I actively contributed to the architecture patterns in the Key Management in Cloud Services Guidance document published by the Cloud Security Alliance Key Management Working group.

I actively contributed to the architecture patterns in the Key Management in Cloud Services Guidance document published by the Cloud Security Alliance Key Management Working group.
I actively contributed to the organization and / or program committees of the following events:
NIST announced yesterday that Classic McEliece is one of the Round-3 Finalists in the Post-Quantum Cryptography Standardization Process.
“As such, NIST selected Classic McEliece as a finalist and believes it could be ready for standardization (should NIST choose to select it) at the end of the third round.”
The full report by NIST can be found here.
The Classic McEliece submission in Round 3 is a merger of the Classic McEliece and NTS-KEM submissions to the previous rounds. The submission builds on code-based cryptography with binary Goppa codes, a proposal that has not been broken for more than 40 years.
I wrote a blog post on “How to Make Cryptography Services Work for Your Organization” which was published on the IBM Security Intelligence website. Check it out for some real-world lessons learned.
I completed the Level 2 certification as IBM and Open Group Architect in October 2019. This certification is not a one-time sit-down learn-stuff-by-heart and forget-all-again. Instead, I earned the certification by working continuously as architect for multiple years and by demonstrating my achievements to an internal review board at IBM.
I have led several large projects as security architect. My reference projects concerned architectures for smart metering security, cryptography services for financial services, and enterprise security architectures. I followed a series of trainings on architecture, design thinking, consulting and project management. I also specialized not only in security architecture, but also learned how IT is managed for a specific industry: in my case I focused on banks. Further I earned this certification by giving presentations at international conferences and summer schools, by creating reusable assets, and last but not least by mentoring others.
Classic McEliece Submission to NIST‘s Post-Quantum Standardization together with Daniel J. Bernstein, Tung Chou, Tanja Lange, Ingo von Maurich, Rafael Misoczki, Ruben Niederhagen, Edoardo Persichetti, Peter Schwabe, Nicolas Sendrier, Jakub Szefer, and Wen Wang.
Great to see that my Ph.D. research is relevant for the next crypto standardization, i.e., the parameters in the 2008 paper Attacking and defending the McEliece cryptosystem are still holding up.
Now included as the IND-CCA2 KEM parameters for mceliece6960119:
m = 13, n = 6960, t = 119, l = 256.
Moreover, more PQCrypto code-based crypto submissions also used my complexity computations to determine the security level of their proposals.
I gave a lecture at the ECRYPT winter school in Zurich, Switzerland on how large enterprises manage cryptographic keys and public-key certificates.
I published an IBM Blog post: What to expect from the GDPR readiness assessment.
Together with my IBM Belgium colleagues I organized a crypto workshop for 10-14 year old girls at the Digital Muse Girl Tech Fest in Brussels on Saturday April 30, 2016. We ran 4 workshops where the girls learned how to make and break ciphers – all toy examples of course. Still, lots of fun and great to see that girls enjoy math and crypto!
Privacy and Security in Smart Energy Grids
January 17‒20, 2016
Dagstuhl, Germany
Scientific organization together with George Danezis, Stefan Katzenbeisser, and Bart Preneel