ºÝºÝߣshows by User: Tudy / http://www.slideshare.net/images/logo.gif ºÝºÝߣshows by User: Tudy / Fri, 10 Jul 2020 10:53:39 GMT ºÝºÝߣShare feed for ºÝºÝߣshows by User: Tudy Digital Transformation in the Cloud: What They Don’t Always Tell You [2020] /slideshow/digital-transformation-in-the-cloud-what-they-dont-always-tell-you-2020/236781876 tudy-digitaltransformationinthecloud-200710105339
The payoff of successful Digital Transformation can be essential for companies engaged in highly-competitive markets. Almost every business decision requires executives and managers to balance risk and reward, and efficiency in that process is essential to an enterprise’s success. With the emergence of the Cloud, IT risk has suffered yet another radical transformation. The past couple of years have also brought along new vulnerabilities, exploits, and attack methods, as well as new data privacy requirements such as the GDPR. While all of these things require significant changes to any existing processes and tools, they mostly require a different approach when catering to people's IT security awareness, especially when moving to the Cloud. Based on real-life projects and experience from recent years, this session provides a quick insight into the role that the Cloud plays within Digital Transformation initiatives, touching on challenges companies usually face when dealing with governance, security, change management & cost-control. Examples and case studies included.]]>

The payoff of successful Digital Transformation can be essential for companies engaged in highly-competitive markets. Almost every business decision requires executives and managers to balance risk and reward, and efficiency in that process is essential to an enterprise’s success. With the emergence of the Cloud, IT risk has suffered yet another radical transformation. The past couple of years have also brought along new vulnerabilities, exploits, and attack methods, as well as new data privacy requirements such as the GDPR. While all of these things require significant changes to any existing processes and tools, they mostly require a different approach when catering to people's IT security awareness, especially when moving to the Cloud. Based on real-life projects and experience from recent years, this session provides a quick insight into the role that the Cloud plays within Digital Transformation initiatives, touching on challenges companies usually face when dealing with governance, security, change management & cost-control. Examples and case studies included.]]>
Fri, 10 Jul 2020 10:53:39 GMT /slideshow/digital-transformation-in-the-cloud-what-they-dont-always-tell-you-2020/236781876 Tudy@slideshare.net(Tudy) Digital Transformation in the Cloud: What They Don’t Always Tell You [2020] Tudy The payoff of successful Digital Transformation can be essential for companies engaged in highly-competitive markets. Almost every business decision requires executives and managers to balance risk and reward, and efficiency in that process is essential to an enterprise’s success. With the emergence of the Cloud, IT risk has suffered yet another radical transformation. The past couple of years have also brought along new vulnerabilities, exploits, and attack methods, as well as new data privacy requirements such as the GDPR. While all of these things require significant changes to any existing processes and tools, they mostly require a different approach when catering to people's IT security awareness, especially when moving to the Cloud. Based on real-life projects and experience from recent years, this session provides a quick insight into the role that the Cloud plays within Digital Transformation initiatives, touching on challenges companies usually face when dealing with governance, security, change management & cost-control. Examples and case studies included. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/tudy-digitaltransformationinthecloud-200710105339-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> The payoff of successful Digital Transformation can be essential for companies engaged in highly-competitive markets. Almost every business decision requires executives and managers to balance risk and reward, and efficiency in that process is essential to an enterprise’s success. With the emergence of the Cloud, IT risk has suffered yet another radical transformation. The past couple of years have also brought along new vulnerabilities, exploits, and attack methods, as well as new data privacy requirements such as the GDPR. While all of these things require significant changes to any existing processes and tools, they mostly require a different approach when catering to people&#39;s IT security awareness, especially when moving to the Cloud. Based on real-life projects and experience from recent years, this session provides a quick insight into the role that the Cloud plays within Digital Transformation initiatives, touching on challenges companies usually face when dealing with governance, security, change management &amp; cost-control. Examples and case studies included.
Digital Transformation in the Cloud: What They Don’t Always Tell You [2020] from Tudor Damian
]]>
170 0 https://cdn.slidesharecdn.com/ss_thumbnails/tudy-digitaltransformationinthecloud-200710105339-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Security & Compliance in the Cloud [2019] /slideshow/2019-security-compliance-in-the-cloud/236781834 tudy-securitycomplianceinthecloud-200710105039
Almost every business decision requires executives and managers to balance risk and reward, and efficiency in that process is essential to an enterprise’s success. Too often though, IT risk (business risk related to the use of IT) is overlooked. While other business risks such as market, credit and operational risks have long been incorporated into the decision-making processes, IT risk has usually been relegated to technical specialists outside the boardroom, despite falling under the same risk category as other business risks: failure to achieve strategic objectives. With the emergence of the Cloud, IT risk has suffered yet another radical transformation. The past couple of years have also brought along new vulnerabilities, exploits, and attack methods, as well as new data privacy requirements such as the GDPR. While all of these things require significant changes to any existing processes and tools, they mostly require a different approach when catering to people's IT security awareness, especially when moving to the Cloud.]]>

Almost every business decision requires executives and managers to balance risk and reward, and efficiency in that process is essential to an enterprise’s success. Too often though, IT risk (business risk related to the use of IT) is overlooked. While other business risks such as market, credit and operational risks have long been incorporated into the decision-making processes, IT risk has usually been relegated to technical specialists outside the boardroom, despite falling under the same risk category as other business risks: failure to achieve strategic objectives. With the emergence of the Cloud, IT risk has suffered yet another radical transformation. The past couple of years have also brought along new vulnerabilities, exploits, and attack methods, as well as new data privacy requirements such as the GDPR. While all of these things require significant changes to any existing processes and tools, they mostly require a different approach when catering to people's IT security awareness, especially when moving to the Cloud.]]>
Fri, 10 Jul 2020 10:50:39 GMT /slideshow/2019-security-compliance-in-the-cloud/236781834 Tudy@slideshare.net(Tudy) Security & Compliance in the Cloud [2019] Tudy Almost every business decision requires executives and managers to balance risk and reward, and efficiency in that process is essential to an enterprise’s success. Too often though, IT risk (business risk related to the use of IT) is overlooked. While other business risks such as market, credit and operational risks have long been incorporated into the decision-making processes, IT risk has usually been relegated to technical specialists outside the boardroom, despite falling under the same risk category as other business risks: failure to achieve strategic objectives. With the emergence of the Cloud, IT risk has suffered yet another radical transformation. The past couple of years have also brought along new vulnerabilities, exploits, and attack methods, as well as new data privacy requirements such as the GDPR. While all of these things require significant changes to any existing processes and tools, they mostly require a different approach when catering to people's IT security awareness, especially when moving to the Cloud. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/tudy-securitycomplianceinthecloud-200710105039-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Almost every business decision requires executives and managers to balance risk and reward, and efficiency in that process is essential to an enterprise’s success. Too often though, IT risk (business risk related to the use of IT) is overlooked. While other business risks such as market, credit and operational risks have long been incorporated into the decision-making processes, IT risk has usually been relegated to technical specialists outside the boardroom, despite falling under the same risk category as other business risks: failure to achieve strategic objectives. With the emergence of the Cloud, IT risk has suffered yet another radical transformation. The past couple of years have also brought along new vulnerabilities, exploits, and attack methods, as well as new data privacy requirements such as the GDPR. While all of these things require significant changes to any existing processes and tools, they mostly require a different approach when catering to people&#39;s IT security awareness, especially when moving to the Cloud.
Security & Compliance in the Cloud [2019] from Tudor Damian
]]>
136 0 https://cdn.slidesharecdn.com/ss_thumbnails/tudy-securitycomplianceinthecloud-200710105039-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Modern cybersecurity threats, and shiny new tools to help deal with them /slideshow/modern-cybersecurity-threats-and-shiny-new-tools-to-help-deal-with-them/90682627 g2urfbsyobjeeif6w1qe-signature-399d5b2db8035275aa7de8b0fe5010a4041a2cc5ceb4ee7f9276bf93764987cb-poli-180314191710
With cybersecurity threats changing rapidly, we definitely need a new set of tools to be able to prevent and address them more efficiently: malware is becoming more complex and harder to detect, malicious insider attacks are on the rise and zero-day exploits make their way to the public much quicker than before. Join this session to see how Windows Server 2016 and Windows 10 can help organizations deal with this ever-changing security ecosystem by providing them with ways to better secure their environment and data. We’ll touch on topics such as malware & threat resistance, identity & access control, virtualization-based security, configurable code integrity, remote attestation and a few others.]]>

With cybersecurity threats changing rapidly, we definitely need a new set of tools to be able to prevent and address them more efficiently: malware is becoming more complex and harder to detect, malicious insider attacks are on the rise and zero-day exploits make their way to the public much quicker than before. Join this session to see how Windows Server 2016 and Windows 10 can help organizations deal with this ever-changing security ecosystem by providing them with ways to better secure their environment and data. We’ll touch on topics such as malware & threat resistance, identity & access control, virtualization-based security, configurable code integrity, remote attestation and a few others.]]>
Wed, 14 Mar 2018 19:17:09 GMT /slideshow/modern-cybersecurity-threats-and-shiny-new-tools-to-help-deal-with-them/90682627 Tudy@slideshare.net(Tudy) Modern cybersecurity threats, and shiny new tools to help deal with them Tudy With cybersecurity threats changing rapidly, we definitely need a new set of tools to be able to prevent and address them more efficiently: malware is becoming more complex and harder to detect, malicious insider attacks are on the rise and zero-day exploits make their way to the public much quicker than before. Join this session to see how Windows Server 2016 and Windows 10 can help organizations deal with this ever-changing security ecosystem by providing them with ways to better secure their environment and data. We’ll touch on topics such as malware & threat resistance, identity & access control, virtualization-based security, configurable code integrity, remote attestation and a few others. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/g2urfbsyobjeeif6w1qe-signature-399d5b2db8035275aa7de8b0fe5010a4041a2cc5ceb4ee7f9276bf93764987cb-poli-180314191710-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> With cybersecurity threats changing rapidly, we definitely need a new set of tools to be able to prevent and address them more efficiently: malware is becoming more complex and harder to detect, malicious insider attacks are on the rise and zero-day exploits make their way to the public much quicker than before. Join this session to see how Windows Server 2016 and Windows 10 can help organizations deal with this ever-changing security ecosystem by providing them with ways to better secure their environment and data. We’ll touch on topics such as malware &amp; threat resistance, identity &amp; access control, virtualization-based security, configurable code integrity, remote attestation and a few others.
Modern cybersecurity threats, and shiny new tools to help deal with them from Tudor Damian
]]>
279 3 https://cdn.slidesharecdn.com/ss_thumbnails/g2urfbsyobjeeif6w1qe-signature-399d5b2db8035275aa7de8b0fe5010a4041a2cc5ceb4ee7f9276bf93764987cb-poli-180314191710-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
The state of web applications (in)security @ ITDays 2016 /slideshow/the-state-of-web-applications-insecurity-itdays/69626595 tudordamian-thestateofwebapplicationsinsecurity-161129082657
The global security landscape is changing, now more than ever. With cloud computing gaining momentum and advanced persistent threats becoming a common occurrence, the industry is taking a more focused and serious approach, especially after some of last years' heavily publicized cyber breaches. Join this session for a high-level overview on the industry trends in the area of web application security, and find out why security is bound to become a hot topic in any organization developing or using web applications.]]>

The global security landscape is changing, now more than ever. With cloud computing gaining momentum and advanced persistent threats becoming a common occurrence, the industry is taking a more focused and serious approach, especially after some of last years' heavily publicized cyber breaches. Join this session for a high-level overview on the industry trends in the area of web application security, and find out why security is bound to become a hot topic in any organization developing or using web applications.]]>
Tue, 29 Nov 2016 08:26:57 GMT /slideshow/the-state-of-web-applications-insecurity-itdays/69626595 Tudy@slideshare.net(Tudy) The state of web applications (in)security @ ITDays 2016 Tudy The global security landscape is changing, now more than ever. With cloud computing gaining momentum and advanced persistent threats becoming a common occurrence, the industry is taking a more focused and serious approach, especially after some of last years' heavily publicized cyber breaches. Join this session for a high-level overview on the industry trends in the area of web application security, and find out why security is bound to become a hot topic in any organization developing or using web applications. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/tudordamian-thestateofwebapplicationsinsecurity-161129082657-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> The global security landscape is changing, now more than ever. With cloud computing gaining momentum and advanced persistent threats becoming a common occurrence, the industry is taking a more focused and serious approach, especially after some of last years&#39; heavily publicized cyber breaches. Join this session for a high-level overview on the industry trends in the area of web application security, and find out why security is bound to become a hot topic in any organization developing or using web applications.
The state of web applications (in)security @ ITDays 2016 from Tudor Damian
]]>
448 4 https://cdn.slidesharecdn.com/ss_thumbnails/tudordamian-thestateofwebapplicationsinsecurity-161129082657-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Microsoft Azure Stack /slideshow/itcamp-community-microsoft-azure-stack/64391201 tudy-microsoftazurestack-160726104830
Introducing Microsoft Azure Stack]]>

Introducing Microsoft Azure Stack]]>
Tue, 26 Jul 2016 10:48:30 GMT /slideshow/itcamp-community-microsoft-azure-stack/64391201 Tudy@slideshare.net(Tudy) Microsoft Azure Stack Tudy Introducing Microsoft Azure Stack <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/tudy-microsoftazurestack-160726104830-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Introducing Microsoft Azure Stack
Microsoft Azure Stack from Tudor Damian
]]>
1816 6 https://cdn.slidesharecdn.com/ss_thumbnails/tudy-microsoftazurestack-160726104830-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
2016, A new era of OS and Cloud Security /slideshow/tudor-damian-2016-a-new-era-of-os-and-cloud-security/64390703 tudordamian-2016aneweraofosandcloudsecurity-160726103331
The global security landscape is changing, now more than ever. With cloud computing gaining momentum and advanced persistent threats becoming a common occurrence, the industry is taking a more focused and serious approach when it comes to security, especially after some of last years’ heavily publicized incidents. Join this session for a discussion on what Microsoft is doing to protect against these new security threats with fresh approaches taken both at the server & client OS level, as well as in Azure.]]>

The global security landscape is changing, now more than ever. With cloud computing gaining momentum and advanced persistent threats becoming a common occurrence, the industry is taking a more focused and serious approach when it comes to security, especially after some of last years’ heavily publicized incidents. Join this session for a discussion on what Microsoft is doing to protect against these new security threats with fresh approaches taken both at the server & client OS level, as well as in Azure.]]>
Tue, 26 Jul 2016 10:33:31 GMT /slideshow/tudor-damian-2016-a-new-era-of-os-and-cloud-security/64390703 Tudy@slideshare.net(Tudy) 2016, A new era of OS and Cloud Security Tudy The global security landscape is changing, now more than ever. With cloud computing gaining momentum and advanced persistent threats becoming a common occurrence, the industry is taking a more focused and serious approach when it comes to security, especially after some of last years’ heavily publicized incidents. Join this session for a discussion on what Microsoft is doing to protect against these new security threats with fresh approaches taken both at the server & client OS level, as well as in Azure. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/tudordamian-2016aneweraofosandcloudsecurity-160726103331-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> The global security landscape is changing, now more than ever. With cloud computing gaining momentum and advanced persistent threats becoming a common occurrence, the industry is taking a more focused and serious approach when it comes to security, especially after some of last years’ heavily publicized incidents. Join this session for a discussion on what Microsoft is doing to protect against these new security threats with fresh approaches taken both at the server &amp; client OS level, as well as in Azure.
2016, A new era of OS and Cloud Security from Tudor Damian
]]>
518 5 https://cdn.slidesharecdn.com/ss_thumbnails/tudordamian-2016aneweraofosandcloudsecurity-160726103331-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
IT Risk Management /slideshow/it-risk-management-55410581/55410581 itcamp2015-tudordamian-itriskmanagement-151123103720-lva1-app6892
Almost every business decision requires executives and managers to balance risk and reward, and efficiency in that process is essential to an enterprise’s success. Too often though, IT risk (business risk related to the use of IT) is overlooked. While other business risks such as market, credit and operational risks have long been incorporated into the decision-making processes, IT risk has usually been relegated to technical specialists outside the boardroom, despite falling under the same risk category as other business risks: failure to achieve strategic objectives. This session intends to address business risks related to the use of IT, looking at industry standards, frameworks and best practices, as well as focusing on real world examples and specific plans on how to implement IT Risk Management on every level of your company.]]>

Almost every business decision requires executives and managers to balance risk and reward, and efficiency in that process is essential to an enterprise’s success. Too often though, IT risk (business risk related to the use of IT) is overlooked. While other business risks such as market, credit and operational risks have long been incorporated into the decision-making processes, IT risk has usually been relegated to technical specialists outside the boardroom, despite falling under the same risk category as other business risks: failure to achieve strategic objectives. This session intends to address business risks related to the use of IT, looking at industry standards, frameworks and best practices, as well as focusing on real world examples and specific plans on how to implement IT Risk Management on every level of your company.]]>
Mon, 23 Nov 2015 10:37:20 GMT /slideshow/it-risk-management-55410581/55410581 Tudy@slideshare.net(Tudy) IT Risk Management Tudy Almost every business decision requires executives and managers to balance risk and reward, and efficiency in that process is essential to an enterprise’s success. Too often though, IT risk (business risk related to the use of IT) is overlooked. While other business risks such as market, credit and operational risks have long been incorporated into the decision-making processes, IT risk has usually been relegated to technical specialists outside the boardroom, despite falling under the same risk category as other business risks: failure to achieve strategic objectives. This session intends to address business risks related to the use of IT, looking at industry standards, frameworks and best practices, as well as focusing on real world examples and specific plans on how to implement IT Risk Management on every level of your company. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/itcamp2015-tudordamian-itriskmanagement-151123103720-lva1-app6892-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Almost every business decision requires executives and managers to balance risk and reward, and efficiency in that process is essential to an enterprise’s success. Too often though, IT risk (business risk related to the use of IT) is overlooked. While other business risks such as market, credit and operational risks have long been incorporated into the decision-making processes, IT risk has usually been relegated to technical specialists outside the boardroom, despite falling under the same risk category as other business risks: failure to achieve strategic objectives. This session intends to address business risks related to the use of IT, looking at industry standards, frameworks and best practices, as well as focusing on real world examples and specific plans on how to implement IT Risk Management on every level of your company.
IT Risk Management from Tudor Damian
]]>
6544 8 https://cdn.slidesharecdn.com/ss_thumbnails/itcamp2015-tudordamian-itriskmanagement-151123103720-lva1-app6892-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
IDS Evasion Techniques /slideshow/ids-evasion-techniques/55406554 tudordamian-idsevasiontechniques-151123083756-lva1-app6892
There is no doubt that Intrusion Detection Systems should be incorporated into any security infrastructure, however today’s IDS implementations are far from perfect. Security Managers should continue to add layers to their defense strategy and not place too much reliance on this technology, as it’s not easy to create a system that can effectively flag an attack without crashing under the weight of its own logs, operate relatively maintenance free and respond appropriately to benign anomalous events without raising too many false alarms. This session discusses some of the most common techniques aimed at evading IDS detection order to easily attack the infrastructure sitting behind those systems.]]>

There is no doubt that Intrusion Detection Systems should be incorporated into any security infrastructure, however today’s IDS implementations are far from perfect. Security Managers should continue to add layers to their defense strategy and not place too much reliance on this technology, as it’s not easy to create a system that can effectively flag an attack without crashing under the weight of its own logs, operate relatively maintenance free and respond appropriately to benign anomalous events without raising too many false alarms. This session discusses some of the most common techniques aimed at evading IDS detection order to easily attack the infrastructure sitting behind those systems.]]>
Mon, 23 Nov 2015 08:37:56 GMT /slideshow/ids-evasion-techniques/55406554 Tudy@slideshare.net(Tudy) IDS Evasion Techniques Tudy There is no doubt that Intrusion Detection Systems should be incorporated into any security infrastructure, however today’s IDS implementations are far from perfect. Security Managers should continue to add layers to their defense strategy and not place too much reliance on this technology, as it’s not easy to create a system that can effectively flag an attack without crashing under the weight of its own logs, operate relatively maintenance free and respond appropriately to benign anomalous events without raising too many false alarms. This session discusses some of the most common techniques aimed at evading IDS detection order to easily attack the infrastructure sitting behind those systems. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/tudordamian-idsevasiontechniques-151123083756-lva1-app6892-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> There is no doubt that Intrusion Detection Systems should be incorporated into any security infrastructure, however today’s IDS implementations are far from perfect. Security Managers should continue to add layers to their defense strategy and not place too much reliance on this technology, as it’s not easy to create a system that can effectively flag an attack without crashing under the weight of its own logs, operate relatively maintenance free and respond appropriately to benign anomalous events without raising too many false alarms. This session discusses some of the most common techniques aimed at evading IDS detection order to easily attack the infrastructure sitting behind those systems.
IDS Evasion Techniques from Tudor Damian
]]>
1898 10 https://cdn.slidesharecdn.com/ss_thumbnails/tudordamian-idsevasiontechniques-151123083756-lva1-app6892-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Social Engineering, or hacking people /slideshow/social-engineering-or-hacking-people/42250523 tudordamian-socialengineeringorhackingpeople-141202024912-conversion-gate02
DefCamp #5, Bucharest, November 29th Just as a chain is as weak as its weakest link, computer systems are as vulnerable as their weakest component – and that’s rarely the technology itself, it’s more often the people using it. This is precisely why it’s usually easier to exploit people’s natural inclination to trust than it is to discover ways to hack into computer systems. As the art of manipulating people into them giving up confidential information, Social Engineering has been a hot topic for many years. This session will discuss some of the most common Social Engineering techniques and countermeasures.]]>

DefCamp #5, Bucharest, November 29th Just as a chain is as weak as its weakest link, computer systems are as vulnerable as their weakest component – and that’s rarely the technology itself, it’s more often the people using it. This is precisely why it’s usually easier to exploit people’s natural inclination to trust than it is to discover ways to hack into computer systems. As the art of manipulating people into them giving up confidential information, Social Engineering has been a hot topic for many years. This session will discuss some of the most common Social Engineering techniques and countermeasures.]]>
Tue, 02 Dec 2014 02:49:11 GMT /slideshow/social-engineering-or-hacking-people/42250523 Tudy@slideshare.net(Tudy) Social Engineering, or hacking people Tudy DefCamp #5, Bucharest, November 29th Just as a chain is as weak as its weakest link, computer systems are as vulnerable as their weakest component – and that’s rarely the technology itself, it’s more often the people using it. This is precisely why it’s usually easier to exploit people’s natural inclination to trust than it is to discover ways to hack into computer systems. As the art of manipulating people into them giving up confidential information, Social Engineering has been a hot topic for many years. This session will discuss some of the most common Social Engineering techniques and countermeasures. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/tudordamian-socialengineeringorhackingpeople-141202024912-conversion-gate02-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> DefCamp #5, Bucharest, November 29th Just as a chain is as weak as its weakest link, computer systems are as vulnerable as their weakest component – and that’s rarely the technology itself, it’s more often the people using it. This is precisely why it’s usually easier to exploit people’s natural inclination to trust than it is to discover ways to hack into computer systems. As the art of manipulating people into them giving up confidential information, Social Engineering has been a hot topic for many years. This session will discuss some of the most common Social Engineering techniques and countermeasures.
Social Engineering, or hacking people from Tudor Damian
]]>
825 4 https://cdn.slidesharecdn.com/ss_thumbnails/tudordamian-socialengineeringorhackingpeople-141202024912-conversion-gate02-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Azure Site Recovery and System Center /slideshow/azure-site-recovery-and-system-center/42250480 mssummit-tudordamian-azuresiterecoveryandsystemcenter-141202024751-conversion-gate01
Azure Site Recovery is a cloud-based service that automates virtual machine fail-over across sites. The service integrates with Virtual Machine Manager which manages on-premises Hyper-V servers. Hyper-V Replica technology replicates virtual machine configuration and data across sites. Based on customer feedback, support for SAN replication is important. This session covers the scenarios in scope, solution architecture, and SAN integration using SMI-S.]]>

Azure Site Recovery is a cloud-based service that automates virtual machine fail-over across sites. The service integrates with Virtual Machine Manager which manages on-premises Hyper-V servers. Hyper-V Replica technology replicates virtual machine configuration and data across sites. Based on customer feedback, support for SAN replication is important. This session covers the scenarios in scope, solution architecture, and SAN integration using SMI-S.]]>
Tue, 02 Dec 2014 02:47:51 GMT /slideshow/azure-site-recovery-and-system-center/42250480 Tudy@slideshare.net(Tudy) Azure Site Recovery and System Center Tudy Azure Site Recovery is a cloud-based service that automates virtual machine fail-over across sites. The service integrates with Virtual Machine Manager which manages on-premises Hyper-V servers. Hyper-V Replica technology replicates virtual machine configuration and data across sites. Based on customer feedback, support for SAN replication is important. This session covers the scenarios in scope, solution architecture, and SAN integration using SMI-S. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/mssummit-tudordamian-azuresiterecoveryandsystemcenter-141202024751-conversion-gate01-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Azure Site Recovery is a cloud-based service that automates virtual machine fail-over across sites. The service integrates with Virtual Machine Manager which manages on-premises Hyper-V servers. Hyper-V Replica technology replicates virtual machine configuration and data across sites. Based on customer feedback, support for SAN replication is important. This session covers the scenarios in scope, solution architecture, and SAN integration using SMI-S.
Azure Site Recovery and System Center from Tudor Damian
]]>
1085 2 https://cdn.slidesharecdn.com/ss_thumbnails/mssummit-tudordamian-azuresiterecoveryandsystemcenter-141202024751-conversion-gate01-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Upgrading your Private Cloud to Windows Server 2012 R2 /slideshow/upgrading-your-private-cloud/42250404 1-141202024541-conversion-gate01
Learn about the functionality and processes that are available to enable you to move your private cloud deployments to Windows Server 2012 R2 with zero downtime. Understand the options that are available to you and the considerations that need to be made as you determine the best path for continuing to keep your environment on the best technology available for private clouds today. This session covers the end to end approach including Hyper-V, Clustering, Storage and SCVMM.]]>

Learn about the functionality and processes that are available to enable you to move your private cloud deployments to Windows Server 2012 R2 with zero downtime. Understand the options that are available to you and the considerations that need to be made as you determine the best path for continuing to keep your environment on the best technology available for private clouds today. This session covers the end to end approach including Hyper-V, Clustering, Storage and SCVMM.]]>
Tue, 02 Dec 2014 02:45:40 GMT /slideshow/upgrading-your-private-cloud/42250404 Tudy@slideshare.net(Tudy) Upgrading your Private Cloud to Windows Server 2012 R2 Tudy Learn about the functionality and processes that are available to enable you to move your private cloud deployments to Windows Server 2012 R2 with zero downtime. Understand the options that are available to you and the considerations that need to be made as you determine the best path for continuing to keep your environment on the best technology available for private clouds today. This session covers the end to end approach including Hyper-V, Clustering, Storage and SCVMM. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/1-141202024541-conversion-gate01-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Learn about the functionality and processes that are available to enable you to move your private cloud deployments to Windows Server 2012 R2 with zero downtime. Understand the options that are available to you and the considerations that need to be made as you determine the best path for continuing to keep your environment on the best technology available for private clouds today. This session covers the end to end approach including Hyper-V, Clustering, Storage and SCVMM.
Upgrading your Private Cloud to Windows Server 2012 R2 from Tudor Damian
]]>
636 2 https://cdn.slidesharecdn.com/ss_thumbnails/1-141202024541-conversion-gate01-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
What's new in Hyper-V 2012 R2 /slideshow/tudor-damian-whats-new-in-hyperv-2012-r2-28192144/28192144 tudor-20damian-20-20what-27s-20new-20in-20hyper-v-202012-20r2-131113034834-phpapp02
One of my sessions at Microsoft Summit 2013]]>

One of my sessions at Microsoft Summit 2013]]>
Wed, 13 Nov 2013 03:48:34 GMT /slideshow/tudor-damian-whats-new-in-hyperv-2012-r2-28192144/28192144 Tudy@slideshare.net(Tudy) What's new in Hyper-V 2012 R2 Tudy One of my sessions at Microsoft Summit 2013 <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/tudor-20damian-20-20what-27s-20new-20in-20hyper-v-202012-20r2-131113034834-phpapp02-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> One of my sessions at Microsoft Summit 2013
What's new in Hyper-V 2012 R2 from Tudor Damian
]]>
1046 2 https://cdn.slidesharecdn.com/ss_thumbnails/tudor-20damian-20-20what-27s-20new-20in-20hyper-v-202012-20r2-131113034834-phpapp02-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Comparing MS Cloud with VMware Cloud /slideshow/tudor-damian-comparing-ms-cloud-with-v-mware-cloud/28192143 tudor-20damian-20-20comparing-20ms-20cloud-20with-20vmware-20cloud-131113034834-phpapp01
One of my sessions at Microsoft Summit 2013]]>

One of my sessions at Microsoft Summit 2013]]>
Wed, 13 Nov 2013 03:48:34 GMT /slideshow/tudor-damian-comparing-ms-cloud-with-v-mware-cloud/28192143 Tudy@slideshare.net(Tudy) Comparing MS Cloud with VMware Cloud Tudy One of my sessions at Microsoft Summit 2013 <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/tudor-20damian-20-20comparing-20ms-20cloud-20with-20vmware-20cloud-131113034834-phpapp01-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> One of my sessions at Microsoft Summit 2013
Comparing MS Cloud with VMware Cloud from Tudor Damian
]]>
2741 5 https://cdn.slidesharecdn.com/ss_thumbnails/tudor-20damian-20-20comparing-20ms-20cloud-20with-20vmware-20cloud-131113034834-phpapp01-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
What's new in Windows 8 /slideshow/whats-new-in-windows-8/14569846 tudy-whatsnewinwindows8-121003043335-phpapp01
A brief overview of the new features in Windows 8. ]]>

A brief overview of the new features in Windows 8. ]]>
Wed, 03 Oct 2012 04:33:33 GMT /slideshow/whats-new-in-windows-8/14569846 Tudy@slideshare.net(Tudy) What's new in Windows 8 Tudy A brief overview of the new features in Windows 8. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/tudy-whatsnewinwindows8-121003043335-phpapp01-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> A brief overview of the new features in Windows 8.
What's new in Windows 8 from Tudor Damian
]]>
4479 3 https://cdn.slidesharecdn.com/ss_thumbnails/tudy-whatsnewinwindows8-121003043335-phpapp01-thumbnail.jpg?width=120&height=120&fit=bounds presentation White http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Linux on Hyper-V /slideshow/tudor-damian-linux-on-hyperv/12207586 tudordamian-linuxonhyper-v-120329072742-phpapp01
MS Days 2012, Bulgaria]]>

MS Days 2012, Bulgaria]]>
Thu, 29 Mar 2012 07:27:40 GMT /slideshow/tudor-damian-linux-on-hyperv/12207586 Tudy@slideshare.net(Tudy) Linux on Hyper-V Tudy MS Days 2012, Bulgaria <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/tudordamian-linuxonhyper-v-120329072742-phpapp01-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> MS Days 2012, Bulgaria
Linux on Hyper-V from Tudor Damian
]]>
4088 7 https://cdn.slidesharecdn.com/ss_thumbnails/tudordamian-linuxonhyper-v-120329072742-phpapp01-thumbnail.jpg?width=120&height=120&fit=bounds presentation White http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Private cloud, the Good, the Bad and the Ugly /slideshow/tudor-damian-private-cloud-the-good-the-bad-and-the-ugly/12207557 tudordamian-privatecloudthegoodthebadandtheugly-120329072618-phpapp01
MS Days 2012, Bulgaria]]>

MS Days 2012, Bulgaria]]>
Thu, 29 Mar 2012 07:26:16 GMT /slideshow/tudor-damian-private-cloud-the-good-the-bad-and-the-ugly/12207557 Tudy@slideshare.net(Tudy) Private cloud, the Good, the Bad and the Ugly Tudy MS Days 2012, Bulgaria <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/tudordamian-privatecloudthegoodthebadandtheugly-120329072618-phpapp01-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> MS Days 2012, Bulgaria
Private cloud, the Good, the Bad and the Ugly from Tudor Damian
]]>
1272 5 https://cdn.slidesharecdn.com/ss_thumbnails/tudordamian-privatecloudthegoodthebadandtheugly-120329072618-phpapp01-thumbnail.jpg?width=120&height=120&fit=bounds presentation White http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Hyper-V 3.0 Overview /Tudy/hyperv-30-overview tudordamian-hyper-v3-0overview-120106155928-phpapp02
]]>

]]>
Fri, 06 Jan 2012 15:59:23 GMT /Tudy/hyperv-30-overview Tudy@slideshare.net(Tudy) Hyper-V 3.0 Overview Tudy <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/tudordamian-hyper-v3-0overview-120106155928-phpapp02-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br>
Hyper-V 3.0 Overview from Tudor Damian
]]>
904 3 https://cdn.slidesharecdn.com/ss_thumbnails/tudordamian-hyper-v3-0overview-120106155928-phpapp02-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
BOI 2011 - Be what's next /slideshow/boi-2011-be-whats-next/8548682 tudordamianrazvanrusu-boi2011-bewhatsnext-110709005445-phpapp01
Balkan Olympiad in Informatics]]>

Balkan Olympiad in Informatics]]>
Sat, 09 Jul 2011 00:54:41 GMT /slideshow/boi-2011-be-whats-next/8548682 Tudy@slideshare.net(Tudy) BOI 2011 - Be what's next Tudy Balkan Olympiad in Informatics <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/tudordamianrazvanrusu-boi2011-bewhatsnext-110709005445-phpapp01-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Balkan Olympiad in Informatics
BOI 2011 - Be what's next from Tudor Damian
]]>
503 4 https://cdn.slidesharecdn.com/ss_thumbnails/tudordamianrazvanrusu-boi2011-bewhatsnext-110709005445-phpapp01-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Hosting your virtual private cloud /slideshow/hosting-your-virtual-private-cloud/5541917 tudy-hostingyourvirtualprivatecloud-101024010551-phpapp01
Prezentarea de la Future Hosting Conference 2010, despre virtual private cloud deployments]]>

Prezentarea de la Future Hosting Conference 2010, despre virtual private cloud deployments]]>
Sun, 24 Oct 2010 01:05:44 GMT /slideshow/hosting-your-virtual-private-cloud/5541917 Tudy@slideshare.net(Tudy) Hosting your virtual private cloud Tudy Prezentarea de la Future Hosting Conference 2010, despre virtual private cloud deployments <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/tudy-hostingyourvirtualprivatecloud-101024010551-phpapp01-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Prezentarea de la Future Hosting Conference 2010, despre virtual private cloud deployments
Hosting your virtual private cloud from Tudor Damian
]]>
343 1 https://cdn.slidesharecdn.com/ss_thumbnails/tudy-hostingyourvirtualprivatecloud-101024010551-phpapp01-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Linux sub Hyper-V R2 /slideshow/linux-sub-hyperv-r2/5336394 tudy-linux-sub-hyper-v-101001163209-phpapp01
O scurta introducere in arhitectura Hyper-V R2 si Linux Integration Services v2.1, precum si o detaliere a unor solutii de management si instrumente utile in gazduirea sistemelor Linux sub Hyper-V - video screencast pe Vimeo: http://www.vimeo.com/15466169]]>

O scurta introducere in arhitectura Hyper-V R2 si Linux Integration Services v2.1, precum si o detaliere a unor solutii de management si instrumente utile in gazduirea sistemelor Linux sub Hyper-V - video screencast pe Vimeo: http://www.vimeo.com/15466169]]>
Fri, 01 Oct 2010 16:32:04 GMT /slideshow/linux-sub-hyperv-r2/5336394 Tudy@slideshare.net(Tudy) Linux sub Hyper-V R2 Tudy O scurta introducere in arhitectura Hyper-V R2 si Linux Integration Services v2.1, precum si o detaliere a unor solutii de management si instrumente utile in gazduirea sistemelor Linux sub Hyper-V - video screencast pe Vimeo: http://www.vimeo.com/15466169 <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/tudy-linux-sub-hyper-v-101001163209-phpapp01-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> O scurta introducere in arhitectura Hyper-V R2 si Linux Integration Services v2.1, precum si o detaliere a unor solutii de management si instrumente utile in gazduirea sistemelor Linux sub Hyper-V - video screencast pe Vimeo: http://www.vimeo.com/15466169
Linux sub Hyper-V R2 from Tudor Damian
]]>
775 2 https://cdn.slidesharecdn.com/ss_thumbnails/tudy-linux-sub-hyper-v-101001163209-phpapp01-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
https://cdn.slidesharecdn.com/profile-photo-Tudy-48x48.jpg?cb=1623066315 As an IT consultant with more than 15 years of experience in managing complex IT infrastructures, Tudor is a Certified Ethical Hacker, a Microsoft Cloud and Datacenter Management MVP, and a regular speaker at local and regional community events. He is also one of the organizers of the ITCamp conference in Romania (itcamp.ro). bringing together tens of awesome speakers with hundreds of attendees every year. Tudor often talks about the latest technologies and trends with themes including cloud governance, risk management & compliance, networking & security, virtualization technologies, social engineering & cybersecurity, web application security, white-hat hacking & penetration testing. www.tudy.tel https://cdn.slidesharecdn.com/ss_thumbnails/tudy-digitaltransformationinthecloud-200710105339-thumbnail.jpg?width=320&height=320&fit=bounds slideshow/digital-transformation-in-the-cloud-what-they-dont-always-tell-you-2020/236781876 Digital Transformation... https://cdn.slidesharecdn.com/ss_thumbnails/tudy-securitycomplianceinthecloud-200710105039-thumbnail.jpg?width=320&height=320&fit=bounds slideshow/2019-security-compliance-in-the-cloud/236781834 Security &amp; Compliance ... https://cdn.slidesharecdn.com/ss_thumbnails/g2urfbsyobjeeif6w1qe-signature-399d5b2db8035275aa7de8b0fe5010a4041a2cc5ceb4ee7f9276bf93764987cb-poli-180314191710-thumbnail.jpg?width=320&height=320&fit=bounds slideshow/modern-cybersecurity-threats-and-shiny-new-tools-to-help-deal-with-them/90682627 Modern cybersecurity t...