CyberStars Cyber Security Competition

As part of the implementation of National Cyber Security Capacity Building Program and responding to the identified skills gap, a workshop dubbed CyberStars was held in Kigali, where over 400 students engaged in a competition to come up with different solutions to bolster cyber security in different domains.

The competition was organised by the Ministry of Information, Technology and Communications (MITEC) and Rwanda Information Society Authority, RISA, in collaboration with Silensec.

According to a statement, the competition targeted ICT students in universities and software solutions will be developed in the domains of; Ethical Hacking (attackers), Intrusion Detection and Security Monitoring (defenders), Computer Forensics (Responders) which will help the Government to protect its cyber space.

“The students were exposed to real activities related to cyber operations in the different domains  which will develop the need of doing research and practical hands on exercises to better respond to the Cyber Security need of the country.

Highlighting the importance of the CyberStars Competition, Chief Executive Officer of RISA, Innocent Bagamba Muhizi, said: “From leaked passwords to identity theft, cyber security issues are always in the news. With this competition, we are creating awareness and building capacity by developing the next generation of cyber security experts who will ensure that as individuals, our businesses/data, our governments are operating in a secure cyber environment.”

The main purpose of this competition is to enhance national expertise in practical cybersecurity operations and reduction of the human capacity gap in cybersecurity field and leasing awareness.

“This competition is important to the government and the people of Rwanda as it helps create human capacity that will secure businesses and the country from cyber-attacks. Through the competition and with the support of media, we shall be able to inform the public on basic steps to protect their cyber space whenever they use internet to socialize or transact businesses” emphasized Dr Almerindo Grazian, the CEO of Silensec who has massive expertise in Information Security system.

Currently, the CyberStars competition operates within seven countries from the Middle East (Oman, Saudi Arabia, Egypt, Irak, Tunisia, United Arab Emirates and Yemen) where the campaign has been received well, and the finalists already awarded.

With this initiative, Rwanda is also the first country in East Africa and one of the few in the entire African continent to organise a national cybersecurity competition.

The New Times:

You Might Also Read:

In S.Africa The Cybersecurity Skills Gap Is A Chasm

« A Guided Tour Of The Asian Dark Web
Why Some Computer Viruses Refuse To Die »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Perimeter 81 / Black Hat On-Demand Webinar

Perimeter 81 / Black Hat On-Demand Webinar

Black Hat On-Demand Webinar - Identity is the New Perimeter: This webinar will provide you with vital insights to help understand the need for Zero Trust and how it can transform your network.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Clayden Law

Clayden Law

Clayden Law are experts in information technology, data privacy and cybersecurity law.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Free Access: Cyber Security Supplier Directory listing 5,000+ specialist service providers.

Cylance Smart Antivirus

Cylance Smart Antivirus

An antivirus that works smarter, not harder, from BlackBerry. Lightweight, non-intrusive protection powered by artificial intelligence. BUY NOW - LIMITED DISCOUNT OFFER.

UpGuard

UpGuard

UpGuard's discovery engine brings visibility to complex IT environments, enabling teams to identify risk, confirm compliance and make business safer.

Cymulate

Cymulate

Cymulate is a SaaS-based breach and attack simulation platform that makes it simple to know and optimize your security posture any time, all the time.

Digital Hands

Digital Hands

Digital Hands is an award-winning managed security services provider.

Security & Intelligence Agency (SOA) - Croatia

Security & Intelligence Agency (SOA) - Croatia

SOA is the Croatian security and intelligence service. Areas of activity include Cyber Security and Information Security.

CyberStream

CyberStream

CyberStream, a division of the TechStream Group, is an information & cybersecurity talent acquisition solution provider.

Valid Network

Valid Network

Valid Network DSP is blending traditional cyber security methodologies with blockchain transactions to achieve trust, internal and federated between organizations and stake holders.

Pakistan Telecommunication Company Limited (PTCL)

Pakistan Telecommunication Company Limited (PTCL)

Pakistan Telecommunication Company Limited (PTCL) is the largest integrated Information Communication Technology (ICT) company of Pakistan.

Nigerian Communications Commission (NCC)

Nigerian Communications Commission (NCC)

NCC has established a CSIRT for the telecommunication industry to provide services and support for the prevention and management of potential cyber security related emergencies.