IS-FOX Live Hacking Event
Top-Speaker

 

Live hacking
events

IS-FOX Live Hacking Event
Management training

 

'This should be mandatory for everyone.'

IS-FOX Live Hacking Event Virtuell
Virtual events

 

'The best online event ever'

IS-FOX Live Hacking Event
For production facilities

 

'Great demos, explained in an easy way'

IS-FOX Live Hacking Event
Customer events

 

'The perfect keynote"

IS-FOX Live Hacking Event Feedback

Customers, who trust in our live events:

Abus, Allianz, Amadeus, Bosch, Ergo, Evonik, Finanz Informatik, the airports DUS, CGN, FRA, HAM, MUC, ZRH, Geberit, Generali, Giesecke & Devrient, Groz-Beckert, Helmholtz Zentren, Henkel, Hornbach, IATA, LBBW, Lanxess, Loacker, Lufthansa, Munich RE, Osram, Otto Fuchs, Pro7Sat1, Rational, Rewe, Rohde & Schwarz, Saar LB, SAP, thyssenkrupp, ZF Friedrichshafen ... and hundreds more.

Keynote, security day, customer event

Live hacking that inspires

We don't hack Bluetooth interfaces, we hack people:

  • We always focus on the individuals in front of the screen and their behavior, not the technology they can't change.
  • We use real and up-to-date threat scenarios collected from our pentesters, incident responders and in our social engineering assessments.
  • Our live hacking demos are easy to understand and create a personal involvement.
  • We avoid technical terms or explain them. Beginners can follow and professionals still feel comfortable.
  • We don't just “boo”, but give simple and practical tips with a “wow” effect.


    Discover content
     
IS-FOX Live Hacking Events

As good as an in-precense event

Exciting virtual live hacking events

No boring “online webinars” but real virtual live events:

  • Tailor-made formats: from 15-minute top management pitches to 2-hour basic training courses.
     
  • Cutting-edge topics: Phishing, ransomware, social engineering, deep fakes, artificial intelligence, and much more.
     
  • Interactive: online surveys, quizzes, Q&A sessions ... we get the audience involved – even virtually.
IS-FOX Live Hacking Events virtuell
IS-FOX Logo Fuchs ohne Text

Find your live hacking event

Target group-specific formats, always up-to-date

Social Engineering 15 30 45 60 75 90 105 120 Minuten CxO Pitch Viren & Malware Ransomware Fit für Cyber Security Manager Pitch Cyber Security @ Home E - Mail & Phishing Passwort Management
Phishing
60 min

Recognize and fend off phishing

Phishing is and remains the top threat to companies and individuals. Phishing generates more revenue worldwide than drug dealing. In this interactive event, you will learn about various attack scenarios through practical demos and receive tips,

  • which key characteristics you need to look out for in phishing emails,
  • how you can distinguish a genuine link from a fake phishing link,
  • which email attachments can be tricky and how you should deal with dubious file attachments.

Through interactive online surveys and discussions, we actively involve you and you can apply your knowledge immediately.  

 

60 min

Phishing next level

Welcome to the next generation of phishing methods: Text messages, WhatsApp, QR codes and voice phishing. In this interactive event, you will learn how criminals are able to circumvent even modern technical protection measures such as 2-factor authentication and how you can effectively defend yourself against them.

We will show many practical examples of real phishing attacks and interactively involve you and the entire audience through online polls. With our defense tips, you will become an effective shield against cyber threats, both at work and at home.

 

90 min

Anatomy of a phishing attack

Cybercrime generates more money worldwide than drug and arms dealing. Spying on access data (phishing) and encrypting information and systems with subsequent ransomware are currently the biggest cyber threats to companies. But how do attackers actually choose their victims? How are companies infected? And what crucial role do you play as an employee? In this event, we will use live demonstrations to show you

  • how attackers select their victims and what role your personal behaviour plays here,
  • how quickly a really well-made phishing page and the matching e-mail can be created,
  • what drastic consequences a wrong click on an e-mail attachment can have,
  • and, of course, how you can recognise these attacks and protect yourself against them.

Through interactive online surveys and discussions, you are not just a spectator, but become part of the action.

Ransomware
60 min

Anatomy of a ransomware attack

Ransomware attacks - encrypting information and systems and then holding companies to ransom - are the biggest cyber threat today. But how do attackers choose their victims? How do companies get infected? And what is your role as an employee?

Immerse yourself in the world of ransomware and learn through live demos and real-life examples how quickly the professionals break through their victims' defenses, how ransom negotiations work and whether you as a company should pay.

Companies are not without a chance! Learn the elements of an effective cyber security strategy and the simple steps you can take to make a fundamental contribution to successful defense. We use interactive surveys to engage you and the audience.

Passwords
60 min

Strong and simple passwords? It's possible!

Passwords are annoying! Too many, too complicated! But what can you do? Can you trust password managers? And what are the real benefits of multi-factor authentication? Your life with passwords will be easier after this interactive session. Learn with exciting live hacking demos

  • how quickly even passwords like HarryP0tter1 can be cracked by criminals, 
  • how to create and remember simple but hard-to-crack passwords,
  • if and which password managers you can really trust,
  • whether additional codes via SMS or app really increase your security and
  • whether or not you should change your passwords anyway. 

Through interactive online polls and discussions, you will be actively involved and can apply your knowledge immediately.

AI
60 min

Social engineering with artificial intelligence

Psychological tricks and deception are becoming more dangerous thanks to artificial intelligence (AI). In this exciting course, you will learn from numerous examples and live demos,

  • how intruders gain physical access to secured buildings,
  • what social engineering is, and the insidious methods criminals are using to target both individuals and organizations,
  • the "stories" they tell their victims to manipulate them,
  • how they use artificial intelligence (AI) to create and deploy fake phone calls and videos, known as "deep fakes". 

Of course, we will also provide you with practical tips to help you identify and defend against these threats. You will be actively involved through interactive polls and will be able to apply your knowledge immediately.

@Home
90 min

Cyber Security @ Home: Chapter 1

With numerous live hacking demos, this live training offers not only exciting insights, but very practical tips to take your home cybersecurity to the next level.

  • How does virus detection work and which devices should have virus protection?
  • Is commercial software really better than free alternatives?
  • Is Apple Macintosh really more secure than Windows? Is the iPhone any better? And Google Android?
  • Can you back up to the cloud? In fact, should you?
  • Can you trust password managers, and if so, which ones?
  • Are one-time codes via SMS or app really more secure?

We will actively involve you in the live event with practical examples, interactive online polls and direct Q&A sessions.
 

90 min

Cyber Security @ Home: Chapter 2

This live event will give you exciting insights and practical tips on how to take your home cyber security to the next level.

  • Which phishing scams do criminals use specifically for private individuals?
  • How are victims put under psychological pressure and how can you protect yourself?
  • What security settings should you pay attention to with smart home devices?
  • How can you secure your internet router?
  • How can you restrict your child's apps and usage times?
  • How can you use and save passwords across devices?
  • What are the benefits of ‘passkeys’?

Through interactive online surveys and direct Q&A sessions, you will become part of the event and can ask the questions you always had about security.

Fit4Security
120 min

Fit for cybersecurity

Dive into the world of cyber security and learn how cyber criminals threaten companies and individuals. Through live hacking and demos, we will demonstrate modern attack techniques at first hand and teach you all the basics you need to successfully fend off such attacks. You will learn

  • how to recognize and fend off phishing attacks,
  • which email attachments can be tricky,
  • how to create and remember simple but hard-to-crack passwords,
  • how company-wide security works and what role you play in it.

Through interactive online surveys and discussions, you are not just a participant, you become part of the event.
 

 

Get advice now

Top results or your money back!
 

 Request a quote

Live hacking as a face-to-face or virtual event?

It depends...

Of course, a real face-to-face event with social interaction and informal conversation remains the undisputed number one for human communication. But it comes at a price. Venues need to be booked and delegates, speakers and departments need to get there. A 2-hour event can often take between 3 and 8 hours, depending on travel time. Virtual events are much more economical and environmentally friendly and, since Covid, are now fully accepted.

 

Virtual live hacking events

  • Perfect for distributed organisations, such as companies with many locations. Anyone can attend any date without travelling time and costs.
     
  • An ideal format for a curriculum, for example a new security topic every 3 or 6 months.
     
  • Excellent price/performance ratio.

 

Live hacking as a face-to-face event

  • Think Big! It's better to have a single comprehensive event than lots of small workshops.
     
  • Can be integrated into existing events, such as board or supervisory board meetings, management meetings, divisional events or corporate meetings.
     
  • There is actually no alternative for (top level) managers.

We underpin our training courses and keynote speeches with live demonstrations or impressive live hacking elements. Examples:

  • What happens during ransomware encryption?
  • How quickly can a password be cracked live?
  • How do you forge the sender of an email?
  • How can you catch the second factor?
  • How do you create a deep fake video of the management?

Face-to-face training takes place exclusively on site, ‘in presence’. A virtual live event can take place as a Teams meeting, Webex event or stream. It is not a recording, but a live event. This enables interaction through online polls, discussions, Q&A sessions, chats, etc.

The results are almost comparable in quality. Above we have explained which format to use and when.

This is not an either/or decision. Real behavioural change occurs when you have multiple contacts with the target group via different channels.

  • E-learning is perfect for imparting knowledge, testing it and presenting it to the auditor as proof.
  • A live event creates a high level of personal involvement with live hacking demos and stories from the inside, enabling interaction, direct feedback, Q&A sessions and social proximity.

Both formats have their purpose.

We are generally flexible, but have ‘best practice’ formats between 30 minutes and 2.5 hours that have proven their value over the years, depending on the topic and the target group. Live hacking events for managers are often shorter, as this target group only has limited time. A break should be planned for events lasting longer than 2 hours.

In principle, yes - if the participants actually take part.

  • At virtual events, phone calls, emails or other people can quickly distract from the event, which is practically not the case at a face-to-face event in a room. However, we do a good job of keeping participants ‘on track’ with exciting topics and interaction.
  • The Q&A sessions are equally effective at both events.
  • The social interpersonal component and networking naturally suffer at a virtual event.
  • On the other hand, virtual live hacking events can be planned much more flexibly, do not require room planning and have an almost unbeatable price/performance ratio.

We offer our live hacking events in German and English.

Yes, this is possible for an extra charge. However, we do not recommend this, as a live event thrives on its interactivity. Instead, we recommend offering additional dates or relying on replicable measures such as e-learning, videos or the intranet.

Yes, we can customise our standard content to your company and your specific topics at any time. We take into account your policies, such as password rules, and explain the proper reporting channels.

We are also happy to include specific examples of attacks from your company.

And for all those who dare, we can also run a tandem event with security specialists such as CISOs, ISOs or Cyber Defence Centres. We explain how the attackers proceed, you explain how you defend against them.

Live hacking events are suitable in various ways

  • to inform top management about the security strategy.
  • to win managers as role models and multipliers.
  • as a kick-off event for a security awareness campaign.
  • as a training event after a phishing simulation.
  • as an event for Cyber Security Month.
  • as fixed training courses within the cyber security curriculum

Security awareness campaigns are our speciality. Feel free to contact us. 

Yes, both in our best-practice standard and by individual arrangement.

Examples:

  • Cyber security strategy for top management.
  • The role of the manager in cyber security.
  • Cyber security for supervisory board members / advisory boards.
  • Defence against social engineering / CEO fraud for personal assistants and accounting.
  • Phishing attacks on HR departments through unsolicited applications, etc.

Create even more security awareness

Phishing Simulation Test HvS IS-FOX

Our phishing tests measure, sensitize and train in one go.

Read more
Cyber Security Training preview

Modern and entertaining IT security trainings protect your company from attacks and their consequences.

Read more
Test löschen Preview Bild

IT security training for administrators with interactive e-learning and hacking environment.

Read more
IS-FOX Security Awareness Kampagne

Sensitize your employees, managers, administrators and developers with a holistic cyber security awareness campaign

Read more