cybersecurity Cloud strategy cloud governance Microsoft Azure Office 365 Microsoft 365
Cluj-Napoca, Cluj, Romania
It's a time when assuming your systems and applications are "unhackable" is one of the biggest mistakes you could do. While most people still think that prevention and maintenance remain a top priority in protecting yourself, building a clear process around how you will respond to attacks and data breaches during and after their occurrence is something often overlooked, or simply ignored.
The past few years have brought along new vulnerabilities, exploits, and attack methods, as well as new data privacy requirements such as the GDPR. While all of these things require significant changes to any existing processes and tools, they mostly require a different approach when catering to people's IT security awareness.
Do you know how exposed you are when you're connecting to the hotel/restaurant/airport WiFi? Are you aware how fast clicking on a link can become a nightmare? Come down for a quick overview and live demos of some of the current cyber threats, especially as they pertain to social engineering vectors.
This session intends to bring the assume breach security posture into the spotlight. We'll be discussing recent trends in cybersecurity attacks (credential reuse, password spraying, insider attacks, 2FA-bypass, etc.) and look at the best ways to build your data breach incident response policy. Demos included.
As an IT consultant with more than 15 years of experience in managing complex IT infrastructures, Tudor is a Certified Ethical Hacker, a Microsoft Cloud and Datacenter Management MVP, and a regular speaker at local and regional community events. He is also one of the organizers of the ITCamp conference in Romania (itcamp.ro). bringing together tens of awesome speakers with hundreds of attendees every year.
Tudor often talks about the latest technologies and trends with themes including cloud governance, risk management & compliance, networking & security, virtualization technologies, social engineering & cybersecurity, web application security, white-hat hacking & penetration testing techniques.
Certified Ethical Hacker, Microsoft CDM MVP, IT consultant, meaning of life seeker, amateur photographer, gamer ツ