Cybersecurity Cloud Strategy Business & Management Digital Transformation Cloud Advisory Business Process Optimization COBIT SFIA IT Risk Management Business Continuity and Disaster Recovery Security & Compliance GDPR
Cluj-Napoca, Cluj, Romania
"Never trust, always verify" is the core principle of the Zero Trust Model, a rising trend in the world of IT security. With more and more people working remotely, there's a growing need to adapt to the complexity of the new hybrid workplace and to protect the people, devices, and apps, wherever they're located. However, not all people and organizations are ready for the digital transformation and management complexity that "perimeterless" security might require.
Verifying everything explicitly (users, apps, devices), using a least-privilege access model, defining the proper context for policy compliance and device health, and applying an assume breach approach are all essential parts of the process. Join this session to find out everything about how Zero Trust architectures are designed to work, and how implementing (or not implementing) ZT might impact you and your organization.
As an IT consultant with more than 15 years of experience in managing complex IT infrastructures, Tudor is a Certified Ethical Hacker, a Microsoft Cloud and Datacenter Management MVP, and a regular speaker at local and regional community events. He is also one of the founders and organizers of the ITCamp conference in Romania (itcamp.ro). bringing together tens of awesome speakers with hundreds of attendees every year.
Tudor often talks about the latest technologies and trends, with themes including cloud strategy & governance, digital transformation, cybersecurity, business process optimization, IT risk management & compliance.
Certified Ethical Hacker, Microsoft CDM MVP, IT consultant, meaning of life seeker, amateur photographer, gamer ツ