Skip to content

Services, Wiki-Artikel, Blog-Beiträge und Glossar-Einträge durchsuchen

↑↓NavigierenEnterÖffnenESCSchließen
How much does Live-Hacking cost?
Security Awareness

How much does Live-Hacking cost?

Live hacking is a great way to raise employee awareness in the short term and is great for starting an enterprise-wide awareness campaign. W...

Chris Wojzechowski Chris Wojzechowski Geschäftsführender Gesellschafter
Updated: October 9, 2024 3 Min. read
IT-Grundschutz-Praktiker (TÜV) IT Risk Manager (DGI) § 8a BSIG Prüfverfahrenskompetenz Ausbilderprüfung (IHK)
Table of Contents (3 sections)

Live hacking is a great way to raise employee awareness in the short term and is great for starting an enterprise-wide awareness campaign.

What Live Hacking is?

Live hacking is a lecture format. It is often used to make employees aware to IT security issues. The speakers carry out previously selected and planned hacking scenarios. This can be quite impressive and increase the attention to IT security in the company. In the most strategically efficient way, live hacking can be done at the beginning of a company-wide awareness-raising campaign. Due to the high entertainment value, live hacking can also be a one-time infotainment talk, for example at an evening event.

Criticizing Live Hacking

In a perfect world, one live hacking would be enough and listeners will no longer use weak passwords and recognize phishing in their sleep. Unfortunately, this is not the case as it is a long way from taking up knowledge to putting it into practice. Attacker strategies often change and it is a real transfer to recognize an old fraud in new packaging. In addition, live hacking is often criticized only to show the “half truth”. Many live hackings rely too much on the “show effect” and show attacks on obsolete systems with security mechanisms disabled. This often causes panic reactions of the kind “I never use a computer again”. A reaction that should not be produced by a live hacking. A live hacking should sensitize and empower employees to define their own risk and protection level. Scare tactics and the development of resentment should not be the claim of a professional live hacking. We at AWARE7 therefore prefer to use elements of story-telling in some cases. In particular, our topics in the area of ​​“Social Engineering” live on it, for example, if we offer you the chance to win five euros.

How much does Live Hacking Cost?

It has been very difficult to find prices for live hacking until recently. As a result, prices and services of the providers are not really comparable. Frequently, individual offers are created so that the market is not transparent and customer-unfriendly. AWARE7 goes a new way to bring a little light into the dark. We publish our pricing structure and increase the transparency of the market. The packages Basic and Standard are especially interesting for small and medium-sized companies. The “Premium” package can be customized in such a way that the price is also determined individually. We also want to offer individual prices for charities and events, as we focus on the wide spread of knowledge for individuals in this case. A selection of non-profit companies and other partners we have supported in the past at events or in penetration testing can be found here.

Next Step

Our certified security experts will advise you on the topics covered in this article — free and without obligation.

Free · 30 minutes · No obligation

Share this article

About the author

About the Author

Chris Wojzechowski
Chris Wojzechowski

Geschäftsführender Gesellschafter

E-Mail

Geschäftsführender Gesellschafter der AWARE7 GmbH mit langjähriger Expertise in Informationssicherheit, Penetrationstesting und IT-Risikomanagement. Absolvent des Masterstudiengangs Internet-Sicherheit an der Westfälischen Hochschule (if(is), Prof. Norbert Pohlmann). Bestseller-Autor im Wiley-VCH Verlag und Lehrbeauftragter der ASW-Akademie. Einschätzungen zu Cybersecurity und digitaler Souveränität erschienen u.a. in Welt am Sonntag, WDR, Deutschlandfunk und Handelsblatt.

10 Publikationen
  • Einsatz von elektronischer Verschlüsselung - Hemmnisse für die Wirtschaft (2018)
  • Kompass IT-Verschlüsselung - Orientierungshilfen für KMU (2018)
  • IT Security Day 2025 - Live Hacking: KI in der Cybersicherheit (2025)
  • Live Hacking - Credential Stuffing: Finanzrisiken jenseits Ransomware (2025)
  • Keynote: Live Hacking Show - Ein Blick in die Welt der Cyberkriminalität (2025)
  • Analyse von Angriffsflächen bei Shared-Hosting-Anbietern (2024)
  • Gänsehaut garantiert: Die schaurigsten Funde aus dem Leben eines Pentesters (2022)
  • IT Security Zertifizierungen — CISSP, T.I.S.P. & Co (Live-Webinar) (2023)
  • Sicherheitsforum Online-Banking — Live Hacking (2021)
  • Nipster im Netz und das Ende der Kreidezeit (2017)
IT-Grundschutz-Praktiker (TÜV) IT Risk Manager (DGI) § 8a BSIG Prüfverfahrenskompetenz Ausbilderprüfung (IHK)
Certified ISO 27001ISO 9001AZAVBSI

Cookielose Analyse via Matomo (selbst gehostet, kein Tracking-Cookie). Datenschutzerklärung