Use a seasoned ethical hacker as a guest speaker or moderator.
Looking for a guest speaker on hacking, ethical hacking, forensic research and cybersecurity? That's possible! A passionate hacker from Sectricity provides an inspiring session at your conference or meeting.
Preben explains how hackers work and he proudly talks about his findings, such as the privacy leak on Facebook or the error that allowed him to execute code on Snapchat servers. Meanwhile, there are already more than 50 serious security errors at companies about which he can tell anecdotes.
With every speech we give, we show people the different things they've never seen before.
Hendrik explains how a forensic investigation goes and what you can find digitally. His other hobbyhorses are the security of Radio Communications or Industrial Control Systems.
What we tell you is experienced and experienced by the public from a hacker's perspective.
During the hacking speeches, people can really experience what it's like to be hacked, as well as sometimes learn a little bit of hacking themselves. Sometimes people learn during the sessions that they have already been hacked.
And finally, you can count on Yves for a keynote or general session on the importance of security awareness for companies. He has already successfully supervised countless security awareness programs and talks from his own experience.
We clearly explain why the human firewall is just as important as the technical firewall.
In this way, even non-technical people in the audience will certainly get the message along with them!
Our philosophy is to let security speeches be experienced and enjoyed from a hacker's perspective. No boring powerpoints, but passionate hackers in their best! Every speech is packed with practical examples and live hacking moments - that stick!
- Various security risks are addressed
- Learning session adapted to a group of participants
- Interspersed with live examples
- Cybersecurity in human language
- Real anecdotes
- Cyber advice
- Ethical Hacking
- The story of a hacker
- How does a hacker work
- Trendwatching cybercrime
- Security Awareness
- Phishing Awareness
- Forensic Research
- Wireless Security
- On request