PoRaC 3, an Erasmus Intensive Programme in cooperation with 5 other European institutes, to talk about different methods for localisation using radio communication.
VTK, Summer School on Information Security and Protection 2011
In*form (school magazine)
Security matters for all.
Securing your business!
When you have a problem, we’re there to solve it!
2008, 2009, 2010, 2011 worked at the general servicedesk.
2006: Production steel plates
2007: Production isolated walls
Repairing tft monitors from Sony.
Helping in the warehouse
Security assessments at multiple environments, optimizing security settings in Active Directory, remediation of shared account usage, bad password policy, unknown service accounts, reducing amount of privileged accounts and removal of legacy protocols. Using Security Compliance Manager to verify baseline.
General operations of Active Directory at multiple global organizations. Management, optimization and continuity of service.
Multiple PKI implementations based on ADCS at multiple organizations. Ranging from single CA set-up's at SMB's to multi-tier architectures leveraging HSM's in global organizations. Multiple clean-up's and optimalization projects.
Multiple PoC implementations at different organizations.
Involvement in set-up and configuration of Azure environments and Azure services in conjunction with O365.
Since Windows 7, the usage of PowerShell has increased drastically. Ranging from small automation scripts, to small WinForm GUI applications to reporting, auditing, conversion or even larger applications. Also some projects and Proof of concept code in .net/c#/asp.net, php, and others. C++ from a previous life. Sometimes having nightmares about Java...
Various ADFS set-up and configuration in multiple architectures
Multiple Splunk set-up's at customers
Different Security Application PoC's at different customers, including Varonis, RightsWATCH, Cynet, Sentinel One, Secret Server, Symantec Data Center Security
Operating System and Application hardening: Windows Client/Server, IIS, SQL and Hyper-V security optimization projects. Implementation and configuration of other Microsoft security tools such as BitLocker (MBAM), AppLocker and EMET.
New technology, learning new possibilities in the computer world, gaming, reading, programming for fun, photography, exploring new things on the internet, science, …