About Us

We Will Turn You Into a Windows Security Expert By Sharing
Our Expertise & The Most Up-To-Date Tools
(And a Few Geeky Jokes, too)

Our Mission

In the IT industry we’ve reached the point where there are not enough cyber
security experts with the latest knowledge and skills.

According to the industry’s statistics, by 2019 the market will need 6 million security
professionals… but only 4 to 5 million of them will have
the needed qualifications.

That means we’ll be short of 1 million IT soldiers. (Let that sinks in for a moment.)

We want to fix this — and we need YOU.

What excites us the most is sharing what we know with other IT experts.
Especially if they are already skilled and want to seriously level up their game.

How We Do It

CQURE was formed in 2008 in Poland and since then has expanded to the rest of Europe,
the Americas, Middle East and Asia – as well as opening offices in New York and in Dubai.

Our services range from IT security audits, to penetration tests, solution
implementations and customized trainings.

We share our expertise both offline (at seminars and conferences) and online (through
videos and blog posts). Our benchmark is to bring you at least three NEW
cybersecurity solutions, tools ot tricks every week.

GET THE CQURE WEEKLY NEWSLETTER

Events & Media

We love sharing our knowledge at conferences. Paula does it with so much passion, she usually leaves an event with The Best Speaker badge. We had also appeared in press — so you might have seen us in quite few places by now.

Our Experts

Paula Januszkiewicz

Founder and CEO of CQURE

Paula has extensive experience in security projects and has conducted
hundreds of security analyses (even for government organizations).
Within CQURE she devoted herself to her passions: Penetration Tests,
Audits, Architecture Consulting and creating Trainings & Seminars.

Paula delivers training on:
Security, Operating Systems, Windows Internals, Internet Information Services, Public Key Infrastructure, Active Directory, Powershell and other Microsoft Technologies

Speaker at events & conferences:
Paula is also a top speaker on many well-known conferences like TechEd North America, TechEd Europe, TechEd Middle East, RSA, TechDays, CyberCrime.
She was also rated as the best speaker at Microsoft Ignite 2015.

Highest Level Certifications:
Enterprise Security MVP and trainer (MCT) and Microsoft Security Trusted Advisor, CQURE Academy Security Master.

Private:
Paula enjoys researching new technologies and converting her findings
into leading-edge training (she’s already created six globally-recognized
programs). She also wrote a book on Threat Management Gateway 2010
and she’s currently working on the next one… so stay tuned for more.

Greg Tworek

Director of CQURE

Greg has been working with Windows Security since the very beginning of his professional career. He started as a system administrator, then moved to a consultant role, IT manager and chief information security officer (CISO). Now he is mainly responsible for consulting services delivered worldwide by CQURE.

Greg delivers training on:
Security, Operating Systems, Windows Internals, Internet Information Services, Virtualization Technologies, Active Directory, SQL Server, Powershell and other Microsoft Technologies.

Highest Level Certifications:
Microsoft acknowledged Greg by nominating him ten times in a row as the Most Valuable Professional. He’s been also given an access to the source code of Windows and invited to participate in Springboard Technical Experts Panel, Security Trusted Advisor Program — and more. On his wall you can spot the certifications in: MTA, MCP, MCP+I, MCSA, MCSE and MCDBA, CQURE Academy Security Master.

Private:
Greg has never stopped doing two things he likes the most: learning new things and sharing his experience with others by writing (NT 4.0 Security book, blog) and speaking at IT events.

Kamil Bączyk

Senior Infrastructure & Security Expert

Kamil deeply believes that combining work and hobby is the key to success. In CQURE he has his heart and soul in the Microsoft infrastructure, cloud and security solutions. Kamil’s experience allows him to perform architecture consulting, penetration tests and authored trainings and seminars.

Kamil delivers training on:
Windows Security, Troubleshooting, Skype for Business, Office 365, Public Key Infrastructure, Internet Information Services, Powershell, Identity Management, Cloud Solutions, SharePoint.

Highest Level Certifications:
Most Valuable Professional (MVP): Office Servers and Services, Microsoft Certified Trainer (MCT), CQURE Academy Security Master.

Private:
Kamil is an ex-gamer and an addicted workaholic. He is a technology geek fixated on drones and flying, a car enthusiast, currently in love with BMW. Kamil shares his research, knowledge and passion at conferences and IT events. Following the maxim regarding SharePoint: “you love it or hate it” he truly enjoys being in the SharePoint environments and trusts cloud solutions.

Chris Pietrzak

Infrastructure Architect & Security Expert

Chris is a true geek that follows the maxim: everything is possible it is just a matter of time! As for day-to-day work at CQURE he designs and implements solutions for Security, Network & Management area, mainly for various platforms, he is an architect for various network solutions from HP and CISCO, and edge solutions from CheckPoint, Fortinet and SonicWall.

Chris delivers training on:
Edge Security (Microsoft IAG/UAG/ISA/TMG, Fortinet, CheckPoint), Core Infrastructure (Active Directory, Active Directory Federation Services, Exchange, Skype for Business, Internet Information Services), Public Key Infrastructure, Powershell, Kerberos Interoperability (OsX, Linux, Apache, Java, Smartcards), Anywhere Access – SSLVPNs, DirectAccess, Mobile Device Management, Cloud Solutions.

Highest Level Certifications:
Checkpoint Certified Security Administrator, Microsoft Certified Trainer,(ISC) 2 Certified Information Systems Security Professional, (ISC)2 System Security Certified Practitioner, Checkpoint Certified Security Engineer, Certified Information Systems Auditor, CQURE Academy Security Master.

Private:
Chris likes to travel and become familiar with different cultures, he likes to walk… in general wherever possible, especially in the mountains. He likes to drive his sport car and ride a motobike.

Michał Jankowski-Lorek

Cloud Solutions & Machine Learning Expert

Michael designs and implements solutions for Databases, Network & Management area, mainly for Microsoft platform. As for day-to-day work, he works as Solution Architect, designing and planning database related solutions and software, mainly based on Microsoft and Oracle servers. He also designs and administers IT Infrastructure based on Microsoft systems and network solution from CISCO.

Michał delivers training on:
Machine Learning, Big Data, Machine Learning, Data Integration, Windows Security, ADFS, Cloud solutions, PowerShell, Designing Databases, Programing Database, Database Security, .Net Development.

Highest Level Certifications:
Microsoft Certified Trainer (MCT), CQURE Academy Security Master.

Private:
He likes sailing on the sea and the ocean. Michael being a typical geek likes all of the possible math riddles which he does really well. Michael is additionally interested in Big data, High Availability and real time analytics especially when combined with machine learning and artificial intelligent or natural language processing. He is currently finishing PhD thesis in which he is combining academic knowledge, professional experience and strong technical skills.

What Others Say About Us

Let me start by saying Paula is amazing!! The passion for the topic really shows. As an engineer with 16 years of experience, I am impressed. Thank you for the education, and entertainment.

Dave Kordyban

Network Engineer | Garrett County Government

Course by CQURE Academy is a great course. Intense, deep and revealing. As it also happened before, Paula Januszkiewicz knows how to blow your mind. As great athletes make their discipline look easy when you watch them perform, so Paula makes Windows purr like a little kitten. Even though I am fully aware of how much I still don't know, after a course such as this Windows is not mysterious anymore. This is a great feeling

Doru-Catalin Togea

Information Security Advisor | Norwegian Police

We have learned a lot about IIS, hacking and much much more. Our motivation has increased during this course and of course great interest in your work Paula. Impressed with your enthusiastic energic way of presenting.

Styrk Finne

Senior Professional System Engineer | CSC Norway

Our Expertise

Windows Internals
System Services, Group Managed Service Accounts, Permissions, Privileges, Operating System Security, File and Registry Security, PowerShell, Automation, Offline Access
Identity Theft Protection
Identifying Passwords Locations, Cryptographic Protection for Passwords, Authentication and Authorization, Authentication Protocols, Pass-the-Hash, Pass-the-Ticket, Local Admin Password Solution, Data Protection API, CredentialGuard
Penetration Testing
Detecting Points of Access, Network Related Points of Entry, Offline Access, Elevating Privileges, Spreading Across the Network, Offline Analysis, Organization of Penetration Test, Creating Reports
Malware
Malware Analysis, Virus, Worms, Trojans, Spywares, Ransomware, Detecting Malicious Code, Application Whitelisting, Code Signing
High Availability
Encryption, Rights Management Services, File Classification Infrastructure, Secure Access to Files and Folders, Clustering, Business Continuity, Load Balancing
Secure Server
Harderning Windows, Security Compliance Manager, Internet Information Server, SQL Server, Network Security, Denial of Service
Forensics
Forensics Scenarios, Gathering Evidence, Analyzing Disks, Analyzing Network Traffic, Offline and Online Analysis, Disk Based Artefacts, Memory Analysis, Documenting Findings
Server Monitoring
Detecting Malware, Behavioral Analysis, Useful Tools, Performance Monitoring, Event Logs, Event Tracing, Analyzing Logs, Detecting Issues, Creating Baselines, Response Automation, Auditing
Incident Response
Identifying Incidents, Creating Response Plans, Incident Response Team Organization, Gathering Evidence