Breaking in Before Others Do

Penetration Test

Pentesting web applications, backends, APIs, mobile apps and more in order to find vulnerabilities before others do.

more details

Avoiding Cloudbursts

Cloud Security Check

Checking the security and hardening of your cloud environments against security best-practices.

more details

Sharpening Skills

Custom Training

All trainings can be executed inhouse at your office, external at one of my training sites, or fully online for home-office workers.

more details

Securing Container Platforms

K8s Platform Review

Reviewing the security and hardening of your container orchestration platform setups (K8s and others).

more details

Mitigating Risks the Agile Way

Agile Threat Modeling

Using agile threat modeling techniques modern architectures are constantly evaluated against risk rules that define mitigation steps.

more details

Automating Security Checks

Dev.Sec.Ops

Let security keep up with the DevOps pace by automating static and dynamic security checks along with a false positive handling process.

more details

Securing the Big Picture

Secure SDLC Process Review

Security review of your Software Development Lifecycle Process (SDLC) as part of a Defense-in-Depth approach.

more details

Hardening from Within

Whitebox Analysis

Analyzing software and system architectures in order to find weaknesses and define hardening steps.

more details

0+

Pentests & Reviews

0+

Trainings

0+

Conference Talks

0+

Happy Customers

Upcoming Conference Talks & Trainings

Setting The Stage

As a speaker with international conference experience (Black Hat Arsenal USA, DEF CON AppSec Village USA, RSA Conference USA, Oracle JavaOne, Black Hat Arsenal Europe, Black Hat Arsenal Asia, DeepSec, BruCON, OWASP AppSecEU, OWASP AppSec Days, DevOpsCon Berlin/Munich/London/Singapore, JAX, Heise DevSec, Heise Sec-IT, Heise Herbstcampus, RuhrSec, JCon, JavaLand, Internet Security Days, IT-Tage Frankfurt, OOP, and others) I’m definitely enjoying to speak and train about IT-Security topics.

Security Expert

Individual Services

Application Pentest

Application Pentest

Attacking web applications, backends, APIs, and mobile apps in order to find vulnerabilities before others do.

Read More
Cloud Security Check

Cloud Security Check

Checking the security and hardening of your cloud infrastructure and services against best-practices.

Read More
Container Platform Review

Container Platform Review

Security review of your container orchestration platform (Kubernetes) as part of a defense-in-depth approach.

Read More

Individual Education

Hands-on Learning

Get your individual training agenda for your business

let's talk

Latest Blog Posts

IT-Security Blog

Best Practice
12 Steps to Secure Software
on 13 Apr 2024

12 Steps to Secure Software

Empower cybersecurity in software development projects with these easy and effective first steps.

Conference
Micro Attack Simulations
on 20 Oct 2023

Micro Attack Simulations

I was interviewed about improving cyber resilience through Micro Attack Simulations.

Web Security Bootcamp
Join my upcoming two-day online training event:
20. – 21. February 2025 (click here to see details)