Cloud Strategy Microsoft Azure Office 365 Cybersecurity IT Security GDPR COBIT
It's 2019, a time when assuming your systems and applications are "unhackable" is one of the biggest mistakes you could do. While most people still think that prevention and maintenance remain a top priority in protecting yourself, building a clear process around how you will respond to attacks and data breaches during and after their occurrence is something often overlooked, or simply ignored.
This session intends to bring the assume breach security posture into the spotlight. We'll be discussing recent trends in cybersecurity attacks (credential reuse, password spraying, insider attacks, 2FA-bypass, etc.) and look at the best ways to build your data breach incident response policy. Demos included.
Tudor is the CIO and Managing Partner of Avaelgo - a Microsoft 2018 Country Partner of the Year company based in Eastern Europe (Romania). As an IT consultant with more than 15 years of experience in managing complex IT infrastructures, he is a Certified Ethical Hacker, a Microsoft Cloud and Datacenter Management MVP and a regular speaker at local and regional community events. Tudor often talks about the latest technologies and trends with themes including cloud and hybrid networking & security, virtualization technologies, social engineering and information security awareness, web application security, white-hat hacking and penetration testing techniques. He is also one of the organizers of the ITCamp conference in Romania (itcamp.ro). bringing together tens of awesome speakers with hundreds of attendees every year.
Certified Ethical Hacker, Microsoft CDM MVP, IT consultant, meaning of life seeker, amateur photographer, gamer ツ