Mike Jankowski-Lorek « Secure Tour

Mike Jankowski-Lorek

Cloud Solutions & Machine Learning Expert

Michael designs and implements solutions for Databases, Network & Management area, mainly for Microsoft platform. As for day-to-day work, he works as Solution Architect, designing and planning database related solutions and software, mainly based on Microsoft and Oracle servers. He also designs and administers IT Infrastructure based on Microsoft systems and network solution from CISCO.

Michał delivers training on:
Machine Learning, Big Data, Machine Learning, Data Integration, Windows Security, ADFS, Cloud solutions, PowerShell, Designing Databases, Programming Database, Database Security, .NET Development.

Highest Level Certifications:
Microsoft Certified Trainer (MCT), CQURE Academy Security Master.

He likes sailing on the sea and the ocean. Michael being a typical geek likes all of the possible math riddles which he does really well. Michael is additionally interested in Big data, High Availability and real time analytics especially when combined with machine learning and artificial intelligent or natural language processing. He is currently finishing PhD thesis in which he is combining academic knowledge, professional experience and strong technical skills.

Mikes Sessions

Windows Security version Next – the big change has come

We all should remember the impact of changes in the Windows Vista kernel. Administrators and developers met the new reality and had to live with it. Did you observe anything comparable since 2006? If you think no revolution happened during last ten years it means you are misled by the fact that big changes are […]


Hybrid Environment Security – Migrating to Secure Cloud

Hybrid approach – one that combines on-premises and cloud environments working together, is what makes best solution for many organizations. Expanding your key infrastructure components (AD, PKI, backup) beyond your safe datacenter, new question arise how to make it secure when it is on the cloud? How to manage certificates, keys, encryption in virtual remote […]


Closing Keynote: Think and Act Like a Hacker to Protect Your Company’s Assets

The reality here is as follows: attacks happen and they will happen as long as there are humans on this planet. However, they should not happen if you protect your infrastructure properly. Is there a weakness right now in your IT security system? Wouldn’t it be better to find it before an untrusted source or […]