Profile Picture

Rico Komenda

Cybersecurity Professional | Application & AI Security Specialist

About

I’m Rico Komenda, a Senior Security Consultant with broad experience across multiple security frameworks, technologies, and methodologies.

In my role, I focus on the security analysis of IT systems and applications, helping organizations identify risks and strengthen their security posture. My expertise spans Application Security, Cloud Security, and AI Security, allowing me to take a holistic view of modern, complex environments. I work closely with clients to design and implement tailored security solutions that align with their technical landscape, business goals, and risk appetite.

My interest in technology started early. As a teenager, I began scripting for video games - initially to automate tasks and experiment with game mechanics. That curiosity quickly evolved into a deeper passion for programming and eventually ethical hacking. Understanding how systems work, where they fail, and how they can be protected has driven my career ever since.

I’m a goal-oriented and pragmatic security professional who values clear communication, professionalism, and real-world impact. Clients appreciate my hands-on approach, my ability to translate complex security topics into actionable insights, and my deep understanding of the IT security industry. I strongly believe that the best security outcomes are achieved through collaboration, which is why I enjoy working closely with both clients and colleagues as a dedicated team player.

Conference Talks

Event Title Links
🇺🇸 OWASP LASCON 2025 Builders and Breakers: A Collaborative Look at Securing LLM-Integrated Apps (together with Javan Rasokat) / The Model Context Protocol: Convenience meets vulnerability YouTube YouTube Post
🇩🇪 OWASP Stuttgart All about MCP Security Slides
🇩🇪 WeAreDevelopers World Congress 2025 Builders and Breakers: A Collaborative Look at Securing LLM-Integrated Apps Post Video
🇪🇸 OWASP Global AppSec EU 2025 Builders and Breakers: A Collaborative Look at Securing LLM-Integrated Apps (together with Javan Rasokat) Post Schedule
🇩🇪 JAX 2025 MLSecOps: Securing AI/ML Systems in an evolving landscape Conference
🇩🇪 JavaLand 2025 Pentesting LLM-integrated applications Agenda
🇩🇪 MCTTP 2024 Pentesting Large Language Models 101 Post Schedule
🇩🇪 OWASP Stuttgart AI Security & Insights into OWASP Top 10 LLM Slides
🇩🇪 IT Security Summit 2024 Cloud Security Architecture / Real-world exploits and mitigations in LLM Apps / MLSecOps: Security of AI/ML systems Conference
🇷🇴 DefCamp Cluj-Napoca 2024 Step-by-Step: Application Security Architecture YouTube Post
🇩🇪 JAX 2024 The Future Of Application Security Conference
🇳🇴 NDC Security 2024 Hacked in hours: Red team assessments unveiling vulnerabilities YouTube Post
🇩🇪 IT Security Summit 2023 Hacking a Kubernetes Cluster / DeepPhishing: Be the CEO / Kubernetes Cluster - but secure! (Workshop) Post Conference
🇩🇪 JavaScript Days 2022 Attack vectors in the frontend & how to prevent them Post Conference
🇺🇸
OWASP LASCON 2025
Builders and Breakers: A Collaborative Look at Securing LLM-Integrated Apps (together with Javan Rasokat) / The Model Context Protocol: Convenience meets vulnerability
🇩🇪
OWASP Stuttgart
All about MCP Security
🇩🇪
WeAreDevelopers World Congress 2025
Builders and Breakers: A Collaborative Look at Securing LLM-Integrated Apps
🇪🇸
OWASP Global AppSec EU 2025
Builders and Breakers: A Collaborative Look at Securing LLM-Integrated Apps (together with Javan Rasokat)
🇩🇪
JAX 2025
MLSecOps: Securing AI/ML Systems in an evolving landscape
🇩🇪
JavaLand 2025
Pentesting LLM-integrated applications
🇩🇪
MCTTP 2024
Pentesting Large Language Models 101
🇩🇪
OWASP Stuttgart
AI Security & Insights into OWASP Top 10 LLM
🇩🇪
IT Security Summit 2024
Cloud Security Architecture / Real-world exploits and mitigations in LLM Apps / MLSecOps: Security of AI/ML systems
🇷🇴
DefCamp Cluj-Napoca 2024
Step-by-Step: Application Security Architecture
🇩🇪
JAX 2024
The Future Of Application Security
🇳🇴
NDC Security 2024
Hacked in hours: Red team assessments unveiling vulnerabilities
🇩🇪
IT Security Summit 2023
Hacking a Kubernetes Cluster / DeepPhishing: Be the CEO / Kubernetes Cluster - but secure! (Workshop)
🇩🇪
JavaScript Days 2022
Attack vectors in the frontend & how to prevent them

Open Source Contributions

Publications

Contact

Reach me at hello@komenda.de