What I do

The Cyber-Fixer

Unorthodox, unethical, unproblematic 
When Standard Solutions Don’t Cut It

You’ve been breached. Or you’re about to be. Or you’ve got a security problem that’s been eating your leadership team alive for months. You’ve hired the big consulting firms, followed their playbooks, implemented their frameworks, and you’re still stuck.

Welcome to my world. I’m the person you call when your current security approach has flatlined.

For over 25 years, I’ve been fixing the unfixable—closing cases my competition didn’t pack the gear for, solving cyber crises others abandoned, and predicting threat vectors before they became catastrophes. I don’t do cookie-cutter assessments. I don’t sell you expensive software licenses you don’t need. I fix your actual problems using an unorthodox approach built on street-smart methodology, deep technical expertise, and a network that spans law enforcement, intelligence agencies, and critical infrastructure operators globally.

The Services: What Gets Fixed

Cyber Crisis Response & Rapid Deployment

When a cyber incident strikes, you don’t need someone to hold your hand through a 90-day assessment. You need your infrastructure operational, evidence preserved, law enforcement coordinated, and business continuity restored. Yesterday.

I created the first effective cyber incident response plan in 2010, and the fundamentals are now the gold standard in organizations worldwide. When you call me in a crisis, I don’t start from zero. I activate a global network of specialized incident response teams, deploy them at breathtaking speeds, and execute a protocol that’s been refined across hundreds of real-world incidents across every continent.

What this actually does: Your incident goes from “catastrophic breach” to “contained incident with business continuity restored” while evidence is collected and law enforcement is coordinated. I do this because speed is the difference between a recoverable incident and a business-ending disaster.

Read my blog on cyber crisis protocols

Fixing Broken Security Postures with ACRAC

You’ve had risk assessments done. Lots of them. They probably identified hundreds of vulnerabilities, most of them useless noise, leaving you asking: “What do I actually need to fix?”

I developed ACRAC—the Advanced Cybersecurity Risk Assessment Checklist—specifically to cut through the bullshit. It’s not another checkbox compliance tool. It’s an open-source framework that identifies real vulnerabilities across government, public, and private organizations worldwide, prioritizes them in order of actual risk, and gives you a clear path to address them.

ACRAC has been applied globally because it actually works. It’s been validated across continents, constantly iterated based on real-world results, and it’s the foundation of my risk mitigation work today.

What this actually does: You get a brutally honest, actionable assessment of your security posture. Not hundreds of buzzwords. Not industry-standard checkbox compliance. The specific things that will actually kill your organization if they’re not fixed, listed in the order you need to fix them.

Explore ACRAC on the open-source repository

Finalizing Special Projects Others Failed

This is where the real work happens.

The field of cybersecurity is so complex and dynamic that not even common sense leads to closure of a case. Your vendors didn’t find the breach. Your consultants hit a wall. Your team can’t figure out where the attack surface actually is. The problem’s technical, organizational, political, or some unholy combination of all three.

My unorthodox approach—combining forensic analysis, social engineering, intelligence gathering, and network penetration testing with organizational and political insight—has repeatedly closed cases my competition didn’t pack the gear for. Some are published in my blog. Most are confidential. All of them share a common thread: they were intractable until I applied an unconventional methodology.

What this actually does: You fix the unfixable. The case that stalled. The attack you couldn’t trace. The insider threat you couldn’t pinpoint. The supply chain vulnerability nobody could locate. Problem solved.

Read case studies on my blog

Government & Executive Briefings

The threat landscape changes daily. New zero-days drop. New attack vectors emerge. New threat actors appear. Your decision-makers can’t make strategic choices if they’re operating on stale intelligence.

I brief governments, militaries, and Fortune 500 leadership—including the European Parliament on critical infrastructure security. These aren’t PowerPoint presentations. They’re threat landscape assessments combined with strategic implications for your organization specifically. After briefing, I maintain advisory relationships where I serve as the person who helps leadership make the right call when pressure is on.

What this actually does: Your leadership team has current, contextual threat intelligence. They understand the strategic implications for your specific situation. They make better decisions. Your security strategy actually aligns with your threat landscape rather than reacting to yesterday’s news.

See keynote topics and availability

Sustainable Cybersecurity Maturity Transformation

Quick fix? No. Some problems need you to transform your organizational security culture from reactive to proactive. Building that requires guidance based on tremendous amounts of experience and knowledge.

I’ve guided organizations through maturity transformations using advanced models that have been refined across multiple continents. This is the excruciatingly time-consuming process that actually works—thorough assessment, prioritized vulnerability mitigation, governance framework development, and cultural evolution. It’s work, but it builds real security.

What this actually does: Your organization develops genuine cybersecurity excellence. Not checkbox compliance. Real security embedded in culture, process, and technical infrastructure.

Personal Cyber Hygiene & Executive Protection

High-profile individuals are premium targets. Extortion research. Impersonation attempts to circumvent your organization’s security. Reconnaissance for kidnapping and ransom. The weakest link in cybersecurity is human—and the higher your profile, the more interesting you become to adversaries.

I provide bespoke training for you, your family, and your inner circle on best practices to avoid digital pitfalls. Think of it as “Inception,” but for your digital life—protection against sophisticated attacks designed to exploit your personal vulnerabilities to compromise your organization.

What this actually does: Your family stays safe. Your personal assets stay protected. Your organization’s security doesn’t get breached through your phone.

What You’re Reading

I maintain several publications documenting my research and thinking:

Books include “Dominance on the Digital Battlefield,” “GLINMACA—The Global Internet Magna Carta,” “Threat Assessment: Bitcoin,” and “Adding the E to Your Business Strategy.” Available on Amazon.

Papers and Research are available on Academia.edu, covering cyber terrorism, offensive cybersecurity, information warfare, digital strategy, and infrastructure protection.

Blog on lars-hilse.de covers specific threats: phishing evolution, malware in corporate espionage, man-in-the-middle attacks on critical infrastructure, SQL injection vulnerabilities, insider threats, eavesdropping risks, organizational culture in cybersecurity, AI in cyberwarfare, and more.

Experience Where It Matters

  • 25+ years in cybersecurity consulting, advisory, training, and operations
  • Degrees in electrical engineering and finance
  • Over $1 million privately funded in cybersecurity research
  • Multiple continents: Government, military, intelligence services, law enforcement, critical infrastructure, and Fortune 500 organizations
  • Predictive track record: 25 years of accurate forecasting on digital threat evolution
  • Global network: Law enforcement, intelligence community, specialized response teams, and organizational leaders

In cybersecurity, there are no second chances. The first move determines everything.