Why it is worth hacking your own IT security infrastructure on a regular basis? This presentation will show how hackers proceed during an IT attack (CyberKillChain), which validation options exist for the IT security infrastructure and how to proactively monitor the efficiency of this cyber security infrastructure.