Simon Petitjean

Simon Petitjean

Luxembourg
4 k abonnés de 500 relations

Services

Activité

S’inscrire pour voir toute l’activité

Expérience

  • Graphique PwC Luxembourg

    PwC Luxembourg

    Luxembourg

  • -

    Luxembourg

  • -

    Luxembourg

  • -

    Luxembourg

  • -

    Luxembourg

  • -

    Luxembourg

  • -

    Luxembourg

  • -

    Luxembourg

  • -

    Cattenom, France

  • -

    Leicester, Royaume-Uni

Formation

  • Graphique TELECOM Nancy

    TELECOM Nancy

    -

    Activités et associations :Gestion du Club Musique (2010-2012)

    Spécialisation en Systèmes d'Information d'Entreprise

  • -

    Activités et associations :Président du Club Informatique (2009-2010)

  • -

Licences et certifications

Expériences de bénévolat

  • Graphique Voices of Nuclear

    Member

    Voices of Nuclear

    - aujourd’hui 3 ans

    Environnement

    The Voices of Nuclear is an indepent citizen association of volunteers, with no economic, institutional, union or political ties.
    It was created in March 2018 with the aim of contributing to:
    - the recognition of nuclear energy as essential to the low-carbon energy transition,
    - to highlighting the contribution of nuclear energy to the human and environmental challenges facing our societies, individually and collectively,
    - to the reestablishment of the facts concerning this…

    The Voices of Nuclear is an indepent citizen association of volunteers, with no economic, institutional, union or political ties.
    It was created in March 2018 with the aim of contributing to:
    - the recognition of nuclear energy as essential to the low-carbon energy transition,
    - to highlighting the contribution of nuclear energy to the human and environmental challenges facing our societies, individually and collectively,
    - to the reestablishment of the facts concerning this scientific and industrial sector.

  • Graphique PwC Luxembourg

    First Aid Helper

    PwC Luxembourg

    - aujourd’hui 1 an 1 mois

    Santé

    First Aid worker at PwC Luxembourg, trained in all relevant first aid techniques, such as cardio-pulmonary resuscitation, vascular compression, etc.

  • Graphique PwC Luxembourg

    Floor warden - Emergency first responder

    PwC Luxembourg

    - aujourd’hui 7 mois

    Santé

    Organize emergency evacuation procedures.
    Ensure the safety of personnel during evacuations.
    Act as the first responder in case of fire outbreaks, providing initial assistance while awaiting professional help.
    Secure premises and individuals during emergency situations.

Publications

  • Hacking EV Charging Points, for fun... and fixing the firmware

    Hack.lu

    This lightning talk will develop the context and reasons that led to the discovery and disclosure of vulnerabilities in an Electric Vehicle Smart Charging Point (CVE-2024-5313 and CVE-2024-8070).
    We will discover a specific product, how it works, how it is supposed to be provisioned and some mistakes that were made that enabled the speaker to elevate his privileges.

    See publication
  • NIS2, un bouclier cyber pour le secteur public

    Lëtzebuerger Gemengen

    Considérées par le législateur européen comme critiques ou hautement critiques par les services qu’elles rendent, les entités publiques devront prochainement se conformer à la directive NIS2 sur la sécurité des réseaux et des systèmes d’information. De plus en plus régulièrement victimes d’actions malveillantes, elles traitent pourtant la cybersécurité en parent pauvre de leur transformation digitale. Maxime Pallez et Simon Petitjean, Cybersecurity Directors chez PwC Luxembourg, décortiquent la…

    Considérées par le législateur européen comme critiques ou hautement critiques par les services qu’elles rendent, les entités publiques devront prochainement se conformer à la directive NIS2 sur la sécurité des réseaux et des systèmes d’information. De plus en plus régulièrement victimes d’actions malveillantes, elles traitent pourtant la cybersécurité en parent pauvre de leur transformation digitale. Maxime Pallez et Simon Petitjean, Cybersecurity Directors chez PwC Luxembourg, décortiquent la situation et leur livrent quelques conseils pour renforcer leurs défenses.

    Other authors
    See publication
  • CVE-2024-8070 - Cleartext Storage of Sensitive Information

    Schneider Electric

    Cleartext Storage of Sensitive Information vulnerability exists that exposes test credentials in the firmware binary.
    Impacts EVlink Home Smart (All versions prior to 2.0.6.0.0) and Schneider Charge (All versions prior to 1.13.4).

    CVSS v3.1 Base Score 8.5 | High

    See publication
  • CVE-2024-5313 - Exposure of a non-disabled SSH interface to the wrong sphere

    Schneider Electric

    Vulnerability implied by the existence of a non-disabled SSH interface in its EVlink Home Smart charging station (EV charging stations for the residential market).

    Impacts EVlink Home Smart (v2.0.4.1.2_131, v2.0.3.8.2_128)

    Risk to expose an SSH network interface on the local area network of the homeowner, which could result in
    increasing the exposure to potential network scanning or reconnaissance activities from malicious users.

    CVSS v3.1 Base Score 6.5 | Medium

    See publication
  • Decoding The AI Paradox

    Silicon Luxembourg

    As the 2024 PwC Cybersecurity & Privacy Day approaches, the focus on the AI paradox takes center stage. In an exclusive interview, Simon Petitjean, Cybersecurity Director at PwC Luxembourg, delves into the theme of the event and unravels the intricate balance between innovation and security in the realm of cybersecurity.

    See publication
  • Data Governance in action: the Chief Data Officer, the Chief Information Security Officer and the Perks of collaboration

    PwC Luxembourg

    Chief Data Officers (CDO) and Chief Information Security Officers (CISO), it's time to join forces! Discover the value of the collaboration of these two roles for your business and why you should have a robust data governance framework.

    Other authors
    See publication
  • European Cybersecurity Certification Scheme for Cloud Services (EUCS): How are companies and their Cloud Service Providers preparing for it?

    Silicon Luxembourg

    Launched in 2019 by the European Commission, the European Cybersecurity Certification Scheme (EUCS) for Cloud Services will apply to all cloud services: IaaS, PaaS, SaaS, XaaS. Scheduled for 2024, the scheme still raises uncertainties and questions. Will organisations be able to comply in time?

    For Simon Petitjean (Cybersecurity Director, Offensive Security & Red Team Leader) and Xavier Roch Lhotellier (Consulting Director & Customer Transformation Leader), awareness of the importance of…

    Launched in 2019 by the European Commission, the European Cybersecurity Certification Scheme (EUCS) for Cloud Services will apply to all cloud services: IaaS, PaaS, SaaS, XaaS. Scheduled for 2024, the scheme still raises uncertainties and questions. Will organisations be able to comply in time?

    For Simon Petitjean (Cybersecurity Director, Offensive Security & Red Team Leader) and Xavier Roch Lhotellier (Consulting Director & Customer Transformation Leader), awareness of the importance of the sovereign cloud is gradually emerging among enterprises, but there is still a lot of work to be done to raise awareness.

    “This would accelerate the momentum on this sensitive issue and offer a new horizon, that of a sovereign digital ecosystem, to European hosting companies in the face of the strong domination of American hyperscalers,” they explain.

    Other authors
    See publication
  • TechTalk Podcasts - Season 7 Episode 2: The One on Cloud Security

    PwC Luxembourg

    In this episode, we talk about cloud security with Quentin Bechoux, Cloud Transformation Manager, and Simon Petitjean, Cybersecurity Director, at PwC Luxembourg.

    More precisely, we dive into the European Cybersecurity Certification Scheme for Cloud Services (EUCS), how to manage the security aspect of the cloud adoption journey, and how to ensure the security of data in the public cloud.

    Other authors
    See publication
  • TechTalk Podcasts - Season 6 Episode 1: The One on Critical Infrastructure, an Introduction

    PwC Luxembourg

    We begin a new season of TechTalk with a series of episodes about Critical Infrastructure protection —a hot topic that should be on the minds of each one of us.
    The regrettable events we are living through, particularly the war in Ukraine, as well as recent high-profile cyber-attacks on the energy industry, are putting critical infrastructure security in the spotlight.

    To give us the details about this timely matter, we invited Simon Petitjean, Cybersecurity Director and Offensive…

    We begin a new season of TechTalk with a series of episodes about Critical Infrastructure protection —a hot topic that should be on the minds of each one of us.
    The regrettable events we are living through, particularly the war in Ukraine, as well as recent high-profile cyber-attacks on the energy industry, are putting critical infrastructure security in the spotlight.

    To give us the details about this timely matter, we invited Simon Petitjean, Cybersecurity Director and Offensive Security & Red Team Leader, and Maxime Pallez, Cybersecurity Senior Manager, who focuses on security governance at PwC Luxembourg.

    Other authors
    See publication
  • DORA Event Series - Session 5 - How will DORA facilitate information and intelligence sharing?

    PwC Malta

    How will DORA facilitate information and intelligence sharing?

    This session is intended for Executive Management concerned about their organisation’s ICT and cyber risk exposure, and individuals working in Risk, Compliance, Internal Audit, Information Security, Operations, as well as other professionals responsible for responding to and managing incidents or who form part of the ICT and/or cyber security function.

    Other authors
    See publication
  • TechTalk Podcasts - Season 5 Episode 3: The One on Ethical Hacking

    PwC Luxembourg

    Very often, we hear on the news about a cyber-attack, where malicious hackers worked to disable a security system to either take it down or to steal information, usually to get a ransom.

    But hacking isn't only about illegal activities. In this episode of TechTalk, Luis and Carla talk with Simon Petitjean, Offensive Security & Red Team Leader at PwC Luxembourg, about "the good type of hacking" - the ethical one. And who’s better placed to tell us about it than an ethical hacker himself?

    Other authors
    See publication
  • Security of Virtual Desktop Infrastructures: from great concepts to bad surprises

    Hack.lu

    Virtual Desktop Infrastructure hosts users’ desktop environments on remote servers which are accessed over a network using a remote display protocol from specific client software or hardware such as Thin-client or Zero-client. We encountered such solutions during pentests in high-security networks. Moreover, we had the opportunity to study one specific commercial implementation: we identified and exploited several flaws that allow taking over the whole infrastructure. We’ve had some fun hacking…

    Virtual Desktop Infrastructure hosts users’ desktop environments on remote servers which are accessed over a network using a remote display protocol from specific client software or hardware such as Thin-client or Zero-client. We encountered such solutions during pentests in high-security networks. Moreover, we had the opportunity to study one specific commercial implementation: we identified and exploited several flaws that allow taking over the whole infrastructure. We’ve had some fun hacking this technology so we would like to share our experience by explaining our findings and giving tips to mitigate the critical vulnerabilities we found.

    Other authors
    See publication
  • Exploiting a vulnerability to quicken SAP discovery phase

    Hack.lu

    After few Google queries, it’s not a big deal to find a lot of conferences or talks dealing with SAP security. In the same way, finding tools to exploit the known vulnerabilities has become easier. My approach is different: as a professional security consultant, the first questions you should ask yourself when you arrive at a client is:
    • Are there some SAP servers somewhere? If yes, where?
    • Can we get their exact configuration? How to gather information?
    • What vulnerability can we…

    After few Google queries, it’s not a big deal to find a lot of conferences or talks dealing with SAP security. In the same way, finding tools to exploit the known vulnerabilities has become easier. My approach is different: as a professional security consultant, the first questions you should ask yourself when you arrive at a client is:
    • Are there some SAP servers somewhere? If yes, where?
    • Can we get their exact configuration? How to gather information?
    • What vulnerability can we exploit to do this fast and efficiently?
    These questions must be answered correctly, quickly and with the less efforts possible. I proposed my own approach and gave some examples with a “handmade” tiny but efficient tool.
    A vulnerability in one of SAP’s components was explained and demonstrated.

    See publication

Cours

  • AWS Certified Cloud Practitioner 2020

    CLF-C01

  • ITIL v3 Foundation

    ITILF

  • Microsoft Azure Fundamentals 2020

    AZ-900

  • Microsoft Security, Compliance, and Identity Fundamentals

    SC-900

  • Nuix 5 (Introduction)

    -

  • PRINCE2® Foundation

    PR2F

  • SANS: Advanced Incident Response, Threat Hunting, and Digital Forensics

    FOR508

  • SANS: Advanced Penetration Testing, Exploit Writing, and Ethical Hacking

    SEC660

  • SANS: Mobile Device Security and Ethical Hacking

    SEC575

  • SANS: Network Penetration Testing and Ethical Hacking

    SEC560

  • SECO-Institute - Associate SOC Analyst

    -

  • SECO-Institute - Dark Web Foundation

    -

  • SECO-Institute - Threat Analyst

    -

  • Securing and Auditing Virtualized Environments

    MIS-ASN304

  • SpecterOps - Adversary Tactics: Red Team Operations

    ATRTO

  • Training of Pilots of civil unmanned aircraft used for recreational purposes

    DGAC

  • kCura Relativity Administrator Training

    -

  • kCura Relativity Infrastructure Training

    -

Prix et distinctions

  • PwC EMEA / SANS Institute CTF: Capture The Flag Victor (ex æquo)

    PwC France / SANS Institute

    Winning solo player of PwC EMEA's CTF organized by PwC France and the SANS Institute - ex æquo "1st position" with Antoine Goichot (PwC Luxembourg) and PwC Norway Red Team

  • SpecterOps: Adversary Tactics: Red Team Operations Capture the Flag Victor

    SpecterOps

    Winning team of the SpecterOps Adversary Tactics: Red Team Operations' CTF

  • SANS: NetWars Capture The Flag Victor

    SANS Institute

    3rd solo player of the SANS Amsterdam NetWars CTF

  • SEC575: Capture The Flag Victor

    SANS Institute

    Winning team of the SEC575's CTF

  • SEC560: Capture The Flag Victor

    SANS Institute

    Winning team of the SEC560's CTF

Résultats d’examens

  • Diplôme d'Ingénieur TELECOM Nancy

    Résultat : Ingénieur Diplômé

    Enseignement de spécialité : Systèmes d'Information d'Entreprises

  • Test of English for International Communication (TOEIC)

    Résultat : 815

    Niveau "Opérationnel supérieur".

  • Baccalauréat Scientifique

    Résultat : Mention Très Bien

    Enseignement de spécialité : Physique-Chimie.

Langues

  • French

    Bilingue ou langue natale

  • English

    Capacité professionnelle complète

  • German

    Compétence professionnelle limitée

Recommandations reçues

10 personnes ont recommandé Simon

Inscrivez-vous pour y accéder

Plus d’activités de Simon

Voir le profil complet de Simon

  • Découvrir vos relations en commun
  • Être mis en relation
  • Contacter Simon directement
Devenir membre pour voir le profil complet

Autres profils similaires

Autres personnes nommées Simon Petitjean

Ajoutez de nouvelles compétences en suivant ces cours