Follow the White Rabbit - IT Security Podcast - English Edition

Link11

"Wake up, Neo. The Matrix has you." Welcome to the rabbit hole of cybersecurity. Instead of a red pill, we offer something much more valuable: clarity in a world of digital chaos. With cyberattacks surging globally and costing businesses billions while threatening critical infrastructure, staying ahead of the curve isn't just for IT pros - it’s a necessity for everyone. Follow the White Rabbit for your backstage pass to the frontlines of IT security. Hosted by Kofi Osae-Attah, the information security officer at Link11, we explore the strategies of modern attackers and the cutting-edge defenses that protect our digital future. Why subscribe? Global Insights: From our headquarters in Frankfurt, Germany, we discuss cyber resilience that transcends borders. Cutting-Edge Tech: Discover how AI and machine learning are revolutionizing DDoS attacks and automated defense mechanisms. Regulatory Roadmap: We demystify NIS2, the Cyber Resilience Act, and the EU AI Act to reveal what matters most for your business. Expert Access: Join us for candid conversations with industry leaders and Link11’s top security architects. Whether you're a CISO, tech enthusiast, or business owner navigating the cloud, we provide the insights you need to protect yourself against data breaches, identity theft, and infrastructure disruptions. Follow the White Rabbit. Your journey into the heart of cybersecurity starts now. Keep calm and get protected.

Episodes

  1. #04: Pre-Crime: The Shift from Reactive to Predictive Cybersecurity

    APR 9

    #04: Pre-Crime: The Shift from Reactive to Predictive Cybersecurity

    In this episode of Follow the Rabbit, host Kofi Osae-Attah sits down with Luigi Lenguito, the CEO and co-founder of BforeAI, for an in-depth discussion about the revolutionary field of predictive security. Luigi explains his "Pre-Crime" philosophy, which shifts the cybersecurity posture from "assume breach" and reactive threat detection to a model of preemptive measures that identifies malicious infrastructure - the criminal "DevOps" - before a single victim is affected. Drawing an analogy to weather forecasting, Lenguito illustrates how data and supercomputing have transformed our ability to predict hurricanes. He argues that cybersecurity is currently in an "emergency room" phase - stressful and reactive - and that predictive intelligence is the key to moving "left of boom." By isolating and shutting down infrastructure before phishing pages or campaigns go live, organizations can stop being victims and become active participants in their own defense. The conversation also addresses the role of automation in scaling these defenses. Given the predicted 5,000% increase in threats over the last year, Luigi makes a bold case for aggressive preemptive measures, even at the cost of minor false positives. He explains why the future is human-augmented, not human-operated, and how this shift enables CISOs to safeguard the ultimate business case for security: Brand trust. TakeawaysMove "left of boom": Traditional threat detection (EDR/MDR) often means you are already a victim. Predictive security, on the other hand, identifies the "pre-attack" phase, which includes the registration of malicious domains and exfiltration servers.The Weather Forecast Analogy: Just as we use satellites and models to preempt natural disasters, we must use automation to gain the foresight necessary to disrupt cybercrime before it starts.Managing False Positives: Luigi argues for a shift in KPIs. Accepting a 0.05% rate of false positives is a strategic trade-off to avoid months-long, systemic outages that cost millions.Democratized Cybercrime: The barrier to entry for attackers has collapsed due to generative AI (GenAI). There has been a shift from low-volume, high-skill APTs to high-volume, AI-augmented cybercrime using "hacking as a service."The business case for security: Predictive technology protects brand reputation and ensures process resilience (OT/IT uptime). This allows limited human resources to focus on high-level strategy rather than manual takedowns. Why Listen? If your security team is experiencing alert fatigue and "emergency room" burnout, this episode provides a roadmap for a more proactive future. Luigi Lenguito offers the executive insight necessary to understand how automation and preventive measures save millions of potential cybercrime victims every day. Love the show? Make sure to like, push, and subscribe to the Follow the Rabbit podcast! Links: You'll find Luigi on Linkedin. Here you can find more about BforeAI.

    29 min
  2. #03: Botnets and the Hidden Threats in Our Homes

    MAR 26

    #03: Botnets and the Hidden Threats in Our Homes

    In this episode of Follow the Rabbit, host Kofi Osae-Attah sits down with Octavia de Weerdt, the general director of NBIP. They discuss the pervasive rise of botnets and the invisible digital threats lurking in our living rooms. Octavia explains how our digital infrastructure, which we take pride in for its high-speed connectivity and smart home ecosystems, has become a double-edged sword. As we embrace digitalization, we inadvertently provide cybercrime networks with a massive, decentralized army of smart devices to power their next attack. The conversation delves into the "paradox of the smart home," revealing that everything from routers to connected coffee makers can be exploited by malicious actors. Octavia reveals how these botnets use our personal devices against us, often without our knowledge. She warns that, as the internet security landscape shifts, we must adopt a multi-stakeholder approach balancing technology, European policy, and shared responsibility between manufacturers and providers. Finally, Octavia highlights the unique Dutch model of collective resilience. By transforming a dense and vulnerable digital infrastructure into a collaborative defense network, the Netherlands is pioneering ways to mitigate cybercrime on a large scale. This episode is a wake-up call for everyone using the internet today. Understanding these hidden threats is the first step toward reclaiming our digital safety. TakeawaysThe Invisible Army: Massive botnet armies are active across the internet at any given moment, using compromised smart devices to launch global attacks.The "Smart" Vulnerability: Every unmanaged device in your home, from routers to IoT gadgets, is a potential target for cybercrime.Double-Edged Infrastructure: While our advanced digital infrastructure drives the economy, it also provides attackers with the capacity and speed needed to generate sophisticated digital threats.Shared Responsibility: Protecting the internet requires more than individual caution. It requires stronger European security policies and proactive device management from internet service providers (ISPs).Collective Resilience: The NaWas model demonstrates the importance of not-for-profit, community-driven organizations in defending against volumetric and application-layer attacks. Why Listen? If you have a Wi-Fi router or smart devices in your home, you are on the front lines of a global digital war. Octavia De Weerdt breaks down the complex worlds of botnets and internet security in practical, insightful ways that are essential for anyone operating in our highly connected world. Don't forget to like, push, and subscribe to the Follow the Rabbit podcast! Join us as we explore the people and technology that protect the future of the internet. Links:You'll find Octavia on Linkedin. Find more about the NBIP here. Dive deeper into the NaWas project.

    23 min
  3. #02: The Future of Cybersecurity - Automation Meets Human Insight

    MAR 12

    #02: The Future of Cybersecurity - Automation Meets Human Insight

    In this episode of Follow the Rabbit, host Kofi Osae-Attah welcomes Lili Guo, the CISO and partner at Modelverse. Together, they discuss the delicate balance between automation and human intuition in cybersecurity. Lili shares her experience transitioning from the "dark ages" of 100-page Word documents and endless Excel spreadsheets to establishing functional digital infrastructures. She emphasizes that automation is not only about APIs and dashboards; it's also about reducing the "work burden" and preventing burnout for security analysts. The conversation delves into the architecture of an Information Security Management System (ISMS). Lili demystifies the path to ISO 27001 and other major certifications. She explains that an ISMS is a dynamic, living system, not a static checklist. Organizations can achieve continuous compliance by integrating automation into daily operations rather than just "cramming" for an audit. Lili also shares a strategic "source of truth" approach, showing how to map one set of automated controls across multiple frameworks, such as SOC 2, PCI DSS, and NIST, to save hundreds of manual hours. Finally, the episode addresses the human element in technology. Although AI is a game-changer for incident management and threat detection, Lili argues that technology cannot replace the cultural context and strategic design that a human CISO provides. Learn how to balance incident detection tools with "fit for purpose" policies to ensure your security measures protect the business without disrupting workflow. TakeawaysDitch the "Dark Ages" of Excel. The foundation of effective cybersecurity automation is digitalization. The first step to reducing toil is moving lists from Word and Excel into a centralized platform.The ISMS is alive. An Information Security Management System requires continuous improvement and management involvement. Automation should send routine check alerts year-round to keep the system active.Unified Compliance Strategy: By establishing a single source of truth, companies can automate the collection of evidence that satisfies multiple audits (ISO 27001, SOC 2, etc.) simultaneously, reducing redundant work by up to 80%.AI in Incident Management: Automation and AI are essential for filtering false positives, allowing SOC teams to focus on real, high-priority threats.Judgment can't be automated. Security policies must be "fit for purpose." Only humans can understand organizational culture and ensure that security measures don't stifle productivity. Why Listen? If your team is stressed for weeks before a security audit, your process is broken. Listen to this episode to learn how to transition from a reactive, manual approach to a proactive, automated security strategy. Whether you're a technical lead or a business executive, Lili Guo provides a blueprint for scaling your security operations using smart technology and human-centric design. Don't forget to like, push, and subscribe to the Follow the Rabbit podcast! Join us as we explore the intersection of technology, trust, and the people behind them. Links:You'll find Lili on Linkedin. More about Modelverse here.

    23 min
  4. #01: The Human Factor of Trust & Technology

    MAR 12

    #01: The Human Factor of Trust & Technology

    In the first episode of the English edition of Follow the Rabbit, host Kofi Osae-Attah sits down with Sabika Ishaq, the chief information security officer (CISO) at Grant Thornton Luxembourg and president of Women4Cyber Luxembourg. Together, they explore the front lines of financial security, revealing why trust is the ultimate currency and how the "human factor" is both our greatest vulnerability and our strongest defense. Sabika introduces her "Three P's" philosophy - People, People, and People - reminding us that, since humans build, use, and abuse technology, they must be at the heart of every strategy. The conversation demystifies major regulations like DORA and NIS 2, presenting them as essential frameworks for global resilience rather than rigid checklists. Sabika explains how a "see something, say something" security culture can transform a workforce into a human firewall. By shifting the mindset from viewing security as an obstacle to viewing it as a business enabler, organizations can better protect everything from personal banking apps to critical national infrastructure. Looking ahead, Sabika discusses the double-edged sword of AI and the urgent need for diversity in tech. She explains how neurodiversity and diverse backgrounds detect threats that homogeneous teams often overlook. From encouraging the difficult question of "why?" in the boardroom to offering a roadmap for women transitioning into the field, this episode is a masterclass in leadership, ethics, and the power of the "think before you click" mantra. TakeawaysThe Three P's: Cybersecurity is about people—those who build technology, those who use it, and those who abuse it. Resilience starts with the human element.Culture over compliance: A strong security culture means security is part of everyday thinking and employees feel safe reporting incidents.Regulations as Resilience: Frameworks like DORA and NIS 2 shift the focus from mere protection to operational resilience, ensuring that services can withstand global disruptions.The Diversity Advantage: Diverse teams bring a wider range of perspectives, which is essential for solving the constantly evolving "puzzle" of cyber threats.The Golden Rule: The most effective defense for any user is a simple mindset shift. Think before you click, and embrace shared responsibility for data safety. Why listen? Cybersecurity is a human problem, not just a technical one. If you want to learn how top-tier financial institutions safeguard your funds, how AI is reshaping the threat landscape, or how to build a career in this high-stakes field, this conversation with Sabika Ishaq is a must-listen. Don't forget to like, subscribe, and follow the Follow the Rabbit podcast! Help us spread the word by sharing this episode with anyone looking to stay secure in a digital world. Links:You'll find Sabika on Linkedin. Or you can read her short bio here. Here are some more facts about the Women4Cyber Foundation. And the Chapter in Luxembourg.

    29 min

About

"Wake up, Neo. The Matrix has you." Welcome to the rabbit hole of cybersecurity. Instead of a red pill, we offer something much more valuable: clarity in a world of digital chaos. With cyberattacks surging globally and costing businesses billions while threatening critical infrastructure, staying ahead of the curve isn't just for IT pros - it’s a necessity for everyone. Follow the White Rabbit for your backstage pass to the frontlines of IT security. Hosted by Kofi Osae-Attah, the information security officer at Link11, we explore the strategies of modern attackers and the cutting-edge defenses that protect our digital future. Why subscribe? Global Insights: From our headquarters in Frankfurt, Germany, we discuss cyber resilience that transcends borders. Cutting-Edge Tech: Discover how AI and machine learning are revolutionizing DDoS attacks and automated defense mechanisms. Regulatory Roadmap: We demystify NIS2, the Cyber Resilience Act, and the EU AI Act to reveal what matters most for your business. Expert Access: Join us for candid conversations with industry leaders and Link11’s top security architects. Whether you're a CISO, tech enthusiast, or business owner navigating the cloud, we provide the insights you need to protect yourself against data breaches, identity theft, and infrastructure disruptions. Follow the White Rabbit. Your journey into the heart of cybersecurity starts now. Keep calm and get protected.