Stewe Bulach
Stewe Bulach
Information Security Engineer

Cybersecurity playlist :
Information Security Engineer Stewe Bulach

December 13, 2024

IAM - Quand tu allais on revenait

▶️ Bio your way, with a dash of cybersecurity.

A fighter at heart since childhood, I’ve spent my life learning to lose so that I can better appreciate my victories.

Today, as an Information Security Engineer, I coordinate both operational and governance aspects, but above all I remain passionate about technology and discovery.

 

▶️ What makes you want to get involved in cybersecurity every day?

I only thrive in adversity, and Cyber offers me a permanent intellectual war that means I can’t rest on my laurels, so I have to learn and, above all, improve every day.

Protecting our data and our digital assets has become my mission.

 

▶️ Which song have you chosen, with a direct or subtle link to cybersecurity?

‘Quand tu allais on revenait’ – IAM.

This band thrilled me throughout my teenage years and still does. This song, but wow.

It represents the humility you have to have when faced with someone better than you.

Especially in Cyber because every time you think you’re good, there’s always someone who’ll find a vulnerability you hadn’t foreseen, hence the title of the song.

 

▶️ Extract that brings the song and cybersecurity closer together.

‘Leur voix s’élèvent, je les entends ils veulent me couler.

Je monte la garde pour décocher des ukulélés.’

The voices are the alerts and signals that detect a cyber attack, and the response is to analyse, block and react with our teams, putting our defences in place.

 

▶️ A conclusion.

Every day should be about learning and getting better, without getting a big head and bringing it all the way back, because as the song ‘Quand tu allais on revenait’ goes:

‘Je prône les vertus du profil bas, l’eau qui dort fais plus de dégâts

Qu’un chien qui aboie mais ne mord pas’

 

📢 Glossary: Information Security Engineer

An Information Security Engineer is a professional specialising in the protection of an organisation’s information assets, whether digital or physical.

This role encompasses a wide range of responsibilities relating to risk management, compliance, and the implementation of security policies and procedures to ensure the protection of sensitive data.

Skills required:

– Expertise in risk assessment and compliance. Examples: DORA, ISO 27001, NIST CSF.
– Mastery of SIEM (Security Information and Event Management) tools to monitor cybersecurity-related events.
– Advanced analytical skills to solve complex problems.
– In-depth knowledge of network technologies and security protocols.

Assess your company's cyber robustness.

With 1 overall score and 7 thematic scores,
find out where your strengths lie and where you need to improve, in just 5 minutes.

Your results are strictly confidential and will only be shared at your request.

Join the hundreds of cyber aficionados of the Propulsar Club .

The best cyber advice, use cases and self-assessments to help you improve your cyber skills or to benefit from the services of an expert CISO on a timeshare basis. Directly to your inbox.

You can unsubscribe at any time.
Guaranteed spam-free.

Related cyber musics

Sébastien Tellier - L'amour et la violence

Head of Cyber Insurance
Marc-Eric Bellot

Casseurs Flowters - Si facile

Local Cybersecurity Consultant
Gaëtan Bourdillon

Stromae - Carmen

CEO Custocy
Sébastien Sivignon