Javan Rasokat

Javan Rasokat

Product Security Specialist | PhD Candidate at
University of Bayreuth | Security Educator

Javan is an Senior Application Security Specialist at Sage and a Doctoral Security Researcher at the Chair of Cybersecurity, University of Bayreuth, focused on how organisations adopt and scale modern security controls in real engineering ecosystems. At Sage, he helps product and platform teams ship secure cloud software without slowing down, designing practical AppSec architecture, embedding security into everyday workflows, and building automation that surfaces issues across large, distributed systems.

His professional journey began in ethical hacking and security research, progressing through full-stack web and mobile engineering before transitioning into product security. Earlier as a teenager, he discovered security bugs during the creation of automation bots for games and reported them to game operators, sparking his early interest in security. This unique combination of builder and breaker experience informs his current work: partnering with engineering and operations teams, driving secure design decisions, and creating tooling that reduces risk at scale.


Conference Talks

🇩🇪German OWASP Day 2025 - DüsseldorfFrom Startup to Scale: Choosing the Right AppSec Path with Vanessa Sutter
Pre-Conference Training: Leveraging Browser Features for Proactive Defense
Video | Blogpost | Post
🇺🇸OWASP Global AppSec Washington DCHow Latest Browser Security Features Eliminate Bug ClassesYouTube | Post | Schedule
🇺🇸LASCON 2025Builders and Breakers: A Collaborative Look at Securing LLM-Integrated Apps with Rico KomendaYouTube | Post
🇩🇪Aalen UniversityEthical Hacking SeminarBlog | Slides | Post | Schedule
🇩🇪OWASP FrankfurtChapter Meetup #73: Hands-On OWASP WorkshopPost | Meetup | Announcement
🇸🇬AppSec Days SingaporeXSS is dead - Browser Security Features that Eliminate Bug ClassesPost | Schedule
🇺🇸DEF CON 33Eliminating Bug Classes at Scale: Leveraging Browser Features for Proactive Defense | DEF CON 33 Workshop
The Death of XSS? Browser Security Features that Eliminate Bug Classes | AppSec Village Talk
Post | Workshop
🇺🇸BSidesLVXSS is dead – Browser Security Features that Eliminate Bug Classes | Talk
Eliminating Bug Classes at Scale: Leveraging Browser Features for Proactive Defense | BSidesLV Workshop
YouTube | Blogpost | Post
🇪🇸OWASP Global AppSec EU BarcelonaBuilders and Breakers: A Collaborative Look at Securing LLM-Integrated Apps with Rico KomendaPost | Post | Schedule
🇳🇴NDC Security 2025Stop Firefighting Vulnerabilities, Start Eliminating Bug Classes at ScalePost | Post | Workshop
🇺🇸DEF CON 32When Chatbots Go Rogue – Lessons Learned from Building and Defending LLM Applications with Andra Lezza | AppSec Village TalkYouTube | Blogpost | Post | Schedule
🇩🇪OWASP FrankfurtChapter Meetup #63: The Dark Side Of LLMs: Uncovering And Overcoming Of Code VulnerabilitiesSlides | Blogpost | Post | Meetup
🇨🇦SecTor 2023The Dark Side Of LLMs: Uncovering And Overcoming Of Code VulnerabilitiesVideo | Slides | Blogpost | Schedule
🇳🇵ThreatCon 2023The Dark Side Of LLMs: Uncovering And Overcoming Of Code VulnerabilitiesBlogpost | Post | Schedule
🇦🇺BSides Canberra 2023The Dark Side Of LLMs: Uncovering And Overcoming Of Code VulnerabilitiesBlogpost | Blogpost | Schedule
🇦🇺CyberCon Melbourne 2023The Dark Side Of LLMs: Uncovering And Overcoming Of Code VulnerabilitiesPost
🇺🇸OWASP Global AppSec San Francisco 2022Exploiting race conditions in web applicationsSlides | Blogpost | Post | Schedule
🇦🇷Ekoparty 2022A race against time - How to exploit race conditions in web appsYouTube | Blogpost | Post
🇸🇬Hack In The Box (HITB) Singapore 2022Exploiting Race Condition Vulnerabilities In Web ApplicationsYouTube | Slides | Blogpost | Post | Agenda

Professional Trainings

Some of my trainings, not all of them, can be offered in-house or tailored for you. Trainings can be delivered in English or German (🇩🇪), depending on the audience. For inquiries, please reach out at .

Advanced Web Security: Scaling CSP & Cutting-Edge Browser Defences for Bug Class EliminationModern web security has shifted. Patching individual vulnerabilities no longer scales, especially across organisations with hundreds of services. This hands-on training teaches you how to eliminate entire bug classes using the newest browser security standards - including several features that have only just been published or are still in development, such as client-side Reporting API and or the new integrity policies (SRI). You’ll work with a pre-secured training app and progressively enforce CSP3 (Content-Security-Policy), Trusted Types, Sec-Fetch-Metadata, COOP/COEP, and other modern defences, test their effectiveness, and learn how to automate adoption at scale. No coding experience is required - everything is provided. The course blends deep technical exercises with architectural guidance for rolling out secure-by-default protections across real environments. You’ll leave with practical, forward-looking expertise that moves your organisation from reactive patching to proactive bug-class elimination, using the most current standards available.1-Day Training
Not available yet - CfT outstanding.
Proactive Security Engineering: Building Secure-by-Design Architectures That ScaleMost engineers can fix vulnerabilities. Far fewer can design systems where entire bug classes simply can’t exist. This two-day, hands-on training teaches how to do exactly that: build secure-by-design architectures that prevent defects rather than chase them.
You’ll exploit realistic flaws in enterprise-grade applications, trace them back to architectural roots, and then rebuild the systems using scalable patterns that embed security directly into design and DevSecOps workflows. Each module follows a repeatable cycle: exploit → test → defend → pattern → re-test. Turning isolated fixes into reusable engineering practices.
Across access control, input validation, identity, secrets, configuration, browser security, dependency governance, observability, you’ll learn how to replace patching with proactive architecture.
All labs and applications are purpose-built for this course, not textbook demos, and attendees receive lifetime access to the full environment.
2-Day Training
Not available yet - CfT outstanding.
Think like a hacker, code like a pro: Secure Coding TrainingThis training provides a comprehensive understanding of the most common and dangerous security vulnerabilities in web applications, using the OWASP Top 10 as a reference. Through a combination of theoretical lectures and practical exercises, participants will learn to identify critical vulnerabilities in web applications, understand how attacks on them work, and how to take necessary measures to fix these vulnerabilities and prevent attacks. The training consists of a mix of theory about current threats and real-world examples, and practical exercises that address and handle these threats. Participants have the opportunity to examine an insecure web application (OWASP Juice Shop) using the methods they have learned and to identify vulnerabilities. Once the vulnerabilities are identified and attacked, the training covers relevant defensive measures to prevent attacks, thus providing a useful catalogue of measures for secure programming. Through practical exercises, participants can directly apply the knowledge they have learned and thereby improve their skills in assessing and enhancing the security of web applications.2-Day Training
Available on request.
Software Quality Engineering - Master's Lecture 🇩🇪Joint master lecture with Prof. Dr. Katja Wengler about Software Quality Engineering, Secure Software Development Lifecycle and Secure Coding Practices.Available at:
DHBW CAS Heilbronn, Germany
Security Hackathon 🇩🇪I am lecturing in Software Engineering with a focus on Secure Coding. Using a mix of theory and practice, students learn about commonly exploited vulnerabilities in web applications and learn ways to exploit these, as well as measures to prevent or fix these vulnerabilities through secure software development.Available at:
DHBW Karlsruhe, Germany
ISC2 CISSP / CSSLP / CCSP Training 🇩🇪 🇬🇧Comprehensive preparation for the Certified Information Systems Security Professional (CISSP), Cloud Certified Security Professional (CCSP) and Certified Secure Software Lifecycle Professional (CSSLP) certifications.
ISC2 Authorized Instructor
Can be provided in German (🇩🇪) or English (🇬🇧) / in-house / remote / on-site.
Cooperation with:
IT-Schulungen.de

Highlights

Publications

🇩🇪 Wengler, Katja; Rasokat, Javan (2024): Wie können digitale Formate die studierendenzentrierte Lehre unterstützen? In: Hufnagel, Julia; Ternes, Doris; Schnekenburger, Carsten (Hg.): Band 7: Digitale Lehre an der DHBW – The New Normal?, 7: Heilbronn (Schriftenreihe #DUAL), S. 191-202. Online verfügbar unter https://www.zhl.dhbw.de/fileadmin/user_upload/CAS-ZHL/Hochschuldidaktik/Schriftenreihe_DUAL/DHBW_ZHL_Band_7__online.pdf

PDF

🇩🇪 Rasokat, Javan (2021): Race Conditions in Webanwendungen. Master Thesis, Informatik, Aalen University, 106 pages. Online verfügbar unter https://opus-htw-aalen.bsz-bw.de/frontdoor/deliver/index/docId/1327/file/Rasokat-Race_Conditions_in_Webanwendungen.pdf

PDF

Qualifications

M.Sc. in IT Security Management (with distinction), Aalen University

B.Sc. in Business Information Systems - Software Engineering, DHBW Karlsruhe

CISSP · CCSP · CSSLP · GXPN (GIAC Exploit Researcher and Advanced Penetration Tester) · CEH (Certified Ethical Hacker) · IAPP AIGP (Artifical Intelligence Governance Professional) · ISC2 Authorized Instructor · ITIL Foundation · AEVO Certificate - Certified trainer and instructor