© Mapbox, © OpenStreetMap

Speaker

Tudor Damian

Tudor Damian

Cybersecurity & Cloud Advisor @ D3 Cyber

Cluj-Napoca, Romania

An IT consultant with more than 20 years of industry experience, Tudor is a Certified Ethical Hacker, and a Microsoft Cloud and Datacenter Management MVP. His commitment to staying at the forefront of technology trends enables him to provide valuable guidance and support to organizations seeking to navigate the ever-changing IT landscape. His passion for sharing knowledge and engaging with the community has made him a regular speaker at local and regional community events, where he aims to provide valuable insights and guidance to professionals and enthusiasts in the IT industry.

In terms of expertise, Cybersecurity Strategy and Cloud Governance both rank highly among Tudor’s core interests, helping organizations develop effective strategies to leverage the power of Cloud computing and secure their operations. He also focuses on IT Governance & Risk Management, Data Protection, Business Process Optimization, and Digital Transformation.

Awards

Area of Expertise

  • Information & Communications Technology
  • Business & Management

Topics

  • Cybersecurity
  • Cloud Strategy
  • Cloud Migration
  • Cloud & DevOps
  • IT Governance
  • IT Risk Management
  • Data Protection
  • Systems & Network Administration
  • NIS-2
  • GDPR
  • Business Continuity & Disaster Recovery
  • Business Process Optimization
  • Digital Transformation
  • Vulnerability Management
  • vCISO

Crafting your Cybersecurity Strategy: Tales from the Trenches

Cybersecurity stands as one of today's top concerns for many organizations. While a lucky few may have the required expertise in-house, many still rely on external specialists to guide their cybersecurity endeavors, a thing which, in turn, tends to provide its own challenges.

Crafting an effective cybersecurity strategy involves assessing the organization's current posture, identifying potential risks, formulating comprehensive policies, ensuring staff are well-trained, responding to incidents, and maintaining adherence to compliance standards, among other tasks.

In this session, participants will delve into the foundational components of a robust cybersecurity strategy aligned with the organization's mission and vision. Through real-world examples, attendees will grasp how such strategies elevate an organization's cybersecurity maturity, improve its security posture, and fortify its resilience against potential threats.

Demystifying Zero Trust & PETs

As the digital landscape evolves, the imperative for robust security measures has never been more acute. The Zero Trust model, with its foundational mantra of "Never trust, always verify," presents a paradigm shift in IT security, tailored for today's complex hybrid work environments.

Verifying everything explicitly (users, apps, devices), using a least-privilege access model, defining the proper context for policy compliance and device health, and applying an assume breach approach are all essential parts of the process. On top of that, the latest developments in Privacy Enhancing Technologies (PETs), including homomorphic encryption, differential privacy, and zero-knowledge proofs play a crucial role in protecting data privacy and enhancing security measures within a Zero Trust framework.

Join this session to find out everything about how Zero Trust architectures are designed to work, and how implementing ZT and PETs will make your digital operations safer in an era marked by rapidly evolving cyber threats and stringent data protection regulations.

Governance, Security & Compliance in the Cloud

The payoff of successful Digital Transformation can be essential for companies engaged in highly-competitive markets. Almost every business decision requires executives and managers to balance risk and reward, and efficiency in that process is essential to an enterprise’s success. However, when people talk about moving workloads to the Cloud, most times they just hear the technical mumbo-jumbo - IaaS, PaaS, SaaS, DevOps & automation, containers, and so on.

This session argues we should perhaps sit back for a bit and discuss the need to develop a coherent, long-term Cloud strategy, even before taking the first step towards a Cloud-centric or hybrid approach. In the end, it’s all about looking at the hows and whys of moving to the Cloud, planning a clear roadmap of your migration, and making sure that once you get there, you can sleep better at night knowing you’ve got everything under control.

Based on real-life projects and experience from recent years, this session provides a quick insight into the role that the Cloud plays within Digital Transformation initiatives, touching on challenges companies usually face when dealing with governance, security, change management & cost-control.

Surviving Cyber Attacks: 2024 Edition

You've probably been hacked already, and you don't even know it. Now what?

In today's rapidly evolving digital ecosystem, the notion that any system or application is "unhackable" is not just outdated - it's perilously naive. As we venture deeper into 2024, the cybersecurity domain is witnessing an unprecedented proliferation of sophisticated threats, from AI-manipulated attacks to insidious ransomware campaigns targeting our most critical infrastructures.

This session is an urgent wake-up call, designed to shatter any lingering complacency. We will look at how Digital Transformation, propelled by the pandemic and the mass shift to remote work, has expanded vulnerabilities and introduced new attack vectors, making the question "Now what?" more relevant than ever.

NIS2 & CRA: Europe's Response to Cyber Shenanigans

In an era where cyber threats are getting increasingly sophisticated, Europe has stepped up its game with two pivotal regulations: the NIS2 Directive and the Cyber Resilience Act (CRA). These measures are redefining the cybersecurity landscape, offering comprehensive strategies to combat digital dangers.

In this session, we'll delve into the depths of both the NIS2 Directive and the CRA, unraveling their complexities and implications, looking at how they're changing the game, and what it means for businesses, individuals, and yes, even the humble smart devices in our homes. Walk away with insights that'll make you the star of your next virtual hangout, and have your smart toaster nodding in approval (well, metaphorically).

Cybersecurity in the Era of AI and Quantum Computing

Cybersecurity is rapidly evolving, shaped by artificial intelligence (AI) and the emergent potential of Quantum Computing. AI enhances security through automated detection and analysis, swiftly processing vast amounts of data to spot and predict threats, and Quantum Computing holds the promise to revolutionize various industries by offering unparalleled computational speed and efficiency, enabling it to tackle complex problems far beyond the reach of classical computers.

Yet, these benefits also come with risks: AI's capabilities can be exploited for advanced phishing, vulnerability discovery, and creating adaptive malware, complicating the cybersecurity landscape, while Quantum Computing further challenges digital security by threatening to undermine traditional encryption, making existing protections potentially obsolete.

This session will explore the mixed impact of AI and Quantum Computing on Cybersecurity, highlighting both the advancements and vulnerabilities they introduce. We'll discuss current threats like supply chain attacks and ransomware, alongside the integration of Privacy Enhancing Technologies (PETs) with AI and quantum defenses, offering a strategic viewpoint on safeguarding against the future of cyber threats.

Hek.si 2024

February 2024

NDC Security 2024

January 2024 Oslo, Norway

DefCamp 2023

November 2023 Bucharest, Romania

IT Days 2023

November 2023 Cluj-Napoca, Romania

Experts Live Europe 2023

September 2023 Prague, Czechia

The Developers

June 2023 Cluj-Napoca, Romania

Limitl3ss - IT Summit of Transylvania

March 2023 Târgu-Mureş, Romania

Defcamp 2022

November 2022 Bucharest, Romania

IT Days 2022

November 2022 Cluj-Napoca, Romania

Infosek 2022

September 2022 Nova Gorica, Slovenia

IT Days 2021

November 2021 Cluj-Napoca, Romania

DefCamp 2021

November 2021 Bucharest, Romania

PeakIT 004

October 2021 Braşov, Romania

Techorama 2021 Spring Edition

May 2021 Antwerpen, Belgium

Hek.si 2021

February 2021 Ljubljana, Slovenia

EuropeClouds Summit

October 2020

Collabdays Lisbon 2020

October 2020 Lisbon, Portugal

Cloud & Datacenter Conference Germany 2020

May 2020 Hanau am Main, Germany

Experts Live Europe 2019

November 2019 Prague, Czechia

DefCamp 2019

November 2019 Bucharest, Romania

KulenDayz 2019

September 2019 Osijek, Croatia

Microsoft Inspire 2019

July 2019 Las Vegas, Nevada, United States

ITCamp 2019

June 2019 Cluj-Napoca, Romania

Cloud & Datacenter Conference Germany 2019

May 2019 Hanau am Main, Germany

Hyper-V and Hybrid Cloud Community Day

May 2019 Hanau am Main, Germany

Microsoft MVP Summit 2019

March 2019 Redmond, Washington, United States

Experts Live Europe 2018

October 2018 Prague, Czechia

Microsoft Inspire 2018

July 2018 Las Vegas, Nevada, United States

ITCamp 2018

June 2018 Cluj-Napoca, Romania

Microsoft Cloud & Datacenter Conference Germany 2018

March 2018 Hanau am Main, Germany

Microsoft MVP Summit 2018

March 2018 Redmond, Washington, United States

Defcamp 2017

November 2017 Bucharest, Romania

Experts Live 2017

August 2017 Berlin, Germany

Microsoft Inspire 2017

July 2017 Washington, Washington, D.C., United States

Future Decoded 2016

October 2016 London, United Kingdom

Microsoft Ignite 2016

September 2016 Atlanta, Georgia, United States

Defcamp 2015

November 2015 Bucharest, Romania

Future Decoded 2015

November 2015 London, United Kingdom

Microsoft Ignite 2015

May 2015 Chicago, Illinois, United States

DefCamp 2014

November 2014 Bucharest, Romania

Microsoft TechEd Europe 2014

October 2014 Barcelona, Spain

Microsoft TechEd Europe 2013

June 2013 Madrid, Spain

Tudor Damian

Cybersecurity & Cloud Advisor @ D3 Cyber

Cluj-Napoca, Romania