
RAG security: the forgotten attack surface
Why your sanitized user queries don’t protect you when the threat enters through your knowledge base.
As a speaker with international conference experience (Black Hat Arsenal USA, DEF CON AppSec Village USA, RSA Conference USA, Oracle JavaOne, Black Hat Arsenal Europe, Black Hat Arsenal Asia, DeepSec, BruCON, OWASP AppSecEU, OWASP AppSec Days, DevOpsCon Berlin/Munich/London/Singapore, JAX, Heise DevSec, Heise Sec-IT, Heise Herbstcampus, RuhrSec, JCon, JavaLand, Internet Security Days, IT-Tage Frankfurt, OOP, and others) I’m definitely enjoying to speak, present keynotes, and train about IT-Security topics.

Manual penetration testing of web applications, APIs, and mobile apps — including business logic flaws and chained attack paths.

Cloud security audit combining CIS benchmarks with pentesting experience to find exploitable misconfigurations in your AWS, Azure, or GCP setup.

Security review of Kubernetes and OpenShift platforms covering RBAC, pod security, container images, and CIS benchmark compliance.

Why your sanitized user queries don’t protect you when the threat enters through your knowledge base.

Why the Model Context Protocol needs a new security mental model, and how to build it.

A scenario-driven workflow for tracing attack paths in agentic AI systems using a five-zone navigation lens, attack trees, and OWASP’s threat taxonomy and playbooks.
