Showhacking

Showhacking

Showhacking

Only those who know how hackers work and their behavior can prepare themselves and protect themselves optimally against them

In an increasingly networked and digitalized world, security vulnerabilities and threats to companies are omnipresent. While the rapid development of technologies brings many benefits, it also opens new gateways for cyberattacks and data loss. Maintaining a robust security infrastructure is a challenge that every company must face.

We support you with a team of experienced experts in preventing and defending against cyber attacks and information security incidents by demonstrating how hackers think and act.

Security Awareness Showhacking - Experience hacking live!

The basic idea of Security Awareness Showhacking is to immerse the audience in the mind of a hacker and show how the employees of the virtual company Compor AG can be misled into making mistakes. The aim is for viewers to understand how attackers operate so that they can also recognize and see through these behaviours in everyday life. In this way, a much more profound change in behavior towards security is initiated than is possible through purely web-based training or slide presentations.

Presentations on a wide variety of topics can be offered as part of a security awareness show hacking event. These can, for example, be compiled individually according to customer requirements on social engineering, technical vulnerabilities, information leakage, hacker tools, or reports on contacts with real fraudsters.

We offer flexibility in topic selection and adaptation to the technical knowledge of the audience, ensuring inclusivity. Whether your audience is technically experienced or non-IT-savvy, we can tailor the showhacking to suit their needs. The event can be held in person, hybrid, or via video stream, providing you with the choice that best fits your requirements.

Regardless of the type of presentation, this service includes:
  • A preliminary meeting to plan the event. Possible ways of individualizing the scenarios are identified and the dates for the events are set.
  • We support you in setting up the technical requirements before the event.
  • Support with the internal preparation of the event. This includes, for example, support with the moderation of the presentations.


Additional services can be provided as an option, for example:
  • Composing write-ups, articles or blog posts for internal or external channels
  • Subsequent answering of questions from the audience
  • Recording of the event and provision of video material, e.g. for internal training purposes

What’s included in our service

We offer you a wide range of different modules. These include, among others:

  • Phishing campaigns
  • Man-in-the-middle attacks
  • Search engine tricks
  • Keyloggers in hardware and software
  • Rogue access points
  • Breaking passwords
  • Attacks against web applications 
  • Darknet and crypto currencies
Do you require further information?


Do you have any questions or want more information about our offers? Please write to us! We will happily advise you on our services and work with you to find the right solution for your request.



REQUEST OFFER

Contact us!

Prof. Dr. Alexander Schinner

Prof. Dr. Alexander Schinner

Partner | Cyber Incident Response & Crisis Center (CIRCC), Business Continuity Management (BCM), Security Operation Center (SOC)
personView bio