Petr Kunstat
Presales Consultant Thales
BIOGRAPHY
Petr Kunstat has experience with IT management in multinational companies and IT consulting in the area of SW development and IT security. At Thales, he works as an IT Security Consultant and focuses on Access Control and Protection of Sensitive Data.
How to exploit Cloud adoption for making your IT more secure and convenient for end users
Whether data are stored in a public or private cloud, we always address two main security goals. First, how to encrypt data that no one gets access to the encryption keys and how to manage consistently those keys and certificates across our entire IT portfolio. Second, how to ensure that only authorized users with the appropriate role and privileges can access this encrypted data and IT applications and at the same time how to ensure that each access is monitored and recorded in the standard SIEM or Log Management system. By implementing IT security solution that address both goals – encryption and smart access management we can achieve even more and it is the user convenience.
Based on the real experience and the public researches we know It is very important to consider human resistance against any security solution. The whole concept can fails when the solution is not user friendly or easy to use. As an example of wrong security solution result is an implementation of a strong password enforcement. It typically leads to having those passwords written on laptop case and it is clear it brakes the security goals at all.
So, during our session where we introduce Thales security company we will present the proven security approaches and solutions, that will help to increase the level of IT security and meet company compliance with industry standard regulation. We will focus on the security challenges in Cloud adoption era. For security engineers we will introduce how Cloud HSM solution works, how to manage data/DB encryption and keys/certificates from one central point via GUI, KMIP,PKCS#11 and how can be easy an implementation of the Cloud Smart Access Management solution.
Are you the next cyber security superstar?
If you are passionate about an information security topic or you have strong technical skills developing researches on your own, you should definitely Apply at Call for Papers. By submitting you will have the chance to showcase your work to +2000 attendees.
Other speakers joining this year
Milan Gabor
CEO Viris
Raluca Stanciu
Senior Software Engineer BullGuard
Alexandru Razvan Caciulescu
Senior Software Engineer UiPath
Ready for this year's presentations?
By registering you will unlock access to 60+ speakers and two full days with cyber security news & showcases from worldwide leaders.
COMPETITIONS
Sponsors & Partners
They help us make this conference possible.
POWERED BY
Orange Romania is part of the Orange Group, one of the largest global telecommunications operators that connects hundreds of millions of customers worldwide. With over 11 million local customers and an annual turnover exceeding 1.5 billion euros, Orange Romania connects 1 in 2 Romanians and offers an extensive range of communication solutions for both individual and corporate customers, from basic connectivity services to complete mobile, fixed internet, TV packages, and complex IT&C solutions through Orange Business.
Orange Romania is the number 1 operator in terms of network performance, and also holds nine consecutive Top Employer certifications, which confirm that Orange Romania, in addition to the remarkable products and services it offers, pays special attention to its employees and working environment. In the past 3 years Orange has launched two 5G Labs in Bucharest and Iasi, that aim to support researchers, startups and companies to test their 5G solutions in advance.
In addition, Orange is a long-term supporter of the startup ecosystem through the Orange Fab accelerator program designed to support entrepreneurs in the development of innovative products and their distribution locally and internationally.