About Us

We Will Turn You Into a Windows Security Expert By Sharing
Our Expertise & The Most Up-To-Date Tools
(And a Few Geeky Jokes, too)

Our Mission

In the IT industry we’ve reached the point where there are not enough cyber
security experts with the latest knowledge and skills.

According to the industry’s statistics, by 2019 the market will need 6 million security
professionals… but only 4 to 5 million of them will have
the needed qualifications.

That means we’ll be short of 1 million IT soldiers. (Let that sinks in for a moment.)

We want to fix this — and we need YOU.

What excites us the most is sharing what we know with other IT experts.
Especially if they are already skilled and want to seriously level up their game.

How We Do It

CQURE was formed in 2008 in Poland and since then has expanded to the rest of Europe,
the Americas, Middle East and Asia – as well as opening offices in New York and in Dubai.

Our services range from IT security audits, to penetration tests, solution
implementations and customized trainings.

We share our expertise both offline (at seminars and conferences) and online (through
videos and blog posts). Our benchmark is to bring you at least three NEW
cybersecurity solutions, tools ot tricks every week.

GET THE CQURE WEEKLY NEWSLETTER

Events & Media

We love sharing our knowledge at conferences. Paula does it with so much passion, she usually leaves an event with The Best Speaker badge. We had also appeared in press — so you might have seen us in quite few places by now.

Our Experts

Paula Januszkiewicz

Founder and CEO of CQURE

Paula has extensive experience in security projects and has conducted
hundreds of security analyses (even for government organizations).
Within CQURE she devoted herself to her passions: Penetration Tests,
Audits, Architecture Consulting and creating Trainings & Seminars.

Paula delivers training on:
Security, Operating Systems, Windows Internals, Internet Information Services, Public Key Infrastructure, Active Directory, Powershell and other Microsoft Technologies

Speaker at events & conferences:
Paula is also a top speaker on many well-known conferences like TechEd North America, TechEd Europe, TechEd Middle East, RSA, TechDays, CyberCrime.
She was also rated as the best speaker at Microsoft Ignite 2015.

Highest Level Certifications:
Enterprise Security MVP and trainer (MCT) and Microsoft Security Trusted Advisor, CQURE Academy Security Master.

Private:
Paula enjoys researching new technologies and converting her findings
into leading-edge training (she’s already created six globally-recognized
programs). She also wrote a book on Threat Management Gateway 2010
and she’s currently working on the next one… so stay tuned for more.

Greg Tworek

Director of CQURE

Greg has been working with Windows Security since the very beginning of his professional career. He started as a system administrator, then moved to a consultant role, IT manager and chief information security officer (CISO). Now he is mainly responsible for consulting services delivered worldwide by CQURE.

Greg delivers training on:
Security, Operating Systems, Windows Internals, Internet Information Services, Virtualization Technologies, Active Directory, SQL Server, Powershell and other Microsoft Technologies.

Highest Level Certifications:
Microsoft acknowledged Greg by nominating him ten times in a row as the Most Valuable Professional. He’s been also given an access to the source code of Windows and invited to participate in Springboard Technical Experts Panel, Security Trusted Advisor Program — and more. On his wall you can spot the certifications in: MTA, MCP, MCP+I, MCSA, MCSE and MCDBA, CQURE Academy Security Master.

Private:
Greg has never stopped doing two things he likes the most: learning new things and sharing his experience with others by writing (NT 4.0 Security book, blog) and speaking at IT events.

Kamil Bączyk

Senior Infrastructure & Security Expert

Kamil deeply believes that combining work and hobby is the key to success. In CQURE he has his heart and soul in the Microsoft infrastructure, cloud and security solutions. Kamil’s experience allows him to perform architecture consulting, penetration tests and authored trainings and seminars.

Kamil delivers training on:
Windows Security, Troubleshooting, Skype for Business, Office 365, Public Key Infrastructure, Internet Information Services, Powershell, Identity Management, Cloud Solutions, SharePoint.

Highest Level Certifications:
Most Valuable Professional (MVP): Office Servers and Services, Microsoft Certified Trainer (MCT), CQURE Academy Security Master.

Private:
Kamil is an ex-gamer and an addicted workaholic. He is a technology geek fixated on drones and flying, a car enthusiast, currently in love with BMW. Kamil shares his research, knowledge and passion at conferences and IT events. Following the maxim regarding SharePoint: “you love it or hate it” he truly enjoys being in the SharePoint environments and trusts cloud solutions.

Chris Pietrzak

Infrastructure Architect & Security Expert

Chris is a true geek that follows the maxim: everything is possible it is just a matter of time! As for day-to-day work at CQURE he designs and implements solutions for Security, Network & Management area, mainly for various platforms, he is an architect for various network solutions from HP and CISCO, and edge solutions from CheckPoint, Fortinet and SonicWall.

Chris delivers training on:
Edge Security (Microsoft IAG/UAG/ISA/TMG, Fortinet, CheckPoint), Core Infrastructure (Active Directory, Active Directory Federation Services, Exchange, Skype for Business, Internet Information Services), Public Key Infrastructure, Powershell, Kerberos Interoperability (OsX, Linux, Apache, Java, Smartcards), Anywhere Access – SSLVPNs, DirectAccess, Mobile Device Management, Cloud Solutions.

Highest Level Certifications:
Checkpoint Certified Security Administrator, Microsoft Certified Trainer,(ISC) 2 Certified Information Systems Security Professional, (ISC)2 System Security Certified Practitioner, Checkpoint Certified Security Engineer, Certified Information Systems Auditor, CQURE Academy Security Master.

Private:
Chris likes to travel and become familiar with different cultures, he likes to walk… in general wherever possible, especially in the mountains. He likes to drive his sport car and ride a motobike.

Michał Jankowski-Lorek

Cloud Solutions & Machine Learning Expert

Michael designs and implements solutions for Databases, Network & Management area, mainly for Microsoft platform. As for day-to-day work, he works as Solution Architect, designing and planning database related solutions and software, mainly based on Microsoft and Oracle servers. He also designs and administers IT Infrastructure based on Microsoft systems and network solution from CISCO.

Michał delivers training on:
Machine Learning, Big Data, Machine Learning, Data Integration, Windows Security, ADFS, Cloud solutions, PowerShell, Designing Databases, Programing Database, Database Security, .Net Development.

Highest Level Certifications:
Microsoft Certified Trainer (MCT), CQURE Academy Security Master.

Private:
He likes sailing on the sea and the ocean. Michael being a typical geek likes all of the possible math riddles which he does really well. Michael is additionally interested in Big data, High Availability and real time analytics especially when combined with machine learning and artificial intelligent or natural language processing. He is currently finishing PhD thesis in which he is combining academic knowledge, professional experience and strong technical skills.

Kama Jankowska-Lorek

Key Account Manager

Kama is a member of our ‘invisible team’. With over 10 years’ experience with IT professionals, she is responsible for smooth and seamless work of our Experts. All the planning, scheduling, contracts – this is Kama’s job. So next time you have some questions regarding CQURE’s services, no matter if this is about penetration tests, audits, customized trainings, consulting or implementations – ‘Who you gonna call?’ And the answer is not Ghostbuster, but Kama! She will take good care of you, no matter where you are from.

Responsibilities:

Kama is in charge of our major Clients – starting from first contact till the end of the project. She is also a magic link between the Clients and our Experts. When someone should know what is going on in the company – this is Kama.

Private:

Another workaholic in our team, though she prefers to be called a work enthusiast. Being a creative type, in her free time she likes to express her artistic self. Lately she has taken up ukulele! She also loves travelling. She always says ‘The adventure starts at the end of your comfort zone’.

What Others Say About Us

Our Expertise

Windows Internals
System Services, Group Managed Service Accounts, Permissions, Privileges, Operating System Security, File and Registry Security, PowerShell, Automation, Offline Access
Identity Theft Protection
Identifying Passwords Locations, Cryptographic Protection for Passwords, Authentication and Authorization, Authentication Protocols, Pass-the-Hash, Pass-the-Ticket, Local Admin Password Solution, Data Protection API, CredentialGuard
Penetration Testing
Detecting Points of Access, Network Related Points of Entry, Offline Access, Elevating Privileges, Spreading Across the Network, Offline Analysis, Organization of Penetration Test, Creating Reports
Malware
Malware Analysis, Virus, Worms, Trojans, Spywares, Ransomware, Detecting Malicious Code, Application Whitelisting, Code Signing
High Availability
Encryption, Rights Management Services, File Classification Infrastructure, Secure Access to Files and Folders, Clustering, Business Continuity, Load Balancing
Secure Server
Harderning Windows, Security Compliance Manager, Internet Information Server, SQL Server, Network Security, Denial of Service
Forensics
Forensics Scenarios, Gathering Evidence, Analyzing Disks, Analyzing Network Traffic, Offline and Online Analysis, Disk Based Artefacts, Memory Analysis, Documenting Findings
Server Monitoring
Detecting Malware, Behavioral Analysis, Useful Tools, Performance Monitoring, Event Logs, Event Tracing, Analyzing Logs, Detecting Issues, Creating Baselines, Response Automation, Auditing
Incident Response
Identifying Incidents, Creating Response Plans, Incident Response Team Organization, Gathering Evidence