Breaking in Before Others Do

Penetration Test

Pentesting web applications, backends, APIs, mobile apps and more in order to find vulnerabilities before others do.

more details

Avoiding Cloudbursts

Cloud Security Check

Checking the security and hardening of your cloud environments against security best-practices.

more details

Sharpening Skills

Custom Training

All trainings can be executed in-house at your office, external at one of my training sites, or fully online for home-office workers.

more details

Securing Container Platforms

K8s Platform Review

Reviewing the security and hardening of your container orchestration platform setups (K8s and others).

more details

Mitigating Risks the Agile Way

Agile Threat Modeling

Using agile threat modeling techniques modern architectures are constantly evaluated against risk rules that define mitigation steps.

more details

Automating Security Checks

Dev.Sec.Ops

Let security keep up with the DevOps pace by automating static and dynamic security checks along with a false positive handling process.

more details

Securing the Big Picture

Secure SDLC Process Review

Security review of your Software Development Lifecycle Process (SDLC) as part of a Defense-in-Depth approach.

more details

Hardening from Within

Whitebox Analysis

Analyzing software and system architectures in order to find weaknesses and define hardening steps.

more details

0+

Pentests & Reviews

0+

Trainings

0+

Conference Talks

0+

Happy Customers

Upcoming Conference Talks & Trainings

Setting The Stage

As a speaker with international conference experience (Black Hat Arsenal USA, DEF CON AppSec Village USA, RSA Conference USA, Oracle JavaOne, OWASP AppSecEU, OWASP AppSec Days, DevOpsCon, JAX, Heise DevSec, Heise Sec-IT, Heise Herbstcampus, RuhrSec, JCon, JavaLand, Internet Security Days, IT-Tage Frankfurt, OOP, and others) I’m definitely enjoying to speak and train about IT-Security topics.

Security Expert

Individual Services

Application Pentest

Application Pentest

Attacking web application, backends, APIs, and mobile apps in order to find vulnerabilities before others do.

Read More
Cloud Security Check

Cloud Security Check

Checking the security and hardening of your cloud infrastructure and services against best-practices.

Read More
Container Platform Review

Container Platform Review

Security review of your container orchestration platform (Kubernetes) as part of a defense-in-depth approach.

Read More

Individual Trainings

Hands-on Learning

Get your individual training agenda for your business

let's talk