SlideShare a Scribd company logo
  • Upload
  • Home
  • Explore
  • Login
  • Signup
SlideShare a Scribd company logo
  • Home
  • Explore
  • Upload
  • Login
  • Signup

We've updated our privacy policy. Click here to review the details. Tap here to review the details.

×
×
×
×
×
×
Pawel Krawczyk

Pawel Krawczyk

69 Followers
22 SlideShares 1 Clipboard 69 Followers 115 Followings
  • Unblock User Block User
22 SlideShares 1 Clipboard 69 Followers 115 Followings

Personal Information
Organization / Workplace
Reading, United Kingdom United Kingdom
Occupation
Application Security Consultant
Industry
Technology / Software / Internet
Website
pl.linkedin.com/in/pawelkrawczyk/
About
Application security manager with strong technical background and over 15 years of experience in private and public sector. Visionary thinker with powerful analytical skills and passion for delivering long-lasting and optimized solutions. Good communicator, experienced in explaining complex technical issues to business and end-user audience. Expert in modern networking and secure application development technologies. Specialties: Security assessment of large, heterogenous application portfolios in business-critical enterprise environments, security economics, risk assessment and modeling.
Contact Details
Tags
security information security web application security owasp devsecops devops administracja publiczna security ekonomia bezpieczestwo docker jenkins continuous integration authentication surveillance privacy unicode devseccon tls ssl ipsec cloud computing bezpieczeństwo source code sca sast apache struts java mod_security risk management electronic signature public administration web applications censorship content filtering "electronic signature" cryptography hacking data leak
See more
Presentations (22)
See all
Europejskie Ramy Interoperacyjności 2.0
13 years ago • 506 Views
Real Life Information Security
13 years ago • 532 Views
Zaufanie W Systemach Informatycznych
12 years ago • 1639 Views
Kryptografia i mechanizmy bezpieczenstwa
12 years ago • 3496 Views
Audyt Wewnetrzny W Zakresie Bezpieczenstwa
12 years ago • 2280 Views
Krawczyk Ekonomia Bezpieczenstwa 2
12 years ago • 435 Views
Source Code Scanners
11 years ago • 2682 Views
Why care about application security
11 years ago • 893 Views
Pragmatic view on Electronic Signature directive 1999 93
11 years ago • 787 Views
Filtrowanie sieci - Panoptykon
11 years ago • 1277 Views
Dlaczego przejmować się bezpieczeństwem aplikacji (pol)
11 years ago • 656 Views
Are electronic signature assumptions realistic
11 years ago • 413 Views
Paweł Krawczyk - Ekonomia bezpieczeństwa
10 years ago • 902 Views
Leszek Miś "Czy twoj WAF to potrafi"
9 years ago • 1359 Views
Łukasz Lenart "How secure your web framework is? Based on Apache Struts 2"
9 years ago • 1244 Views
Presentation from CyberGov.pl 2015
7 years ago • 824 Views
Get rid of TLS certificates - using IPSec for large scale cloud protection
4 years ago • 123 Views
Unicode the hero or villain
4 years ago • 442 Views
Effective DevSecOps
3 years ago • 371 Views
Reading Geek Night 2019
3 years ago • 602 Views
Authenticity and usability
3 years ago • 65 Views
Top DevOps Security Failures
3 years ago • 825 Views
Likes (6)
See all
Chatbots, Conversational Interfaces, and the Rise of Messaging platforms
Sean Johnson • 6 years ago
Malware vs autoryzacja transakcji
SecuRing • 7 years ago
Applications secure by default
SecuRing • 7 years ago
1112 agile approach to pci dss development
bezpiecznik • 11 years ago
Crypto Strikes Back! (Google 2009)
Nate Lawson • 13 years ago
Eric Vyncke - IPv6 Security Vendor Point of View
IPv6 Conference • 12 years ago
  • Activity
  • About

Presentations (22)
See all
Europejskie Ramy Interoperacyjności 2.0
13 years ago • 506 Views
Real Life Information Security
13 years ago • 532 Views
Zaufanie W Systemach Informatycznych
12 years ago • 1639 Views
Kryptografia i mechanizmy bezpieczenstwa
12 years ago • 3496 Views
Audyt Wewnetrzny W Zakresie Bezpieczenstwa
12 years ago • 2280 Views
Krawczyk Ekonomia Bezpieczenstwa 2
12 years ago • 435 Views
Source Code Scanners
11 years ago • 2682 Views
Why care about application security
11 years ago • 893 Views
Pragmatic view on Electronic Signature directive 1999 93
11 years ago • 787 Views
Filtrowanie sieci - Panoptykon
11 years ago • 1277 Views
Dlaczego przejmować się bezpieczeństwem aplikacji (pol)
11 years ago • 656 Views
Are electronic signature assumptions realistic
11 years ago • 413 Views
Paweł Krawczyk - Ekonomia bezpieczeństwa
10 years ago • 902 Views
Leszek Miś "Czy twoj WAF to potrafi"
9 years ago • 1359 Views
Łukasz Lenart "How secure your web framework is? Based on Apache Struts 2"
9 years ago • 1244 Views
Presentation from CyberGov.pl 2015
7 years ago • 824 Views
Get rid of TLS certificates - using IPSec for large scale cloud protection
4 years ago • 123 Views
Unicode the hero or villain
4 years ago • 442 Views
Effective DevSecOps
3 years ago • 371 Views
Reading Geek Night 2019
3 years ago • 602 Views
Authenticity and usability
3 years ago • 65 Views
Top DevOps Security Failures
3 years ago • 825 Views
Likes (6)
See all
Chatbots, Conversational Interfaces, and the Rise of Messaging platforms
Sean Johnson • 6 years ago
Malware vs autoryzacja transakcji
SecuRing • 7 years ago
Applications secure by default
SecuRing • 7 years ago
1112 agile approach to pci dss development
bezpiecznik • 11 years ago
Crypto Strikes Back! (Google 2009)
Nate Lawson • 13 years ago
Eric Vyncke - IPv6 Security Vendor Point of View
IPv6 Conference • 12 years ago
Personal Information
Organization / Workplace
Reading, United Kingdom United Kingdom
Occupation
Application Security Consultant
Industry
Technology / Software / Internet
Website
pl.linkedin.com/in/pawelkrawczyk/
About
Application security manager with strong technical background and over 15 years of experience in private and public sector. Visionary thinker with powerful analytical skills and passion for delivering long-lasting and optimized solutions. Good communicator, experienced in explaining complex technical issues to business and end-user audience. Expert in modern networking and secure application development technologies. Specialties: Security assessment of large, heterogenous application portfolios in business-critical enterprise environments, security economics, risk assessment and modeling.
Contact Details
Tags
security information security web application security owasp devsecops devops administracja publiczna security ekonomia bezpieczestwo docker jenkins continuous integration authentication surveillance privacy unicode devseccon tls ssl ipsec cloud computing bezpieczeństwo source code sca sast apache struts java mod_security risk management electronic signature public administration web applications censorship content filtering "electronic signature" cryptography hacking data leak
See more

Modal header

  • About
  • Support
  • Terms
  • Privacy
  • Copyright
  • Cookie Preferences
  • Do not sell or share my personal information
English
Current Language: English
Español
Português
Français
Deutsch

© 2023 SlideShare from Scribd

We've updated our privacy policy.

We’ve updated our privacy policy so that we are compliant with changing global privacy regulations and to provide you with insight into the limited ways in which we use your data.

You can read the details below. By accepting, you agree to the updated privacy policy.

Thank you!

View updated privacy policy
We've encountered a problem, please try again.