Personal Information
Organization / Workplace
Grenoble Area, France France
Occupation
Security Architect at Schneider Electric
Industry
Technology / Software / Internet
About
I am willing to be involved in team work doing innovative projects.
I would like to progressively move away from the keyboard and spend more time with clients and stakeholders.
I used to work on every parts of a web application, from production and hosting to the database schema definition to the client side Javascript, currently focusing on SOA and security.
I have been in various projects, different in size and procedures.
I like the Agile / DevOps movement and would like to have the opportunity to put my ideas in practice.
My current focus is on Security where a lot of work has to be done.
- Presentations
- Documents
- Infographics
Frans Rosén Keynote at BSides Ahmedabad
Security BSides Ahmedabad
•
4 years ago
Namespaces for Local Networks
Men and Mice
•
6 years ago
OAuth 2.0 Security Reinforced
Torsten Lodderstedt
•
5 years ago
Security Training: #3 Threat Modelling - Practices and Tools
Yulian Slobodyan
•
10 years ago
Effective service and resource management with systemd
David Timothy Strauss
•
8 years ago
Red7 Software Application Security Threat Modeling
Robert Grupe, CSSLP CISSP PE PMP
•
6 years ago
Best Practices for IoT Security in the Cloud
Amazon Web Services
•
7 years ago
AWS re:Invent 2016: IoT Security: The New Frontiers (IOT302)
Amazon Web Services
•
7 years ago
Apprendre la cryptographie par l'attaque - Devoxx FR 2016
ThierryAbalea
•
8 years ago
Livre blanc biz hackathon-2017
MEDEF - Mouvement des Entreprises de France
•
6 years ago
Debugging Distributed Systems - Devoxx Belgium 2016 [Extended]
Donny Nadolny
•
7 years ago
Debugging Distributed Systems - Velocity Santa Clara 2016
Donny Nadolny
•
7 years ago
Breaking SSL using time synchronisation attacks
jselvi
•
8 years ago
IBM ADEPT
_hd
•
8 years ago
CBGTBT - Part 6 - Transactions 102
Blockstrap.com
•
8 years ago
CBGTBT - Part 5 - Blockchains 102
Blockstrap.com
•
8 years ago
State of Bitcoin and Blockchain 2016
CoinDesk
•
8 years ago
Authorization for Internet of Things using OAuth 2.0
Hannes Tschofenig
•
8 years ago
Delegation-based Authentication and Authorization for the IP-based IoT
Joon Young Park
•
8 years ago
You're a pretty fly for a WildFly
Emmanuel Hugonnet
•
9 years ago