Tudor Damian
Cybersecurity & Cloud Advisor @ D3 Cyber
Cluj-Napoca, Romania
Actions
An IT consultant with more than 20 years of industry experience, Tudor is a Certified Ethical Hacker, and a Microsoft Cloud and Datacenter Management MVP. His commitment to staying at the forefront of technology trends enables him to provide valuable guidance and support to organizations seeking to navigate the ever-changing IT landscape.
His passion for sharing knowledge and engaging with the community has made him a regular speaker at local and regional community events. His speaking engagements provide valuable insights and guidance to IT industry professionals and enthusiasts.
Area of Expertise
Topics
Crafting your Cybersecurity Strategy: Tales from the Trenches
Cybersecurity stands as one of today's top concerns for many organizations. While a lucky few may have the required expertise in-house, many still rely on external specialists to guide their cybersecurity endeavors, a thing which, in turn, tends to provide its own challenges.
Crafting an effective cybersecurity strategy involves assessing the organization's current posture, identifying potential risks, formulating comprehensive policies, ensuring staff are well-trained, responding to incidents, and maintaining adherence to compliance standards, among other tasks.
In this session, participants will delve into the foundational components of a robust cybersecurity strategy aligned with the organization's mission and vision. Through real-world examples, attendees will grasp how such strategies elevate an organization's cybersecurity maturity, improve its security posture, and fortify its resilience against potential threats.
Demystifying Zero Trust & PETs
As the digital landscape evolves, the imperative for robust security measures has never been more acute. The Zero Trust model, with its foundational mantra of "Never trust, always verify," presents a paradigm shift in IT security, tailored for today's complex hybrid work environments.
Verifying everything explicitly (users, apps, devices), using a least-privilege access model, defining the proper context for policy compliance and device health, and applying an assume breach approach are all essential parts of the process. On top of that, the latest developments in Privacy Enhancing Technologies (PETs), including homomorphic encryption, differential privacy, and zero-knowledge proofs play a crucial role in protecting data privacy and enhancing security measures within a Zero Trust framework.
Join this session to find out everything about how Zero Trust architectures are designed to work, and how implementing ZT and PETs will make your digital operations safer in an era marked by rapidly evolving cyber threats and stringent data protection regulations.
Governance, Security & Compliance in the Cloud
The payoff of successful Digital Transformation can be essential for companies engaged in highly-competitive markets. Almost every business decision requires executives and managers to balance risk and reward, and efficiency in that process is essential to an enterprise’s success. However, when people talk about moving workloads to the Cloud, most times they just hear the technical mumbo-jumbo - IaaS, PaaS, SaaS, DevOps & automation, containers, and so on.
This session argues we should perhaps sit back for a bit and discuss the need to develop a coherent, long-term Cloud strategy, even before taking the first step towards a Cloud-centric or hybrid approach. In the end, it’s all about looking at the hows and whys of moving to the Cloud, planning a clear roadmap of your migration, and making sure that once you get there, you can sleep better at night knowing you’ve got everything under control.
Based on real-life projects and experience from recent years, this session provides a quick insight into the role that the Cloud plays within Digital Transformation initiatives, touching on challenges companies usually face when dealing with governance, security, change management & cost-control.
Surviving Cyber Attacks: 2024 Edition
You've probably been hacked already, and you don't even know it. Now what?
In today's rapidly evolving digital ecosystem, the notion that any system or application is "unhackable" is not just outdated - it's perilously naive. As we venture deeper into 2024, the cybersecurity domain is witnessing an unprecedented proliferation of sophisticated threats, from AI-manipulated attacks to insidious ransomware campaigns targeting our most critical infrastructures.
This session is an urgent wake-up call, designed to shatter any lingering complacency. We will look at how Digital Transformation, propelled by the pandemic and the mass shift to remote work, has expanded vulnerabilities and introduced new attack vectors, making the question "Now what?" more relevant than ever.
NIS2 & CRA: Europe's Response to Cyber Shenanigans
In an era where cyber threats are getting increasingly sophisticated, Europe has stepped up its game with two pivotal regulations: the NIS2 Directive and the Cyber Resilience Act (CRA). These measures are redefining the cybersecurity landscape, offering comprehensive strategies to combat digital dangers.
In this session, we'll delve into the depths of both the NIS2 Directive and the CRA, unraveling their complexities and implications, looking at how they're changing the game, and what it means for businesses, individuals, and yes, even the humble smart devices in our homes. Walk away with insights that'll make you the star of your next virtual hangout, and have your smart toaster nodding in approval (well, metaphorically).
Cybersecurity in the Era of AI and Quantum Computing
Cybersecurity is rapidly evolving, shaped by artificial intelligence (AI) and the emergent potential of Quantum Computing. AI enhances security through automated detection and analysis, swiftly processing vast amounts of data to spot and predict threats, and Quantum Computing holds the promise to revolutionize various industries by offering unparalleled computational speed and efficiency, enabling it to tackle complex problems far beyond the reach of classical computers.
Yet, these benefits also come with risks: AI's capabilities can be exploited for advanced phishing, vulnerability discovery, and creating adaptive malware, complicating the cybersecurity landscape, while Quantum Computing further challenges digital security by threatening to undermine traditional encryption, making existing protections potentially obsolete.
This session will explore the mixed impact of AI and Quantum Computing on Cybersecurity, highlighting both the advancements and vulnerabilities they introduce. We'll discuss current threats like supply chain attacks and ransomware, alongside the integration of Privacy Enhancing Technologies (PETs) with AI and quantum defenses, offering a strategic viewpoint on safeguarding against the future of cyber threats.
Ethical AI and Cybersecurity: At the Intersection of Technology and Regulation
As AI continues to revolutionize the cybersecurity landscape, professionals face the dual challenge of securing AI-driven systems while ensuring their ethical use. This session explores the intersection of AI, cybersecurity, and emerging regulatory frameworks, offering insights into the ethical considerations, compliance challenges, and security implications of AI integration.
Learn about AI's evolving role in enhancing and complicating cybersecurity efforts, gain practical guidance on developing AI-driven cybersecurity strategies that are effective and ethically sound, and examine the complexities of aligning AI technologies with global regulatory standards.
NDC Security 2025 Sessionize Event Upcoming
DefCamp 2024 Sessionize Event Upcoming
SecureWorld in the era of Artificial Intelligence Sessionize Event Upcoming
DefCamp Cluj-Napoca Sessionize Event
NDC Security 2024 Sessionize Event
Techorama 2021 Spring Edition Sessionize Event
Global Security and Compliance Community Conference Sessionize Event
EuropeClouds Summit Sessionize Event
Collabdays Lisbon 2020 Sessionize Event
Cloud & Datacenter Conference Germany 2020 Sessionize Event
Experts Live Europe 2019 Sessionize Event
KulenDayz 2019 Sessionize Event
ITCamp 2019 Sessionize Event
Cloud & Datacenter Conference Germany 2019 Sessionize Event
Hyper-V and Hybrid Cloud Community Day Sessionize Event
Experts Live Europe 2018 Sessionize Event
ITCamp 2018 Sessionize Event
Tudor Damian
Cybersecurity & Cloud Advisor @ D3 Cyber
Cluj-Napoca, Romania
Actions
Please note that Sessionize is not responsible for the accuracy or validity of the data provided by speakers. If you suspect this profile to be fake or spam, please let us know.
Jump to top