Plan your live hacking show now and create security awareness

Experience how hackers work, think and act to steal your data, disrupt processes and cause damage.

Configure Live Hacking Show now Book a free initial consultation
Unique infotainment show from 30 - 90 minutes

We adapt the live hacking to the time available and offer a time for questions afterwards.

Continuous adaptation to current threats

Criminals are constantly adapting their scams and methods of attack. So does our live hacking show.

Individually tailored to your audience

Career starters, professionals or experts? We have the right content and live hacking for all target groups.

Live Hacking & Cyber Security Shows

We have already offered live hacking shows for companies of all sizes

The professional preparation and follow-up of events is part of our daily business. We regularly speak to hundreds of people about the business of cyber criminals on the Internet. Don’t take any risks – we put on hundreds of shows a year and can draw on an extensive pool of speakers.

The way to your live hacking show

Live Hacking Show - professionell durchgeführt

1. establishing contact & exchanging initial details
After you have contacted us, we will schedule an initial meeting in which we will exchange information. We reserve your event subject to reservation. You will then receive a quote.

2. acceptance of the offer and reservation of the appointment
Your appointment is reserved as soon as you have accepted the offer. You will receive an order confirmation. All event details must now be finalized.

3. individualization, technical check and implementation
Depending on your wishes, we can customize the live hacking show to the target audience, organization or location. If required, we will carry out a technical check and perform the show.

4. editing the recording, sending the slides and invoicing
If the show has been recorded, it will be edited. We can send the films on request. We then take the liberty of invoicing for the service.

Create awareness for the topic of information security

Understanding how hackers think

Digital attacks are diverse. How do criminals think and how can anyone get caught in the digital crosshairs? Find out!

Low-threshold, for every target group

Every live hacking show is only as complex as it needs to be. We guaranteed a target group-oriented approach.

Entertaining with added value

Experience our dynamic show. Live and individual every time. With us you don’t get a PowerPoint battle.

Tips for private and professional life

Give your audience valuable tips and tricks for more digital security in their private and professional lives.

Possible content for your show

A live hacking show has one focus. You can select these focal points. Customized shows are made for you and can cover topics that are not listed.

Attacks on the password

Show your audience how insecure the use of passwords is. Whether guessed or cracked, we show you the challenges of dealing with passwords.

Call ID spoofing

Falsifying telephone numbers on the telephone display is a popular method for criminals to gain authority. We will show you how you can protect yourself.

Phishing attacks & ChatGPT

Sophisticated phishing emails sent to the right person at the right time are a major threat. With the help of AI, we show you live how modern criminals operate on the Internet.

Search engine hacking

Sensitive information can easily be found on the Internet and with the help of search engines. We show you how it works and how you can protect yourself.

WLAN & Network Hacking

Wireless networks can be dangerous for. the confidentiality of information. We show you live which attacks are still possible today.

Ransomware infection

Ransomware is the biggest threat to organizations of all kinds. Suddenly unable to act. Experience with us how lucrative the business is and how quickly infection occurs.

An excerpt from our speakers


Wojzechowski, MSc

Managing Partner

Chris Wojzechowski is an experienced IT security expert and speaker at AWARE7 GmbH who specializes in cybersecurity training and awareness-raising. With his practical and clear presentation of complex topics, he supports companies and organizations in optimizing their security measures and arming themselves against current threats.


Hörnemann, MSc, T.I.S.P.

Authorized signatory, Chief Operating Officer

Jan Hörnemann is an authorized signatory and external information security officer (ISB) at AWARE7 GmbH. With his in-depth expertise in IT security and his many years of experience, he helps companies to develop and implement their security strategies to ensure a high level of protection against cyber threats.


Henning, BSc, OSCP

Speaker & Penetration Testing Expert

Thomas Henning is a certified OSCP pentester and holds a Bachelor of Science degree. At AWARE7 GmbH, he uses his extensive expertise and analytical skills to uncover security gaps in IT systems and develop customized security solutions.


Krüger, MA

Speaker & expert for digital learning

Benjamin Krüger has many years of experience as a learning expert and holds a Master of Arts (MA). At AWARE7 GmbH, he develops innovative training concepts and programs to sustainably strengthen the awareness and skills of employees in the area of IT security.


Prof. Dr. Matteo Große-Kampmann, MBA

Head of Research & Development

Prof. Dr. Matteo Große-Kampmann is Head of Research and Development at AWARE7 GmbH. With his extensive scientific expertise and innovative approaches, he drives the development of new technologies and security solutions in order to continuously improve IT security and set forward-looking standards.


Bothe, MSc

Speaker & IHK Examination Board

David Bothe, MSc, is an experienced IT security expert at AWARE7 GmbH and a member of the IHK examination board. With his in-depth expertise and practice-oriented approach, he makes a significant contribution to education and training in the field of IT security and supports companies in implementing effective security strategies.

Callback service

Write to us with your request. We will be happy to call you back at a specific time.

Appointment service

Arrange a digital appointment with us so that we can discuss your requirements.

Contact form

Leave a message via our contact form. We will get back to you.

Find out more about our completed projects

Success stories

Group-wide awareness campaign for Gelsenwasser AG

Together with AWARE7 GmbH, Gelsenwasser AG carried out an extensive, multimedia cyber security awareness campaign for around 1,500 employees.

Remote cybersecurity awareness event for Payback GmbH

PAYBACK GmbH has booked AWARE7 GmbH for a remote live hacking awareness show to prepare and sensitize employees to digital threats.

Emergency deployment in the district of Dachau

At 9:00 am the speaker was canceled, we were called at 10:00 am. At 17:00 we were on time in Dachau to enrich the planned event with a live hacking presentation.

Remote Live Hacking Show at the Security Days at Munich Re

The world’s largest reinsurer has been relying on our expertise for several years. In recent years, we have always been represented at the internal Security Days.

External penetration test for the mobile iOS application of Twinsoft GmbH & Co. KG

We carried out an extensive penetration test of the BioShare Authenticator app and the backend for Twinsoft GmbH & Co.

Take a look at all the success stories
and download them free of charge

We have been carrying out various types of projects. The satisfaction is reflected in the release of a success story. Take a look at all our success stories now.

All success stories

Plan your next live hacking show now

We are our best customer

As an information security consultancy, the demands placed on its own systems are high. All employees are aware that improvement as part of the PDCA cycle is necessary for an increased level of information security maturity.

We have decided to have our ISMS certified in accordance with ISO 27001 in order to be able to present this claim to the outside world. The scope includes all locations, employees, business processes and assets. The certificate can be downloaded free of charge.

We know what we are talking about, are familiar with the challenges of project planning and maintain close contact with auditors.

AWARE7 ISO 27001 certified
AWARE7 GmbH - ISO 27001 certified - Seal

FAQ – Frequently asked questions

What is a live hacking show?

During a live hacking session, (certified) specialists demonstrate how a digital attack can be carried out. The target of the attack can be a company or a private individual.

What is shown during a live hacking?

From the theft of a password to a multi-layered attack and infection with an encryption Trojan, many interlinked aspects can be introduced during the demonstration. Organizers and live hackers should ensure through an exchange that the content of the show fits the target group, is understood and does not underchallenge them.

How long does a live hacking show last?

Most customers are interested in a show lasting between 30 and 90 minutes. Depending on the desired event format, the show can be extended to include a Q&A session.

Are laws broken during live hacking?

Live hackers must also comply with applicable laws. This particularly affects §202c StGB. For training purposes, however, realistic live hacking can be carried out with a permit agreement, without the organizer or the lecturer being threatened with legal consequences.

Can live hacking also be considered a lecture in the field of digitalization?

Yes, live hacking addresses numerous aspects of digitalization. The aim is to empower the audience rather than deter them. The shows therefore also partly consist of tips and tricks for using digital media.

Is a live hacking show also possible in other languages?

AWARE7 Live Hacking is available in English as well as German. Polish, Spanish, Turkish and Portuguese are available on request.

Can live hacking also be carried out remotely?

Yes, the show about security gaps and vulnerabilities can be carried out both remotely and on-site. Both formats have their advantages and disadvantages. Book a free appointment now to find out the best format for your event.

Can the live hacking show be recorded?

Yes, the show can be recorded under certain conditions. Multiple utilization is possible. The video can be used to fill your own e-learning module. After consultation, the video can also be made available on popular video portals. We will be happy to provide you with an individual offer, which you can find further details in.

Can my organization also be attacked during live hacking?

If required, we can customize the live hacking to your organization. We recommend the recording, development and provision of live hacking as e-learning for individualization.