Cybersecurity & Cloud Advisor @ D3 Cyber
An IT consultant with more than 20 years of industry experience, Tudor is a Certified Ethical Hacker, and a Microsoft Cloud and Datacenter Management MVP. His commitment to staying at the forefront of technology trends enables him to provide valuable guidance and support to organizations seeking to navigate the ever-changing IT landscape. His passion for sharing knowledge and engaging with the community has made him a regular speaker at local and regional community events, where he aims to provide valuable insights and guidance to professionals and enthusiasts in the IT industry.
In terms of expertise, Cybersecurity Strategy and Cloud Governance both rank highly among Tudor’s core interests, helping organizations develop effective strategies to leverage the power of Cloud computing and secure their operations. He also focuses on IT Governance & Risk Management, Data Protection, Business Process Optimization, and Digital Transformation.
Area of Expertise
Cybersecurity stands as one of today's top concerns for many organizations. While a lucky few may have the required expertise in-house, many still rely on external specialists to guide their cybersecurity endeavors, a thing which, in turn, tends to provide its own challenges.
Crafting an effective cybersecurity strategy involves assessing the organization's current posture, identifying potential risks, formulating comprehensive policies, ensuring staff are well-trained, responding to incidents, and maintaining adherence to compliance standards, among other tasks.
In this session, participants will delve into the foundational components of a robust cybersecurity strategy aligned with the organization's mission and vision. Through real-world examples, attendees will grasp how such strategies elevate an organization's cybersecurity maturity, improve its security posture, and fortify its resilience against potential threats.
As the digital landscape evolves, the imperative for robust security measures has never been more acute. The Zero Trust model, with its foundational mantra of "Never trust, always verify," presents a paradigm shift in IT security, tailored for today's complex hybrid work environments.
Verifying everything explicitly (users, apps, devices), using a least-privilege access model, defining the proper context for policy compliance and device health, and applying an assume breach approach are all essential parts of the process. On top of that, the latest developments in Privacy Enhancing Technologies (PETs), including homomorphic encryption, differential privacy, and zero-knowledge proofs play a crucial role in protecting data privacy and enhancing security measures within a Zero Trust framework.
Join this session to find out everything about how Zero Trust architectures are designed to work, and how implementing ZT and PETs will make your digital operations safer in an era marked by rapidly evolving cyber threats and stringent data protection regulations.
The payoff of successful Digital Transformation can be essential for companies engaged in highly-competitive markets. Almost every business decision requires executives and managers to balance risk and reward, and efficiency in that process is essential to an enterprise’s success. However, when people talk about moving workloads to the Cloud, most times they just hear the technical mumbo-jumbo - IaaS, PaaS, SaaS, DevOps & automation, containers, and so on.
This session argues we should perhaps sit back for a bit and discuss the need to develop a coherent, long-term Cloud strategy, even before taking the first step towards a Cloud-centric or hybrid approach. In the end, it’s all about looking at the hows and whys of moving to the Cloud, planning a clear roadmap of your migration, and making sure that once you get there, you can sleep better at night knowing you’ve got everything under control.
Based on real-life projects and experience from recent years, this session provides a quick insight into the role that the Cloud plays within Digital Transformation initiatives, touching on challenges companies usually face when dealing with governance, security, change management & cost-control.
You've probably been hacked already, and you don't even know it. Now what?
In today's rapidly evolving digital ecosystem, the notion that any system or application is "unhackable" is not just outdated - it's perilously naive. As we venture deeper into 2024, the cybersecurity domain is witnessing an unprecedented proliferation of sophisticated threats, from AI-manipulated attacks to insidious ransomware campaigns targeting our most critical infrastructures.
This session is an urgent wake-up call, designed to shatter any lingering complacency. We will look at how Digital Transformation, propelled by the pandemic and the mass shift to remote work, has expanded vulnerabilities and introduced new attack vectors, making the question "Now what?" more relevant than ever.
In an era where cyber threats are getting increasingly sophisticated, Europe has stepped up its game with two pivotal regulations: the NIS2 Directive and the Cyber Resilience Act (CRA). These measures are redefining the cybersecurity landscape, offering comprehensive strategies to combat digital dangers.
In this session, we'll delve into the depths of both the NIS2 Directive and the CRA, unraveling their complexities and implications, looking at how they're changing the game, and what it means for businesses, individuals, and yes, even the humble smart devices in our homes. Walk away with insights that'll make you the star of your next virtual hangout, and have your smart toaster nodding in approval (well, metaphorically).
Cybersecurity is rapidly evolving, shaped by artificial intelligence (AI) and the emergent potential of Quantum Computing. AI enhances security through automated detection and analysis, swiftly processing vast amounts of data to spot and predict threats, and Quantum Computing holds the promise to revolutionize various industries by offering unparalleled computational speed and efficiency, enabling it to tackle complex problems far beyond the reach of classical computers.
Yet, these benefits also come with risks: AI's capabilities can be exploited for advanced phishing, vulnerability discovery, and creating adaptive malware, complicating the cybersecurity landscape, while Quantum Computing further challenges digital security by threatening to undermine traditional encryption, making existing protections potentially obsolete.
This session will explore the mixed impact of AI and Quantum Computing on Cybersecurity, highlighting both the advancements and vulnerabilities they introduce. We'll discuss current threats like supply chain attacks and ransomware, alongside the integration of Privacy Enhancing Technologies (PETs) with AI and quantum defenses, offering a strategic viewpoint on safeguarding against the future of cyber threats.
Cybersecurity & Cloud Advisor @ D3 Cyber