EU Competitions: Cyber Security Enthusiasts Invited to Enter

There is a growing need for trained IT professionals with the right skills to address the challenges of the fast-expanding cyber security landscape. In response to this, some nations have begun to organise national cyber security competitions aimed at students, university graduates and even non-ICT professionals to promote new entrants into the profession. 

This month there are two significant cyber security competitions with this aim - one set up by the European Union and the the other  a private sector event :-

The European Cybersecurity Challenge:   The European Union’s annual campaign dedicated to promoting cyber security among EU citizens and organisations and to providing up-to-date online security information through awareness raising and sharing of good practices.

The Czech Republic will host the sixth edition of the European Cyber Security Challenge - the annual European event that brings together young talent from across Europe to have fun and compete in cybersecurity!

Top cyber talents from each participating country will meet in Prague to network and collaborate and finally compete against each other. Contestants will be challenged in solving security related tasks from domains such as web security, mobile security, crypto puzzles, reverse engineering and forensics and in the process collect points for solving them.

The competition will be held on Friday 15 October, marking the European Cyber Security Month , which is an annual campaign which aims to raise awareness of citizens, organisations, companies and institutions about the major cyber threats.

The three teams that achieve the highest scores come the end of the event will then present a report explaining the strategies they adopted during the challenge. 

Reply Cybersecurity Challenge:     The Cybersecurity Challenge is part of Reply’s Challenges programme, which seeks to target the most innovative trends in coding, creativity, cybersecurity, and finance.

The fourth instalment of the Reply Cybersecurity Challenge is set to launch on 15th October, with applications now open for teams to register and take part. The group coding contest is open to cyber security enthusiasts and professionals worldwide, with support this year coming from Intesa Sanpaolo, one of Europe’s top banking firms, and software company Immersive Labs. Last year’s challenge drew more than 10,000 participants from 160 countries, forming 2,380 teams of two to four players.

The competition consists of a 24-hour marathon Capture The Flag (CTF) tournament, focusing on the identification of vulnerabilities purposely hidden within software and computer systems.

The final score will then be determined by the highest number of hidden flags identified, plus a bonus awarded for the quick resolution of the problems.

Developed by cyber security experts from Reply, the contest includes five gaming categories – coding, web, binary, crypto, and miscellaneous – which see players attempt to solve security problems and riddles of increasing difficulty in the fastest time.

The challenge is accompanied by the Train&Win programme, which allows teachers and students of more than 16 years to train together with problems to solve in CTF mode on the Reply Challenge platform, as well as win devices to be used for educational purposes. The platform can be used as a cyber security gym, with exercises and study materials available to help them prepare for the international competition. 

Applications are now open and will stay open until 15 October. Teams can register for free, either submitting the details of their team or by joining other players in random teams, and can then train in ‘sandbox’ mode on the challenges of previous editions.

Reply Challenge:     ECSC:        CybersecurityMonth.EU:       Digtal Skillls.EU:         EdTechnology

You Might Also Read: 

Cyber Security Shared Skills Group Created:

 

« Webinar: How to build a secure access service edge (SASE) model in the AWS Cloud
Students Warned Of Tax Refund Frauds »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

Protective Intelligence

Protective Intelligence

Protective Intelligence brings together a group of information security specialists with a passion for delivering high-quality solutions.

NCC Group

NCC Group

NCC Group is a global cyber and software resilience business operating across multiple sectors, geographies and technologies.

DoSarrest Internet Security Ltd

DoSarrest Internet Security Ltd

DOSarrest is a fully managed security firm specializing in cloud based DDoS protection services to a worldwide client base.

XenArmor

XenArmor

XenArmor products include NetCertScanner, an enterprise software to scan & manage expired SSL Certificates on your local network or internet.

A-SIT Secure Information Technology Center

A-SIT Secure Information Technology Center

A-SIT was founded in 1999 as a registered nonprofit association and is established as a competence center for IT-Security.

Foresite

Foresite

Foresite is a global service provider, delivering a range of managed security and consulting solutions.

HvS Consulting

HvS Consulting

HvS Consulting is a specialist information security company offering a full range of services including IT security architecture, ISO 27001 audits, Pentesting, Security monitoring and Training.

Department of Energy - Cybersecurity, Energy Security, and Emergency Response (CESER)

Department of Energy - Cybersecurity, Energy Security, and Emergency Response (CESER)

The Office of Cybersecurity, Energy Security, and Emergency Response (CESER) addresses the emerging threats of tomorrow while protecting the reliable flow of energy to Americans today.

Samoby

Samoby

Samoby provide a subscription solution for Mobile Threat Protection and usage control on Android and iOS devices.

National Cybersecurity Student Association (NCSA)

National Cybersecurity Student Association (NCSA)

The National Cybersecurity Student Association is a one-stop-shop to enhance the educational and professional development of cybersecurity students through activities, networking and collaboration.

Crypto Valley Association

Crypto Valley Association

Crypto Valley Association is an independent, government-supported association established to build the world’s leading blockchain and cryptographic technologies ecosystem.

Adlumin

Adlumin

Adlumin Inc. provides the enterprise-grade security operations platform and managed detection and response services that keep mid-market organizations secure.

InfoSystems Inc

InfoSystems Inc

InfoSystems provides reliable IT solutions to build and maintain strong and secure systems for both SMB and enterprise organizations.

National Cyber Coordination & Command Centre (NC4) - Malaysia

National Cyber Coordination & Command Centre (NC4) - Malaysia

NC4 is established as a center for dealing with cyber threats and crisis at the national level in Malaysia.

Mainstream Technologies

Mainstream Technologies

Mainstream Technologies is an information technology services firm specializing in custom software development, managed IT services, cybersecurity services and hosting.

Custodia Continuity

Custodia Continuity

Custodia Continuity manage your Security, Backup, Continuity and Compliance. You get on with your business.