — but almost all can be mitigated with a few simple steps.</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>24</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">7aeb839d-3778-44d5-9d22-1b5273fd32d9</guid>
      <title>Webinar - Secure your digital business communications</title>
      <description><![CDATA[<h2>In this webinar, you'll learn:</h2><ul><li>What are the challenges of remote and hybrid ways of working</li><li>How to safeguard your digital business interactions by means of end-to-end encryption</li><li>Why Tresorit is a great service for secure file sharing and email</li><li>Why 7,000 companies have opted for Threema secure messaging</li></ul><h2>Reduce the risks of sharing information with peers, clients and other external parties.</h2>
<p><p>Find out more at www.tresorit.com</p></p>]]></description>
      <pubDate>Wed, 13 Jul 2022 14:25:52 +0000</pubDate>
      <author>spotify-podcaster@tresorit.com (Miguel Rodriguez, Olivia Michaud)</author>
      <link>https://under-ctrl.simplecast.com/episodes/webinar-secure-your-digital-business-communications-9s6Efn2C</link>
      <content:encoded><![CDATA[<h2>In this webinar, you'll learn:</h2><ul><li>What are the challenges of remote and hybrid ways of working</li><li>How to safeguard your digital business interactions by means of end-to-end encryption</li><li>Why Tresorit is a great service for secure file sharing and email</li><li>Why 7,000 companies have opted for Threema secure messaging</li></ul><h2>Reduce the risks of sharing information with peers, clients and other external parties.</h2>
<p><p>Find out more at www.tresorit.com</p></p>]]></content:encoded>
      <enclosure length="28178265" type="audio/mpeg" url="https://chrt.fm/track/1A2EF3/cdn.simplecast.com/audio/ae66bc11-4050-400a-9f39-99119f3f24d3/episodes/04f2c5f7-3258-40d6-9d4e-514473cf6ee4/audio/b91db550-a408-4f43-a284-257be224b46c/default_tc.mp3?aid=rss_feed&amp;feed=9hgsF902"/>
      <itunes:title>Webinar - Secure your digital business communications</itunes:title>
      <itunes:author>Miguel Rodriguez, Olivia Michaud</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/6bb881ee-2fad-49e8-b005-03e4cd35d484/6bc1e3b7-812b-4ab9-960a-b6cbddc67654/3000x3000/underctrl-artwork.jpg?aid=rss_feed"/>
      <itunes:duration>00:29:20</itunes:duration>
      <itunes:summary>New communication channels expose to new risks, learn how to secure your digital interactions - from emailing to messaging through file sharing.</itunes:summary>
      <itunes:subtitle>New communication channels expose to new risks, learn how to secure your digital interactions - from emailing to messaging through file sharing.</itunes:subtitle>
      <itunes:keywords>communication channels, email encryption, security, privacy, threema</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>23</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">a7e1fc83-ee63-40e4-a138-03967831079c</guid>
      <title>Webinar - Email Encryption in the new normal</title>
      <description><![CDATA[<h2>You’ll learn:</h2><ul><li>Why encrypting emails should be top of your list to protect business data</li><li>How to secure your hybrid workspace with email encryption</li><li>How to easily integrate secure emailing to your existing workflows</li></ul><p> </p><h2>Reduce the risks of sharing information with peers, clients and other external parties.</h2>
<p><p>Find out more at www.tresorit.com</p></p>]]></description>
      <pubDate>Thu, 30 Jun 2022 13:31:58 +0000</pubDate>
      <author>spotify-podcaster@tresorit.com (Olivia Michaud, Norbert Hegyaljai)</author>
      <link>https://under-ctrl.simplecast.com/episodes/webinar-email-encryption-in-the-new-normal-Ax1pO7up</link>
      <content:encoded><![CDATA[<h2>You’ll learn:</h2><ul><li>Why encrypting emails should be top of your list to protect business data</li><li>How to secure your hybrid workspace with email encryption</li><li>How to easily integrate secure emailing to your existing workflows</li></ul><p> </p><h2>Reduce the risks of sharing information with peers, clients and other external parties.</h2>
<p><p>Find out more at www.tresorit.com</p></p>]]></content:encoded>
      <enclosure length="30483186" type="audio/mpeg" url="https://chrt.fm/track/1A2EF3/cdn.simplecast.com/audio/ae66bc11-4050-400a-9f39-99119f3f24d3/episodes/8b6aec82-4635-47be-8d32-5c5967e7839f/audio/b0204943-8709-4d63-bd6b-14a7023eff38/default_tc.mp3?aid=rss_feed&amp;feed=9hgsF902"/>
      <itunes:title>Webinar - Email Encryption in the new normal</itunes:title>
      <itunes:author>Olivia Michaud, Norbert Hegyaljai</itunes:author>
      <itunes:duration>00:31:44</itunes:duration>
      <itunes:summary>Encrypting emails is key to securing modern workspaces. This recorded webinar taught about the trends driving this uptake, and why all email encryption is not equal.</itunes:summary>
      <itunes:subtitle>Encrypting emails is key to securing modern workspaces. This recorded webinar taught about the trends driving this uptake, and why all email encryption is not equal.</itunes:subtitle>
      <itunes:keywords>workspace, encryption, security, email</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>22</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">b8682a49-2bf5-4451-979f-2efa5cb95aed</guid>
      <title>Matt Mitchell: Making digital hygiene skills available for everyone</title>
      <description><![CDATA[<p>The current cyberspace landscape is a reflection of the world's social, political, and economic phenomena, mirroring the social inequality, discrimination and privacy violations that occur in society (and, in many cases, amplifying them). </p><p>In our next podcast episode, we’ll dive deeper into these issues with celebrated human rights defender, hacker, and security trainer <a href="https://www.linkedin.com/in/matthewtechmitchell/" target="_blank">Matt Mitchell</a> who, after direct experience in employee-monitoring roles, felt compelled to use his knowledge of surveillance practices for good - by helping high-risk individuals, marginalized groups, and journalists secure their identity and work online.</p><p>As a tech fellow of the Ford Foundation and co-founder of CryptoHarlem, NYC-based Matt is on a mission to help NGOs and minority communities acquire basic digital hygiene skills and reach their full potential. </p><p>Listen on for real-life examples and stories of a quest to safeguard privacy of those who need it most. </p>
<p><p>Find out more at www.tresorit.com</p></p>]]></description>
      <pubDate>Wed, 9 Jun 2021 23:00:00 +0000</pubDate>
      <author>spotify-podcaster@tresorit.com (Balázs Judik, Matt Mitchell)</author>
      <link>https://under-ctrl.simplecast.com/episodes/matt-mitchell-making-digital-hygiene-skills-available-for-everyone-T4q4lSyx</link>
      <content:encoded><![CDATA[<p>The current cyberspace landscape is a reflection of the world's social, political, and economic phenomena, mirroring the social inequality, discrimination and privacy violations that occur in society (and, in many cases, amplifying them). </p><p>In our next podcast episode, we’ll dive deeper into these issues with celebrated human rights defender, hacker, and security trainer <a href="https://www.linkedin.com/in/matthewtechmitchell/" target="_blank">Matt Mitchell</a> who, after direct experience in employee-monitoring roles, felt compelled to use his knowledge of surveillance practices for good - by helping high-risk individuals, marginalized groups, and journalists secure their identity and work online.</p><p>As a tech fellow of the Ford Foundation and co-founder of CryptoHarlem, NYC-based Matt is on a mission to help NGOs and minority communities acquire basic digital hygiene skills and reach their full potential. </p><p>Listen on for real-life examples and stories of a quest to safeguard privacy of those who need it most. </p>
<p><p>Find out more at www.tresorit.com</p></p>]]></content:encoded>
      <enclosure length="46271261" type="audio/mpeg" url="https://chrt.fm/track/1A2EF3/cdn.simplecast.com/audio/ae66bc11-4050-400a-9f39-99119f3f24d3/episodes/a9271ddf-b34c-4e0b-a386-c9ac9292d55b/audio/7c985a64-4f1a-4c03-9229-06978aae0629/default_tc.mp3?aid=rss_feed&amp;feed=9hgsF902"/>
      <itunes:title>Matt Mitchell: Making digital hygiene skills available for everyone</itunes:title>
      <itunes:author>Balázs Judik, Matt Mitchell</itunes:author>
      <itunes:duration>00:48:06</itunes:duration>
      <itunes:summary>The current cyberspace landscape is a reflection of the world&apos;s social, political, and economic phenomena, mirroring the social inequality, discrimination and privacy violations that occur in society (and, in many cases, amplifying them). 

In our next podcast episode, we’ll dive deeper into these issues with celebrated human rights defender, hacker, and security trainer Matt Mitchell who, after direct experience in employee-monitoring roles, felt compelled to use his  knowledge of surveillance practices for good - by helping high-risk individuals, marginalized groups, and journalists secure their identity and work online.

As a tech fellow of the Ford Foundation and co-founder of CryptoHarlem, NYC-based Matt is on a mission to help NGOs and minority communities acquire basic digital hygiene skills and reach their full potential. 

Listen on for real-life examples and stories of a quest to safeguard privacy of those who need it most. 
</itunes:summary>
      <itunes:subtitle>The current cyberspace landscape is a reflection of the world&apos;s social, political, and economic phenomena, mirroring the social inequality, discrimination and privacy violations that occur in society (and, in many cases, amplifying them). 

In our next podcast episode, we’ll dive deeper into these issues with celebrated human rights defender, hacker, and security trainer Matt Mitchell who, after direct experience in employee-monitoring roles, felt compelled to use his  knowledge of surveillance practices for good - by helping high-risk individuals, marginalized groups, and journalists secure their identity and work online.

As a tech fellow of the Ford Foundation and co-founder of CryptoHarlem, NYC-based Matt is on a mission to help NGOs and minority communities acquire basic digital hygiene skills and reach their full potential. 

Listen on for real-life examples and stories of a quest to safeguard privacy of those who need it most. 
</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>21</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">bbb16afb-4eb6-4e53-8eeb-7f8b565a040c</guid>
      <title>Ex-NSA engineer Alex White: Mobile security for high-risk individuals</title>
      <description><![CDATA[<p><i>The myriad routines connected to them have made smartphones essential tools in our work and private lives. These days, mobile devices account for over half of global web traffic. Unsurprisingly, cybercriminals have also set their sights on this goldmine of data. Consumers and organizations alike have seen a surge in attacks on mobile devices due to the global shift to remote work.</i></p><p><i>To explore the quickly changing landscape of mobile threats and how mobile security can be increased, we spoke to ex-NSA engineer and </i><a href="https://glacier.chat/" target="_blank"><i>Glacier’</i></a><i>s co-founder </i><a href="https://www.linkedin.com/in/alewhit/" target="_blank"><i>Alex White</i></a><i>. Having witnessed the growing demand for security in the mobile market, Glacier’s team is on a mission to offer tailor-made protection for high-risk devices and individuals.</i></p><p><i>If you want to hear more about techniques to protect mobile data, the NSA’s ways of working, and some highlights from the privacy scene, listen to our podcast- hosted by </i><a href="https://www.linkedin.com/in/balazsjudik/" target="_blank"><i>Balázs Judik</i></a><i>.</i></p>
<p><p>Find out more at www.tresorit.com</p></p>]]></description>
      <pubDate>Wed, 12 May 2021 23:00:00 +0000</pubDate>
      <author>spotify-podcaster@tresorit.com (Balázs Judik, Alex Whtie)</author>
      <link>https://under-ctrl.simplecast.com/episodes/ex-nsa-engineer-alex-white-mobile-security-for-high-risk-individuals-AU1816gc</link>
      <content:encoded><![CDATA[<p><i>The myriad routines connected to them have made smartphones essential tools in our work and private lives. These days, mobile devices account for over half of global web traffic. Unsurprisingly, cybercriminals have also set their sights on this goldmine of data. Consumers and organizations alike have seen a surge in attacks on mobile devices due to the global shift to remote work.</i></p><p><i>To explore the quickly changing landscape of mobile threats and how mobile security can be increased, we spoke to ex-NSA engineer and </i><a href="https://glacier.chat/" target="_blank"><i>Glacier’</i></a><i>s co-founder </i><a href="https://www.linkedin.com/in/alewhit/" target="_blank"><i>Alex White</i></a><i>. Having witnessed the growing demand for security in the mobile market, Glacier’s team is on a mission to offer tailor-made protection for high-risk devices and individuals.</i></p><p><i>If you want to hear more about techniques to protect mobile data, the NSA’s ways of working, and some highlights from the privacy scene, listen to our podcast- hosted by </i><a href="https://www.linkedin.com/in/balazsjudik/" target="_blank"><i>Balázs Judik</i></a><i>.</i></p>
<p><p>Find out more at www.tresorit.com</p></p>]]></content:encoded>
      <enclosure length="61928881" type="audio/mpeg" url="https://chrt.fm/track/1A2EF3/cdn.simplecast.com/audio/ae66bc11-4050-400a-9f39-99119f3f24d3/episodes/92d4108e-0589-4156-b087-fc159ff76187/audio/47e0b808-999e-4268-96d6-985a299fe550/default_tc.mp3?aid=rss_feed&amp;feed=9hgsF902"/>
      <itunes:title>Ex-NSA engineer Alex White: Mobile security for high-risk individuals</itunes:title>
      <itunes:author>Balázs Judik, Alex Whtie</itunes:author>
      <itunes:duration>01:04:29</itunes:duration>
      <itunes:summary>The myriad routines connected to them have made smartphones essential tools in our work and private lives. These days, mobile devices account for over half of global web traffic. Unsurprisingly, cybercriminals have also set their sights on this goldmine of data. Consumers and organizations alike have seen a surge in attacks on mobile devices due to the global shift to remote work.

To explore the quickly changing landscape of mobile threats and how mobile security can be increased, we spoke to ex-NSA engineer and Glacier’s co-founder Alex White. Having witnessed the growing demand for security in the mobile market, Glacier’s team is on a mission to offer tailor-made protection for high-risk devices and individuals.

If you want to hear more about techniques to protect mobile data, the NSA’s ways of working, and some highlights from the privacy scene, listen to our podcast - hosted by Balázs Judik.</itunes:summary>
      <itunes:subtitle>The myriad routines connected to them have made smartphones essential tools in our work and private lives. These days, mobile devices account for over half of global web traffic. Unsurprisingly, cybercriminals have also set their sights on this goldmine of data. Consumers and organizations alike have seen a surge in attacks on mobile devices due to the global shift to remote work.

To explore the quickly changing landscape of mobile threats and how mobile security can be increased, we spoke to ex-NSA engineer and Glacier’s co-founder Alex White. Having witnessed the growing demand for security in the mobile market, Glacier’s team is on a mission to offer tailor-made protection for high-risk devices and individuals.

If you want to hear more about techniques to protect mobile data, the NSA’s ways of working, and some highlights from the privacy scene, listen to our podcast - hosted by Balázs Judik.</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>20</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">17ede728-01d4-4954-a368-da02bb8094c4</guid>
      <title>Ex-CIA officer Gus Hunt - Shifting towards data-centric security</title>
      <description><![CDATA[<p><i>Rapid innovation should be counterbalanced by sensible security measures to protect our lives in the virtual space and, so far, encryption has proved to incredibly useful in doing just that. Encryption is after all the through-line of our daily digital routines, and is present (or should be present) in every message, transaction and video call you receive.</i></p><p><i>Our next podcast guest, prominent cybersecurity expert </i><a href="https://www.linkedin.com/in/gus-hunt-55b57b3/" target="_blank"><i>Gus Hunt</i></a><i>, also shares our enthusiasm for all things encrypted. With experience working across the C-Suite in both government and private roles within the CIA and Accenture, Gus provides a unique outlook on both the case for strong encryption and the challenges it can present to law enforcement agencies.</i></p><p><i>Expect to get the low down on space exploration, intelligence service insights, encryption backdoors and much more in the next episode of under CTRL!</i></p>
<p><p>Find out more at www.tresorit.com</p></p>]]></description>
      <pubDate>Wed, 7 Apr 2021 23:00:00 +0000</pubDate>
      <author>spotify-podcaster@tresorit.com (Gus Hunt, Paul Bartlett)</author>
      <link>https://under-ctrl.simplecast.com/episodes/ex-cia-officer-gus-hunt-shifting-towards-data-centric-security-ZwI3R_Hv</link>
      <content:encoded><![CDATA[<p><i>Rapid innovation should be counterbalanced by sensible security measures to protect our lives in the virtual space and, so far, encryption has proved to incredibly useful in doing just that. Encryption is after all the through-line of our daily digital routines, and is present (or should be present) in every message, transaction and video call you receive.</i></p><p><i>Our next podcast guest, prominent cybersecurity expert </i><a href="https://www.linkedin.com/in/gus-hunt-55b57b3/" target="_blank"><i>Gus Hunt</i></a><i>, also shares our enthusiasm for all things encrypted. With experience working across the C-Suite in both government and private roles within the CIA and Accenture, Gus provides a unique outlook on both the case for strong encryption and the challenges it can present to law enforcement agencies.</i></p><p><i>Expect to get the low down on space exploration, intelligence service insights, encryption backdoors and much more in the next episode of under CTRL!</i></p>
<p><p>Find out more at www.tresorit.com</p></p>]]></content:encoded>
      <enclosure length="50075417" type="audio/mpeg" url="https://chrt.fm/track/1A2EF3/cdn.simplecast.com/audio/ae66bc11-4050-400a-9f39-99119f3f24d3/episodes/33660301-a5f9-4f35-a8fa-c9ac9ec25ead/audio/9d025d28-e6d5-49cd-9237-4542fb5ccb0b/default_tc.mp3?aid=rss_feed&amp;feed=9hgsF902"/>
      <itunes:title>Ex-CIA officer Gus Hunt - Shifting towards data-centric security</itunes:title>
      <itunes:author>Gus Hunt, Paul Bartlett</itunes:author>
      <itunes:duration>00:52:10</itunes:duration>
      <itunes:summary>Rapid innovation should be counterbalanced by sensible security measures to protect our lives in the virtual space and, so far, encryption has proved to incredibly useful in doing just that. Encryption is after all the through-line of our daily digital routines, and is present (or should be present) in every message, transaction and video call you receive.

Our next podcast guest, prominent cybersecurity expert Gus Hunt, also shares our enthusiasm for all things encrypted. With experience working across the C-Suite in both government and private roles within the CIA and Accenture, Gus provides a unique outlook on both the case for strong encryption and the challenges it can present to law enforcement agencies.

Expect to get the low down on space exploration, intelligence service insights, encryption backdoors and much more in the next episode of under CTRL!</itunes:summary>
      <itunes:subtitle>Rapid innovation should be counterbalanced by sensible security measures to protect our lives in the virtual space and, so far, encryption has proved to incredibly useful in doing just that. Encryption is after all the through-line of our daily digital routines, and is present (or should be present) in every message, transaction and video call you receive.

Our next podcast guest, prominent cybersecurity expert Gus Hunt, also shares our enthusiasm for all things encrypted. With experience working across the C-Suite in both government and private roles within the CIA and Accenture, Gus provides a unique outlook on both the case for strong encryption and the challenges it can present to law enforcement agencies.

Expect to get the low down on space exploration, intelligence service insights, encryption backdoors and much more in the next episode of under CTRL!</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>19</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">34afb078-1185-4c35-85a9-3060ba0aa8a4</guid>
      <title>Cologne Bonn Airport: Behind the scenes of airport operations – an interview with Dr. Demian Pitz</title>
      <description><![CDATA[<p>Some associate airports with the excitement of travel, others think of them as transit points for business travel. However you view them, airports need to operate like clockwork and everyone – from employees to passengers – must follow a carefully controlled script. That said, we rarely take the time to reflect on the complex processes that guide these operations.</p><p>With this in mind, we wanted to gain insights from an airport operator about their facilities digital journey. Enter Cologne Bonn Airport’s<a href="https://www.linkedin.com/in/dr-demian-pitz-112b9215a/" target="_blank"> Dr. Demian Pitz</a>, who took the time to walk us through some of the airport’s transformation projects - explaining how Tresorit now helps the airport communicate securely with internal teams and external partners. </p>
<p><p>Find out more at www.tresorit.com</p></p>]]></description>
      <pubDate>Thu, 11 Mar 2021 00:00:00 +0000</pubDate>
      <author>spotify-podcaster@tresorit.com (Dr. Demian Pitz, Paul Bartlett)</author>
      <link>https://under-ctrl.simplecast.com/episodes/cologne-bonn-airport-behind-the-scenes-of-airport-operations-an-interview-with-dr-demian-pitz-tHHqF2r9</link>
      <content:encoded><![CDATA[<p>Some associate airports with the excitement of travel, others think of them as transit points for business travel. However you view them, airports need to operate like clockwork and everyone – from employees to passengers – must follow a carefully controlled script. That said, we rarely take the time to reflect on the complex processes that guide these operations.</p><p>With this in mind, we wanted to gain insights from an airport operator about their facilities digital journey. Enter Cologne Bonn Airport’s<a href="https://www.linkedin.com/in/dr-demian-pitz-112b9215a/" target="_blank"> Dr. Demian Pitz</a>, who took the time to walk us through some of the airport’s transformation projects - explaining how Tresorit now helps the airport communicate securely with internal teams and external partners. </p>
<p><p>Find out more at www.tresorit.com</p></p>]]></content:encoded>
      <enclosure length="47557530" type="audio/mpeg" url="https://chrt.fm/track/1A2EF3/cdn.simplecast.com/audio/ae66bc11-4050-400a-9f39-99119f3f24d3/episodes/c6c3d494-0d9a-43b0-82b7-228027e9dfe8/audio/dc7204ce-0a80-4b01-a3a6-865a5882bacb/default_tc.mp3?aid=rss_feed&amp;feed=9hgsF902"/>
      <itunes:title>Cologne Bonn Airport: Behind the scenes of airport operations – an interview with Dr. Demian Pitz</itunes:title>
      <itunes:author>Dr. Demian Pitz, Paul Bartlett</itunes:author>
      <itunes:duration>00:49:26</itunes:duration>
      <itunes:summary>Some associate airports with the excitement of travel, others think of them as transit points for business travel. However you view them, airports need to operate like clockwork and everyone – from employees to passengers – must follow a carefully controlled script. That said, we rarely take the time to reflect on the complex processes that guide these operations.

With this in mind, we wanted to gain insights from an airport operator about their facilities digital journey. Enter Cologne Bonn Airport’s Dr. Demian Pitz, who took the time to walk us through some of the airport’s transformation projects - explaining how Tresorit now helps the airport communicate securely with internal teams and external partners.  
</itunes:summary>
      <itunes:subtitle>Some associate airports with the excitement of travel, others think of them as transit points for business travel. However you view them, airports need to operate like clockwork and everyone – from employees to passengers – must follow a carefully controlled script. That said, we rarely take the time to reflect on the complex processes that guide these operations.

With this in mind, we wanted to gain insights from an airport operator about their facilities digital journey. Enter Cologne Bonn Airport’s Dr. Demian Pitz, who took the time to walk us through some of the airport’s transformation projects - explaining how Tresorit now helps the airport communicate securely with internal teams and external partners.  
</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>18</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">45e66340-8bb4-44cd-98b1-37c092178d4b</guid>
      <title>DeleteMe: Disappearing from data brokers’ radar – an interview with Rob Shavell</title>
      <description><![CDATA[<p>In our highly interconnected world, data is the fuel that keeps the digital economy up and running. Companies and platforms of all shapes and sizes are collecting, sharing and selling the personal information of their users without explicit consent to do so. We believe it’s time to regain ownership of your data by removing your private information from search results.</p><p>This is a sentiment shared by fellow privacy advocate and <a href="https://joindeleteme.com/" target="_blank">DeleteMe</a> founder <a href="https://www.linkedin.com/in/rob-shavell-494749/" target="_blank">Rob Shavell</a>, who helps us shed light on the complexities of data collection & brokerage in the latest episode of under CTRL. We also explore how DeleteMe helps users minimize their digital footprint by removing their personal information from data broker sites.</p><p>Are you ready to vanish from the digital map and start afresh in your own private world? Listen to our episode for more expert advice to find out how.</p>
<p><p>Find out more at www.tresorit.com</p></p>]]></description>
      <pubDate>Thu, 11 Feb 2021 00:00:00 +0000</pubDate>
      <author>spotify-podcaster@tresorit.com (Rob Shavell, Paul Bartlett)</author>
      <link>https://under-ctrl.simplecast.com/episodes/deleteme-disappearing-from-data-brokers-radar-an-interview-with-rob-shavell-lxW7NLhq</link>
      <content:encoded><![CDATA[<p>In our highly interconnected world, data is the fuel that keeps the digital economy up and running. Companies and platforms of all shapes and sizes are collecting, sharing and selling the personal information of their users without explicit consent to do so. We believe it’s time to regain ownership of your data by removing your private information from search results.</p><p>This is a sentiment shared by fellow privacy advocate and <a href="https://joindeleteme.com/" target="_blank">DeleteMe</a> founder <a href="https://www.linkedin.com/in/rob-shavell-494749/" target="_blank">Rob Shavell</a>, who helps us shed light on the complexities of data collection & brokerage in the latest episode of under CTRL. We also explore how DeleteMe helps users minimize their digital footprint by removing their personal information from data broker sites.</p><p>Are you ready to vanish from the digital map and start afresh in your own private world? Listen to our episode for more expert advice to find out how.</p>
<p><p>Find out more at www.tresorit.com</p></p>]]></content:encoded>
      <enclosure length="32332212" type="audio/mpeg" url="https://chrt.fm/track/1A2EF3/cdn.simplecast.com/audio/ae66bc11-4050-400a-9f39-99119f3f24d3/episodes/b2227a94-c4f6-4809-9a92-80d8bed473e0/audio/bad520b0-ad58-4afd-bc0d-e56edfdabd78/default_tc.mp3?aid=rss_feed&amp;feed=9hgsF902"/>
      <itunes:title>DeleteMe: Disappearing from data brokers’ radar – an interview with Rob Shavell</itunes:title>
      <itunes:author>Rob Shavell, Paul Bartlett</itunes:author>
      <itunes:duration>00:33:41</itunes:duration>
      <itunes:summary>In our highly interconnected world, data is the fuel that keeps the digital economy up and running. Companies and platforms of all shapes and sizes are collecting, sharing and selling the personal information of their users without explicit consent to do so. We believe it’s time to regain ownership of your data by removing your private information from search results. 

This is a sentiment shared by fellow privacy advocate and DeleteMe founder Rob Shavell, who helps us shed light on the complexities of data collection &amp; brokerage in the latest episode of under CTRL. We also explore how DeleteMe helps users minimize their digital footprint by removing their personal information from data broker sites.

Are you ready to vanish from the digital map and start afresh in your own private world? Listen to our episode for more expert advice to find out how.</itunes:summary>
      <itunes:subtitle>In our highly interconnected world, data is the fuel that keeps the digital economy up and running. Companies and platforms of all shapes and sizes are collecting, sharing and selling the personal information of their users without explicit consent to do so. We believe it’s time to regain ownership of your data by removing your private information from search results. 

This is a sentiment shared by fellow privacy advocate and DeleteMe founder Rob Shavell, who helps us shed light on the complexities of data collection &amp; brokerage in the latest episode of under CTRL. We also explore how DeleteMe helps users minimize their digital footprint by removing their personal information from data broker sites.

Are you ready to vanish from the digital map and start afresh in your own private world? Listen to our episode for more expert advice to find out how.</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>17</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">4e835f68-0a69-4221-9f76-0d25f0d6c1f6</guid>
      <title>Troy Hunt: Password Security Is the Name of the Game</title>
      <description><![CDATA[<p>The security of the New World we are building online is heavily dependent on password security but, despite this, password reuse and negligence continue to be a problem for the world’s Web users. This lax approach has created the ideal environment for hackers to thrive,  as leaked credentials become replicated across the clean and dark web. </p><p>To help explore the mechanisms that power these exchanges, we’ve recruited security evangelist and <a href="https://haveibeenpwned.com/">Have I Been Pwned</a> founder <a href="https://www.linkedin.com/in/troyhunt/">Troy Hunt</a> to join our resident cryptographic expert (and Tresorit CEO) <a href="https://www.linkedin.com/in/istvanlam/">Istvan Lam</a> on under CTRL. </p><p>Stay tuned for news on the biggest threats in cyberspace, the logic behind staying quiet about data breaches and insight into some of the most infamous data breaches of all time. </p>
<p><p>Find out more at www.tresorit.com</p></p>]]></description>
      <pubDate>Thu, 14 Jan 2021 00:00:00 +0000</pubDate>
      <author>spotify-podcaster@tresorit.com (Tresorit)</author>
      <link>https://under-ctrl.simplecast.com/episodes/troy-hunt-password-security-is-the-name-of-the-game-AM1MY0FS</link>
      <content:encoded><![CDATA[<p>The security of the New World we are building online is heavily dependent on password security but, despite this, password reuse and negligence continue to be a problem for the world’s Web users. This lax approach has created the ideal environment for hackers to thrive,  as leaked credentials become replicated across the clean and dark web. </p><p>To help explore the mechanisms that power these exchanges, we’ve recruited security evangelist and <a href="https://haveibeenpwned.com/">Have I Been Pwned</a> founder <a href="https://www.linkedin.com/in/troyhunt/">Troy Hunt</a> to join our resident cryptographic expert (and Tresorit CEO) <a href="https://www.linkedin.com/in/istvanlam/">Istvan Lam</a> on under CTRL. </p><p>Stay tuned for news on the biggest threats in cyberspace, the logic behind staying quiet about data breaches and insight into some of the most infamous data breaches of all time. </p>
<p><p>Find out more at www.tresorit.com</p></p>]]></content:encoded>
      <enclosure length="56806224" type="audio/mpeg" url="https://chrt.fm/track/1A2EF3/cdn.simplecast.com/audio/ae66bc11-4050-400a-9f39-99119f3f24d3/episodes/05cc46bd-2526-47e5-8342-de9e45e74b1b/audio/9146de20-008a-4661-ba7c-36556176fb8c/default_tc.mp3?aid=rss_feed&amp;feed=9hgsF902"/>
      <itunes:title>Troy Hunt: Password Security Is the Name of the Game</itunes:title>
      <itunes:author>Tresorit</itunes:author>
      <itunes:duration>00:59:11</itunes:duration>
      <itunes:summary>The security of the New World we are building online is heavily dependent on password security but, despite this, password reuse and negligence continue to be a problem for the world’s Web users. This lax approach has created the ideal environment for hackers to thrive,  as leaked credentials become replicated across the clean and dark web. 

To help explore the mechanisms that power these exchanges, we’ve recruited security evangelist and Have I Been Pwned founder Troy Hunt to join our resident cryptographic expert (and Tresorit CEO) Istvan Lam on under CTRL. 

Stay tuned for news on the biggest threats in cyberspace, the logic behind staying quiet about data breaches and insight into some of the most infamous data breaches of all time. 
</itunes:summary>
      <itunes:subtitle>The security of the New World we are building online is heavily dependent on password security but, despite this, password reuse and negligence continue to be a problem for the world’s Web users. This lax approach has created the ideal environment for hackers to thrive,  as leaked credentials become replicated across the clean and dark web. 

To help explore the mechanisms that power these exchanges, we’ve recruited security evangelist and Have I Been Pwned founder Troy Hunt to join our resident cryptographic expert (and Tresorit CEO) Istvan Lam on under CTRL. 

Stay tuned for news on the biggest threats in cyberspace, the logic behind staying quiet about data breaches and insight into some of the most infamous data breaches of all time. 
</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>16</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">6a43ca20-906a-4a23-bc56-52c9384730f8</guid>
      <title>White Shark: Security As A Service In An Ocean Filled With Threats – an Interview with Laszlo Borsy</title>
      <description><![CDATA[<p>2020: the year of the cyberattack – and the year that security services levelled up to combat this growing threat. </p><p>Today on under CTRL, we’re joined by <a href="https://www.linkedin.com/in/laszlo-borsy-8608247/" target="_blank">Laszlo Borsy</a> - cybersecurity advocate and VP of Business Development at <a href="https://whiteshark.io/" target="_blank">White Shark</a>, a managed security services company based out of our hometown Budapest.</p><p>White Shark represents a new breed of security agency, and one that adopts a holistic, risk-driven approach to security in order to protects its clients against ransomware and phishing. </p><p>Expect eyebrow raising stories from the murky world of industrial espionage, the strategies security experts use to track down system vulnerabilities and more! </p>
<p><p>Find out more at www.tresorit.com</p></p>]]></description>
      <pubDate>Mon, 28 Dec 2020 00:00:00 +0000</pubDate>
      <author>spotify-podcaster@tresorit.com (Laszlo Borsy, Paul Bartlett)</author>
      <link>https://under-ctrl.simplecast.com/episodes/white-shark-security-as-a-service-in-an-ocean-filled-with-threats-an-interview-with-laszlo-borsy-SG6jeCyd</link>
      <content:encoded><![CDATA[<p>2020: the year of the cyberattack – and the year that security services levelled up to combat this growing threat. </p><p>Today on under CTRL, we’re joined by <a href="https://www.linkedin.com/in/laszlo-borsy-8608247/" target="_blank">Laszlo Borsy</a> - cybersecurity advocate and VP of Business Development at <a href="https://whiteshark.io/" target="_blank">White Shark</a>, a managed security services company based out of our hometown Budapest.</p><p>White Shark represents a new breed of security agency, and one that adopts a holistic, risk-driven approach to security in order to protects its clients against ransomware and phishing. </p><p>Expect eyebrow raising stories from the murky world of industrial espionage, the strategies security experts use to track down system vulnerabilities and more! </p>
<p><p>Find out more at www.tresorit.com</p></p>]]></content:encoded>
      <enclosure length="48074639" type="audio/mpeg" url="https://chrt.fm/track/1A2EF3/cdn.simplecast.com/audio/ae66bc11-4050-400a-9f39-99119f3f24d3/episodes/aad55ee2-fc18-4fdb-b9e2-fd6afd3ec01d/audio/e14637c1-5b60-49d8-ab59-a07201ed5b5d/default_tc.mp3?aid=rss_feed&amp;feed=9hgsF902"/>
      <itunes:title>White Shark: Security As A Service In An Ocean Filled With Threats – an Interview with Laszlo Borsy</itunes:title>
      <itunes:author>Laszlo Borsy, Paul Bartlett</itunes:author>
      <itunes:duration>00:50:05</itunes:duration>
      <itunes:summary>2020: the year of the cyberattack – and the year that security services levelled up to combat this growing threat. 

Today on under CTRL, we’re joined by Laszlo Borsy - cybersecurity advocate and VP of Business Development at White Shark, a managed security services company based out of our hometown Budapest.

White Shark represents a new breed of security agency, and one that adopts a holistic, risk-driven approach to security in order to protects its clients against ransomware and phishing. 

Expect eyebrow raising stories from the murky world of industrial espionage, the strategies security experts use to track down system vulnerabilities and more! 
</itunes:summary>
      <itunes:subtitle>2020: the year of the cyberattack – and the year that security services levelled up to combat this growing threat. 

Today on under CTRL, we’re joined by Laszlo Borsy - cybersecurity advocate and VP of Business Development at White Shark, a managed security services company based out of our hometown Budapest.

White Shark represents a new breed of security agency, and one that adopts a holistic, risk-driven approach to security in order to protects its clients against ransomware and phishing. 

Expect eyebrow raising stories from the murky world of industrial espionage, the strategies security experts use to track down system vulnerabilities and more! 
</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>15</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">3a94c57c-6197-4155-ae56-cd0824a4d9f6</guid>
      <title>Bark: A Child&apos;s Guardian In Cyberspace - a Talk with Titania Jordan</title>
      <description><![CDATA[<p>Going online can expose children to new risks from cyberbullying, online predators, self-harm to uncensored content and targeted ads. The traditional protections we place around children are no longer effective in cyberspace, but can an app really help to prevent harmful situations both online and offline?</p><p>Today, under CTRL is joined by Bark's Chief Parenting Officer Titania Jordan to discuss online privacy for children. Bark is an AI-driven platform that provides a new way to protect the online lives of children – flagging concerning behaviour through its dashboard and providing parents with the ability to access recommendations to confronting suspicious activity and harmful situations in a considerate manner.</p><p>You can learn more about todays guest Titania Jordan on <a href="https://www.linkedin.com/in/titaniajordan/" target="_blank">LinkedIn</a>  and <a href="https://bark.us" target="_blank">https://bark.us</a>. You can follow us on twitter <a href="https://twitter.com/Tresorit" target="_blank">@tresorit</a> and LinkedIn <a href="https://www.linkedin.com/company/tresorit/" target="_blank">@linkedin.com/company/tresorit/</a> and learn more about our company on <a href="https://tresorit.com/?utm_source=podcast_bio&utm_medium=referral&utm_campaign=podcast" target="_blank">www.tresorit.com</a></p><p> </p><p>https://www.linkedin.com/in/titaniajordan/</p>
<p><p>Find out more at www.tresorit.com</p></p>]]></description>
      <pubDate>Mon, 14 Dec 2020 00:00:00 +0000</pubDate>
      <author>spotify-podcaster@tresorit.com (Paul Bartlett, Titania Jordan)</author>
      <link>https://under-ctrl.simplecast.com/episodes/bark-a-childs-guardian-in-cyberspace-a-talk-with-titania-jordan-1wr6_hcK</link>
      <content:encoded><![CDATA[<p>Going online can expose children to new risks from cyberbullying, online predators, self-harm to uncensored content and targeted ads. The traditional protections we place around children are no longer effective in cyberspace, but can an app really help to prevent harmful situations both online and offline?</p><p>Today, under CTRL is joined by Bark's Chief Parenting Officer Titania Jordan to discuss online privacy for children. Bark is an AI-driven platform that provides a new way to protect the online lives of children – flagging concerning behaviour through its dashboard and providing parents with the ability to access recommendations to confronting suspicious activity and harmful situations in a considerate manner.</p><p>You can learn more about todays guest Titania Jordan on <a href="https://www.linkedin.com/in/titaniajordan/" target="_blank">LinkedIn</a>  and <a href="https://bark.us" target="_blank">https://bark.us</a>. You can follow us on twitter <a href="https://twitter.com/Tresorit" target="_blank">@tresorit</a> and LinkedIn <a href="https://www.linkedin.com/company/tresorit/" target="_blank">@linkedin.com/company/tresorit/</a> and learn more about our company on <a href="https://tresorit.com/?utm_source=podcast_bio&utm_medium=referral&utm_campaign=podcast" target="_blank">www.tresorit.com</a></p><p> </p><p>https://www.linkedin.com/in/titaniajordan/</p>
<p><p>Find out more at www.tresorit.com</p></p>]]></content:encoded>
      <enclosure length="44058887" type="audio/mpeg" url="https://chrt.fm/track/1A2EF3/cdn.simplecast.com/audio/ae66bc11-4050-400a-9f39-99119f3f24d3/episodes/3064980e-1110-4d82-b923-821e6798d8bc/audio/2b577c43-0aa3-4849-9025-a47603e060ec/default_tc.mp3?aid=rss_feed&amp;feed=9hgsF902"/>
      <itunes:title>Bark: A Child&apos;s Guardian In Cyberspace - a Talk with Titania Jordan</itunes:title>
      <itunes:author>Paul Bartlett, Titania Jordan</itunes:author>
      <itunes:duration>00:45:54</itunes:duration>
      <itunes:summary>Going online can expose children to new risks from cyberbullying, online predators, self-harm to uncensored content and targeted ads. The traditional protections we place around children are no longer effective in cyberspace, but can an app really help to prevent harmful situations both online and offline?

Today, under CTRL is joined by Bark&apos;s Chief Parenting Officer Titania Jordan to discuss online privacy for children. Bark is an AI-driven platform that provides a new way to protect the online lives of children – flagging concerning behaviour through its dashboard and providing parents with the ability to access recommendations to confronting suspicious activity and harmful situations in a considerate manner.

You can learn more about todays guest Titania Jordan on LinkedIn: https://linkedin.com/in/titaniajordan and https://bark.us. You can follow us on twitter @tresorit and LinkedIn @linkedin.com/company/tresorit/ and learn more about our company on www.tresorit.com</itunes:summary>
      <itunes:subtitle>Going online can expose children to new risks from cyberbullying, online predators, self-harm to uncensored content and targeted ads. The traditional protections we place around children are no longer effective in cyberspace, but can an app really help to prevent harmful situations both online and offline?

Today, under CTRL is joined by Bark&apos;s Chief Parenting Officer Titania Jordan to discuss online privacy for children. Bark is an AI-driven platform that provides a new way to protect the online lives of children – flagging concerning behaviour through its dashboard and providing parents with the ability to access recommendations to confronting suspicious activity and harmful situations in a considerate manner.

You can learn more about todays guest Titania Jordan on LinkedIn: https://linkedin.com/in/titaniajordan and https://bark.us. You can follow us on twitter @tresorit and LinkedIn @linkedin.com/company/tresorit/ and learn more about our company on www.tresorit.com</itunes:subtitle>
      <itunes:keywords>bark, protect kids’ online life, ai, children’s online activity, cyberbullying</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>14</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">264c437e-d9f0-4ef3-adea-c40b5ced30d2</guid>
      <title>Brave: Redesigned Browsing and Advertising Experience – an Interview with Luke Mulks</title>
      <description><![CDATA[<p>Luke describes <a href="https://brave.com/">Brave</a> as a “<i>privacy browser with the first kind of integrated global private ad and reward platform</i>”. By blocking trackers that allow platforms to create detailed audience profiles, Brave provides users with a “<i>real clean start” </i>and a browser experience that’s 3 times faster than Google.<br /><br />Having started his career in advertising, Luke is one of the many marketing professionals who witnessed the rise of tech monopolies and became alarmed at the industry’s approach to data and targeting. </p><p>You can learn more about todays guest Luke Mulks on <a href="https://www.linkedin.com/in/pureproductions/" target="_blank">LinkedIn</a>  and <a href="https://brave.com/" target="_blank">https://brave.com</a>. You can follow us on twitter <a href="https://twitter.com/Tresorit" target="_blank">@tresorit</a> and LinkedIn <a href="https://www.linkedin.com/company/tresorit/" target="_blank">@linkedin.com/company/tresorit/</a> and learn more about our company on <a href="https://tresorit.com/?utm_source=podcast_bio&utm_medium=referral&utm_campaign=podcast" target="_blank">www.tresorit.com</a></p>
<p><p>Find out more at www.tresorit.com</p></p>]]></description>
      <pubDate>Mon, 30 Nov 2020 01:00:00 +0000</pubDate>
      <author>spotify-podcaster@tresorit.com (Luke Mulks, Paul Bartlett)</author>
      <link>https://under-ctrl.simplecast.com/episodes/brave-redesigned-browsing-and-advertising-experience-an-interview-with-luke-mulks-XNBLcIqz</link>
      <content:encoded><![CDATA[<p>Luke describes <a href="https://brave.com/">Brave</a> as a “<i>privacy browser with the first kind of integrated global private ad and reward platform</i>”. By blocking trackers that allow platforms to create detailed audience profiles, Brave provides users with a “<i>real clean start” </i>and a browser experience that’s 3 times faster than Google.<br /><br />Having started his career in advertising, Luke is one of the many marketing professionals who witnessed the rise of tech monopolies and became alarmed at the industry’s approach to data and targeting. </p><p>You can learn more about todays guest Luke Mulks on <a href="https://www.linkedin.com/in/pureproductions/" target="_blank">LinkedIn</a>  and <a href="https://brave.com/" target="_blank">https://brave.com</a>. You can follow us on twitter <a href="https://twitter.com/Tresorit" target="_blank">@tresorit</a> and LinkedIn <a href="https://www.linkedin.com/company/tresorit/" target="_blank">@linkedin.com/company/tresorit/</a> and learn more about our company on <a href="https://tresorit.com/?utm_source=podcast_bio&utm_medium=referral&utm_campaign=podcast" target="_blank">www.tresorit.com</a></p>
<p><p>Find out more at www.tresorit.com</p></p>]]></content:encoded>
      <enclosure length="46950329" type="audio/mpeg" url="https://chrt.fm/track/1A2EF3/cdn.simplecast.com/audio/ae66bc11-4050-400a-9f39-99119f3f24d3/episodes/55c980f3-9616-4547-a5da-473f0ecf39d9/audio/13a80a4e-b6ff-4dcc-991f-704f6e2b2737/default_tc.mp3?aid=rss_feed&amp;feed=9hgsF902"/>
      <itunes:title>Brave: Redesigned Browsing and Advertising Experience – an Interview with Luke Mulks</itunes:title>
      <itunes:author>Luke Mulks, Paul Bartlett</itunes:author>
      <itunes:duration>00:48:55</itunes:duration>
      <itunes:summary>Luke describes Brave as a “privacy browser with the first kind of integrated global private ad and reward platform”. By blocking trackers that allow platforms to create detailed audience profiles, Brave provides users with a “real clean start” and a browser experience that’s 3 times faster than Google.

Having started his career in advertising, Luke is one of the many marketing professionals who witnessed the rise of tech monopolies and became alarmed at the industry’s approach to data and targeting. 

You can learn more about todays guest Luke Mulks on https://www.linkedin.com/in/pureproductions/  and https://brave.com. You can follow us on twitter @tresorit and LinkedIn @linkedin.com/company/tresorit/ and learn more about our company on www.tresorit.com</itunes:summary>
      <itunes:subtitle>Luke describes Brave as a “privacy browser with the first kind of integrated global private ad and reward platform”. By blocking trackers that allow platforms to create detailed audience profiles, Brave provides users with a “real clean start” and a browser experience that’s 3 times faster than Google.

Having started his career in advertising, Luke is one of the many marketing professionals who witnessed the rise of tech monopolies and became alarmed at the industry’s approach to data and targeting. 

You can learn more about todays guest Luke Mulks on https://www.linkedin.com/in/pureproductions/  and https://brave.com. You can follow us on twitter @tresorit and LinkedIn @linkedin.com/company/tresorit/ and learn more about our company on www.tresorit.com</itunes:subtitle>
      <itunes:keywords>private browsing, private ads, bat community, brave</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>13</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">9c75284f-265c-4dbf-b619-bb3f2716f9f2</guid>
      <title>DuckDuckGo: can a search engine protect searchers&apos; privacy? Interview with Kamyl Bazbaz</title>
      <description><![CDATA[<p>Our search engine knows often more about us than our best friends – thanks to the data trails we leave as we are seeking answers to common and sensitive questions across the web. Is there a real choice, a private alternative for online search and navigation, without dismantling the boundaries of our privacy? The answer is clearly and reassuringly: YES. </p><p><a href="https://blog.tresorit.com/how-tech-giants-monopolize-the-digital-space-an-interview-with-edward-shone/">The privacy violation in the digital space is so far-reaching</a> that people can only see the top of the iceberg. The behavioral-based advertising works so cleverly that users cannot even notice that they are trapped in an intellectual isolation called “<a href="https://spreadprivacy.com/google-filter-bubble-study/">filter bubble</a>”. Kamyl warns of the damaging consequences of this: not just a biased world view, but this can be a real hotbed for misinformation and radicalization.</p><p>You can learn more about todays guest Kamyl Bazbaz on <a href="https://www.linkedin.com/in/kamylbazbaz/" target="_blank">LinkedIn</a>  and <a href="https://duckduckgo.com/" target="_blank">https://duckduckgo.com</a>. You can follow us on twitter <a href="https://twitter.com/Tresorit" target="_blank">@tresorit</a> and LinkedIn <a href="https://www.linkedin.com/company/tresorit/" target="_blank">@linkedin.com/company/tresorit/</a> and learn more about our company on <a href="https://tresorit.com/?utm_source=podcast_bio&utm_medium=referral&utm_campaign=podcast" target="_blank">www.tresorit.com</a><br /> </p>
<p><p>Find out more at www.tresorit.com</p></p>]]></description>
      <pubDate>Mon, 16 Nov 2020 00:00:00 +0000</pubDate>
      <author>spotify-podcaster@tresorit.com (Paul Bartlett, Kamyl Bazbaz)</author>
      <link>https://under-ctrl.simplecast.com/episodes/duckduckgo-can-a-search-engine-protect-searchers-privacy-interview-with-kamyl-bazbaz-cv8Pwk1M</link>
      <content:encoded><![CDATA[<p>Our search engine knows often more about us than our best friends – thanks to the data trails we leave as we are seeking answers to common and sensitive questions across the web. Is there a real choice, a private alternative for online search and navigation, without dismantling the boundaries of our privacy? The answer is clearly and reassuringly: YES. </p><p><a href="https://blog.tresorit.com/how-tech-giants-monopolize-the-digital-space-an-interview-with-edward-shone/">The privacy violation in the digital space is so far-reaching</a> that people can only see the top of the iceberg. The behavioral-based advertising works so cleverly that users cannot even notice that they are trapped in an intellectual isolation called “<a href="https://spreadprivacy.com/google-filter-bubble-study/">filter bubble</a>”. Kamyl warns of the damaging consequences of this: not just a biased world view, but this can be a real hotbed for misinformation and radicalization.</p><p>You can learn more about todays guest Kamyl Bazbaz on <a href="https://www.linkedin.com/in/kamylbazbaz/" target="_blank">LinkedIn</a>  and <a href="https://duckduckgo.com/" target="_blank">https://duckduckgo.com</a>. You can follow us on twitter <a href="https://twitter.com/Tresorit" target="_blank">@tresorit</a> and LinkedIn <a href="https://www.linkedin.com/company/tresorit/" target="_blank">@linkedin.com/company/tresorit/</a> and learn more about our company on <a href="https://tresorit.com/?utm_source=podcast_bio&utm_medium=referral&utm_campaign=podcast" target="_blank">www.tresorit.com</a><br /> </p>
<p><p>Find out more at www.tresorit.com</p></p>]]></content:encoded>
      <enclosure length="36475436" type="audio/mpeg" url="https://chrt.fm/track/1A2EF3/cdn.simplecast.com/audio/ae66bc11-4050-400a-9f39-99119f3f24d3/episodes/94447678-8ece-40b5-84ba-d448ec7a8596/audio/0471ada0-2086-4a63-822d-5a7834eccdfc/default_tc.mp3?aid=rss_feed&amp;feed=9hgsF902"/>
      <itunes:title>DuckDuckGo: can a search engine protect searchers&apos; privacy? Interview with Kamyl Bazbaz</itunes:title>
      <itunes:author>Paul Bartlett, Kamyl Bazbaz</itunes:author>
      <itunes:duration>00:38:00</itunes:duration>
      <itunes:summary>Our search engine knows often more about us than our best friends – thanks to the data trails we leave as we are seeking answers to common and sensitive questions across the web. Is there a real choice, a private alternative for online search and navigation, without dismantling the boundaries of our privacy? The answer is clearly and reassuringly: YES. 

The privacy violation in the digital space is so far-reaching that people can only see the top of the iceberg. The behavioral-based advertising works so cleverly that users cannot even notice that they are trapped in an intellectual isolation called “filter bubble”. Kamyl warns of the damaging consequences of this: not just a biased world view, but this can be a real hotbed for misinformation and radicalization.

You can learn more about todays guest Kamyl Bazbaz on https://www.linkedin.com/in/kamylbazbaz  and https://duckduckgo.com. You can follow us on twitter @tresorit and LinkedIn @linkedin.com/company/tresorit/ and learn more about our company on www.tresorit.com</itunes:summary>
      <itunes:subtitle>Our search engine knows often more about us than our best friends – thanks to the data trails we leave as we are seeking answers to common and sensitive questions across the web. Is there a real choice, a private alternative for online search and navigation, without dismantling the boundaries of our privacy? The answer is clearly and reassuringly: YES. 

The privacy violation in the digital space is so far-reaching that people can only see the top of the iceberg. The behavioral-based advertising works so cleverly that users cannot even notice that they are trapped in an intellectual isolation called “filter bubble”. Kamyl warns of the damaging consequences of this: not just a biased world view, but this can be a real hotbed for misinformation and radicalization.

You can learn more about todays guest Kamyl Bazbaz on https://www.linkedin.com/in/kamylbazbaz  and https://duckduckgo.com. You can follow us on twitter @tresorit and LinkedIn @linkedin.com/company/tresorit/ and learn more about our company on www.tresorit.com</itunes:subtitle>
      <itunes:keywords>data trail, duckduckgo, kamyl bazbaz, privacy, search engine, private search</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>12</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">3c183233-26f9-42d4-955d-74b738b135a8</guid>
      <title>Phil Zimmermann: Is the EU declaring war on encryption?</title>
      <description><![CDATA[<p>Phil Zimmermann creator of <a href="https://en.wikipedia.org/wiki/Pretty_Good_Privacy" target="_blank">Pretty Good Privacy</a> and Co-Founder of <a href="https://www.silentcircle.com/" target="_blank">SilentCircle </a>and István Lám, CEO of Tresorit discuss the recent <a href="https://files.orf.at/vietnam2/files/fm4/202045/783284_fh_st12143-re01en20_783284.pdf" target="_blank">press report</a> from EU - "Draft Council Resolution on Encryption". <br /><br />Why are the five Eyes putting forward a proposal to expand “targeted lawful access” and what potential impact will this have on privacy? Is there a potential solution that can have a balanced outcome for both sides? With quantum computing on the horizon, does it even matter? There is an ongoing review by the senate on section 230. Can backdoors and social networks be intertwined? Join in for the answers.</p><p>You can learn more about todays guest on <a href="https://philzimmermann.com/" target="_blank">philzimmermann.com</a>. You can follow us on twitter <a href="https://twitter.com/Tresorit" target="_blank">@tresorit</a> and LinkedIn <a href="https://www.linkedin.com/company/tresorit/" target="_blank">@linkedin.com/company/tresorit/</a> and learn more about our company on <a href="https://tresorit.com/?utm_source=podcast_bio&utm_medium=referral&utm_campaign=podcast" target="_blank">www.tresorit.com</a><br />Related article: <a href="https://techcrunch.com/2020/11/09/whats-all-this-about-europe-wanting-crypto-backdoors/" target="_blank">https://techcrunch.com/2020/11/09/whats-all-this-about-europe-wanting-crypto-backdoors/ </a></p>
<p><p>Find out more at www.tresorit.com</p></p>]]></description>
      <pubDate>Fri, 13 Nov 2020 00:00:00 +0000</pubDate>
      <author>spotify-podcaster@tresorit.com (Paul Bartlett, István Lám, Philip Zimmermann)</author>
      <link>https://blog.tresorit.com/phil-zimmerman-is-the-eu-declaring-war-on-encryption/</link>
      <content:encoded><![CDATA[<p>Phil Zimmermann creator of <a href="https://en.wikipedia.org/wiki/Pretty_Good_Privacy" target="_blank">Pretty Good Privacy</a> and Co-Founder of <a href="https://www.silentcircle.com/" target="_blank">SilentCircle </a>and István Lám, CEO of Tresorit discuss the recent <a href="https://files.orf.at/vietnam2/files/fm4/202045/783284_fh_st12143-re01en20_783284.pdf" target="_blank">press report</a> from EU - "Draft Council Resolution on Encryption". <br /><br />Why are the five Eyes putting forward a proposal to expand “targeted lawful access” and what potential impact will this have on privacy? Is there a potential solution that can have a balanced outcome for both sides? With quantum computing on the horizon, does it even matter? There is an ongoing review by the senate on section 230. Can backdoors and social networks be intertwined? Join in for the answers.</p><p>You can learn more about todays guest on <a href="https://philzimmermann.com/" target="_blank">philzimmermann.com</a>. You can follow us on twitter <a href="https://twitter.com/Tresorit" target="_blank">@tresorit</a> and LinkedIn <a href="https://www.linkedin.com/company/tresorit/" target="_blank">@linkedin.com/company/tresorit/</a> and learn more about our company on <a href="https://tresorit.com/?utm_source=podcast_bio&utm_medium=referral&utm_campaign=podcast" target="_blank">www.tresorit.com</a><br />Related article: <a href="https://techcrunch.com/2020/11/09/whats-all-this-about-europe-wanting-crypto-backdoors/" target="_blank">https://techcrunch.com/2020/11/09/whats-all-this-about-europe-wanting-crypto-backdoors/ </a></p>
<p><p>Find out more at www.tresorit.com</p></p>]]></content:encoded>
      <enclosure length="64497100" type="audio/mpeg" url="https://chrt.fm/track/1A2EF3/cdn.simplecast.com/audio/ae66bc11-4050-400a-9f39-99119f3f24d3/episodes/a58401ca-dd9f-42d9-9805-0fa689890386/audio/f3776a59-50e9-43f0-9a7b-5e64d5ac1e34/default_tc.mp3?aid=rss_feed&amp;feed=9hgsF902"/>
      <itunes:title>Phil Zimmermann: Is the EU declaring war on encryption?</itunes:title>
      <itunes:author>Paul Bartlett, István Lám, Philip Zimmermann</itunes:author>
      <itunes:duration>01:07:12</itunes:duration>
      <itunes:summary>Phil Zimmermann creator of Pretty Good Privacy and Co-Founder of SilentCircle and István Lám, CEO of Tresorit discuss the recent press report from EU - &quot;Draft Council Resolution on Encryption&quot;. 

Why are the five Eyes putting forward a proposal to expand “targeted lawful access” and what potential impact will this have on privacy? Is there a potential solution that can have a balanced outcome for both sides? With quantum computing on the horizon, does it even matter? There is an ongoing review by the senate on section 230. Can backdoors and social networks be intertwined? Join in for the answers.

You can learn more about todays guest on philzimmermann.com. You can follow us on twitter @tresorit and LinkedIn @linkedin.com/company/tresorit/ and learn more about our company on www.tresorit.comRelated article: https://techcrunch.com/2020/11/09/whats-all-this-about-europe-wanting-crypto-backdoors/ </itunes:summary>
      <itunes:subtitle>Phil Zimmermann creator of Pretty Good Privacy and Co-Founder of SilentCircle and István Lám, CEO of Tresorit discuss the recent press report from EU - &quot;Draft Council Resolution on Encryption&quot;. 

Why are the five Eyes putting forward a proposal to expand “targeted lawful access” and what potential impact will this have on privacy? Is there a potential solution that can have a balanced outcome for both sides? With quantum computing on the horizon, does it even matter? There is an ongoing review by the senate on section 230. Can backdoors and social networks be intertwined? Join in for the answers.

You can learn more about todays guest on philzimmermann.com. You can follow us on twitter @tresorit and LinkedIn @linkedin.com/company/tresorit/ and learn more about our company on www.tresorit.comRelated article: https://techcrunch.com/2020/11/09/whats-all-this-about-europe-wanting-crypto-backdoors/ </itunes:subtitle>
      <itunes:keywords>eu war on encryption, eu data protection, encryption backdoor, data protection and privacy, ban end-to-end encryption, five eyes surveillance, five eyes, crypto backdoor, targeted lawful access, data privacy protection</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>11</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">2504a996-8284-4157-a927-29daf2235c61</guid>
      <title>Digital identification revolutionized by AI - talk with Husayn Kassai</title>
      <description><![CDATA[<p>How can "machine learning" tell if a goverment ID is genuine or fake? How does <a href="https://onfido.com/resources/case-studies/revolut-case-study" target="_blank">Revolut</a> and other neobanks benefit from such services? How does <a href="https://onfido.com/" target="_blank">Onfido</a> support airport check-ins in parallel with connecting COVID19 test results to your digital identity? CEO and Co-Founder of Onfido, Husayn Kassai will shed light on these topics. <br /> </p><p>You can find todays guest on <a href="https://linkedin.com/in/husaynkassai " target="_blank">https://linkedin.com/in/husaynkassai </a>and learn more about Onfido on <a href="https://onfido.com/" target="_blank">https://onfido.com</a>. And if you want to know what we are up to you can follow us on twitter <a href="https://twitter.com/Tresorit" target="_blank">@tresorit</a> and LinkedIn <a href="https://www.linkedin.com/company/tresorit/" target="_blank">@linkedin.com/company/tresorit/</a> and learn more about our company on <a href="https://tresorit.com/?utm_source=podcast_bio&utm_medium=referral&utm_campaign=podcast" target="_blank">www.tresorit.com</a></p>
<p><p>Find out more at www.tresorit.com</p></p>]]></description>
      <pubDate>Sun, 1 Nov 2020 23:00:00 +0000</pubDate>
      <author>spotify-podcaster@tresorit.com (Husayn Kassai, Paul Bartlett)</author>
      <link>https://under-ctrl.simplecast.com/episodes/digital-identification-revolutionized-by-ai-talk-with-husayn-kassai-1f4QLJiB</link>
      <content:encoded><![CDATA[<p>How can "machine learning" tell if a goverment ID is genuine or fake? How does <a href="https://onfido.com/resources/case-studies/revolut-case-study" target="_blank">Revolut</a> and other neobanks benefit from such services? How does <a href="https://onfido.com/" target="_blank">Onfido</a> support airport check-ins in parallel with connecting COVID19 test results to your digital identity? CEO and Co-Founder of Onfido, Husayn Kassai will shed light on these topics. <br /> </p><p>You can find todays guest on <a href="https://linkedin.com/in/husaynkassai " target="_blank">https://linkedin.com/in/husaynkassai </a>and learn more about Onfido on <a href="https://onfido.com/" target="_blank">https://onfido.com</a>. And if you want to know what we are up to you can follow us on twitter <a href="https://twitter.com/Tresorit" target="_blank">@tresorit</a> and LinkedIn <a href="https://www.linkedin.com/company/tresorit/" target="_blank">@linkedin.com/company/tresorit/</a> and learn more about our company on <a href="https://tresorit.com/?utm_source=podcast_bio&utm_medium=referral&utm_campaign=podcast" target="_blank">www.tresorit.com</a></p>
<p><p>Find out more at www.tresorit.com</p></p>]]></content:encoded>
      <enclosure length="40320660" type="audio/mpeg" url="https://chrt.fm/track/1A2EF3/cdn.simplecast.com/audio/ae66bc11-4050-400a-9f39-99119f3f24d3/episodes/5063659d-b8a2-411f-81ed-279983004168/audio/e715156c-5c37-4e11-be7f-07f862c65d6c/default_tc.mp3?aid=rss_feed&amp;feed=9hgsF902"/>
      <itunes:title>Digital identification revolutionized by AI - talk with Husayn Kassai</itunes:title>
      <itunes:author>Husayn Kassai, Paul Bartlett</itunes:author>
      <itunes:duration>00:42:01</itunes:duration>
      <itunes:summary>How can &quot;machine learning&quot; tell if a goverment ID is genuine or fake? How does Revolut and other neobanks benefit from such services? How does Onfido support airport check-ins in parallel with connecting COVID19 test results to your digital identity? CEO and Co-Founder of Onfido, Husayn Kassai will shed light on these topics. 

You can find todays guest on https://linkedin.com/in/husaynkassai and learn more about Onfido on https://onfido.com. And if you want to know what we are up to you can follow us on twitter @tresorit and LinkedIn @linkedin.com/company/tresorit/ and learn more about our company on www.tresorit.com</itunes:summary>
      <itunes:subtitle>How can &quot;machine learning&quot; tell if a goverment ID is genuine or fake? How does Revolut and other neobanks benefit from such services? How does Onfido support airport check-ins in parallel with connecting COVID19 test results to your digital identity? CEO and Co-Founder of Onfido, Husayn Kassai will shed light on these topics. 

You can find todays guest on https://linkedin.com/in/husaynkassai and learn more about Onfido on https://onfido.com. And if you want to know what we are up to you can follow us on twitter @tresorit and LinkedIn @linkedin.com/company/tresorit/ and learn more about our company on www.tresorit.com</itunes:subtitle>
      <itunes:keywords>digital id verification, my digital identity, digital identity, digital identity service, id biometrics, digital identity security, biometric identity systems, biometric identity verification, digital identity and security, digital identity companies, biometric id systems, onfido identity verification, get a digital id, my digital id, digital identities and digital security</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>10</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">48897f6e-ecfc-45c4-a2ae-b35082cbacd4</guid>
      <title>The journey of clinical trials - an interview with Matt Barthel</title>
      <description><![CDATA[<p><i>How do Pharma companies handle ultra sensitive data whilst some of the largest companies are racing to develop COVID-19 vaccination? CTO and Data Protection Officer of </i><a href="https://www.adamasconsulting.com/" target="_blank"><i>Adamas Consulting Group</i></a><i>, </i><a href="https://www.linkedin.com/in/matt-barthel-dip-rqa-mrqa-ispe-iapp-53991515/" target="_blank"><i>Matt Barthel </i></a><i>sheds some light on this complex matter. We discuss clinical trials, data security and compliance within this highly regulated industry and touch on the privacy challenges COVID-19 has brought upon healthcare.</i></p><p>You can find todays guest on<a href="https://www.linkedin.com/in/matt-barthel-dip-rqa-mrqa-ispe-iapp-53991515/" target="_blank"> https://www.linkedin.com/in/matt-barthel-dip-rqa-mrqa-ispe-iapp-53991515/</a> and learn more about Adamas Consulting Group on <a href="https://www.adamasconsulting.com/" target="_blank">https://www.adamasconsulting.com</a>. And if you want to know what we are up to you can follow us on twitter <a href="https://twitter.com/Tresorit" target="_blank">@tresorit</a> and LinkedIn <a href="https://www.linkedin.com/company/tresorit/" target="_blank">@linkedin.com/company/tresorit/</a> and learn more about our company on <a href="https://tresorit.com/?utm_source=podcast_bio&utm_medium=referral&utm_campaign=podcast" target="_blank">www.tresorit.com</a></p>
<p><p>Find out more at www.tresorit.com</p></p>]]></description>
      <pubDate>Sun, 18 Oct 2020 22:00:00 +0000</pubDate>
      <author>spotify-podcaster@tresorit.com (Matt Barthel, Paul Bartlett)</author>
      <link>https://blog.tresorit.com/the-journey-of-clinical-trials-an-interview-with-matt-barthel/</link>
      <content:encoded><![CDATA[<p><i>How do Pharma companies handle ultra sensitive data whilst some of the largest companies are racing to develop COVID-19 vaccination? CTO and Data Protection Officer of </i><a href="https://www.adamasconsulting.com/" target="_blank"><i>Adamas Consulting Group</i></a><i>, </i><a href="https://www.linkedin.com/in/matt-barthel-dip-rqa-mrqa-ispe-iapp-53991515/" target="_blank"><i>Matt Barthel </i></a><i>sheds some light on this complex matter. We discuss clinical trials, data security and compliance within this highly regulated industry and touch on the privacy challenges COVID-19 has brought upon healthcare.</i></p><p>You can find todays guest on<a href="https://www.linkedin.com/in/matt-barthel-dip-rqa-mrqa-ispe-iapp-53991515/" target="_blank"> https://www.linkedin.com/in/matt-barthel-dip-rqa-mrqa-ispe-iapp-53991515/</a> and learn more about Adamas Consulting Group on <a href="https://www.adamasconsulting.com/" target="_blank">https://www.adamasconsulting.com</a>. And if you want to know what we are up to you can follow us on twitter <a href="https://twitter.com/Tresorit" target="_blank">@tresorit</a> and LinkedIn <a href="https://www.linkedin.com/company/tresorit/" target="_blank">@linkedin.com/company/tresorit/</a> and learn more about our company on <a href="https://tresorit.com/?utm_source=podcast_bio&utm_medium=referral&utm_campaign=podcast" target="_blank">www.tresorit.com</a></p>
<p><p>Find out more at www.tresorit.com</p></p>]]></content:encoded>
      <enclosure length="48410260" type="audio/mpeg" url="https://chrt.fm/track/1A2EF3/cdn.simplecast.com/audio/ae66bc11-4050-400a-9f39-99119f3f24d3/episodes/818bdd29-18e0-4a7c-9ef5-f0bb2a6be8c1/audio/5d707281-75fe-40a6-8fe9-050837ce7862/default_tc.mp3?aid=rss_feed&amp;feed=9hgsF902"/>
      <itunes:title>The journey of clinical trials - an interview with Matt Barthel</itunes:title>
      <itunes:author>Matt Barthel, Paul Bartlett</itunes:author>
      <itunes:duration>00:50:26</itunes:duration>
      <itunes:summary>How do Pharma companies handle ultra sensitive data whilst some of the largest companies are racing to develop COVID-19 vaccination? CTO and Data Protection Officer of Adamas Consulting Group, Matt Barthel sheds some light on this complex matter. We discuss clinical trials, data security and compliance within this highly regulated industry and touch on the privacy challenges COVID-19 has brought upon healthcare.

You can find todays guest on https://www.linkedin.com/in/matt-barthel-dip-rqa-mrqa-ispe-iapp-53991515/ and learn more about Adamas Consulting Group on https://www.adamasconsulting.com. And if you want to know what we are up to you can follow us on twitter @tresorit and LinkedIn @linkedin.com/company/tresorit/ and learn more about our company on www.tresorit.com</itunes:summary>
      <itunes:subtitle>How do Pharma companies handle ultra sensitive data whilst some of the largest companies are racing to develop COVID-19 vaccination? CTO and Data Protection Officer of Adamas Consulting Group, Matt Barthel sheds some light on this complex matter. We discuss clinical trials, data security and compliance within this highly regulated industry and touch on the privacy challenges COVID-19 has brought upon healthcare.

You can find todays guest on https://www.linkedin.com/in/matt-barthel-dip-rqa-mrqa-ispe-iapp-53991515/ and learn more about Adamas Consulting Group on https://www.adamasconsulting.com. And if you want to know what we are up to you can follow us on twitter @tresorit and LinkedIn @linkedin.com/company/tresorit/ and learn more about our company on www.tresorit.com</itunes:subtitle>
      <itunes:keywords>data security compliance, hipaa security rules, hipaa data security, hipaa compliance rules and regulations, data security and compliance, data security compliance standards, healthcare data security challenges, hipaa rules and regulations, data security measures in healthcare, healthcare data security, patient data security, hipaa compliance, hipaa security compliance, health data security, patient data breach, hipaa data security requirements</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>9</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">6880ba1b-85d3-4499-8f01-9ce5a2e8324a</guid>
      <title>ProtonMail: Tech monopolies and freedom of speech – discussion with Edward Shone</title>
      <description><![CDATA[<p><strong>In a world monopolised by tech giants, where data is being constantly abused and manipulated by corporations and governments alike - how does privacy and freedom of speech survive? We chat about everything from surveillance capitalism to regulations with Edward Shone, the PR Manager of ProtonMail.</strong></p><p>You can find todays guest on <a href="https://www.linkedin.com/in/edward-shone-1b8aa641/" target="_blank">https://www.linkedin.com/in/edward-shone-1b8aa641</a> and learn more about ProtonMail on <a href="https://protonmail.com/" target="_blank">https://protonmail.com</a>. And if you want to know what we are up to you can follow us on twitter <a href="https://twitter.com/Tresorit" target="_blank">@tresorit</a> and LinkedIn <a href="https://www.linkedin.com/company/tresorit/" target="_blank">@linkedin.com/company/tresorit/</a> and learn more about our company on <a href="https://tresorit.com/?utm_source=podcast_bio&utm_medium=referral&utm_campaign=podcast" target="_blank">www.tresorit.com</a></p>
<p><p>Find out more at www.tresorit.com</p></p>]]></description>
      <pubDate>Sun, 4 Oct 2020 22:00:00 +0000</pubDate>
      <author>spotify-podcaster@tresorit.com (Paul Bartlett, Andy Yen, Edward Shone)</author>
      <link>https://blog.tresorit.com/how-tech-giants-monopolize-the-digital-space-an-interview-with-edward-shone/</link>
      <content:encoded><![CDATA[<p><strong>In a world monopolised by tech giants, where data is being constantly abused and manipulated by corporations and governments alike - how does privacy and freedom of speech survive? We chat about everything from surveillance capitalism to regulations with Edward Shone, the PR Manager of ProtonMail.</strong></p><p>You can find todays guest on <a href="https://www.linkedin.com/in/edward-shone-1b8aa641/" target="_blank">https://www.linkedin.com/in/edward-shone-1b8aa641</a> and learn more about ProtonMail on <a href="https://protonmail.com/" target="_blank">https://protonmail.com</a>. And if you want to know what we are up to you can follow us on twitter <a href="https://twitter.com/Tresorit" target="_blank">@tresorit</a> and LinkedIn <a href="https://www.linkedin.com/company/tresorit/" target="_blank">@linkedin.com/company/tresorit/</a> and learn more about our company on <a href="https://tresorit.com/?utm_source=podcast_bio&utm_medium=referral&utm_campaign=podcast" target="_blank">www.tresorit.com</a></p>
<p><p>Find out more at www.tresorit.com</p></p>]]></content:encoded>
      <enclosure length="48262302" type="audio/mpeg" url="https://chrt.fm/track/1A2EF3/cdn.simplecast.com/audio/ae66bc11-4050-400a-9f39-99119f3f24d3/episodes/f6bf8cd8-7711-43e3-9135-7414d3cdb59e/audio/73cb078d-d149-4446-8535-6001ca915456/default_tc.mp3?aid=rss_feed&amp;feed=9hgsF902"/>
      <itunes:title>ProtonMail: Tech monopolies and freedom of speech – discussion with Edward Shone</itunes:title>
      <itunes:author>Paul Bartlett, Andy Yen, Edward Shone</itunes:author>
      <itunes:duration>00:50:17</itunes:duration>
      <itunes:summary>In a world monopolised by tech giants, where data is being constantly abused and manipulated by corporations and governments alike - how does privacy and freedom of speech survive? We chat about everything from surveillance capitalism to regulations with Edward Shone, the PR Manager of ProtonMail.

You can find todays guest on https://www.linkedin.com/in/edward-shone-1b8aa641 and learn more about ProtonMail on https://protonmail.com. And if you want to know what we are up to you can follow us on twitter @tresorit and LinkedIn @linkedin.com/company/tresorit/ and learn more about our company on www.tresorit.com</itunes:summary>
      <itunes:subtitle>In a world monopolised by tech giants, where data is being constantly abused and manipulated by corporations and governments alike - how does privacy and freedom of speech survive? We chat about everything from surveillance capitalism to regulations with Edward Shone, the PR Manager of ProtonMail.

You can find todays guest on https://www.linkedin.com/in/edward-shone-1b8aa641 and learn more about ProtonMail on https://protonmail.com. And if you want to know what we are up to you can follow us on twitter @tresorit and LinkedIn @linkedin.com/company/tresorit/ and learn more about our company on www.tresorit.com</itunes:subtitle>
      <itunes:keywords>end to end email encryption, data breach protection, encrypt email attachment, safest mail, encrypted mail, european data protection, send encrypted email, encrypted attachment, data protection and security, data protection technologies, secure email providers, secure encrypted email, encrypted email, free encrypted email, data protection services, data encryption at rest, at rest encryption, protonmail for business, prevent data theft</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>8</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">a34fc291-23e8-4871-a7a5-5981242b8b23</guid>
      <title>Physical and digital security for high-end clients – a conversation with Maria Olshanskaya</title>
      <description><![CDATA[<p><strong>Come along with us as we venture into the exclusive world of VIPs and discuss what physical and cybersecurity means to high-end clients. Walking us through the challenges of providing the highest levels of safety and privacy to a global customer base is Maria Olshanskaya, Co-Founder and Active Partner of Tel Aviv’s Aera Global Corp.</strong></p><p>You can find todays guest on <a href="https://www.linkedin.com/in/mariaolshanskaya/" target="_blank">https://linkedin.com/in/mariaolshanskaya/</a> and learn more about <strong>Aera Global</strong> on <a href="https://www.aera.global" target="_blank">https://aera.global</a>. And if you want to know what we are up to you can follow us on twitter <a href="https://twitter.com/Tresorit" target="_blank">@tresorit</a> and LinkedIn <a href="https://www.linkedin.com/company/tresorit/" target="_blank">@linkedin.com/company/tresorit/</a> and learn more about our company on <a href="https://dashboard.simplecast.com/accounts/302be35c-2544-4864-b1f9-8fbce8c7bec3/shows/ae66bc11-4050-400a-9f39-99119f3f24d3/episodes/73ff152a-b5f7-426d-b3e1-9b840d199ae3/www.tresorit.com" target="_blank">www.tresorit.com</a></p>
<p><p>Find out more at www.tresorit.com</p></p>]]></description>
      <pubDate>Mon, 21 Sep 2020 08:35:04 +0000</pubDate>
      <author>spotify-podcaster@tresorit.com (Paul Bartlett, Maria Olshanskaya)</author>
      <link>https://under-ctrl.simplecast.com/episodes/physical-and-digital-security-for-high-end-clients-a-conversation-with-maria-olshanskaya-dlmF8Gfa</link>
      <content:encoded><![CDATA[<p><strong>Come along with us as we venture into the exclusive world of VIPs and discuss what physical and cybersecurity means to high-end clients. Walking us through the challenges of providing the highest levels of safety and privacy to a global customer base is Maria Olshanskaya, Co-Founder and Active Partner of Tel Aviv’s Aera Global Corp.</strong></p><p>You can find todays guest on <a href="https://www.linkedin.com/in/mariaolshanskaya/" target="_blank">https://linkedin.com/in/mariaolshanskaya/</a> and learn more about <strong>Aera Global</strong> on <a href="https://www.aera.global" target="_blank">https://aera.global</a>. And if you want to know what we are up to you can follow us on twitter <a href="https://twitter.com/Tresorit" target="_blank">@tresorit</a> and LinkedIn <a href="https://www.linkedin.com/company/tresorit/" target="_blank">@linkedin.com/company/tresorit/</a> and learn more about our company on <a href="https://dashboard.simplecast.com/accounts/302be35c-2544-4864-b1f9-8fbce8c7bec3/shows/ae66bc11-4050-400a-9f39-99119f3f24d3/episodes/73ff152a-b5f7-426d-b3e1-9b840d199ae3/www.tresorit.com" target="_blank">www.tresorit.com</a></p>
<p><p>Find out more at www.tresorit.com</p></p>]]></content:encoded>
      <enclosure length="22549453" type="audio/mpeg" url="https://chrt.fm/track/1A2EF3/cdn.simplecast.com/audio/ae66bc11-4050-400a-9f39-99119f3f24d3/episodes/5001f91f-29dc-4a2c-a955-e635c51faf45/audio/b5d32e93-785c-4195-994d-9f4877e87311/default_tc.mp3?aid=rss_feed&amp;feed=9hgsF902"/>
      <itunes:title>Physical and digital security for high-end clients – a conversation with Maria Olshanskaya</itunes:title>
      <itunes:author>Paul Bartlett, Maria Olshanskaya</itunes:author>
      <itunes:duration>00:23:30</itunes:duration>
      <itunes:summary>Come along with us as we venture into the exclusive world of VIPs and discuss what physical and cybersecurity means to high-end clients. Walking us through the challenges of providing the highest levels of safety and privacy to a global customer base is Maria Olshanskaya, Co-Founder and Active Partner of Tel Aviv’s Aera Global Corp.

You can find todays guest on https://linkedin.com/in/mariaolshanskaya/ and learn more about Aera Global on https://aera.global. And if you want to know what we are up to you can follow us on twitter @tresorit and LinkedIn @linkedin.com/company/tresorit/ and learn more about our company on www.tresorit.com</itunes:summary>
      <itunes:subtitle>Come along with us as we venture into the exclusive world of VIPs and discuss what physical and cybersecurity means to high-end clients. Walking us through the challenges of providing the highest levels of safety and privacy to a global customer base is Maria Olshanskaya, Co-Founder and Active Partner of Tel Aviv’s Aera Global Corp.

You can find todays guest on https://linkedin.com/in/mariaolshanskaya/ and learn more about Aera Global on https://aera.global. And if you want to know what we are up to you can follow us on twitter @tresorit and LinkedIn @linkedin.com/company/tresorit/ and learn more about our company on www.tresorit.com</itunes:subtitle>
      <itunes:keywords>physical security, high-end clientele, premium service, digital security vip, privacy, aera global</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>7</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">a673d0d2-e766-409d-b0d0-edb6fb873841</guid>
      <title>Schrems II: The invalidated Privacy Shield and its aftermath – a walkthrough with Jitty van Doodewaerd</title>
      <description><![CDATA[<p>With the Schrems 2 ruling finalized in July, how will enterprise data protection be affected? What is the future of the EU-US Privacy Shield? We chat with Jitty van Doodewaerd from DMCC who was formerly part of the Big Data Expert Group of the Dutch Ministry of Economic Affairs.</p><p>You can find todays guest on <a target="_blank">https://www.linkedin.com/in/jitty-van-doodewaerd-0424816/</a> and learn more about DMCC Netherlands on<a target="_blank"> https://dmcc.nl/</a>. And if you want to know what we are up to you can follow us on twitter <a href="https://twitter.com/Tresorit" target="_blank">@tresorit</a> and LinkedIn <a href="https://www.linkedin.com/company/tresorit/" target="_blank">@linkedin.com/company/tresorit/</a> and learn more about our company on <a href="www.tresorit.com" target="_blank">www.tresorit.com</a> </p>
<p><p>Find out more at www.tresorit.com</p></p>]]></description>
      <pubDate>Fri, 4 Sep 2020 11:13:12 +0000</pubDate>
      <author>spotify-podcaster@tresorit.com (Paul Bartlett, Jitty Van Doodewaerd)</author>
      <link>https://blog.tresorit.com/schrems-ii-the-invalidated-privacy-shield-and-its-aftermath-a-walkthrough-with-jitty-van-doodewaerd/</link>
      <content:encoded><![CDATA[<p>With the Schrems 2 ruling finalized in July, how will enterprise data protection be affected? What is the future of the EU-US Privacy Shield? We chat with Jitty van Doodewaerd from DMCC who was formerly part of the Big Data Expert Group of the Dutch Ministry of Economic Affairs.</p><p>You can find todays guest on <a target="_blank">https://www.linkedin.com/in/jitty-van-doodewaerd-0424816/</a> and learn more about DMCC Netherlands on<a target="_blank"> https://dmcc.nl/</a>. And if you want to know what we are up to you can follow us on twitter <a href="https://twitter.com/Tresorit" target="_blank">@tresorit</a> and LinkedIn <a href="https://www.linkedin.com/company/tresorit/" target="_blank">@linkedin.com/company/tresorit/</a> and learn more about our company on <a href="www.tresorit.com" target="_blank">www.tresorit.com</a> </p>
<p><p>Find out more at www.tresorit.com</p></p>]]></content:encoded>
      <enclosure length="21159739" type="audio/mpeg" url="https://chrt.fm/track/1A2EF3/cdn.simplecast.com/audio/ae66bc/ae66bc11-4050-400a-9f39-99119f3f24d3/73ff152a-b5f7-426d-b3e1-9b840d199ae3/podcast-ep6-dmcc_tc.mp3?aid=rss_feed&amp;feed=9hgsF902"/>
      <itunes:title>Schrems II: The invalidated Privacy Shield and its aftermath – a walkthrough with Jitty van Doodewaerd</itunes:title>
      <itunes:author>Paul Bartlett, Jitty Van Doodewaerd</itunes:author>
      <itunes:duration>00:22:03</itunes:duration>
      <itunes:summary>With the Schrems 2 ruling finalized in July, how will enterprise data protection be affected? What is the future of the EU-US Privacy Shield? We chat with Jitty van Doodewaerd from DMCC who was formerly part of the Big Data Expert Group of the Dutch Ministry of Economic Affairs.

You can find todays guest on https://www.linkedin.com/in/jitty-van-doodewaerd-0424816/ and learn more about DMCC Netherlands on https://dmcc.nl/. And if you want to know what we are up to you can follow us on twitter @tresorit and LinkedIn @linkedin.com/company/tresorit/ and learn more about our company on www.tresorit.com </itunes:summary>
      <itunes:subtitle>With the Schrems 2 ruling finalized in July, how will enterprise data protection be affected? What is the future of the EU-US Privacy Shield? We chat with Jitty van Doodewaerd from DMCC who was formerly part of the Big Data Expert Group of the Dutch Ministry of Economic Affairs.

You can find todays guest on https://www.linkedin.com/in/jitty-van-doodewaerd-0424816/ and learn more about DMCC Netherlands on https://dmcc.nl/. And if you want to know what we are up to you can follow us on twitter @tresorit and LinkedIn @linkedin.com/company/tresorit/ and learn more about our company on www.tresorit.com </itunes:subtitle>
      <itunes:keywords>gdpr, eu data protection, data privacy act, enterprise data protection, data protection and privacy, data protection, data leak prevention, data security cloud, us privacy shield, privacy shield, privacy shield certification, eu us privacy shield, schrems ii, business data security, data privacy, data protection services, data encryption at rest, at rest encryption, data privacy protection</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>6</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">7f469ea1-0e2f-47e7-8ce5-1bd7ee3b0db4</guid>
      <title>Secure digital collaboration on the water – HR insights with Codi Robbins</title>
      <description><![CDATA[<p>Join us as we sail off into the sea to discuss how human-centric roles such as hospitality, and different generations all successfully coexist with technology and data security. Helping us navigate the waters is Hornblower Cruises and Events HR manager Codi Robbins from California. <br />You can find todays guest on <a href="https://www.linkedin.com/in/codirobbins/" target="_blank">https://www.linkedin.com/in/codirobbins/</a> and learn more about Hornblower on <a href="https://www.hornblower.com/" target="_blank">https://www.hornblower.com</a>. And if you want to know what we are up to you can follow us on twitter <a href="https://twitter.com/Tresorit" target="_blank">@tresorit</a> and <a href="https://www.linkedin.com/company/tresorit/" target="_blank">LinkedIn</a> and learn more about our company on <a href="http://www.tresorit.com/" target="_blank">www.tresorit.com</a></p>
<p><p>Find out more at www.tresorit.com</p></p>]]></description>
      <pubDate>Mon, 24 Aug 2020 07:49:56 +0000</pubDate>
      <author>spotify-podcaster@tresorit.com (Codi Robbins, Paul Bartlett)</author>
      <link>https://blog.tresorit.com/secure-digital-collaboration-on-the-water-hr-insights-with-codi-robbins/</link>
      <content:encoded><![CDATA[<p>Join us as we sail off into the sea to discuss how human-centric roles such as hospitality, and different generations all successfully coexist with technology and data security. Helping us navigate the waters is Hornblower Cruises and Events HR manager Codi Robbins from California. <br />You can find todays guest on <a href="https://www.linkedin.com/in/codirobbins/" target="_blank">https://www.linkedin.com/in/codirobbins/</a> and learn more about Hornblower on <a href="https://www.hornblower.com/" target="_blank">https://www.hornblower.com</a>. And if you want to know what we are up to you can follow us on twitter <a href="https://twitter.com/Tresorit" target="_blank">@tresorit</a> and <a href="https://www.linkedin.com/company/tresorit/" target="_blank">LinkedIn</a> and learn more about our company on <a href="http://www.tresorit.com/" target="_blank">www.tresorit.com</a></p>
<p><p>Find out more at www.tresorit.com</p></p>]]></content:encoded>
      <enclosure length="33072412" type="audio/mpeg" url="https://chrt.fm/track/1A2EF3/cdn.simplecast.com/audio/ae66bc/ae66bc11-4050-400a-9f39-99119f3f24d3/5a044842-ed86-4f44-96af-c310609fe990/ep5-hornblower_tc.mp3?aid=rss_feed&amp;feed=9hgsF902"/>
      <itunes:title>Secure digital collaboration on the water – HR insights with Codi Robbins</itunes:title>
      <itunes:author>Codi Robbins, Paul Bartlett</itunes:author>
      <itunes:duration>00:34:27</itunes:duration>
      <itunes:summary>Join us as we sail off into the sea to discuss how human-centric roles such as hospitality, and different generations all successfully coexist with technology and data security. Helping us navigate the waters is Hornblower Cruises and Events HR manager Codi Robbins from California. 

You can find todays guest on https://www.linkedin.com/in/codirobbins/ and learn more about Hornblower on https://www.hornblower.com. And if you want to know what we are up to you can follow us on twitter @tresorit and LinkedIn @linkedin.com/company/tresorit/ and learn more about our company on www.tresorit.com </itunes:summary>
      <itunes:subtitle>Join us as we sail off into the sea to discuss how human-centric roles such as hospitality, and different generations all successfully coexist with technology and data security. Helping us navigate the waters is Hornblower Cruises and Events HR manager Codi Robbins from California. 

You can find todays guest on https://www.linkedin.com/in/codirobbins/ and learn more about Hornblower on https://www.hornblower.com. And if you want to know what we are up to you can follow us on twitter @tresorit and LinkedIn @linkedin.com/company/tresorit/ and learn more about our company on www.tresorit.com </itunes:subtitle>
      <itunes:keywords>hospitality, paul bartlett, hr event manager, data security, technology, hr, tresorit, codi robbins, privacy, hornblower cruises and events</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>5</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">b825eb8b-a7b8-4f58-b43c-a80c0fe036a7</guid>
      <title>Protecting data and clients in FinTech - an interview with Jim Rumph</title>
      <description><![CDATA[<p><strong>This time we’ll be diving into the FinTech world and discuss digital transformation and the role cybersecurity plays in this ever evolving world. Joining us from Atlanta, USA, we have Wipfli senior manager Jim Rumph who’ll walk us through what effective risk management and compliance should look like to ensure success and growth.</strong></p><p><br /><strong>You can find todays guest on </strong><a href="http://www.linkedin.com/in/jimrumph/" target="_blank"><strong>www.linkedin.com/in/jimrumph/</strong></a><strong> and learn more about Wipfli on </strong><a href="http://www.wipfli.com/" target="_blank"><strong>www.wipfli.com</strong></a><strong>. And if you want to know what we are up to you can follow us on twitter </strong><a href="https://twitter.com/Tresorit" target="_blank"><strong>@tresorit</strong></a><strong> and instagram </strong><a href="https://www.instagram.com/tresorit_co/" target="_blank"><strong>@tresorit_co</strong></a><strong> and learn more about our company on </strong><a href="http://www.tresorit.com/" target="_blank"><strong>www.tresorit.com</strong></a></p>
<p><p>Find out more at www.tresorit.com</p></p>]]></description>
      <pubDate>Mon, 10 Aug 2020 08:06:29 +0000</pubDate>
      <author>spotify-podcaster@tresorit.com (Jim Rumph, Paul Bartlett)</author>
      <link>https://blog.tresorit.com/reducing-risks-and-protecting-clients-in-fintech-in-the-digital-age-an-interview-with-jim-rumph/</link>
      <content:encoded><![CDATA[<p><strong>This time we’ll be diving into the FinTech world and discuss digital transformation and the role cybersecurity plays in this ever evolving world. Joining us from Atlanta, USA, we have Wipfli senior manager Jim Rumph who’ll walk us through what effective risk management and compliance should look like to ensure success and growth.</strong></p><p><br /><strong>You can find todays guest on </strong><a href="http://www.linkedin.com/in/jimrumph/" target="_blank"><strong>www.linkedin.com/in/jimrumph/</strong></a><strong> and learn more about Wipfli on </strong><a href="http://www.wipfli.com/" target="_blank"><strong>www.wipfli.com</strong></a><strong>. And if you want to know what we are up to you can follow us on twitter </strong><a href="https://twitter.com/Tresorit" target="_blank"><strong>@tresorit</strong></a><strong> and instagram </strong><a href="https://www.instagram.com/tresorit_co/" target="_blank"><strong>@tresorit_co</strong></a><strong> and learn more about our company on </strong><a href="http://www.tresorit.com/" target="_blank"><strong>www.tresorit.com</strong></a></p>
<p><p>Find out more at www.tresorit.com</p></p>]]></content:encoded>
      <enclosure length="32480582" type="audio/mpeg" url="https://chrt.fm/track/1A2EF3/cdn.simplecast.com/audio/ae66bc/ae66bc11-4050-400a-9f39-99119f3f24d3/b5e1baab-143d-4be5-b69f-9c6177d01216/ep4-wipfli-v2_tc.mp3?aid=rss_feed&amp;feed=9hgsF902"/>
      <itunes:title>Protecting data and clients in FinTech - an interview with Jim Rumph</itunes:title>
      <itunes:author>Jim Rumph, Paul Bartlett</itunes:author>
      <itunes:duration>00:33:51</itunes:duration>
      <itunes:summary>This time we’ll be diving into the FinTech world and discuss digital transformation and the role cybersecurity plays in this ever evolving world. Joining us from Atlanta, USA, we have Wipfli senior manager Jim Rumph who’ll walk us through what effective risk management and compliance should look like to ensure success and growth.

You can find todays guest on www.linkedin.com/in/jimrumph/ and learn more about Wipfli on www.wipfli.com. And if you want to know what we are up to you can follow us on twitter @tresorit and instagram @tresorit_co and learn more about our company on www.tresorit.com</itunes:summary>
      <itunes:subtitle>This time we’ll be diving into the FinTech world and discuss digital transformation and the role cybersecurity plays in this ever evolving world. Joining us from Atlanta, USA, we have Wipfli senior manager Jim Rumph who’ll walk us through what effective risk management and compliance should look like to ensure success and growth.

You can find todays guest on www.linkedin.com/in/jimrumph/ and learn more about Wipfli on www.wipfli.com. And if you want to know what we are up to you can follow us on twitter @tresorit and instagram @tresorit_co and learn more about our company on www.tresorit.com</itunes:subtitle>
      <itunes:keywords>risk management, digital transformation, data security, jim rumph, fintech, privacy, wipfli podcast</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>4</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">db45ed71-4fad-4444-bc6e-dfb6fc0fa23b</guid>
      <title>Private Wealth Management online – is it possible? By Romesh Atapattu</title>
      <description><![CDATA[<p>Data protection? Compliance? Regulations? We chat with CEO and founder of Patronous Wealth, Romesh Atapattu about all things digital within the extremely secure world of asset management. Listen to some incredible true stories as we try to answer the question — is it possible for private wealth management to go online?</p><p><br />You can find todays guest, Romesh Atapattu on <a href="www.linkedin.com/in/rom-atapattu-4630151/" target="_blank">LinkedIn</a> and learn more about Patronous Wealth on <a href="http://www.patronuswealth.com/" target="_blank">www.patronuswealth.com</a>. And if you want to know what we are up to you can follow us on twitter <a href="https://twitter.com/Tresorit" target="_blank">@tresorit</a> and instagram <a href="https://www.instagram.com/tresorit_co/" target="_blank">@tresorit_co</a> and learn more about our company on <a href="https://www.tresorit.com/?utm_source=podcast_summary_ep3&utm_medium=referral&utm_campaign=prio2" target="_blank">www.tresorit.com</a></p>
<p><p>Find out more at www.tresorit.com</p></p>]]></description>
      <pubDate>Fri, 24 Jul 2020 08:00:59 +0000</pubDate>
      <author>spotify-podcaster@tresorit.com (Paul Bartlett, Romesh Atapattu)</author>
      <link>https://blog.tresorit.com/private-wealth-management-online-is-it-possible-by-romesh-atapattu/</link>
      <content:encoded><![CDATA[<p>Data protection? Compliance? Regulations? We chat with CEO and founder of Patronous Wealth, Romesh Atapattu about all things digital within the extremely secure world of asset management. Listen to some incredible true stories as we try to answer the question — is it possible for private wealth management to go online?</p><p><br />You can find todays guest, Romesh Atapattu on <a href="www.linkedin.com/in/rom-atapattu-4630151/" target="_blank">LinkedIn</a> and learn more about Patronous Wealth on <a href="http://www.patronuswealth.com/" target="_blank">www.patronuswealth.com</a>. And if you want to know what we are up to you can follow us on twitter <a href="https://twitter.com/Tresorit" target="_blank">@tresorit</a> and instagram <a href="https://www.instagram.com/tresorit_co/" target="_blank">@tresorit_co</a> and learn more about our company on <a href="https://www.tresorit.com/?utm_source=podcast_summary_ep3&utm_medium=referral&utm_campaign=prio2" target="_blank">www.tresorit.com</a></p>
<p><p>Find out more at www.tresorit.com</p></p>]]></content:encoded>
      <enclosure length="39379834" type="audio/mpeg" url="https://chrt.fm/track/1A2EF3/cdn.simplecast.com/audio/ae66bc/ae66bc11-4050-400a-9f39-99119f3f24d3/d4d34a8e-930e-4c7b-9cb9-b8eb47dd58c7/podcast-ep3-patronus_tc.mp3?aid=rss_feed&amp;feed=9hgsF902"/>
      <itunes:title>Private Wealth Management online – is it possible? By Romesh Atapattu</itunes:title>
      <itunes:author>Paul Bartlett, Romesh Atapattu</itunes:author>
      <itunes:duration>00:41:02</itunes:duration>
      <itunes:summary>Data protection? Compliance? Regulations? We chat with CEO and founder of Patronous Wealth, Romesh Atapattu about all things digital within the extremely secure world of asset management. Listen to some incredible true stories as we try to answer the question — is it possible for private wealth management to go online?

You can find todays guest, Romesh Atapattu on www.linkedin.com/in/rom-atapattu-4630151/ and learn more about Patronous Wealth on www.patronuswealth.com. And if you want to know what we are up to you can follow us on twitter @tresorit and instagram @tresorit_co and learn more about our company on www.tresorit.com</itunes:summary>
      <itunes:subtitle>Data protection? Compliance? Regulations? We chat with CEO and founder of Patronous Wealth, Romesh Atapattu about all things digital within the extremely secure world of asset management. Listen to some incredible true stories as we try to answer the question — is it possible for private wealth management to go online?

You can find todays guest, Romesh Atapattu on www.linkedin.com/in/rom-atapattu-4630151/ and learn more about Patronous Wealth on www.patronuswealth.com. And if you want to know what we are up to you can follow us on twitter @tresorit and instagram @tresorit_co and learn more about our company on www.tresorit.com</itunes:subtitle>
      <itunes:keywords>online collaboration, private wealth management, digital privacy, data security, finance podcast, assett management, technology, cloud storage</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>3</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">2802159c-6ca0-454a-8e08-466603422c93</guid>
      <title>From pen and paper to online cloud within leadership services  – discussion with Christoffer Lindblad</title>
      <description><![CDATA[<p>Remember the old days when we used pen and paper? Come along with us as we discuss this gigantic shift in the way we work. We delve into security’s and technology’s influence with Christoffer Lindblad — a founding partner or the nordic leadership service firm Pelago.<br />You can find todays guest, Christoffer Lindblad on <a href="http://linkedin.com/in/christofferlindblad/" target="_blank">linkedin.com/in/christofferlindblad/</a> and learn more about Pelago on <a href="http://www.pelago.se/" target="_blank">www.pelago.se</a>. And if you want to know what we are up to you can follow us on twitter <a href="https://twitter.com/Tresorit" target="_blank">@tresorit</a> and instagram <a href="https://www.instagram.com/tresorit_co/" target="_blank">@tresorit_co</a> and learn more about our company on <a href="https://www.tresorit.com/?utm_source=podcast_summary_ep2&utm_medium=referral&utm_campaign=prio2" target="_blank">www.tresorit.com</a></p>
<p><p>Find out more at www.tresorit.com</p></p>]]></description>
      <pubDate>Fri, 24 Jul 2020 07:51:25 +0000</pubDate>
      <author>spotify-podcaster@tresorit.com (Christoffer Lindblad, Paul Bartlett)</author>
      <link>https://blog.tresorit.com/ep2-from-pen-and-paper-to-online-cloud-within-leadership-services-a-discussion-with-christoffer-lindblad-from-pelago/</link>
      <content:encoded><![CDATA[<p>Remember the old days when we used pen and paper? Come along with us as we discuss this gigantic shift in the way we work. We delve into security’s and technology’s influence with Christoffer Lindblad — a founding partner or the nordic leadership service firm Pelago.<br />You can find todays guest, Christoffer Lindblad on <a href="http://linkedin.com/in/christofferlindblad/" target="_blank">linkedin.com/in/christofferlindblad/</a> and learn more about Pelago on <a href="http://www.pelago.se/" target="_blank">www.pelago.se</a>. And if you want to know what we are up to you can follow us on twitter <a href="https://twitter.com/Tresorit" target="_blank">@tresorit</a> and instagram <a href="https://www.instagram.com/tresorit_co/" target="_blank">@tresorit_co</a> and learn more about our company on <a href="https://www.tresorit.com/?utm_source=podcast_summary_ep2&utm_medium=referral&utm_campaign=prio2" target="_blank">www.tresorit.com</a></p>
<p><p>Find out more at www.tresorit.com</p></p>]]></content:encoded>
      <enclosure length="41505992" type="audio/mpeg" url="https://chrt.fm/track/1A2EF3/cdn.simplecast.com/audio/ae66bc/ae66bc11-4050-400a-9f39-99119f3f24d3/d8aa7b55-0f01-4eac-9144-efaabd920fbb/podcast-ep2-pelago_tc.mp3?aid=rss_feed&amp;feed=9hgsF902"/>
      <itunes:title>From pen and paper to online cloud within leadership services  – discussion with Christoffer Lindblad</itunes:title>
      <itunes:author>Christoffer Lindblad, Paul Bartlett</itunes:author>
      <itunes:duration>00:43:15</itunes:duration>
      <itunes:summary>Remember the old days when we used pen and paper? Come along with us as we discuss this gigantic shift in the way we work. We delve into security’s and technology’s influence with Christoffer Lindblad — a founding partner or the nordic leadership service firm Pelago.
You can find todays guest, Christoffer Lindblad on linkedin.com/in/christofferlindblad/ and learn more about Pelago on www.pelago.se. And if you want to know what we are up to you can follow us on twitter @tresorit and instagram @tresorit_co and learn more about our company on www.tresorit.com</itunes:summary>
      <itunes:subtitle>Remember the old days when we used pen and paper? Come along with us as we discuss this gigantic shift in the way we work. We delve into security’s and technology’s influence with Christoffer Lindblad — a founding partner or the nordic leadership service firm Pelago.
You can find todays guest, Christoffer Lindblad on linkedin.com/in/christofferlindblad/ and learn more about Pelago on www.pelago.se. And if you want to know what we are up to you can follow us on twitter @tresorit and instagram @tresorit_co and learn more about our company on www.tresorit.com</itunes:subtitle>
      <itunes:keywords>hr podcast, digital privacy, leadership services, data security, cyber security, security, technology, cloud storage, interim management</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>2</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">3a33f040-7092-4dd9-b205-8af21301b356</guid>
      <title>Digitalization and security in electronic crimes with Tony Van Der Haar</title>
      <description><![CDATA[<p>Join us as we embark on a journey to discover what electronic crimes are all about, what role technology plays within law enforcement and what’s life like in the COVID-19 era, with detective Tony Van Der Haar from Boone County Sheriff office in northern Kentucky, USA.</p><p>You can learn more on <a href="www.boonesheriff.com" target="_blank">www.boonesheriff.com</a>. If you want to know what we are up to you can follow us on Twitter <a href="https://twitter.com/Tresorit/" target="_blank">@tresorit</a> and Instagram <a href="https://www.instagram.com/tresorit_co" target="_blank">@tresorit_co</a> and learn more about our company on <a href="https://www.tresorit.com/?utm_source=podcast_summary_ep1&utm_medium=referral&utm_campaign=prio2" target="_blank">www.tresorit.com</a></p>
<p><p>Find out more at www.tresorit.com</p></p>]]></description>
      <pubDate>Wed, 22 Jul 2020 14:30:01 +0000</pubDate>
      <author>spotify-podcaster@tresorit.com (Tony Van Der Haar, Paul Bartlett)</author>
      <link>https://blog.tresorit.com/ep1-digitalization-and-security-in-the-context-of-electronic-crime-with-tony-van-der-haar/</link>
      <content:encoded><![CDATA[<p>Join us as we embark on a journey to discover what electronic crimes are all about, what role technology plays within law enforcement and what’s life like in the COVID-19 era, with detective Tony Van Der Haar from Boone County Sheriff office in northern Kentucky, USA.</p><p>You can learn more on <a href="www.boonesheriff.com" target="_blank">www.boonesheriff.com</a>. If you want to know what we are up to you can follow us on Twitter <a href="https://twitter.com/Tresorit/" target="_blank">@tresorit</a> and Instagram <a href="https://www.instagram.com/tresorit_co" target="_blank">@tresorit_co</a> and learn more about our company on <a href="https://www.tresorit.com/?utm_source=podcast_summary_ep1&utm_medium=referral&utm_campaign=prio2" target="_blank">www.tresorit.com</a></p>
<p><p>Find out more at www.tresorit.com</p></p>]]></content:encoded>
      <enclosure length="26684742" type="audio/mpeg" url="https://chrt.fm/track/1A2EF3/cdn.simplecast.com/audio/ae66bc/ae66bc11-4050-400a-9f39-99119f3f24d3/faf949d1-0cb5-4507-9284-f132bc26a00d/podcast-ep1-boone_tc.mp3?aid=rss_feed&amp;feed=9hgsF902"/>
      <itunes:title>Digitalization and security in electronic crimes with Tony Van Der Haar</itunes:title>
      <itunes:author>Tony Van Der Haar, Paul Bartlett</itunes:author>
      <itunes:duration>00:27:48</itunes:duration>
      <itunes:summary>Join us as we embark on a journey to discover what electronic crimes are all about, what role technology plays within law enforcement and what’s life like in the COVID-19 era, with detective Tony Van Der Haar from Boone County Sheriff office in northern Kentucky, USA.

You can learn more on www.boonesheriff.com. If you want to know what we are up to you can follow us on Twitter @tresorit and Instagram @tresorit_co and learn more about our company on www.tresorit.com</itunes:summary>
      <itunes:subtitle>Join us as we embark on a journey to discover what electronic crimes are all about, what role technology plays within law enforcement and what’s life like in the COVID-19 era, with detective Tony Van Der Haar from Boone County Sheriff office in northern Kentucky, USA.

You can learn more on www.boonesheriff.com. If you want to know what we are up to you can follow us on Twitter @tresorit and Instagram @tresorit_co and learn more about our company on www.tresorit.com</itunes:subtitle>
      <itunes:keywords>digital privacy, data security, cyber security, security, technology, cloud storage, law enforcement, privacy</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>1</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">485e0e6f-0d95-47fb-aa78-f9c53f020648</guid>
      <title>Trailer</title>
      <description><![CDATA[Our host - Paul Bartlett - welcomes you to the biweekly series. Find out more at www.tresorit.com
]]></description>
      <pubDate>Tue, 14 Jul 2020 07:31:21 +0000</pubDate>
      <author>spotify-podcaster@tresorit.com (Tresorit)</author>
      <link>https://under-ctrl.simplecast.com/episodes/trailer-_xqN_x0z</link>
      <enclosure length="831458" type="audio/mpeg" url="https://chrt.fm/track/1A2EF3/cdn.simplecast.com/audio/ae66bc/ae66bc11-4050-400a-9f39-99119f3f24d3/76df1274-130b-4976-baaa-9a0f0ae085a4/tresorit-podcast-trailer_tc.mp3?aid=rss_feed&amp;feed=9hgsF902"/>
      <itunes:title>Trailer</itunes:title>
      <itunes:author>Tresorit</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/6bb881ee-2fad-49e8-b005-03e4cd35d484/08775e32-524f-4005-b559-fdde5df354b2/3000x3000/underctrl-artwork.jpg?aid=rss_feed"/>
      <itunes:duration>00:00:52</itunes:duration>
      <itunes:summary>Our host - Paul Bartlett - welcomes you to the biweekly series.</itunes:summary>
      <itunes:subtitle>Our host - Paul Bartlett - welcomes you to the biweekly series.</itunes:subtitle>
      <itunes:keywords>cloudstorage, digital privacy, podcast, data security, cyber security, security, technology, cloud storage, privacy</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>trailer</itunes:episodeType>
    </item>
  </channel>
</rss>