Denmark Wins 2022 European Cyber Security Challenge

The 8th annual European Cyber Security Challenge (ECSC) held in Vienna has ended after two days of intense competition. The top three participants were judged to be Denmark in first place, Germany in second place and France third. 

Run by the European Union Agency for Network and Information Security  (ENISA) participants were given the task of solving security-related challenges including web and mobile security, crypto puzzles, reverse engineering and forensics to test their abilities and different cyber security skills on both defence and attack.

The top teams needed to display both technical expertise as well as the capacity to work as a team in a complex environment. 

On the first day, teams were assigned over 18 challenges to be solved in Jeopardy format testing teams capacities in a wide range of skills.  

  • Network and system knowledge are must-have skills in order to succeed. In addition to crypto and steganography, reverse engineering and exploitation know-how are just as essential as web and mobile/wireless security.  
  • Hardware hacking and escape-the-box scenarios require efficient teamwork and related skills to effectively manage the complexity of the tasks and ensure success. 

The second day brought the "supreme discipline" of the attack & defence scenarios. In this exercise, the teams had to secure their own networks but in the meantime they also had to hack the networks of the other teams. In opposition to the conventional jeopardy format, teams were given significantly more challenges to overcome in the attack & defence exercise. Here, each team had to operate in an identical environment and not only had to protect their own environment, but also to attack the other teams.

  • In the area of defence, it is important to detect attacks performed by other teams through analysis of network traffic, log files or other artefacts left behind by the attackers. 
  • In the meantime, it is also necessary to eliminate the vulnerabilities in the applications to be protected without impairing the functionality or availability. 
  • At the same time, the assets of the other teams must be attacked in order to steal secret data - a 'capture the flag' exercise. 

With 33 teams competing against each other, the pressure on each team was high, boosted by the motivation to perform at their best and find smart ways to achieve the efficiency required. 

Those teams who were the most flexible and who could respond the fastest to the evolving scenarios and change strategies were ruled the most successful.

ENISA:    ENISA:

You Might Also Read: 

Results: NATO’s 2021 Cyber War Game:

 

« Blockchain Is The New IoT Standard
British Girl’s Suicide Puts Spotlight On Social Media »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

ON-DEMAND WEBINAR: Future-proof your security with Secure Access Service Edge (SASE)

ON-DEMAND WEBINAR: Future-proof your security with Secure Access Service Edge (SASE)

Watch this webinar to explore the Security orchestration, automation, and response (SOAR) paradigm, its relationship with organization IT practices, and its role in your security strategy.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

Puppet

Puppet

Puppet is a leader in IT automation. Our software helps DevOps securely automate configuration and management of machines and the software running on them.

IDnext

IDnext

IDnext is the open and independent platform to support innovative approaches in the world of the Digital identity.

Advanced Software Products Group (ASPG)

Advanced Software Products Group (ASPG)

ASPG offers a wide range of innovative mainframe software solutions for Data Security, Access Management, System Management and CICS productivity.

Crypta Labs

Crypta Labs

Crypta Labs is an Award Winning IOT Security startup that is developing a quantum-based encryption chip to secure the Internet of Things.

Reposify

Reposify

Reposify’s cybersecurity solution identifies, manages and defends companies’ global digital footprints.

Serverless Computing

Serverless Computing

Serverless Computing London will help architects, developers and CIOs decide on the best path to a more efficient, scalable and secure computing future.

SAFEcrypto

SAFEcrypto

SAFEcrypto will provide a new generation of practical, robust and physically secure post quantum cryptographic solutions that ensure long-term security for future ICT systems.

Jandnet Recruitment

Jandnet Recruitment

Jandnet Recruitment is a small specialist company working in the IT sector. We recruit across all IT disciplines including cyber security and digital identity.

Pioneer Search

Pioneer Search

Pioneer Search is a UK based Technology & Change, Electronics Engineering, Cyber Security & Cloud and Data & Analytics Employment Agency.

ePLDT

ePLDT

ePLDT delivers best-in-class digital business solutions that include Cloud, Cyber Security, purpose-built Data Center facilities and Managed IT Services.

Tangible Security

Tangible Security

Tangible employs the most sophisticated cyber security tools and techniques available to protect our clients’ sensitive data, infrastructure and competitive advantage.

Forever Group

Forever Group

Forever Group is a Managed Services Provider specialising in Telecommunications, IT Support, and Cyber Security.

INVISUS

INVISUS

INVISUS protects businesses against the latest cyber risks – including business and employee identity theft, data breaches, and cybersecurity compliance.

BitTrap

BitTrap

BitTrap helps companies worldwide detect attackers and put an early end to breaches, preventing data exfiltration and ransomware altogether.

BATM Advanced Communications

BATM Advanced Communications

BATM Advanced Communications is a leading provider of real-time technologies for networking and cyber security solutions.

Securance Consulting

Securance Consulting

Since 2002, Securance has empowered enterprises to assume proactive security, compliance, and risk management strategies.