Send message to

Do you want to send the message without a subject?
Please note that your message can be maximum 1000 characters long
Special characters '<', '>' are not allowed in subject and message
reCaptcha is invalid.
reCaptcha failed because of a problem with the server.

Your message has been sent

You can find the message in your personal profile at "My messages".

An error occured

Please try again.

Make an appointment with

So that you can make an appointment, the calendar will open in a new tab on the personal profile of your contact person.

Create an onsite appointment with

So that you can make an onsite appointment, the appointment request will open in a new tab.

it-sa365-n-Tresorit-Header-Desktop
IT Security Talks Stream I

End-to-End Encryption: How it took over the world but doesn't always deliver on its promises

Join us to learn more about the different types of encryption and how bad implementations can ruin your data privacy.

calendar_today Wed, 03.05.2023, 12:00 - 12:30

event_available Digital

Action Video

south_east

Action description

south_east

Speaker

south_east

Themes

Cloud Security Data protection / GDPR Data security / DLP / Know-how protection

Event

This action is part of the event IT Security Talks

Action Video

grafischer Background
close

This video is available to the it-sa 365 community. 
Please register or log in with your login data.

Action description

What should you look for when choosing an encryption solution for your needs?

Encryption has come along way from the tool of choice for top secret state affairs to solutions everybody can find in their smartphones and messaging apps. However, not all encryption is created equal and in a lot of cases you don’t get the security that was promised. From bad implementation to backdoors to over-complicated usability - there are many reasons your most valuable data might end up unprotected.

In this webinar, we will talk about what you should look for when choosing an encryption solution for your needs.

Learn more about:

The finer details of true end-to-end encryption

How zero knowledge can improve your sleep

How only ease of use can eliminate the human factor

How breaches of encrypted data can still ruin security and why key rotation is key


‘The foundations of encryption are pretty straight forward but done incorrectly, the consequences can be pretty disastrous’

Szilveszter Szebeni, Chief Data & Compliance Officer and Co-Founder, Tresorit
... read more

Language: English

Questions and Answers: Yes

Speaker

show more
close

This content or feature is available to the it-sa 365 community. 
Please register or log in with your login data.