Personal Information
Organization / Workplace
Grenoble Area, France France
Occupation
Security Architect at Schneider Electric
Industry
Technology / Software / Internet
About
I am willing to be involved in team work doing innovative projects.
I would like to progressively move away from the keyboard and spend more time with clients and stakeholders.
I used to work on every parts of a web application, from production and hosting to the database schema definition to the client side Javascript, currently focusing on SOA and security.
I have been in various projects, different in size and procedures.
I like the Agile / DevOps movement and would like to have the opportunity to put my ideas in practice.
My current focus is on Security where a lot of work has to be done.
Likes
(34)Frans Rosén Keynote at BSides Ahmedabad
Security BSides Ahmedabad
•
4 years ago
Namespaces for Local Networks
Men and Mice
•
6 years ago
OAuth 2.0 Security Reinforced
Torsten Lodderstedt
•
4 years ago
Security Training: #3 Threat Modelling - Practices and Tools
Yulian Slobodyan
•
10 years ago
Effective service and resource management with systemd
David Timothy Strauss
•
8 years ago
Red7 Software Application Security Threat Modeling
Robert Grupe, CSSLP CISSP PE PMP
•
6 years ago
Best Practices for IoT Security in the Cloud
Amazon Web Services
•
7 years ago
AWS re:Invent 2016: IoT Security: The New Frontiers (IOT302)
Amazon Web Services
•
7 years ago
Apprendre la cryptographie par l'attaque - Devoxx FR 2016
ThierryAbalea
•
8 years ago
Livre blanc biz hackathon-2017
MEDEF - Mouvement des Entreprises de France
•
6 years ago
Debugging Distributed Systems - Devoxx Belgium 2016 [Extended]
Donny Nadolny
•
7 years ago
Debugging Distributed Systems - Velocity Santa Clara 2016
Donny Nadolny
•
7 years ago
Breaking SSL using time synchronisation attacks
jselvi
•
8 years ago
IBM ADEPT
_hd
•
8 years ago
CBGTBT - Part 6 - Transactions 102
Blockstrap.com
•
8 years ago
CBGTBT - Part 5 - Blockchains 102
Blockstrap.com
•
8 years ago
State of Bitcoin and Blockchain 2016
CoinDesk
•
8 years ago
Authorization for Internet of Things using OAuth 2.0
Hannes Tschofenig
•
8 years ago
Delegation-based Authentication and Authorization for the IP-based IoT
Joon Young Park
•
8 years ago
You're a pretty fly for a WildFly
Emmanuel Hugonnet
•
9 years ago
Design patternsforiot
Michael Koster
•
9 years ago
CEE Log Integrity and the "Counterpane Paper"
Rainer Gerhards
•
10 years ago
ARM CoAP Tutorial
zdshelby
•
10 years ago
#Code: The Programmed Revolution
Fabernovel
•
9 years ago
Faster Secure Software Development with Continuous Deployment - PH Days 2013
Nick Galbreath
•
10 years ago
REST APIs for the Internet of Things
Michael Koster
•
10 years ago
A complete Open Source cloud: Storage, Virt, IaaS, PaaS
Dave Neary
•
10 years ago
Model-driven Extraction and Analysis of Network Security Policies (at MoDELS'13)
Jordi Cabot
•
10 years ago
Software Testing without Requirements: Survival Guide
Oleksandr Lutsaievskyi
•
10 years ago
Networking in OpenStack for non-networking people: Neutron, Open vSwitch and friends
Dave Neary
•
10 years ago
Personal Information
Organization / Workplace
Grenoble Area, France France
Occupation
Security Architect at Schneider Electric
Industry
Technology / Software / Internet
About
I am willing to be involved in team work doing innovative projects.
I would like to progressively move away from the keyboard and spend more time with clients and stakeholders.
I used to work on every parts of a web application, from production and hosting to the database schema definition to the client side Javascript, currently focusing on SOA and security.
I have been in various projects, different in size and procedures.
I like the Agile / DevOps movement and would like to have the opportunity to put my ideas in practice.
My current focus is on Security where a lot of work has to be done.