Live-Hacking Events

Password Hacking, Cyber Attacks and Co. Nothing sensitizes and trains as well as live hacking, classroom training and virtual live-hacking.

This video will be loaded from YouTube while playing. By clicking here you accept the data protection declaration of HVS Consulting / IS-FOX and YouTube.

The formula for success of a good presentation: infotainment

We combine the "show" of live hacking demos with real knowledge transfer. So we don't just "boo", but also explain very concretely how to protect yourself.

And we tell the inside story, background information and the effects of real attacks.

Illustration of an evaluation scale

Examples for target groups

Anatomy of a Cyber Attack

Duration

25 - 45 minutes

Target Group

CxO Level, Supervisory Board, Manager

Focus

present the seriousness of the threat situation in an understandable and vivid way and convey the complexity of a functioning business security ("More than just a virus scanner").

  • Hacking Humans: from Ransomware to Spear Phishing and Social Engineering attacks.
  • Hacking Systems: Penetration into production system with NSA Tool
  • Explanation of the defense strategy „Prevention-Detection-Response”
Fit for Cyber Security

Duration

approx. 45 - 120 minutes

Target Group

All employees

Focus

shake up and create personal involvement through live hacking demos. Then give concrete assistance and tips for behavior in everyday life.

  • Demo: Fake sender in Phishing e-mail
  • Defense: analyze mail and link, report in case of doubt
  • Demo: Cracking passwords
  • Defense: Complex passwords, password manager, multifactor authentication
Cyber Security @ Your Company

Duration

approx. 2 hours

Target Group

All employees

Focus

shake up and create personal involvement through live hacking demos. Explain the meaning of security policies and give concrete tips for safe behavior in everyday life.

  • video: Anatomy of an Industrial Espionage Attack
  • How does security work (Technology - Processes - People)
  • Secure handling of e-mails (incl. live demos)
  • Social Engineering (incl. live demos)
  • Malware and virus scanner (incl. live demos)
  • Classify and handle information securely
  • Secure handling of passwords (incl. live demos)
Cyber Security Refresher

Duration

approx. 1 hour

Target Group

All employees

Focus

present new attack scenarios with live hacking demos and at the same time refresh the contents of the basic training. Present new helpful tools and services.

  • New Phishing Trends (e.g. Vishing, Smishing, etc.)
  • Current malware attacks
  • Password Manager, Multifactor Authentication
Online seminar on Cyber Security

Duration

approx. 45 minutes

Target Group

All employees

Focus

present a key topic with live hacking demos in a format optimized for web conferences. Generate personal involvement and give concrete tips for safe behavior in everyday life. Example topics:

  • Security in the home office
  • Social engineering
  • Viruses and malware
  • Mobile devices
  • Cloud & Social Networks
  • Passwords
  • Security for Kids
Online seminar on data protection according to GDPR

Duration

approx. 45 minutes

Target group

All employees

Focus

Putting data protection in a positive light through personal involvement and communicating the important basics. With concrete tips for correct behavior in everyday life and in case of data breaches.

  • Hacking Demo: stealing personal data
  • Explain the purpose of the GDPR
  • Teaching the basics
  • Giving concrete tips based on numerous examples

See for yourself

We will be happy to show you how we will inspire your target audience via WebEx, Teams or Zoom.
Contact

Participant comments on our live hacking events and online seminars

Most important questions about our Live-Hacking events answered

We support our training sessions and keynote speeches with live demonstrations or live hacking sessions, in which we show very specifically what happens during a ransomware encryption or how quickly we can crack passwords live, forge senders, and so on.

Live-training can take place virtually or in-person. In-person training exclusively happens on-site.

We offer a wide range of best-practice formats ranging from 30 minutes to 2 hours. For example, we provide presentations for CxO-level, training for executives, as well as training for all employees. Topics include email and phishing security, ransomware, basic cybersecurity training, secure passwords, social engineering, the anatomy of a cyber-attack, secure work in the office and from home, and much more. We can adjust the difficulty level to your target audience.

E-learning is a good start, but real awareness arises when contacts are made regularly and through various channels. And to be honest: nothing is more efficient than a live training with practical examples, time for questions, and info-tainment including live hacking.

A Live-Hacking Event lasts between 30 minutes and 2.5 hours, depending on the topic and the audience. For example, trainings for executives are often shorter as they have less time. However, for events lasting more than 2 hours, a break should be scheduled.

In principle, yes, but being in-person makes it less prone to distractions. In virtual events, we often notice that phone calls, emails, or other people can quickly distract from the event, which is practically not the case with in-person events. However, Live-Hacking Events are more flexible to plan virtually and do not require room scheduling.

We offer our Live-Hacking Events in German and English.

Yes, this is possible for an additional fee. However, we advise against it as a live event thrives on its interactivity. Instead, we recommend offering additional sessions or relying on replicable measures such as e-learning, videos, or intranet.

Yes, we customize our standard content to your company. We take into account your policies, such as password policies, and explain your reporting procedures. We are also happy to incorporate specific examples of attacks on your company.

Live-Hacking Events are suitable, for example, for sensitizing executives, as they serve as role models and multipliers. They can also be used as kickoff events to create understanding for upcoming awareness measures. Furthermore, they are well-suited as accompanying training measures after a phishing campaign and as a complement to e-learning and intranet content.

Yes, there are special variants for different target groups, such as in-depth phishing training, executive trainings, etc.