Stage program
Digital Business
(Un)Sicherheit hautnah: Wie Hacker Cyber-Attacken durchführen
10.09.2025
15:15 - 16:00
T Stage | Level 0
Live hacking - IT security can be thwarted so easily. In this session, we show live how attackers penetrate systems (including modern AI systems) - from simple phishing tricks to real vulnerabilities in web applications and IT infrastructures. You will experience first-hand how quickly small mistakes can lead to major security risks. An exciting insight into the mindset of hackers - practical, understandable and with an "aha" effect and practical customer references.
Topics & Technologies
Cyber Security
Internet of Things
Enterprise Applications
About this session
What does the exhibit look like
- Live demo on a monitor
How the topic can be presented
- Customers can come to the exhibit and we show live how penetration tests are carried out at customers' premises.
What is the main content?
- Demonstration of real attack vectors: live hacks such as phishing, password cracking, SQL injection or session hijacking.
- Understanding the mindset of attackers: How hackers go about it, what tools they use and where typical vulnerabilities lie.
- Strengthening security awareness: What companies and employees can do specifically to protect themselves.
- Interactive elements: Participants are actively involved - e.g. through live polls, small challenges or the joint identification of vulnerabilities.
- Live demo on a monitor
How the topic can be presented
- Customers can come to the exhibit and we show live how penetration tests are carried out at customers' premises.
What is the main content?
- Demonstration of real attack vectors: live hacks such as phishing, password cracking, SQL injection or session hijacking.
- Understanding the mindset of attackers: How hackers go about it, what tools they use and where typical vulnerabilities lie.
- Strengthening security awareness: What companies and employees can do specifically to protect themselves.
- Interactive elements: Participants are actively involved - e.g. through live polls, small challenges or the joint identification of vulnerabilities.