Kevin Ott first entered the world of cybersecurity through structured corporate networks and a dual-degree program at Deutsche Bank. Yet beneath the suit and structured workflows, a passion was already brewing: the thrill of simulated attacks, the hunt for vulnerabilities, and the drive to expose weaknesses before real attackers do. Today, Kevin is a Principal Red Team Consultant at NVISO Security and an instructor at the SANS Institute, where he teaches others how to break systems for a greater good.
Kevin doesn’t see Red Teaming as just testing defenses. For him, it’s about realism, trust, and sharpening the edge of enterprise resilience. We met Kevin to dive deep into the mindset of a modern red teamer; one who blends ethical offense with educational impact, and who sees cyber threats as both a technical and cultural challenge.
“I actually started on the other side - classic corporate cybersecurity. I studied Business Informatics in a dual program at Deutsche Bank, working in network security. But even back then, Pentesting fascinated me. After graduating, I quickly realized the corporate world with all its meetings and slow politics wasn’t for me. I’d already started learning a lot on my own, and in 2016, I made the jump into Pentesting professionally. From there, Red Teaming was a natural evolution. It’s just so much more holistic. You’re not just looking at one app or one piece of the network; you’re simulating full-scale, real-world attacks. That complexity, that realism - that’s what excites me.”
“It comes down to mindset and maturity. Many companies do Pentests because they have to check a box, meet compliance. Red Teaming is different. Clients usually want it. They’ve reached a certain security maturity and are ready to challenge themselves. That makes the work more collaborative and rewarding. With new regulations like DORA, Red Teaming is becoming mandatory in some sectors, but I hope the spirit of voluntary rigor doesn’t get lost.”
“Our Red Team engagements simulate the entire attack lifecycle. Often that includes spear-phishing campaigns. We don’t just test generic awareness; we craft personalized, situation-specific lures based on real-world data. If a company just went through a merger, or announced a new project, we’ll use that context. The idea is to mirror what a real attacker would do. We dig deep, profile employees, and craft attacks so tailored they feel legitimate. That’s how we uncover real gaps and also sometimes live in a target’s environment for months without being detected.”
“I was skeptical at first. But today, AI is a game-changer. I use it to write phishing emails, generate landing pages and even clone websites from a single screenshot. Tools like ChatGPT or Claude help us craft convincing assets in minutes. Some of my colleagues are even pushing deepfakes and voice cloning into simulations. On the flip side, defenders are still relying on outdated advice like ‘watch for grammar mistakes’, when AI now writes flawless English. The threat landscape has shifted, and most companies aren’t prepared for how good these attacks have become.”
“I’ve learned so much from others - blog posts, talks, open-source tools. It’s time to give back. At SANS, I teach Red Teaming and co-develop new courses focused on phishing, initial access, and AI-driven attacks. There’s professionally enriching about watching a student finally grasp a hard concept they’ve struggled with. Teaching isn’t just about sharing knowledge, it’s about shaping the next generation of red teamers.”
“User awareness is still underrated. And not in the checkbox training sense. Real, contextual awareness is necessary. But also, if one click can take down your entire organisation, that’s not a user problem; it’s an architectural flaw. Companies need layered defenses, fast response, and most of all, agility. Threats evolve fast. If your defenses can’t keep up, you’re falling behind. AI isn’t optional anymore. It’s how attackers scale. It should be how defenders do too.”
“There’s always this tension: you design a super sophisticated phishing campaign, and nobody bites. Then you throw in something simple like a fake Teams login or SharePoint link, and suddenly four or five users fall for it. It’s a wake-up call. Complexity doesn’t always equal effectiveness. But the real magic happens when users report those attacks. The organizations that shut us down fastest are the ones where users are alert and empowered. That’s real defense in action.”
“I’m not a podcast guy myself, but there are two I always recommend. Darknet Diaries is a classic; it tells real cyber stories with depth and drama. And You Are F***ed, that one’s about Germany’s first declared cyber disaster in Anhalt-Bitterfeld. It’s completely wild. The Bundeswehr had to get involved, which shows just how bad things can go when the systems fail.”
Discover how a deepfake cyber attack on your company could look like.