We are told "we are only as strong as the weakest link" but what happens when ALL the cyber-links are weak? In this presentation, we will see live demonstrations of real-world hacker techniques and show side-by-side views of what the victim and what the hacker sees. How do hackers take control of your systems? What makes you most vulnerable and how can you protect yourself? When your system is compromised, what indication will you have and what does the hacker see?