
Verifying agentic AI controls with attack tree micro simulations
Move agentic AI threat models from assumptions to tested control assertions using attack-tree-driven micro simulations.
Als Speaker mit internationaler Konferenzerfahrung (Black Hat Arsenal USA, DEF CON AppSec Village USA, RSA Conference USA, Oracle JavaOne, Black Hat Arsenal Europe, Black Hat Arsenal Asia, DeepSec, BruCON, Troopers, OWASP AppSecEU, OWASP AppSec Days, DevOpsCon, JAX, Heise devSec, Heise Sec-IT, Heise Herbstcampus, RuhrSec, JCon, JavaLand, Internet Security Days, IT-Tage Frankfurt, OOP und andere) halte ich Vorträge, Keynotes und Trainings zu IT-Security-Themen.

Tiefe Penetrationstests für Webanwendungen und APIs - inklusive Business-Logic-Schwachstellen und verketteter Angriffspfade.

Security Review von Kubernetes- und OpenShift-Plattformen — inklusive RBAC, Pod Security, Container Images und Benchmark-Compliance.

Cloud Security Audit, das Hardening mit Pentesting-Erfahrung kombiniert, um die Sicherheitslage in Ihrem AWS-, Azure- oder GCP-Setup zu verbessern.

Move agentic AI threat models from assumptions to tested control assertions using attack-tree-driven micro simulations.

How attackers bypass text-based guardrails by embedding malicious instructions in images and audio, and the layered defenses required to counter them.

AI agents create a third class of lateral movement, bridging previously isolated systems through natural language, tool access, and execution autonomy.
