Javan Rasokat is a Senior Application Security Specialist at Sage, where he supports product teams in strengthening security across the software development lifecycle. Alongside his role, he lectures on Secure Coding at DHBW University in Germany. His journey into ethical hacking began at a young age, when he built bots to automate online games and uncovered security flaws, which he responsibly reported. Turning this passion into a career, Javan first worked as a full-stack web and mobile engineer before moving into security consulting and penetration testing. He holds a Master’s degree in IT Security Management and multiple industry certifications, including GXPN, CISSP, CCSP, CSSLP, AIGP, and CEH. Javan has shared his research and delivered hands-on workshops at leading international conferences such as DEFCON, Black Hat and OWASP Global AppSec.
Interested? Let's connect on LinkedIn, Twitter or write me an email to javan@asec.app
We are here to help you to level up your organisations Product Security, upskilling your engineers and ideally making our service become disposable. Based on our long experience in this field you'll safe time, not wasting budgets for tools you won't use and bringing your security posture to a new level.
How can I identify and prioritize security vulnerabilities in my software?
What is the best approach for implementing secure development practices?
How can I improve the security of my containerized applications?
What is the most effective way to conduct a penetration testing strategy?
What are the most critical security controls to implement?
What steps can I take to secure my web applications?
How can I train my developers to write more secure code?
What is the best way to conduct a threat model review?
How can I ensure the security of my software supply chain?
What is the best approach for implementing a web application firewall?
How can I ensure my software meets the ASVS standard?
What is the most effective approach for secure continuous integration and deployment?
What is the best way to monitor dependencies for security vulnerabilities?
How can I implement an effective bug bounty program?
How can I ensure my organization has a strong security culture and security champions in place?
We are here to help you answer all those questions.