Denmark Wins 2022 European Cyber Security Challenge

The 8th annual European Cyber Security Challenge (ECSC) held in Vienna has ended after two days of intense competition. The top three participants were judged to be Denmark in first place, Germany in second place and France third. 

Run by the European Union Agency for Network and Information Security  (ENISA) participants were given the task of solving security-related challenges including web and mobile security, crypto puzzles, reverse engineering and forensics to test their abilities and different cyber security skills on both defence and attack.

The top teams needed to display both technical expertise as well as the capacity to work as a team in a complex environment. 

On the first day, teams were assigned over 18 challenges to be solved in Jeopardy format testing teams capacities in a wide range of skills.  

  • Network and system knowledge are must-have skills in order to succeed. In addition to crypto and steganography, reverse engineering and exploitation know-how are just as essential as web and mobile/wireless security.  
  • Hardware hacking and escape-the-box scenarios require efficient teamwork and related skills to effectively manage the complexity of the tasks and ensure success. 

The second day brought the "supreme discipline" of the attack & defence scenarios. In this exercise, the teams had to secure their own networks but in the meantime they also had to hack the networks of the other teams. In opposition to the conventional jeopardy format, teams were given significantly more challenges to overcome in the attack & defence exercise. Here, each team had to operate in an identical environment and not only had to protect their own environment, but also to attack the other teams.

  • In the area of defence, it is important to detect attacks performed by other teams through analysis of network traffic, log files or other artefacts left behind by the attackers. 
  • In the meantime, it is also necessary to eliminate the vulnerabilities in the applications to be protected without impairing the functionality or availability. 
  • At the same time, the assets of the other teams must be attacked in order to steal secret data - a 'capture the flag' exercise. 

With 33 teams competing against each other, the pressure on each team was high, boosted by the motivation to perform at their best and find smart ways to achieve the efficiency required. 

Those teams who were the most flexible and who could respond the fastest to the evolving scenarios and change strategies were ruled the most successful.

ENISA:    ENISA:

You Might Also Read: 

Results: NATO’s 2021 Cyber War Game:

 

« Blockchain Is The New IoT Standard
British Girl’s Suicide Puts Spotlight On Social Media »

ManageEngine
CyberSecurity Jobsite
Check Point

Directory of Suppliers

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Tines

Tines

The Tines security automation platform helps security teams automate manual tasks, making them more effective and efficient.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

ZenGRC

ZenGRC

ZenGRC (formerly Reciprocity) is a leader in the GRC SaaS landscape, offering robust and intuitive products designed to make compliance straightforward and efficient.

Lutech

Lutech

Lutech is an Italian ICT engineering and services company. Business solution areas include cyber security.

Cyber Security National Lab (CINI)

Cyber Security National Lab (CINI)

The Cyber Security National Lab brings together Italian academic excellence in Cyber Security research.

SecureDevice

SecureDevice

SecureDevice is a Danish IT Security company.

Sliced Tech

Sliced Tech

Sliced Tech provides enterprise grade managed Cloud services, including Security-as-a-Services, aimed at meeting the needs of commercial and government clients from within Australia.

IUCC Cyber Unit - Israel

IUCC Cyber Unit - Israel

IUCC Cyber Unit safeguards Israel’s National Research & Education Network (NREN).

German Accelerator

German Accelerator

German Accelerator supports high-potential German startups in successfully entering the U.S. and Southeast Asian markets.

CybrHawk

CybrHawk

CybrHawk is a leading provider of information security-driven risk intelligence solutions focused solely on protecting clients from cyber-attacks.

Traced

Traced

At Traced, our aim is to redefine mobile cyber security to provide the best possible protection to everyone against breaches of privacy and security.

Scholarly Networks Security Initiative (SNSI)

Scholarly Networks Security Initiative (SNSI)

SNSI brings together publishers and institutions to solve cyber-challenges threatening the integrity of the scientific record, scholarly systems and the safety of personal data.

CYDEF

CYDEF

CYDEF provides comprehensive, state-of-the-art cybersecurity protection that is accessible and affordable to organizations of any size.

Sotero

Sotero

Sotero is the first cloud-native, zero trust data security platform that consolidates your entire security stack into one easy-to-manage environment.

Schillings

Schillings

Shillings defends your rights to privacy, reuptation and security. We fight passionately against breaches of your privacy, attacks on your reputation and threats to your security.

Sev1Tech

Sev1Tech

Sev1Tech is a leading provider of IT modernization, cloud, cybersecurity, engineering, fielding, training, and program support services.

Stern Cybersecurity

Stern Cybersecurity

Stern Cybersecurity offers a robust defense against the ever-evolving landscape of digital threats.

Idenhaus Consulting

Idenhaus Consulting

Idenhaus specializes in Cybersecurity and Identity Management (IAM) Consulting.

Cyber Castellum

Cyber Castellum

Cyber Castellum is a cybersecurity consulting firm that specializes in the identification of security vulnerabilities in an organization’s technology landscape.