SECURITY TALK ONLINE

The importance of secure and trustworthy communications

Next Episode Available June 18

With so many businesses working from home, data security has never been as important than it is now.

Join us for this series of 15-minute episodes as we look at how to use technology to keep our most valuable resource—information—safe, both today and in the future.

Save the dates below!

Episode 2: Trustworthy Communications: What it is and Why it Matters

 
Your Host
Steve Multer
 
Guest
Michael Machado
AVP Cyber Security & Compliance, RingCentral

Michael Machado is responsible for information security and communications fraud management at RingCentral, the market leader in unified communications as a service with over 300,000 business customers. Michael and his team are instrumental in leading a strong cyber security program for RingCentral, enabling the company and its products to have strong cyber security while also setting and achieving strong goals and an ambitious vision for his team.

BIO   

Take the Survey

Listen for the prize password during the presentation

and receive a $15 Starbucks Gift Card

$15

RingCentral Talks:

June 4 • Episode 1

How to Run a Secure Meeting: Before, During and After   

 

How to Run a Secure Meeting: Before, During and After:

  • Settings, moderator controls, and more for when you’re scheduling, hosting, or attending
  • For IT Admins:
    • Allow hosts to put attendees on hold
    • Verified users (signed in users only)
  • For Meeting Hosts:
    • Meeting passwords
    • Join before host
    • Waiting rooms
    • Lock Meeting
    • Visual and audio indicators
    • Screen sharing control
    • Remove attendee from a meeting
    • Controlling whether removed attendees can rejoin meeting
 

Want to join us? Just save the date above!

June 11 • Episode 2

Trustworthy Communications: What it is and Why it Matters   

Get familiar with the term “trustworthy communications” and find out what it has to do with keeping your information secure.

In this RingCentral Talk, we’ll:

  • Break down the idea of trustworthy communications
  • Discover why data security matters to you and your company
  • Connect the dots between trustworthy communications and privacy
  • Explore the impact of data breaches at individual, company, and societal levels
  • Dig into security by design, compliance programs, and other foundational elements of the ring of trust (and why they’re important)
  • Find out how RingCentral is taking trustworthy communications to the next level
 

Save the date (above) to make sure you don’t miss out!

June 18 • Episode 3

Inside the Ring of Trust   

Learn how to think through your company’s specific needs and privacy requirements in order to build a trustworthy communications strategy that will help you mitigate risk—right now and down the line.

We'll dig into:

  • Evaluating your current communications—how much can (and should) you trust the solutions you have now?
  • Why the pillars of trusted communications matter, and how thinking through them will help you map out an effective strategy.
  • The categories of communications: what they are and which ones you need to focus on.
 

Ready to join us? Hit the button up top to save the date!

June 25 • Episode 4

Understanding the Difference: Privacy vs. Security   

Coming Soon

 
 

July 9 • Episode 5

Building Trusted Clouds   

Coming Soon

 
 

July 16 • Episode 6

Cybersecurity in the Covid Era   

Coming Soon