IT Security.
Strategically Designed.
Scientifically Grounded.
Current research meets practical consulting, so your IT security goes beyond paper.
Services
IT security grounded in current research
IT Security Consulting
IT security consulting for organizations of all sizes: NIS2 compliance, GDPR requirements, establishing an ISMS based on ISO 27001. My approach draws on current research and addresses the human factor alongside the technical side.
- Strategic security consulting
- NIS2 & GDPR compliance
- Risk assessment & action planning
Security Concepts
I create IT security concepts: status quo analysis, threat modeling, actionable recommendations. Aligned with BSI IT-Grundschutz and ISO 27001, informed by research on developer workflows, authentication, and secret management.
- Status quo analysis
- BSI IT-Grundschutz & ISO 27001
- Threat modeling
Talks & Keynotes
Talks on IT security topics including usable security, AI in cybersecurity, and secure software development. Each talk draws on peer-reviewed research and is adapted to your audience.
- Conference talks & keynotes
- Research-backed content
- Individually tailored
Trainings & Workshops
IT security trainings and workshops: security awareness for the whole team or technical deep dives for developers. I adapt format and content to your team's existing knowledge.
- Security awareness training
- Technical deep dives
- Custom content
About Me
I am an independent IT security consultant, supporting organizations with consulting, security concepts, talks, and trainings. Alongside my consulting work, I conduct research at CISPA — Helmholtz Center for Information Security and Leibniz University Hannover as part of the TeamUSEC research group, focusing on usable security and privacy. I completed my MSc in Computer Science in 2021 with distinction (1.0) and my doctoral degree in computer science with very good (1.0).
Experience
- IT security consulting for organizations
- Creation of IT security concepts
- Expert talks and keynotes on IT security
- Trainings and workshops
- Leading research projects in Usable Security and Privacy
- Contributing to the EU project DAISEC2.0
- Supervising Bachelor and Master theses
- Teaching courses in Usable Security and Privacy
- Publishing scientific papers at top conferences (USENIX Security, CCS)
- Administration of IT infrastructure
- Development of a remote study infrastructure for a research project
Publications
Selected scientific publications
"That's my perspective from 30 years of doing this": An Interview Study on Practices, Experiences, and Challenges of Updating Cryptographic Code
Keeping cryptographic code up to date and free of vulnerabilities is critical for overall software security. We conducted an interview study with 21 experienced software developers to understand their experiences, approaches, challenges, and needs regarding cryptographic updates.
Der regulatorische Rahmen für Code Secret Leakage
Human Factors on Secret Security: Case Studies on Code Secret Leakage, Cryptographic Updates, and Password Update Procedures
Skipping the Security Side Quests: A Qualitative Study on Security Practices and Challenges in Game Development
"We've Disabled MFA for You": An Evaluation of the Security and Usability of Multi-Factor Authentication Recovery Deployments
Talks
Invited talks on IT security and research
IT Infrastructure Threat Landscape and Available Support Services
Talk at the FIS Erfa (knowledge exchange information event) of the German Confederation of Skilled Crafts (ZDH). Topics: current threat landscape for IT infrastructure in skilled trades and concrete support services available for businesses.
AI and Cybersecurity: New Threats and Attacks
What should you keep in mind when it comes to AI and cybersecurity? Opening session of the KI mAI event series with an overview of new attack vectors and risks posed by AI-powered threats.
AI Between Attack and Risk: How Companies Can Protect Themselves Against the New Threat Landscape
Talk on AI-powered cyberattacks, risks of using LLMs in enterprises, and strategies for protecting AI systems and IT infrastructure.
AI & Cybersecurity: Attack Vectors Against LLMs and Chatbots
Overview of attack vectors against LLMs and chatbots, including prompt injection, jailbreaks, and exfiltration of system prompts. The talk addresses what to consider when deploying language models in production.
AI & Cybersecurity – Opportunities and Risks
How AI makes cyberattacks faster, cheaper, and more professional – even without deep technical knowledge. Plus: risks of internal AI deployment including data breaches, uncontrolled outputs, and manipulated training data.
Artificial Intelligence in IT Security: Opportunities and Risks for Businesses
Using LLMs securely – attack vectors, risks, and best practices for businesses. Talk on prompt injection, jailbreaking, and secure LLM deployment in enterprise contexts.
AI in Skilled Trades: Opportunities and Challenges
Talk on opportunities and risks of using AI in skilled trades, with practical examples and cybersecurity guidance.
Post-Quantum Cryptography
Overview of how quantum computers threaten classical cryptographic schemes and the steps companies should plan for when migrating to quantum-resistant algorithms.
Gallery
Impressions from research, talks and projects
FAQ
Answers to common questions about IT security consulting
Who benefits from IT security consulting?
What does an initial consultation look like?
Do you support NIS2 compliance?
What topics do your talks cover?
How much does IT security consulting cost?
Do you also offer remote consulting?
What sets your consulting apart from other providers?
Referenzen
Erfolgreiche Zusammenarbeit mit ausgewählten Kunden und Partnern.