Daniel ILIES

Daniel ILIES

Daniel ILIES

Territory Manager South East Europe at Ivanti

Territory Manager South East Europe at Ivanti            

 

Mr. Daniel ILIES is Territory Manager for South East Europe at Ivanti (formerly LANDESK), being responsible for Ivanti operations within the SEE region. Ivanti is the result of merger between LANDESK and HEAT Software, in early 2017. In the past has held similar positions in top technology companies. Starting from 2002, in his 15 years of expertise in the IT field, Mr. ILIES introduced several  security and application delivery technologies to Romania. Also during this period, Mr. ILIES had taken part in many security and infrastructure projects in various business sectors.

Currently Mr. ILIES’s interests and challenges consist in harmonization of all IT disciplines, from security to IT operations, and their business value respectively, while proving IT and security especially as a business enabler.

Plenary speech: rocks are falling

As the business environment evolved, they gradually started to depend more and more on IT, making IT a critical component of the business nowadays. So did the challenges – evolved into more complex, gradually getting to a level where sometimes IT could only assist, powerless to the security challenges they were facing all of the sudden.

It is still the case of WannaCry, which would evolve faster than the effective defenses that could be put in place. Or the case of GDPR, where, seen as a challenge, can lead to a more violent business disruption, being given its direct consequences to the business. Both WannaCry and GDPR affect all of us, regardless of business size or business sector.

So what to do other than watching it happen? And feeling powerless?

Day 2: Some alternatives to the above situation

In both cases – WannaCry and GDPR – security has a lot to do with respect to business continuity and its bare existence respectively. But what could we do in order to implement a coherent strategy to guarantee the business continuity?

How to position this for business in order to get support to implement them?

During Day 2 we could explore together some possible alternatives that could do the trick.

Cyber Security Congress