Product
Awareness Training

Raising awareness among own employees as a preventive foundation

Companies' own employees represent a major security gap - knowingly and unknowingly. The technical measures taken by companies and public authorities for cyber security only take effect when their own employees behave in a security-conscious manner. Often, however, this is precisely where sensitization and awareness are lacking.

There are a wide variety of reasons for this:

  • Circumvention of safety measures due to lack of understanding or motivation
  • Digital carefree
  • Reliance on technical protection mechanisms
  • Rejecting ownership of information security
  • Lack of knowledge of the employees

Companies and government agencies should focus on their employees to prevent serious security failures and give them the tools they need to recognize potentially security-critical situations and respond appropriately.

The Topics

General safety

An overview of the most important topics and stumbling blocks when dealing with information - analog and digital - for employees of a company.

Mobile working

Mobile working increases the potential for danger and requires employees to exercise a high degree of care. Easy-to-implement safety tips, such as a display lock and regular data backups, should be observed.

E-Mail security

E-mails have become an indispensable part of everyday communication. The dangers of fraudulent e-mails and the correct behavior in the event of attempted attacks must be taken into account.

Social Engineering

Nowadays, it is essential to protect employees from fraudsters on the Internet or by phone. Tips and preventive measures can help protect employees from such attacks.

Safe workplace

Basic rules for handling IT devices and information as well as regulations such as a clean desk policy.

Internet

Protection against malware, the need for updates, and the separation of private and business matters. Especially with regard to social media, this can be a challenge for many employees.

Information classification

The classification of documents, data and information into so-called confidentiality classes is a necessary process to protect confidential information of all kinds.

Plant security

The protection of industrial plants is of paramount importance. This includes both physical and technical protection to prevent unauthorized access and industrial espionage.

Sensitize your team with secunet Awareness Training

The goal of our awareness program: employees recognize the benefits of cybersecurity and change their behavior toward greater security on their own - through self-awareness and practice.

Step 1 of 4
Step 1
Step 2 of 4
Step 2
Step 3 of 4
Step 3
Step 4 of 4
Step 4

The goal of our awareness program: employees recognize the benefits of cybersecurity and change their behavior toward greater security on their own - through self-awareness and practice.

In the implementation phase, we jointly determine the time schedule at which the measures will be carried out. Here, we support you with the creation of the appropriate content at the right time. Of course, particularly labor-intensive times (e.g. the end of the year) or vacation periods are also taken into account accordingly.

Throughout the entire program, we remain in intensive discussion with you and look together at how the individual measures are working. We can adjust the measures through readjustments. In addition, we provide further tips and suggestions on how to continue raising awareness among employees independently after the program. 

We are always available for you!

With the various evaluation measures before, during and after completion of the program, we can measure what progress the employees have made. If required, the results can be prepared in a report suitable for management.

But who among your employees or listeners shouts hurrah when this topic comes up? Scorned as a boring and highly technical subject for paranoids, very few would voluntarily attend a lecture.

We present the topic in a humorous and understandable way for every non-technician in a live hacking show - far away from dry slide lectures. Your audience will experience live which common threats are currently at the top of the hackers' list. How does an attack make itself known? How might I have been able to recognize it? But above all, one thing is important to us: we don't just want to show what's possible, we want to demonstrate in concrete terms what users can do to make life really difficult for hackers. Embedded in accompanying awareness-raising measures, the goal of our live hackings is to leave the audience inspired and with many tips and tricks for more information security in their everyday work.

Tailored to you and specific to your target group.

Together with you, we select the appropriate topics for the show so that your IT guidelines are optimally complemented by live hacking. We would also be happy to advise you on the choice of topics. We recommend a duration of 90 minutes to cover the most important information security trends. However, shorter or longer shows are also possible. Our event is also ideal as a whimsical contribution to an evening event or conference.

We offer target group-specific variations - you want to train executives specifically? Then ask for our executive live hacking. Here we specifically address the information security requirements for managers. We are also happy to teach your IT employees more about the technical possibilities of hackers.

For your employees, we conduct a live hacking event geared to the needs of a user without a technical IT background. The audience learns which warning signals to look out for and what they can do to offer hackers as little attack surface as possible.


Managers have a different perspective on information security than employees. They also have a role model and leadership function. With our live hacking specifically tailored to executives, we address these particularities.


Your IT staff can learn about the latest hacking tools and capabilities. Our show is conducted by IT security experts who have a lot of experience in detecting security vulnerabilities and have many a "inside scoop" to share. Questions from your IT staff can, of course, be fully answered at an appropriately technical level.


The ICS live hacking event uses a scenario that is not only comprehensible to engineers to illustrate the points at which an attacker can strike and the possibilities for attack in a network consisting of classic office IT, control network and plant control.


Live hacking concept
We will work with you to create a live hacking program tailored to your company's needs
Step 1 of 4
Step 1
Step 2 of 4
Step 2
Step 3 of 4
Step 3
Step 4 of 4
Step 4

We will advise you on the selection of topics and work with you to find the right messages. We will also clarify the necessary technical requirements. Contact us using the form below to make an appointment for a personal meeting.

We bring our own hacking equipment and set it up on site at your location. We will clarify the technical requirements (e.g. two beamers, two screens, microphones, etc.) with you in advance.

Feel free to let us know afterwards how you liked the demonstration - because we want to keep improving!

You can choose the focus individually depending on the desired direction of your awareness campaigns. Possible focus topics:

  • Basic IT security awareness
  • CEO Fraud
  • social engineering
  • Encryption Trojans or Ransomware
  • The Darknet
  • Mobile systems, smartphones and tablets
  • Anything that transmits
  • Gimmicks with USB ports
  • Admin special
  • Executive Special
Contact request
Do you have any questions about our Awareness Training offerings?
Do you have any questions about our Awareness Training offerings?

Send us an inquiry via the contact form. We are happy to help.

Site 1