CyberStars Cyber Security Competition

As part of the implementation of National Cyber Security Capacity Building Program and responding to the identified skills gap, a workshop dubbed CyberStars was held in Kigali, where over 400 students engaged in a competition to come up with different solutions to bolster cyber security in different domains.

The competition was organised by the Ministry of Information, Technology and Communications (MITEC) and Rwanda Information Society Authority, RISA, in collaboration with Silensec.

According to a statement, the competition targeted ICT students in universities and software solutions will be developed in the domains of; Ethical Hacking (attackers), Intrusion Detection and Security Monitoring (defenders), Computer Forensics (Responders) which will help the Government to protect its cyber space.

“The students were exposed to real activities related to cyber operations in the different domains  which will develop the need of doing research and practical hands on exercises to better respond to the Cyber Security need of the country.

Highlighting the importance of the CyberStars Competition, Chief Executive Officer of RISA, Innocent Bagamba Muhizi, said: “From leaked passwords to identity theft, cyber security issues are always in the news. With this competition, we are creating awareness and building capacity by developing the next generation of cyber security experts who will ensure that as individuals, our businesses/data, our governments are operating in a secure cyber environment.”

The main purpose of this competition is to enhance national expertise in practical cybersecurity operations and reduction of the human capacity gap in cybersecurity field and leasing awareness.

“This competition is important to the government and the people of Rwanda as it helps create human capacity that will secure businesses and the country from cyber-attacks. Through the competition and with the support of media, we shall be able to inform the public on basic steps to protect their cyber space whenever they use internet to socialize or transact businesses” emphasized Dr Almerindo Grazian, the CEO of Silensec who has massive expertise in Information Security system.

Currently, the CyberStars competition operates within seven countries from the Middle East (Oman, Saudi Arabia, Egypt, Irak, Tunisia, United Arab Emirates and Yemen) where the campaign has been received well, and the finalists already awarded.

With this initiative, Rwanda is also the first country in East Africa and one of the few in the entire African continent to organise a national cybersecurity competition.

The New Times:

You Might Also Read:

In S.Africa The Cybersecurity Skills Gap Is A Chasm

« A Guided Tour Of The Asian Dark Web
Why Some Computer Viruses Refuse To Die »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

BH Consulting

BH Consulting

BH Consulting we are a vendor independent consulting firm providing market leading range of information security services focused on data protection and cybersecurity.

Hyve

Hyve

Hyve provide a wide range of managed web hosting services including private, hybrid and public VMware cloud hosting.

CloudLayar

CloudLayar

CloudLayar is a cloud-based website firewall for protecting your website against online threats.

Secure-NOK

Secure-NOK

Secure-NOK provides products and solutions that detect and remove security attacks and harmful events in industrial networks and control systems.

Intezer Labs

Intezer Labs

The only solution replicating the concepts of the biological immune system into cyber-security. Intezer provides enterprises with unparalleled Threat Detection and accelerates Incident Response.

Datacom Systems

Datacom Systems

Datacom Systems is a leading manufacturer of network visibility solutions.

SySS

SySS

SySS is a market leader in penetration testing in Germany and Europe.

Plurilock Security Solutions

Plurilock Security Solutions

Plurilock is a real-time cybersecurity solution that uses artificial intelligence to identify, prevent, and eliminate insider threats.

CyberGhost

CyberGhost

CyberGhost is a Virtual Private Network services provider offering secure encrypted access to the internet.

TeskaLabs

TeskaLabs

TeskaLabs is a software vendor of cybersecurity and data privacy products.

TAC Security (TAC Infosec)

TAC Security (TAC Infosec)

TAC Security (aka TAC Infosec) is a leading and trusted cyber security consulting partner that specializes in securing the IT infrastructure and assets of enterprises.

Apptega

Apptega

Apptega is an award-Winning Cybersecurity and Compliance Platform. Our mission is to make cybersecurity and compliance easy for everyone.

Resolvo Systems

Resolvo Systems

Resolvo is provides comprehensive security assessment and testing services in Asia.

tTech

tTech

tTech is the first and foremost company providing outsourced Information Technology solutions to businesses in Jamaica.

Support Link Technologies (SLT)

Support Link Technologies (SLT)

Support Link Technologies are an IT Solutions Company committed to achieving customer satisfaction through excellent customer service.

Polygraph

Polygraph

Polygraph monitors the activities of click fraud gangs, including how they operate, who they target, the techniques they use, and how to detect their fraud.