Alexandre Blanc Experience or work background
- Copied from my LinkedIn profile, not to loose it
- Independent Strategic and Security (Cyber) Advisor – Consultant – President and OwnerIndependent Strategic and Security (Cyber) Advisor – Consultant – President and OwnerAlexandre Blanc Cyber · Permanent Full-timeAlexandre Blanc Cyber · Permanent Full-timeNov 2023 – Present · 8 mosNov 2023 to Present · 8 mosRemoteRemote
-
- I provide the analysis and thinking needed to move your technology projects forward in regards to cyber security.
I help you solve complex problems, understand and translate needs by connecting business, technology and security.
For a limited number of cyber security clients and thank to my LinkedIn Top Voice background, I manage LinkedIn pages and advise technology companies on natural growth strategies to support their business development.I provide the analysis and thinking needed to move your technology projects forward in regards to cyber security. I help you solve complex problems, understand and translate needs by connecting business, technology and security. For a limited number of cyber security clients and thank to my LinkedIn Top Voice background, I manage LinkedIn pages and advise technology companies on natural growth strategies to support their business development.
- I provide the analysis and thinking needed to move your technology projects forward in regards to cyber security.
-
- Skills: Linux · Network Security · Information Security · Privacy Protection · Cybersecurity · Cybersecurity Incident Response · encryption · cyber security awarenessSkills: Linux · Network Security · Information Security · Privacy Protection · Cybersecurity · Cybersecurity Incident Response · encryption · cyber security awareness
-
- LIGHTNING ROD, LLC logoCloud Exit EnthusiastCloud Exit EnthusiastLIGHTNING ROD, LLC · FreelanceLIGHTNING ROD, LLC · FreelanceFeb 2024 – Present · 5 mosFeb 2024 to Present · 5 mosremote · Remoteremote · Remote
-
- Working to help companies recoup cloud costs and reduce risks for certain critical workflows.Working to help companies recoup cloud costs and reduce risks for certain critical workflows.
-
- Skills: Cloud Computing · Microsoft Azure · Amazon Web Services (AWS) · Cybersecurity · Cybersecurity Incident ResponseSkills: Cloud Computing · Microsoft Azure · Amazon Web Services (AWS) · Cybersecurity · Cybersecurity Incident Response
-
- Strategic and Security Advisor at VARSStrategic and Security Advisor at VARSVARS Corporation · Permanent Full-timeVARS Corporation · Permanent Full-timeDec 2020 – Nov 2023 · 3 yrsDec 2020 to Nov 2023 · 3 yrsMontreal, Quebec, CanadaMontreal, Quebec, Canada
- helped me get this jobLinkedIn helped me get this job
-
- – Managed incident response for ransomware and cyber attack incidents, acting as lead person and coordinating response. Worked with luxury brands, cities, governments and industrial systems that got impacted.
– Supported foreclosure and collection department to bring needed data and digital proof for accounting experts, lawyers and justice (tribunal) preserving chain of custody of collected data (collaboration with law enforcement)
– Advised organizations on their digital transformations, cloud migration, risk management and security posture.
– Created and did lead the dark web investigation practice for 3 years (digital footprint analysis, attack surface analysis etc) including team management.
– Created the security posture health check practice for the vCISO office, an entry level security posture analysis for SMBs with low security maturity posture..
– Speaker at conferences for global and specialized market (insurance market, risk managment, government entities and private sector)
– Delivered press conferences and articles covering best practices and incident management
– Advised customers for complex cases, including cyber risk during M&A process, and supported sales department
– Managed corporate LinkedIn pages, content and publications- Managed incident response for ransomware and cyber attack incidents, acting as lead person and coordinating response. Worked with luxury brands, cities, governments and industrial systems that got impacted. – Supported foreclosure and collection department to bring needed data and digital proof for accounting experts, lawyers and justice (tribunal) preserving chain of custody of collected data (collaboration with law enforcement) – Advised organizations on their digital transformations, cloud migration, risk management and security posture. – Created and did lead the dark web investigation practice for 3 years (digital footprint analysis, attack surface analysis etc) including team management. – Created the security posture health check practice for the vCISO office, an entry level security posture analysis for SMBs with low security maturity posture.. – Speaker at conferences for global and specialized market (insurance market, risk managment, government entities and private sector) – Delivered press conferences and articles covering best practices and incident management – Advised customers for complex cases, including cyber risk during M&A process, and supported sales department – Managed corporate LinkedIn pages, content and publications
- – Managed incident response for ransomware and cyber attack incidents, acting as lead person and coordinating response. Worked with luxury brands, cities, governments and industrial systems that got impacted.
-
- Skills: Linux · Hiring · Privacy Protection · Cybersecurity · Cybersecurity Incident Response · encryption · cyber security awarenessSkills: Linux · Hiring · Privacy Protection · Cybersecurity · Cybersecurity Incident Response · encryption · cyber security awareness
- Strategic and Security Advisor at VARSStrategic and Security Advisor at VARSRaymond Chabot Grant Thornton · Permanent Full-timeRaymond Chabot Grant Thornton · Permanent Full-timeDec 2020 – Nov 2023 · 3 yrsDec 2020 to Nov 2023 · 3 yrsMontreal, Quebec, CanadaMontreal, Quebec, Canada
- helped me get this jobLinkedIn helped me get this job
-
- – Managed incident response for ransomware and cyber attack incidents, acting as lead person and coordinating response. Worked with luxury brands, cities, governments and industrial systems that got impacted.
– Supported foreclosure and collection department to bring needed data and digital proof for accounting experts, lawyers and justice (tribunal) preserving chain of custody of collected data (collaboration with law enforcement)
– Advised organizations on their digital transformations, cloud migration, risk management and security posture.
– Created and did lead the dark web investigation practice for 3 years (digital footprint analysis, attack surface analysis etc) including team management.
– Created the security posture health check practice for the vCISO office, an entry level security posture analysis for SMBs with low security maturity posture..
– Speaker at conferences for global and specialized market (insurance market, risk managment, government entities and private sector)
– Delivered press conferences and articles covering best practices and incident management
– Advised customers for complex cases, including cyber risk during M&A process, and supported sales department- Managed incident response for ransomware and cyber attack incidents, acting as lead person and coordinating response. Worked with luxury brands, cities, governments and industrial systems that got impacted. – Supported foreclosure and collection department to bring needed data and digital proof for accounting experts, lawyers and justice (tribunal) preserving chain of custody of collected data (collaboration with law enforcement) – Advised organizations on their digital transformations, cloud migration, risk management and security posture. – Created and did lead the dark web investigation practice for 3 years (digital footprint analysis, attack surface analysis etc) including team management. – Created the security posture health check practice for the vCISO office, an entry level security posture analysis for SMBs with low security maturity posture.. – Speaker at conferences for global and specialized market (insurance market, risk managment, government entities and private sector) – Delivered press conferences and articles covering best practices and incident management – Advised customers for complex cases, including cyber risk during M&A process, and supported sales department
- – Managed incident response for ransomware and cyber attack incidents, acting as lead person and coordinating response. Worked with luxury brands, cities, governments and industrial systems that got impacted.
-
- Skills: Linux · Hiring · Privacy Protection · Cybersecurity · Cybersecurity Incident Response · encryption · cyber security awarenessSkills: Linux · Hiring · Privacy Protection · Cybersecurity · Cybersecurity Incident Response · encryption · cyber security awareness
- Director of SecurityDirector of Securityadaware (an Avanquest company)adaware (an Avanquest company)Nov 2019 – Dec 2020 · 1 yr 2 mosNov 2019 to Dec 2020 · 1 yr 2 mosMontreal, Canada AreaMontreal, Canada Area
-
- My role is to do my best to enhance the security posture and protect the organization, developing a security culture.
If you see something say something. I’ve been lucky having support from cyber security community on many occasions, and I think we should be reachable on issues spotted by others. So, all my posts on this platform are my own, but I’m still reachable for security issues spotted on our things.My role is to do my best to enhance the security posture and protect the organization, developing a security culture. If you see something say something. I’ve been lucky having support from cyber security community on many occasions, and I think we should be reachable on issues spotted by others. So, all my posts on this platform are my own, but I’m still reachable for security issues spotted on our things.
- My role is to do my best to enhance the security posture and protect the organization, developing a security culture.
-
- Skills: Linux · Hiring · Privacy Protection · Cybersecurity · Cybersecurity Incident Response · encryption · cyber security awarenessSkills: Linux · Hiring · Privacy Protection · Cybersecurity · Cybersecurity Incident Response · encryption · cyber security awareness
-
- Director, information technologiesDirector, information technologiesMaya HTTMaya HTTMay 2011 – Oct 2019 · 8 yrs 6 mosMay 2011 to Oct 2019 · 8 yrs 6 mosMontreal, Canada AreaMontreal, Canada Area
-
- Opinion and convictions, shared through my linkedin profile, posts, articles and likes are only my own, not my employer’s ones/
– Director of IT
– Management of a team of 10, including sysadmins, network administrators, security / vulnerability assessment and developers
– Managing an IT infrastructure made of > 600 physical machines, 1500 IPs (VMs, active equipments), public /24
– Managing physical security (alarm systems, video surveillance, access management)
– consulting on different projects (infrastructures, development)
– participating in consulting work on IT related side, in order to validate technology choices and viability
– managing emergency recovery plans and IT services continuity
– backup and recovery plans and strategy
– managing IT conformity against complex partial or full constraints, ITAR requirement, NIST etc.
– IT related purchase and supply chain management, software and hardware life cycle management
– validation of highly restricted technology projects (industrial environment etc)
– licenses and conformity management
– IT providers contract management (hardware, softwares, services)
– Management of telecommunications (IPBX, subscriptions, scalability, resilience and redundancy, fibers…)
– Crisis management (market shortage, destructive event recovery, assessment of damage and recovery time)
– vulnerabilities management
– Resource planning
– Market monitoring
– Creation of innovative projects on infrastructure management
– Creation of automation tools empowering employees autonomy (self services tools)Opinion and convictions, shared through my linkedin profile, posts, articles and likes are only my own, not my employer’s ones/ – Director of IT – Management of a team of 10, including sysadmins, network administrators, security / vulnerability assessment and developers – Managing an IT infrastructure made of > 600 physical machines, 1500 IPs (VMs, active equipments), public /24 – Managing physical security (alarm systems, video surveillance, access management) – consulting on different projects (infrastructures, development) – participating in consulting work on IT related side, in order to validate technology choices and viability – managing emergency recovery plans and IT services continuity – backup and recovery plans and strategy – managing IT conformity against complex partial or full constraints, ITAR requirement, NIST etc. – IT related purchase and supply chain management, software and hardware life cycle management – validation of highly restricted technology projects (industrial environment etc) – licenses and conformity management – IT providers contract management (hardware, softwares, services) – Management of telecommunications (IPBX, subscriptions, scalability, resilience and redundancy, fibers…) – Crisis management (market shortage, destructive event recovery, assessment of damage and recovery time) – vulnerabilities management – Resource planning – Market monitoring – Creation of innovative projects on infrastructure management – Creation of automation tools empowering employees autonomy (self services tools)
- Opinion and convictions, shared through my linkedin profile, posts, articles and likes are only my own, not my employer’s ones/
-
- Skills: Linux · Hiring · Privacy Protection · Cybersecurity · Cybersecurity Incident Response · encryption · cyber security awarenessSkills: Linux · Hiring · Privacy Protection · Cybersecurity · Cybersecurity Incident Response · encryption · cyber security awareness
-
- IT manager – Network and system administratorIT manager – Network and system administratorArchivtech SASArchivtech SASJun 2008 – May 2011 · 3 yrsJun 2008 to May 2011 · 3 yrs
-
- My main role is IT Manager, but in fact, my job concerns a more large range of technical skills, from productions servers management, network administration, and specific tools developments for backup services the company provide.
Mainly writing scripts (bash / vbs / php …) and simple web interfaces to manage all the processes we needs.
As the job needs it, i also help customers and partners, in different situations, giving advices on network architecture and data security, on both gnu/linux and windows architecture.
As an IT manager, i can fix users problems to main security consideration and strategy, due to my wide experience in computer skills.
I also manage the company Web services (web, MTA, dns etc).My main role is IT Manager, but in fact, my job concerns a more large range of technical skills, from productions servers management, network administration, and specific tools developments for backup services the company provide. Mainly writing scripts (bash / vbs / php …) and simple web interfaces to manage all the processes we needs. As the job needs it, i also help customers and partners, in different situations, giving advices on network architecture and data security, on both gnu/linux and windows architecture. As an IT manager, i can fix users problems to main security consideration and strategy, due to my wide experience in computer skills. I also manage the company Web services (web, MTA, dns etc).
- My main role is IT Manager, but in fact, my job concerns a more large range of technical skills, from productions servers management, network administration, and specific tools developments for backup services the company provide.
-
- Skills: Linux · Hiring · Cybersecurity · encryptionSkills: Linux · Hiring · Cybersecurity · encryption
-
- Radio Encryption software developmentRadio Encryption software developmentsolarcomsolarcomJul 2007 – Jan 2008 · 7 mosJul 2007 to Jan 2008 · 7 mos
-
- Designing and building specific software for radio encrypted data communication systems, using radio modems (on HF / VHF) for military purposes.Designing and building specific software for radio encrypted data communication systems, using radio modems (on HF / VHF) for military purposes.
-
- Skills: Linux · Cybersecurity · encryptionSkills: Linux · Cybersecurity · encryption
-
- IT manager – Network and sysadmin – developer – computer system analystIT manager – Network and sysadmin – developer – computer system analystCompaq – rightvision – dadiland – air – ademe – creasyweb…Compaq – rightvision – dadiland – air – ademe – creasyweb…Sep 1999 – Jun 2007 · 7 yrs 10 mosSep 1999 to Jun 2007 · 7 yrs 10 mos
-
- In order to summarize the past experiences, i have been technician at Compaq reseller (Accredited Compaq Technician), IT Manager at Rightvision (manufacturing internet appliances Linux/Windows), Webmaster-developer on an internet game website (managing asp/sql server), Corporate Manager in my internet webservices company (providing web hosting and developments) , Computer analyst and sysadmin / netadmin at "Ademe" (French State Department of Ecology), php/mysql developer at creasyweb… worked in lot of places in France and some missions abroad.In order to summarize the past experiences, i have been technician at Compaq reseller (Accredited Compaq Technician), IT Manager at Rightvision (manufacturing internet appliances Linux/Windows), Webmaster-developer on an internet game website (managing asp/sql server), Corporate Manager in my internet webservices company (providing web hosting and developments) , Computer analyst and sysadmin / netadmin at "Ademe" (French State Department of Ecology), php/mysql developer at creasyweb… worked in lot of places in France and some missions abroad.
-
- Skills: Linux · Cybersecurity · encryption
-
Links
Calendrier
L | M | M | J | V | S | D |
---|---|---|---|---|---|---|
1 | ||||||
2 | 3 | 4 | 5 | 6 | 7 | 8 |
9 | 10 | 11 | 12 | 13 | 14 | 15 |
16 | 17 | 18 | 19 | 20 | 21 | 22 |
23 | 24 | 25 | 26 | 27 | 28 | 29 |
30 | 31 |
Recherche
Derniers articles
Tresronours Twitter
Keywords cloud topic
Membre de la FSF
Liens qui vont bien
Mots clés vrac – keyword cloud
analyse
apache
bash
blog
cache
centos
cmsms
compilation
configuration
console
drbd
extension
firefox
firewall
GNU
gratuit
grub
Grub2
htaccess
installation
ip
iptables
ipv4
ligne de commande
linux
logiciel
logiciel libre
module
mod_pagespeed
opensource
plugin
recherche
redhat
referencement
replication
Reseau
script
serveur
tutoriel
ubuntu
update
url rewriting
varnish cache
wordpress
xubuntu
License du contenu – CC By NC SA
Archives
- Resumed posting and expanding on X
- Linkedin Access to your account has been restricted – Final debrief and resilience plan
- I’m thankful for the support I get in rough time
- Cyber security news of the day – 2024 May 31
- Alexandre Blanc Cyber Kicked out from Linkedin
- You’ll most likely find me on LinkedIn
- The Russian roulette landing page !
- RTSP, Debian, VLC, not playing, IP Camera
- 5G network hosted in the cloud, no internet, no phone ! So smart ! And I ended on TV, This week in cyber
- They lock the door for privacy… but they keep a copy of the key, and couple of backdoors
- Worst is yet to come, but they all warned you
- Migrating an old WordPress and handling character set, UTF8, latin1, latin1_swedish_ci
- From a broken TLS CA, to Facebook, to FIN12 hit and run
- Yes we can fix this mess, but do we want to ? That’s another story
- Criminals are still dominating the game, why are we doing so wrong, and what can we learn in this tech ocean ?
- Riding cloud can be tricky, don’t fall from it, in the weekly cyber !
- The threat landscape is very dynamic – Cyber news this week
- Cybersecurity is not obvious even for this newsletter !
- Install Slack desktop app on Kali rolling fixing libappindicator3-1 missing dependency
- How to delete all resources in azure to avoid charges after trial on your forced credit card registration
- Proxmox – ZFS – Dead drive on active VM, recover from replicated disk
- Restrict access to proxmox web admin interface
- Migrate your ESXI VMs to proxmox ZFS
- Install your VPN server with pi-hole on OVH VPS in 30 min
- Using raspberry pi 3 as wifi bridge and repeater and firewall
- Raspberry 3 – create a wifi repeater with USB wifi dongle
- raspberry 3 – routeur pare feu point d’acces wifi avec filtrage pub et tracking – router firewall access point with ads and tracking filtering
- Dell XPS 13 touchpad – corriger la sensibilité
- Utiliser Zazeen set top box depuis une connexion videotron
- Fermeture de mon compte facebook – la dernière goutte
- Choisir un kernel par defaut au demarrage de Centos 7.2 – configuration grub2
- Openvpn access server 2.0.25 et android
- Régler la luminosité du laptop par ligne de commande
- chromium outlook web app version complete sous linux
- Nexus 7 2012 – android 5 lollipop solution au probleme de lenteur
- HDD led sur Xubuntu – xfce
- xubuntu 14.04 verrouiller ecran de veille et desactiver mise en veille a la fermeture de l’ecran
- Authentification avec Radmin en utilisant Wine sur Gentoo
- Patcher bash sur une distribution plus supportee comme fedora 11
- Zimbra desktop sous xubuntu 14.04 64bit – fix
- xubuntu 12.10 probleme de son avec VLC – pulse audio – alsa – toshiba L855D – solution
- Evolution sous xubuntu 12.10 – bug affichage a la configuration – solution temporaire
- Booster son acces internet en changeant de DNS pour opendns
- Serveur DLNA sous ubuntu – minidlna
- sshfs sous windows – dokan sshfs
- xubuntu 11.10 Installer le plugin java pour firefox
- Installer Google Earth sur Xubuntu 11.10
- Installer nagios sur Fedora 11 depuis les sources
- Configurer varnish-cache avec des virtualhosts, apache, fedora, redhat, centos
- Installer Varnish depuis les sources sur Fedora 11