Work

Demystifying .. Creative .. Inspiring ..

If you're looking for an independent to do
vulnerability assessments, security consulting and/or security curriculum development,
facilitation of workshops, research, design, or coding,

you are in the right place!

Demystification

If you don’t understand how hackers could get into your systems, you’re going to have a hard time securing them. Learning how to hack can help you implement the strongest possible security practices. Hacking forensics includes techniques for detecting and reverse engineering malware and advanced persistant threats, like Finfisher ..

Threat modelling

Threat modelling is a process by which potential threats can be identified, enumerated, and prioritised – from a hypothetical attacker's point of view. With a systematic analysis of the probable attacker's profile, the most likely attack vectors, and the assets most desired by an attacker, defenders can focus on what is most important to protect.

Security consulting

Each organisation is dealing with unique IT security threats, so this service can vary greatly, from determining the most effective way to protect computers, networks, software, data and information systems, to facilitating the definition, implementation and maintainance of security policies.

Implementation

Expert assistance when developing implementation plans and validating, migrating, and integrating new security policies, measures and technologies, including developing curricula for security training, and teaching workshops with engaging roleplay and exercises that bring the message home .. Everything we can creatively think of to make it so!

Ty Blei

House of the wolves

Ty

Ty Blei is the Breton word for “House of the Wolves”.

More ..

Zwaardlelie

Liorzh

Liorzh is the Breton word for “garden”. Each plant on the wiki has a place in the Viridiplantae clades.

More ..

There is never enough shelf space

Levraoueg

The Library didn’t only contain magical books, the ones which are chained to their shelves and are very dangerous. It also contained perfectly ordinary books, printed on commonplace paper in mundane ink. It would be a mistake to think that they weren’t also dangerous, just because reading them didn’t make fireworks go off in the sky. Reading them sometimes did the more dangeous trick of making fireworks go off in the privacy of the reader’s brain. Terry Pratchett

More ..

Paranoia Traitor's Manual

The traitor's manual

Game theory is the scientific study of strategically interdependent decision making. This is the Traitor's manual, a guide for people playing Yet Another Alpha Complex. May it be helpful in discovering the rules of the game and making effective counter-moves.

More ..

Rose making music

Math & Music

It tends to be that people are good at math and science or art and music, as if the two elements could not be placed together logically.

More ..

Confusing meine centre du yezh

Confusing meine centre du yezh

Il est absolument essentiel de faire parler ces langues locales.

More ..

Cornelius Castoriadis

Languages and linguistics: A collective dream. More or less by agreement, we all cast spells on ourselves and on others. It matters what we write and say and how we write and say it!

More ..

The problem isn't the problem

Mental causation

Ever since Descartes advanced the notion of a radical substance dualism, there has been an ongoing argument against the notion that an immaterial mind cannot interact with a material body.

More ..

About

Know-how

Research of/for new vulnerabilities through reviews, analysis, and participation in forums and groups.

Some Hack to learn and hacking forensics.

Training of system (security) effectiveness by using experiential learning methods (simulations, hands-on, causal loop diagrams, hack to learn and other forms of discovery oriented learning).

Knowledge

Commonly used attack vectors and vulnerabilities. And keeping current!

Network protocols: TCP/IP, SDH, SONET, Ethernet; Smartcard: ISO 7816, PC/SC, OCF.

Computer languages: Hex, assembly, Ada, C, C++, a bit of Lisp and Prolog; Scripting.

Mathematics related to IT: Numerical algebra, propositional and predicate logic, state machines, graph and probability theory, and game theory.

The real important stuff: Problem Solving Leadership, Changeshop, System Effectiveness Management, Satir systems - Organisational development, various linguistic awarenesses

Interpersonal skills

Organizing and facilitating group processes in organisations, like retrospectives, scenario planning, simulations, workshops and open space (planning/implementation) meetings.

Appreciative inquiry for social engineering, interviewing and reconnaissance.

Spoken languages: Dutch and English (excellent), German (good) and French (a tidbit).

Change agent for increased (security) system effectiveness.

Formal education

1994 Engineer Applied mathematics, PTH Rotterdam

1994 Pedagogy/Didactics diplom, PTH Rotterdam

1991 MSc Information Technology, combining computer science and biology, UvA Amsterdam

1985 Bachelor Biophysics, UvA Amsterdam

1980 VWO, Montessori Lyceum Amsterdam