EU Competitions: Cyber Security Enthusiasts Invited to Enter

There is a growing need for trained IT professionals with the right skills to address the challenges of the fast-expanding cyber security landscape. In response to this, some nations have begun to organise national cyber security competitions aimed at students, university graduates and even non-ICT professionals to promote new entrants into the profession. 

This month there are two significant cyber security competitions with this aim - one set up by the European Union and the the other  a private sector event :-

The European Cybersecurity Challenge:   The European Union’s annual campaign dedicated to promoting cyber security among EU citizens and organisations and to providing up-to-date online security information through awareness raising and sharing of good practices.

The Czech Republic will host the sixth edition of the European Cyber Security Challenge - the annual European event that brings together young talent from across Europe to have fun and compete in cybersecurity!

Top cyber talents from each participating country will meet in Prague to network and collaborate and finally compete against each other. Contestants will be challenged in solving security related tasks from domains such as web security, mobile security, crypto puzzles, reverse engineering and forensics and in the process collect points for solving them.

The competition will be held on Friday 15 October, marking the European Cyber Security Month , which is an annual campaign which aims to raise awareness of citizens, organisations, companies and institutions about the major cyber threats.

The three teams that achieve the highest scores come the end of the event will then present a report explaining the strategies they adopted during the challenge. 

Reply Cybersecurity Challenge:     The Cybersecurity Challenge is part of Reply’s Challenges programme, which seeks to target the most innovative trends in coding, creativity, cybersecurity, and finance.

The fourth instalment of the Reply Cybersecurity Challenge is set to launch on 15th October, with applications now open for teams to register and take part. The group coding contest is open to cyber security enthusiasts and professionals worldwide, with support this year coming from Intesa Sanpaolo, one of Europe’s top banking firms, and software company Immersive Labs. Last year’s challenge drew more than 10,000 participants from 160 countries, forming 2,380 teams of two to four players.

The competition consists of a 24-hour marathon Capture The Flag (CTF) tournament, focusing on the identification of vulnerabilities purposely hidden within software and computer systems.

The final score will then be determined by the highest number of hidden flags identified, plus a bonus awarded for the quick resolution of the problems.

Developed by cyber security experts from Reply, the contest includes five gaming categories – coding, web, binary, crypto, and miscellaneous – which see players attempt to solve security problems and riddles of increasing difficulty in the fastest time.

The challenge is accompanied by the Train&Win programme, which allows teachers and students of more than 16 years to train together with problems to solve in CTF mode on the Reply Challenge platform, as well as win devices to be used for educational purposes. The platform can be used as a cyber security gym, with exercises and study materials available to help them prepare for the international competition. 

Applications are now open and will stay open until 15 October. Teams can register for free, either submitting the details of their team or by joining other players in random teams, and can then train in ‘sandbox’ mode on the challenges of previous editions.

Reply Challenge:     ECSC:        CybersecurityMonth.EU:       Digtal Skillls.EU:         EdTechnology

You Might Also Read: 

Cyber Security Shared Skills Group Created:

 

« Webinar: How to build a secure access service edge (SASE) model in the AWS Cloud
Students Warned Of Tax Refund Frauds »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

Seclore

Seclore

Seclore is the most advanced, secure, and automated Enterprise Digital Rights Management (EDRM) solution available.

Intrinsic-ID

Intrinsic-ID

Intrinsic-ID's authentication technology creates unique IDs and keys to authenticate chips, data, devices and systems.

Cyber Risk Policies

Cyber Risk Policies

CyberRiskPolicy.com is a joint venture between the Poindexter Surety Group of companies and Gibbs Cyber Security.

Cyber 360

Cyber 360

Cyber 360 is a Cybersecurity contract and fulltime placement firm dedicated to identifying and hiring Cybersecurity professionals.

Operational Center for Information Systems Security (COSSI)

Operational Center for Information Systems Security (COSSI)

COSSI is responsible for the detection and mitigation of cyber attacks directed at French Government information systems.

Greenbone Networks

Greenbone Networks

Greenbone Networks delivers a vulnerability analysis solution for enterprise IT which includes reporting and security change management.

SaferVPN

SaferVPN

SaferVPN is a Virtual Private Network services provider offering secure encrypted access to the internet.

Securis

Securis

Securis provides organizations and agencies with the highest level of professional, ultra-secure data destruction and IT recycling.

Applied Magnetics Laboratory (AML)

Applied Magnetics Laboratory (AML)

Applied Magnetics Laboratory is a manufacturer of military security and data destruction equipment for sensitive, classified, and secret information.

Hunter Strategy

Hunter Strategy

Hunter Strategy focuses on delivering solutions that are concise, scalable, and target our customer’s complex technical challenges.

Tetra Defense

Tetra Defense

Tetra Defense is a leading incident response, cyber risk management and digital forensics firm.

HACKNER Security Intelligence

HACKNER Security Intelligence

HACKNER Security Intelligence is an independent security consultancy delivering comprehensive security assessments across IT security, physical security, and social engineering.

NetWitness

NetWitness

NetWitness empowers security teams to rapidly detect today’s targeted and sophisticated attacks with unparalleled visibility.

Identity Digital

Identity Digital

Identity Digital simplifies and connects a fragmented online world with domain names and related technologies that allow people and businesses to build, market and own their digital identities.

Zokyo

Zokyo

Zokyo is a venture studio that builds, secures, and funds legendary web3/crypto businesses.

Auxilion

Auxilion

Auxilion is an award-winning provider of consulting and IT support services, technologies and consulting for public and private organisations in the UK and Ireland.