×

Live-Hacking Events

Password Hacking, Cyber Attacks and Co. Nothing sensitizes and trains as well as live hacking, classroom training and virtual live-hacking.

This video will be loaded from YouTube while playing. By clicking here you accept the data protection declaration of HVS Consulting / IS-FOX and YouTube.

Live hacking events: Topic overview

Depending on the topic, our live hacking events last 60-120 minutes and are aimed at all of your company's employees. Our focus is on presenting a key topic with live hacking demos in a format optimized for web conferences. This creates a personal impact and provides concrete tips for secure behavior in everyday life. You can find our topics here:
Fit for Cyber Security

Immerse yourself in the world of cyber security with comprehensive basics. The topics are in particular

  • Recognizing and fending off phishing
  • Social engineering
  • Viruses and malware
  • Security when working from home
  • Cloud & social media
  • Passwords

Interactive online surveys and discussions mean you are not just a spectator, but part of the action.
Happenings.

Recognizing and fending off phishing

You will learn about the various attack scenarios and receive practical tips:

  • Recognize and fend off phishing
  • Recognizing real and fake links
  • How to unmask a fake link
  • Email attachments and how to deal with them

Supported by live hacking, practical demonstrations and interactive elements

Phishing next level

Welcome to the next generation of phishing methods. This is what you can expect in this live hacking event:

  • Overview of phishing methods beyond email:
    • SMS
      WhatsApp
      QR codes
  • Voice phishing
  • The importance of MFA
  • Tips on how you can protect yourself
  • Practical examples
Anatomy of a phishing attack

Phishing is one of the biggest cyber threats to businesses, but how exactly do attackers go about it? Find out here:

  • how attackers choose their victims
  • how phishing pages and corresponding emails are created
  • what drastic consequences a wrong click in an email can have
  • How you can recognize attacks and protect yourself

Supported by live hacking, practical demonstrations and interactive elements

Anatomy of a ransomware attack

Ransomware is the biggest cyber threat to businesses right now, but how exactly are attackers operating? Find out here:

  • How do attackers choose their victims?
  • How are companies infected?
  • How do ransom negotiations work?
  • What role do employees of a company play?
  • How can you recognize attacks and protect yourself?

Supported by live demos and examples of real incidents

Passwords secure and simple? It is possible!

Valuable tips and tricks on passwords and password managers. Find out with exciting live hacking demos:

  • How quickly passwords can be cracked
  • How to create simple but hard-to-crack passwords
  • How you can memorize passwords
  • If you can trust password managers
  • If additional codes via SMS or app actually increase security
  • If you should still change your passwords or not
Cyber Security @ Home: Chapter 1

Exciting insights and practical tips for more cyber security at home:

  • How does virus detection work?
  • Which devices should have virus protection?
  • Is Apple Macintosh truly more secure than Windows?
  • Can or should you make backups in the cloud?
  • Can you trust password managers?
  • Do one-time codes via SMS or app really provide more security?

We will actively involve you in the live event with practical examples, interactive online surveys and direct Q&A sessions.

NEW: Cyber Security @ Home: Chapter 2

You'll gain exciting insights and practical tips on how to take your cyber security at home to a new level.

  • Which phishing scams do criminals use specifically for private individuals?
  • How are victims exposed to psychological pressure?
  • How can you protect yourself?
  • What security settings should you look out for on smart home devices?
  • How can you secure your internet router?
  • How can you restrict your child's apps and usage times?
  • How can you use and save passwords across devices?

Interactive online surveys and direct Q&A sessions will make you part of the event.

NEW: Attacks on smartphones & co.

This interactive live event deals with important questions that are of interest to every smartphone owner:

  • How do virus scanners work on smartphones and tablets? Are they even useful?
  • Why do criminals like to attack mobile devices?
  • How do company devices differ from private devices?
  • Practical tips on how to recognize and ward off threats

A highlight of the training is the demonstration of the performance of a spy Trojan for mobile devices.

NEU: Social Engineering mit KI

Psychological tricks and deceptions are even more dangerous with artificial intelligence. Discover more:

  • What is social engineering?
  • What perfidious methods do criminals use?
  • How do attackers physically penetrate secure buildings?
  • How are victims manipulated?
  • How are fake phone calls created with AI?
  • What are deep fakes and how are they used?

Supported by numerous examples and live demos.

The formula for success of a good presentation: infotainment

We combine the "show" of live hacking demos with real knowledge transfer. So we don't just "boo", but also explain very concretely how to protect yourself.

And we tell the inside story, background information and the effects of real attacks.

Illustration of an evaluation scale

See for yourself

We will be happy to show you how we will inspire your target audience via WebEx, Teams or Zoom.
Contact

Participant comments on our live hacking events and online seminars

Most important questions about our Live-Hacking events answered

We support our training sessions and keynote speeches with live demonstrations or live hacking sessions, in which we show very specifically what happens during a ransomware encryption or how quickly we can crack passwords live, forge senders, and so on.

Live-training can take place virtually or in-person. In-person training exclusively happens on-site.

We offer a wide range of best-practice formats ranging from 30 minutes to 2 hours. For example, we provide presentations for CxO-level, training for executives, as well as training for all employees. Topics include email and phishing security, ransomware, basic cybersecurity training, secure passwords, social engineering, the anatomy of a cyber-attack, secure work in the office and from home, and much more. We can adjust the difficulty level to your target audience.

E-learning is a good start, but real awareness arises when contacts are made regularly and through various channels. And to be honest: nothing is more efficient than a live training with practical examples, time for questions, and info-tainment including live hacking.

A Live-Hacking Event lasts between 30 minutes and 2.5 hours, depending on the topic and the audience. For example, trainings for executives are often shorter as they have less time. However, for events lasting more than 2 hours, a break should be scheduled.

In principle, yes, but being in-person makes it less prone to distractions. In virtual events, we often notice that phone calls, emails, or other people can quickly distract from the event, which is practically not the case with in-person events. However, Live-Hacking Events are more flexible to plan virtually and do not require room scheduling.

We offer our Live-Hacking Events in German and English.

Yes, this is possible for an additional fee. However, we advise against it as a live event thrives on its interactivity. Instead, we recommend offering additional sessions or relying on replicable measures such as e-learning, videos, or intranet.

Yes, we customize our standard content to your company. We take into account your policies, such as password policies, and explain your reporting procedures. We are also happy to incorporate specific examples of attacks on your company.

Live-Hacking Events are suitable, for example, for sensitizing executives, as they serve as role models and multipliers. They can also be used as kickoff events to create understanding for upcoming awareness measures. Furthermore, they are well-suited as accompanying training measures after a phishing campaign and as a complement to e-learning and intranet content.

Yes, there are special variants for different target groups, such as in-depth phishing training, executive trainings, etc.