Awareness Training

Security Awareness Training

Raising awareness among own employees as a preventive foundation
Companies' own employees represent a major security gap - knowingly and unknowingly. The technical measures taken by companies and public authorities for cyber security only take effect when their own employees behave in a security-conscious manner. Often, however, this is precisely where sensitization and awareness are lacking.

There are a wide variety of reasons for this:

  • Circumvention of safety measures due to lack of understanding or motivation
  • Digital carefree
  • Reliance on technical protection mechanisms
  • Rejecting ownership of information security
  • Lack of knowledge of the employees

Companies and government agencies should focus on their employees to prevent serious security failures and give them the tools they need to recognize potentially security-critical situations and respond appropriately.

The Topics

General safety

An overview of the most important topics and stumbling blocks when dealing with information - analog and digital - for employees of a company.

Mobile working

Mobile working increases the potential for danger and requires employees to exercise a high degree of care. Easy-to-implement safety tips, such as a display lock and regular data backups, should be observed.

E-Mail security

E-mails have become an indispensable part of everyday communication. The dangers of fraudulent e-mails and the correct behavior in the event of attempted attacks must be taken into account.

Social Engineering

Nowadays, it is essential to protect employees from fraudsters on the Internet or by phone. Tips and preventive measures can help protect employees from such attacks.

Safe workplace

Basic rules for handling IT devices and information as well as regulations such as a clean desk policy.


Protection against malware, the need for updates, and the separation of private and business matters. Especially with regard to social media, this can be a challenge for many employees.

Information classification

The classification of documents, data and information into so-called confidentiality classes is a necessary process to protect confidential information of all kinds.

Plant security

The protection of industrial plants is of paramount importance. This includes both physical and technical protection to prevent unauthorized access and industrial espionage.

But who among your employees or listeners shouts hurrah when this topic comes up? Scorned as a boring and highly technical subject for paranoids, very few would voluntarily attend a lecture.

We present the topic in a humorous and understandable way for every non-technician in a live hacking show - far away from dry slide lectures. Your audience will experience live which common threats are currently at the top of the hackers' list. How does an attack make itself known? How might I have been able to recognize it? But above all, one thing is important to us: we don't just want to show what's possible, we want to demonstrate in concrete terms what users can do to make life really difficult for hackers. Embedded in accompanying awareness-raising measures, the goal of our live hackings is to leave the audience inspired and with many tips and tricks for more information security in their everyday work.

Live hacking concept
We will work with you to create a live hacking program tailored to your company's needs

For your employees, we conduct a live hacking event geared to the needs of a user without a technical IT background. The audience learns which warning signals to look out for and what they can do to offer hackers as little attack surface as possible.

Managers have a different perspective on information security than employees. They also have a role model and leadership function. With our live hacking specifically tailored to executives, we address these particularities.

Your IT staff can learn about the latest hacking tools and capabilities. Our show is conducted by IT security experts who have a lot of experience in detecting security vulnerabilities and have many a "inside scoop" to share. Questions from your IT staff can, of course, be fully answered at an appropriately technical level.

The ICS live hacking event uses a scenario that is not only comprehensible to engineers to illustrate the points at which an attacker can strike and the possibilities for attack in a network consisting of classic office IT, control network and plant control.

Tailored to you and specific to your target group.

Together with you, we select the appropriate topics for the show so that your IT guidelines are optimally complemented by live hacking. We would also be happy to advise you on the choice of topics. We recommend a duration of 90 minutes to cover the most important information security trends. However, shorter or longer shows are also possible. Our event is also ideal as a whimsical contribution to an evening event or conference.

We offer target group-specific variations - you want to train executives specifically? Then ask for our executive live hacking. Here we specifically address the information security requirements for managers. We are also happy to teach your IT employees more about the technical possibilities of hackers.

Contact request
Do you have any questions about our Awareness Training offerings?
Do you have any questions about our Awareness Training offerings?

Send us an inquiry via the contact form. We are happy to help.

Seite 1