Just another live:hacking

How unsafe is safe enough?
  • Event format
    everyone
  • Lecture length
    30 to 120 Minutes
  • Audience size
    30 to 900
  • Lecturer
    Philipp Kalweit
The awareness of safety and the desire for user-friendliness are diametrically divided. It is therefore not surprising that a standard of user-friendliness has become established in the private sector. Security only plays a minor role - however, IT Security is a macrosocial topic:

In this way, we are becoming increasingly aware of the risks of digitalisation. But you can only take preventive actions if you are aware of the risks. Don't miss this opportunity and protect yourself before it's too late: With an exciting presentation I would like to give you a painless access to this topic and arouse your interest - and what would be better for that than live:hacking?

Let us show you impressively - and live - how easy it is to manipulate information technology processes. A 60-minute sensitization that you should not miss.

Philipp Kalweit stands for a relaxed atmosphere, anecdotes and in-depth experience from management consulting. Sensitization cannot be better.

It awaits you an unconventional live hacking.

Philipp Kalweit has been providing convincing experiences in the field of IT Security for more than four years and has already been present on stages of the Bundesamt für Sicherheit in der Informationstechnik (Federal Office for Security in Information Technology), the Bundesverband der IT-Anwender (the Federal Association of IT Users), at congresses and exhibitions such as re:publica or CeBIT, as well as many others.

live:hacking

live:hacking
70%
Interaction [Audience]
40%
Sensitization
80%
Let us show you impressively - and live - how easy it is to manipulate information technology processes.

Everything but standard

Our live:hacking inspires!
It is important to us to deliver a great performance, but also to pay attention to our content. Our primary goal is to sensitize people regarding to IT Security.
Diverse - We only offer individual lecture slots tailored to the event.

Therefore, if you don't find a suitable subject area, don't hesitate to work out a new one with ous.


- Attacks against operating systems
- Attacks against mobile devices
- Wi-Fi security
- Firewalls and protection zones
- Denial of Service
- Attacks against web applications
- Attacks against POS systems
- Exploring TCP/IP Ports
- Cryptography in action
- Footprinting
- Fingerprinting using Nmap
- Categories of Malware
- Functionality of sniffers
- SMTP Enumeration
- Authentication on Microsoft environments
- Session hijacking
- SQL injection
- Physical security
- Alternative methods of penetration testing
- Cloud technologies
- Information Security: Data Centers
- Basics of system integration
- Honeypots
- Attack vectors: ATMs
- Use of Near Field Communication [NFC] for attacks
- Bypassing of hardware firewalls
- Social engineering [Applied social studies]
- Bypassing physical security measures
- Mobile payment terminals (attack vector exploited in called back engineered app)


Philosophy

- Does digitization make our social fabric vulnerable?
- Does digitization bring our society into a state of dysfunctionality?
- How much "safety awareness" is enough?
- What dangers are associated with information technology systems?
- Can information technology have an impact on our society?
- Establish Code of Conduct and ethical standards


Social Studies

- Does the human factor represent a relevance for security in information technology?
- Which dangers go along with the human individual in view of security criteria?
- Acquiescence - the power of the words
- How young people can be inspired by information technology despite our school system
- Educational concepts to motivate young people to try programming

Unmistakable

In our premium program we show you live on site possible attack vectors of ATMs. We do not only rely on photos, but also on real hardware. For an extra charge we will take our ATM to your event.
Arrange a free and non-binding consultation now.
By accessing this site, you consent to the use of cookies in accordance with our Privacy Policy. Additional information