Tudor Damian

Information & Communications Technology

Business & Management

cybersecurity Cloud strategy cloud governance Microsoft Azure Office 365 Microsoft 365

Cluj-Napoca, Cluj, Romania

Tudor Damian

Microsoft Cloud & Datacenter Management MVP, Certified Ethical Hacker

As an IT consultant with more than 15 years of experience in managing complex IT infrastructures, Tudor is a Certified Ethical Hacker, a Microsoft Cloud and Datacenter Management MVP, and a regular speaker at local and regional community events. He is also one of the organizers of the ITCamp conference in Romania (itcamp.ro). bringing together tens of awesome speakers with hundreds of attendees every year.

Tudor often talks about the latest technologies and trends with themes including cloud governance, risk management & compliance, networking & security, virtualization technologies, social engineering & cybersecurity, web application security, white-hat hacking & penetration testing techniques.


Certified Ethical Hacker, Microsoft CDM MVP, IT consultant, meaning of life seeker, amateur photographer, gamer ツ

Current sessions

IT security in a post-COVID world

For a long time, IT Security has been a secondary topic for a lot of companies. More often than not, it only came to mind after an actual data breach or security incident, and was often overlooked otherwise. Over the years, things like WannaCry/Petya or GDPR compliance helped raise awareness a little bit, but those soon faded out as well.

However, the new "Low Touch Economy" emerging as a result of the COVID-19 pandemic could provide the jolt that IT Security needed for a long time. With a lot more people working remotely, the need to secure devices (laptops, phones, etc.), communication channels, as well as on-prem & Cloud infrastructure is now higher than ever before.

The global pressure on innovation and developing new business models to adapt to these changes is high. This session aims to address some of the major shifts and impacts of remote work by providing some ways to balance innovation and IT Security, while also touching on some of the ever-growing gaps in security incident detection and response.


Governance, Security & Compliance in the Cloud

Almost every business decision requires executives and managers to balance risk and reward, and efficiency in that process is essential to an enterprise’s success. Too often though, IT risk (business risk related to the use of IT) is overlooked. While other business risks such as market, credit and operational risks have long been incorporated into the decision-making processes, IT risk has usually been relegated to technical specialists outside the boardroom, despite falling under the same risk category as other business risks: failure to achieve strategic objectives.

With the emergence of the Cloud, IT risk has suffered yet another radical transformation. The past couple of years have also brought along new vulnerabilities, exploits, and attack methods, as well as new data privacy requirements such as the GDPR. While all of these things require significant changes to any existing processes and tools, they mostly require a different approach when catering to people's IT security awareness, especially when moving to the Cloud.


Modern IT Risk Management

Almost every business decision requires executives and managers to balance risk and reward, and efficiency in that process is essential to an enterprise’s success. Too often though, IT risk (business risk related to the use of IT) is overlooked.

While other business risks such as market, credit and operational risks have long been incorporated into the decision-making processes, IT risk has usually been relegated to technical specialists outside the boardroom, despite falling under the same risk category as other business risks: failure to achieve strategic objectives. With the emergence of the Cloud, IT Risk has suffered yet another radical transformation.

This session focuses on specific plans on how to implement IT Risk Management on every level of your company in a Cloud-enabled world.


Digital Transformation in the Cloud: What They Don’t Always Tell You

The payoff of successful Digital Transformation can be essential for companies engaged in highly-competitive markets. Almost every business decision requires executives and managers to balance risk and reward, and efficiency in that process is essential to an enterprise’s success.

With the emergence of the Cloud, IT risk has suffered yet another radical transformation. The past couple of years have also brought along new vulnerabilities, exploits, and attack methods, as well as new data privacy requirements such as the GDPR. While all of these things require significant changes to any existing processes and tools, they mostly require a different approach when catering to people's IT security awareness, especially when moving to the Cloud.

Based on real-life projects and experience from recent years, this session provides a quick insight into the role that the Cloud plays within Digital Transformation initiatives, touching on challenges companies usually face when dealing with governance, security, change management & cost-control.


Defining a Cloud Strategy - finding your Peace of Mind

When people talk about moving workloads to the Cloud, most times they just hear the technical mumbo-jumbo - IaaS, PaaS, SaaS, DevOps & automation, containers, and so on.

This session argues we should perhaps sit back for a bit and discuss the need to develop a coherent, long-term Cloud strategy, even before taking the first step towards a Cloud-centric or hybrid approach.

In the end, it’s all about looking at the hows and whys of moving to the Cloud, planning a clear roadmap of your migration, and making sure that once you get there, you can sleep better at night knowing you’ve got everything under control.


You've just been hacked! Now what?

It's a time when assuming your systems and applications are "unhackable" is one of the biggest mistakes you could do. While most people still think that prevention and maintenance remain a top priority in protecting yourself, building a clear process around how you will respond to attacks and data breaches during and after their occurrence is something often overlooked, or simply ignored.

The past few years have brought along new vulnerabilities, exploits, and attack methods, as well as new data privacy requirements such as the GDPR. While all of these things require significant changes to any existing processes and tools, they mostly require a different approach when catering to people's IT security awareness.

Do you know how exposed you are when you're connecting to the hotel/restaurant/airport WiFi? Are you aware how fast clicking on a link can become a nightmare? Come down for a quick overview and live demos of some of the current cyber threats, especially as they pertain to social engineering vectors.

This session intends to bring the assume breach security posture into the spotlight. We'll be discussing recent trends in cybersecurity attacks (credential reuse, password spraying, insider attacks, 2FA-bypass, etc.) and look at the best ways to build your data breach incident response policy. Demos included.


Past and future events

EuropeClouds Summit

18 Oct 2020 - 22 Oct 2020

Collabdays Lisbon 2020

9 Oct 2020
Lisbon, Portugal

Cloud & Datacenter Conference Germany 2020

12 May 2020 - 13 May 2020
Hanau am Main, Hesse, Germany

Experts Live Europe 2019

19 Nov 2019 - 21 Nov 2019
Prague, Hlavní město Praha, Czechia

ITCamp 2019

5 Jun 2019 - 6 Jun 2019
Cluj-Napoca, Cluj, Romania

Cloud & Datacenter Conference Germany 2019

20 May 2019 - 21 May 2019
Hanau am Main, Hesse, Germany

Hyper-V and Hybrid Cloud Community Day

19 May 2019
Hanau am Main, Hesse, Germany

Experts Live Europe 2018

23 Oct 2018 - 25 Oct 2018
Prague, Hlavní město Praha, Czechia

ITCamp 2018

6 Jun 2018 - 8 Jun 2018
Cluj-Napoca, Cluj, Romania