Cloud Strategy Microsoft Azure Office 365 Cybersecurity IT Security GDPR COBIT
Tudor is the CIO and Managing Partner of Avaelgo - a Microsoft 2018 Country Partner of the Year company based in Eastern Europe (Romania). As an IT consultant with more than 10 years of experience in managing complex IT infrastructures, he is a Certified Ethical Hacker, a Microsoft Cloud and Datacenter Management MVP and a regular speaker at local and regional community events. Tudor often talks about the latest technologies and trends with themes including cloud and hybrid networking & security, virtualization technologies, social engineering and information security awareness, web application security, white-hat hacking and penetration testing techniques.
He is also one of the organizers of the ITCamp conference in Romania (itcamp.ro). His day-to-day activities include providing IT advisory services, designing and implementing IT solutions, as well as delivering technical training sessions for experts and beginners alike.
Certified Ethical Hacker, Microsoft CDM MVP, IT consultant, meaning of life seeker, amateur photographer, gamer ツ
The past couple of years have brought along new vulnerabilities, exploits and attack methods, as well as new data privacy requirements such as the GDPR. While all of these things require significant changes to any existing processes and tools, they mostly require a different approach when catering to people's IT security awareness.
Do you know how exposed you are when you're connecting to the hotel/restaurant/airport WiFi? Are you aware how fast clicking on a link can become a nightmare? Come down for a quick overview and live demos of some of the current cyber threats, especially as they pertain to social engineering vectors.
With cybersecurity threats changing rapidly, we definitely need a new set of tools to be able to prevent and address them more efficiently: malware is becoming more complex and harder to detect, malicious insider attacks are on the rise and zero-day exploits make their way to the public much quicker than before. Join this session to see how Windows Server 2016 and Windows 10 can help organizations deal with this ever-changing security ecosystem by providing them with ways to better secure their environment and data. We'll touch on topics such as malware & threat resistance, identity & access control, virtualization-based security, configurable code integrity, remote attestation and a few others.
The global security landscape is changing, now more than ever. With cloud computing gaining momentum and advanced persistent threats becoming a common occurrence, the industry is taking a more focused and serious approach when it comes to security, especially after some of the last years' heavily publicized incidents. Join this session for a discussion on what Microsoft is doing to protect against these new security threats with fresh approaches taken both at the server & client OS level, as well as in Azure.
Almost every business decision requires executives and managers to balance risk and reward, and efficiency in that process is essential to an enterprise’s success. Too often though, IT risk (business risk related to the use of IT) is overlooked.
While other business risks such as market, credit and operational risks have long been incorporated into the decision-making processes, IT risk has usually been relegated to technical specialists outside the boardroom, despite falling under the same risk category as other business risks: failure to achieve strategic objectives. With the emergence of the Cloud, IT Risk has suffered yet another radical transformation.
This session focuses on real-world examples and specific plans on how to implement IT Risk Management on every level of your company in a Cloud-enabled world.
When people talk about moving workloads to the Cloud, most times they just hear the technical mumbo-jumbo - IaaS, PaaS, SaaS, DevOps & automation, containers, and so on.
This session argues we should perhaps sit back for a bit and discuss the need to develop a coherent, long-term Cloud strategy, even before taking the first step towards a Cloud-centric or hybrid approach.
In the end, it’s all about looking at the hows and whys of moving to the Cloud, planning a clear roadmap of your migration, and making sure that once you get there, you can sleep better at night knowing you’ve got everything under control.
6 Jun 2018 - 8 Jun 2018