EU Competitions: Cyber Security Enthusiasts Invited to Enter

There is a growing need for trained IT professionals with the right skills to address the challenges of the fast-expanding cyber security landscape. In response to this, some nations have begun to organise national cyber security competitions aimed at students, university graduates and even non-ICT professionals to promote new entrants into the profession. 

This month there are two significant cyber security competitions with this aim - one set up by the European Union and the the other  a private sector event :-

The European Cybersecurity Challenge:   The European Union’s annual campaign dedicated to promoting cyber security among EU citizens and organisations and to providing up-to-date online security information through awareness raising and sharing of good practices.

The Czech Republic will host the sixth edition of the European Cyber Security Challenge - the annual European event that brings together young talent from across Europe to have fun and compete in cybersecurity!

Top cyber talents from each participating country will meet in Prague to network and collaborate and finally compete against each other. Contestants will be challenged in solving security related tasks from domains such as web security, mobile security, crypto puzzles, reverse engineering and forensics and in the process collect points for solving them.

The competition will be held on Friday 15 October, marking the European Cyber Security Month , which is an annual campaign which aims to raise awareness of citizens, organisations, companies and institutions about the major cyber threats.

The three teams that achieve the highest scores come the end of the event will then present a report explaining the strategies they adopted during the challenge. 

Reply Cybersecurity Challenge:     The Cybersecurity Challenge is part of Reply’s Challenges programme, which seeks to target the most innovative trends in coding, creativity, cybersecurity, and finance.

The fourth instalment of the Reply Cybersecurity Challenge is set to launch on 15th October, with applications now open for teams to register and take part. The group coding contest is open to cyber security enthusiasts and professionals worldwide, with support this year coming from Intesa Sanpaolo, one of Europe’s top banking firms, and software company Immersive Labs. Last year’s challenge drew more than 10,000 participants from 160 countries, forming 2,380 teams of two to four players.

The competition consists of a 24-hour marathon Capture The Flag (CTF) tournament, focusing on the identification of vulnerabilities purposely hidden within software and computer systems.

The final score will then be determined by the highest number of hidden flags identified, plus a bonus awarded for the quick resolution of the problems.

Developed by cyber security experts from Reply, the contest includes five gaming categories – coding, web, binary, crypto, and miscellaneous – which see players attempt to solve security problems and riddles of increasing difficulty in the fastest time.

The challenge is accompanied by the Train&Win programme, which allows teachers and students of more than 16 years to train together with problems to solve in CTF mode on the Reply Challenge platform, as well as win devices to be used for educational purposes. The platform can be used as a cyber security gym, with exercises and study materials available to help them prepare for the international competition. 

Applications are now open and will stay open until 15 October. Teams can register for free, either submitting the details of their team or by joining other players in random teams, and can then train in ‘sandbox’ mode on the challenges of previous editions.

Reply Challenge:     ECSC:        CybersecurityMonth.EU:       Digtal Skillls.EU:         EdTechnology

You Might Also Read: 

Cyber Security Shared Skills Group Created:

 

« Webinar: How to build a secure access service edge (SASE) model in the AWS Cloud
Students Warned Of Tax Refund Frauds »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

aizoOn Technology Consulting

aizoOn Technology Consulting

aizoOn is a technology consulting company offering a range of services including IoT & embedded security, mobile security, cybersecurity assessments, risk & compliance, network monitoring and more.

IntaForensics

IntaForensics

IntaForensics offer a full range of digital investigation services and are able to adapt to the individual needs of solicitors, private clients, Law Enforcement Agencies and commercial businesses.

Green Hills Software

Green Hills Software

Green Hills Software is the largest independent vendor of embedded secure software solutions for applications including the Internet of Things.

Remediant

Remediant

Remediant is the leader in Precision Privileged Access Management. We protect organizations from ransomware and data theft via stolen credentials and lateral movement.

RevenueStream

RevenueStream

RevenueStream uses an innovative algorithmic approach to intercept and prevent payment fraud before it even happens.

German Israeli Partnership Accelerator (GIPA)

German Israeli Partnership Accelerator (GIPA)

GIPA is based on two pillars: it is an incubator aimed at young academics and a program to transfer cybersecurity expertise to corporate partners.

Estio Training

Estio Training

Estio Training is a specialist digital and IT apprenticeships provider, dedicated to introducing new skills and developing existing talent in businesses across the UK.

Peraton

Peraton

Peraton provides innovative solutions for the most sensitive and critical programs in government today, developed and executed by scientists, engineers, and other experts.

Finnish Security & Intelligence Service (SUPO)

Finnish Security & Intelligence Service (SUPO)

The Finnish Security and Intelligence Service is a government agency tasked with combating serious threats to national security in Finland.

Financial Services Information Sharing and Analysis Center (FS-ISAC)

Financial Services Information Sharing and Analysis Center (FS-ISAC)

The Financial Services Information Sharing and Analysis Center is the only global cyber intelligence sharing community solely focused on financial services.

DTS Systeme

DTS Systeme

DTS Systeme is an IT service provider with a focus on the core areas of datacenter, technologies and IT security.

Moss Adams

Moss Adams

Moss Adams is a fully integrated professional services firm dedicated to assisting clients with growing, managing, and protecting prosperity.

Profian

Profian

Profian’s hardware-based solutions maintain your data's confidentiality and integrity in use, providing true confidential computing to meet regulatory and audit requirements.

CCX Technologies

CCX Technologies

CCX Technologies design and develop a wide range of cybersecurity and testing solutions for the aviation, and military and government markets.

Veza Technologies

Veza Technologies

Veza is the authorization platform for data. Built for hybrid, multi-cloud environments, Veza enables organizations to manage and control who can and should take what action on what data.

The Cyber Scheme

The Cyber Scheme

The Cyber Scheme provides NCSC certified and assured assessments, training and career support for security testers & technical cyber professionals.