EU Competitions: Cyber Security Enthusiasts Invited to Enter

There is a growing need for trained IT professionals with the right skills to address the challenges of the fast-expanding cyber security landscape. In response to this, some nations have begun to organise national cyber security competitions aimed at students, university graduates and even non-ICT professionals to promote new entrants into the profession. 

This month there are two significant cyber security competitions with this aim - one set up by the European Union and the the other  a private sector event :-

The European Cybersecurity Challenge:   The European Union’s annual campaign dedicated to promoting cyber security among EU citizens and organisations and to providing up-to-date online security information through awareness raising and sharing of good practices.

The Czech Republic will host the sixth edition of the European Cyber Security Challenge - the annual European event that brings together young talent from across Europe to have fun and compete in cybersecurity!

Top cyber talents from each participating country will meet in Prague to network and collaborate and finally compete against each other. Contestants will be challenged in solving security related tasks from domains such as web security, mobile security, crypto puzzles, reverse engineering and forensics and in the process collect points for solving them.

The competition will be held on Friday 15 October, marking the European Cyber Security Month , which is an annual campaign which aims to raise awareness of citizens, organisations, companies and institutions about the major cyber threats.

The three teams that achieve the highest scores come the end of the event will then present a report explaining the strategies they adopted during the challenge. 

Reply Cybersecurity Challenge:     The Cybersecurity Challenge is part of Reply’s Challenges programme, which seeks to target the most innovative trends in coding, creativity, cybersecurity, and finance.

The fourth instalment of the Reply Cybersecurity Challenge is set to launch on 15th October, with applications now open for teams to register and take part. The group coding contest is open to cyber security enthusiasts and professionals worldwide, with support this year coming from Intesa Sanpaolo, one of Europe’s top banking firms, and software company Immersive Labs. Last year’s challenge drew more than 10,000 participants from 160 countries, forming 2,380 teams of two to four players.

The competition consists of a 24-hour marathon Capture The Flag (CTF) tournament, focusing on the identification of vulnerabilities purposely hidden within software and computer systems.

The final score will then be determined by the highest number of hidden flags identified, plus a bonus awarded for the quick resolution of the problems.

Developed by cyber security experts from Reply, the contest includes five gaming categories – coding, web, binary, crypto, and miscellaneous – which see players attempt to solve security problems and riddles of increasing difficulty in the fastest time.

The challenge is accompanied by the Train&Win programme, which allows teachers and students of more than 16 years to train together with problems to solve in CTF mode on the Reply Challenge platform, as well as win devices to be used for educational purposes. The platform can be used as a cyber security gym, with exercises and study materials available to help them prepare for the international competition. 

Applications are now open and will stay open until 15 October. Teams can register for free, either submitting the details of their team or by joining other players in random teams, and can then train in ‘sandbox’ mode on the challenges of previous editions.

Reply Challenge:     ECSC:        CybersecurityMonth.EU:       Digtal Skillls.EU:         EdTechnology

You Might Also Read: 

Cyber Security Shared Skills Group Created:

 

« Webinar: How to build a secure access service edge (SASE) model in the AWS Cloud
Students Warned Of Tax Refund Frauds »

ManageEngine
CyberSecurity Jobsite
Check Point

Directory of Suppliers

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

TÜV SÜD Academy UK

TÜV SÜD Academy UK

TÜV SÜD offers expert-led cybersecurity training to help organisations safeguard their operations and data.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

Mielabelo

Mielabelo

Belgian consulting firm providing services in the security and compliance of information systems and IT service management.

Indium Software

Indium Software

Indium Software is an Independent Software Testing Company offering software testing services (including security testing) and offshore Quality Assurance solutions.

Awake Security

Awake Security

Awake Security offer a security solution built on an AI platform that acts like the human brain to sense, detect, and respond to threats you may not even know exist.

Renesas Electronics

Renesas Electronics

Renesas Electronics delivers trusted embedded design innovation with solutions that enable billions of connected, intelligent devices to enhance the way people work and live - securely and safely.

RIA in a Box

RIA in a Box

MyRIACompliance combines our team of RIA compliance experts with an online software platform to help investment advisers better manage regulatory compliance and cybersecurity responsibilities.

LOGbinder

LOGbinder

LOGbinder eliminates blind spots in security intelligence for endpoints and applications.

DataExpert Singapore

DataExpert Singapore

DataExpert Singapore provide solutions and services in the areas of Digital Forensics, Data Recovery, Data Duplication, Data Degaussing & Wiping, Data Destruction, and IT Disposal.

Avancer Corporation

Avancer Corporation

Avancer Corporation is a multi-system integrator focusing on Identity and Access Management (IAM) Technology. Founded in 2004.

3i Infotech

3i Infotech

3i Infotech offers consulting & professional services to assess, design and build next gen IT infrastructure, and managed services to operate, optimize and continuously improve.

Coviant Software

Coviant Software

Coviant Software delivers secure managed file transfer (MFT) software that integrates smoothly and easily with business processes.

Zuul IoT

Zuul IoT

Zuul take an asset-centric approach to OT security, enabling security teams to protect the critical IIoT/IoT devices that are at the foundation of critical business functions.

Metabase Q

Metabase Q

Metabase Q protects you from financial and reputational losses with more efficient and intelligent cybersecurity, using the best worldwide in technologies, processes and specialists.

Casepoint

Casepoint

Casepoint is the legal technology platform of choice for corporations, government agencies, and law firms to meet their complex eDiscovery, investigations, and compliance needs.

Focus Group

Focus Group

Focus Group are one of the UK’s leading independent providers of essential business technology. Here to take care of all your telecoms, IT and connectivity services.

Seers

Seers

Seers is the world’s leading privacy & consent management platform for companies worldwide. Trusted by over 50,000+ businesses.

Sectricity

Sectricity

As independent ethical hackers, Sectricity go beyond traditional security, uncovering every vulnerability - testing both systems and employees to eliminate weak spots.