Skip to Content
Event SECURinsights 2026 starts on Sep 3, 2026, 12:00:00 PM (Europe/Berlin)
[Masterclass] Plug, Play, Exploit: Mastering Modern Hardware Attacks

[Masterclass] Plug, Play, Exploit: Mastering Modern Hardware Attacks

Tech
Location: Laboratory - 9/3/26, 4:30 PM - 9/3/26, 6:00 PM (Europe/Berlin) (1 hour 30 minutes)
[Masterclass] Plug, Play, Exploit: Mastering Modern Hardware Attacks
Tobias Scheible
Tobias Scheible
Tobias Scheible is an information security expert with a strong focus on hardware security, penetration testing, and real‑world attack techniques. He has spent many years working and teaching in the field of IT security, combining academic research with hands‑on offensive and defensive security practices. Alongside his writing and research, he is an experienced lecturer and trainer, delivering practical cybersecurity workshops and training sessions for professionals across industries.

Modern security threats no longer originate only from software vulnerabilities or online attacks — increasingly, they are enabled by physical access and inexpensive hardware tools that can silently compromise systems within seconds. In this hands‑on masterclass, participants step directly into the attacker’s perspective and explore how real‑world hardware attacks are executed and how they can be prevented.

Using a fully equipped mobile hardware lab with six dedicated stations, participants work with preconfigured laptops, attack tools, and guided exercises that simulate insider threats, manipulation of devices, and covert data exfiltration. The session provides a practical introduction to the tools, techniques, and tactics used by adversaries, enabling participants to recognize suspicious devices, understand common attack vectors, and apply effective countermeasures.

By the end of the workshop, attendees will be able to identify hardware threats, evaluate their impact, and implement concrete defensive actions to protect their organization from physical-layer compromises. This masterclass is designed for practitioners who want to deepen their technical skillset and gain real, operational insight into hardware-based attacks.

Ideal for:

  • Security Engineers and Technical Practitioners
  • Penetration Testers and Red Team Members
  • Blue Team and Detection Engineers
  • SOC Analysts with an interest in physical attack vectors
  • IT Security Administrators and Infrastructure Specialists
  • Incident Responders and Forensics Specialists
  • Security‑aware IT Managers and Technical Leads
  • CISOs and Security Decision‑Makers who want hands‑on exposure to real‑world attack techniques
  • Anyone responsible for protecting endpoints, workplaces, or critical devices against insider threats and physical compromise