Božidar Belić
Most of Cybersecurity and data breaches comes from some type of identity fraud. In times of remote work, identity protection is your first line of defense and should be the crutial step in your cybersecurity strategy. We will discuss how to:
IT Service Director of Crayon Serbia with 12 years of experience in design, development and implementation of enterprise IT infrastructure and strategies with focus on Cloud transformation and migration, Data Protection and Software Asset Management.