EU Competitions: Cyber Security Enthusiasts Invited to Enter

There is a growing need for trained IT professionals with the right skills to address the challenges of the fast-expanding cyber security landscape. In response to this, some nations have begun to organise national cyber security competitions aimed at students, university graduates and even non-ICT professionals to promote new entrants into the profession. 

This month there are two significant cyber security competitions with this aim - one set up by the European Union and the the other  a private sector event :-

The European Cybersecurity Challenge:   The European Union’s annual campaign dedicated to promoting cyber security among EU citizens and organisations and to providing up-to-date online security information through awareness raising and sharing of good practices.

The Czech Republic will host the sixth edition of the European Cyber Security Challenge - the annual European event that brings together young talent from across Europe to have fun and compete in cybersecurity!

Top cyber talents from each participating country will meet in Prague to network and collaborate and finally compete against each other. Contestants will be challenged in solving security related tasks from domains such as web security, mobile security, crypto puzzles, reverse engineering and forensics and in the process collect points for solving them.

The competition will be held on Friday 15 October, marking the European Cyber Security Month , which is an annual campaign which aims to raise awareness of citizens, organisations, companies and institutions about the major cyber threats.

The three teams that achieve the highest scores come the end of the event will then present a report explaining the strategies they adopted during the challenge. 

Reply Cybersecurity Challenge:     The Cybersecurity Challenge is part of Reply’s Challenges programme, which seeks to target the most innovative trends in coding, creativity, cybersecurity, and finance.

The fourth instalment of the Reply Cybersecurity Challenge is set to launch on 15th October, with applications now open for teams to register and take part. The group coding contest is open to cyber security enthusiasts and professionals worldwide, with support this year coming from Intesa Sanpaolo, one of Europe’s top banking firms, and software company Immersive Labs. Last year’s challenge drew more than 10,000 participants from 160 countries, forming 2,380 teams of two to four players.

The competition consists of a 24-hour marathon Capture The Flag (CTF) tournament, focusing on the identification of vulnerabilities purposely hidden within software and computer systems.

The final score will then be determined by the highest number of hidden flags identified, plus a bonus awarded for the quick resolution of the problems.

Developed by cyber security experts from Reply, the contest includes five gaming categories – coding, web, binary, crypto, and miscellaneous – which see players attempt to solve security problems and riddles of increasing difficulty in the fastest time.

The challenge is accompanied by the Train&Win programme, which allows teachers and students of more than 16 years to train together with problems to solve in CTF mode on the Reply Challenge platform, as well as win devices to be used for educational purposes. The platform can be used as a cyber security gym, with exercises and study materials available to help them prepare for the international competition. 

Applications are now open and will stay open until 15 October. Teams can register for free, either submitting the details of their team or by joining other players in random teams, and can then train in ‘sandbox’ mode on the challenges of previous editions.

Reply Challenge:     ECSC:        CybersecurityMonth.EU:       Digtal Skillls.EU:         EdTechnology

You Might Also Read: 

Cyber Security Shared Skills Group Created:

 

« Webinar: How to build a secure access service edge (SASE) model in the AWS Cloud
Students Warned Of Tax Refund Frauds »

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Directory of Cyber Security Suppliers

Directory of Cyber Security Suppliers

Our Supplier Directory lists 7,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

Teneo

Teneo

Teneo is a Solutions Provider focused on reducing complexity. We combine leading technology with deep expertise to create new ideas on how to simplify IT operations.

NICE Systems

NICE Systems

NICE Systems provide software solutions to ensure compliance, fight financial crime, and safeguard people and assets.

National Association of Software and Services Companies (NASSCOM) - India

National Association of Software and Services Companies (NASSCOM) - India

NASSCOM is a trade association of Indian Information Technology and Business Process Outsourcing industry. Areas of activity include cyber security.

Ideagen

Ideagen

Ideagen provides information management, safety, risk and compliance software solutions that allow organisations to achieve operational excellence, regulatory compliance and reduce risk.

Plurilock Security Solutions

Plurilock Security Solutions

Plurilock is a real-time cybersecurity solution that uses artificial intelligence to identify, prevent, and eliminate insider threats.

Private Internet Access

Private Internet Access

Private Internet Access is a Virtual Private Network services provider offering secure encrypted access to the internet.

Garland Technology

Garland Technology

Garland Technology specializes in network access points (TAPs) for 100% visibility allowing you to see every bit, byte, and packet flowing through your network.

Naukrigulf

Naukrigulf

Naukrigulf.com is one of the fastest growing job sites in the Gulf, with thousands of registered job seekers and a robust CV database across many sectors, including cybersecurity.

CyberGuru

CyberGuru

CyberGuru is a service provided by CyberSecurity Malaysia specializing in cyber security professional training and development.

RUSCADASEC

RUSCADASEC

RUSCADASEC is an independent non-profit initiative on developing the open Russian-speaking international community of industrial cyber security/ICS/SCADA cyber security professionals.

Fortress Information Security

Fortress Information Security

Fortress Information Security is one of the largest cyber security providers of supply chain risk management and vulnerability risk management in the US.

Tokio Marine HCC

Tokio Marine HCC

Tokio Marine HCC is a leading specialty insurance group with a Financial and Professional product line including Tech and Cyber.

Pentesec

Pentesec

Pentesec is a security specialist offering professional services, managed security services and expertise within an extensive range of security technologies.

Arcturus Security

Arcturus Security

Arcturus is a CREST-approved cyber security consultancy created by experts in the field.

Vala Secure

Vala Secure

Vala Secure is a cybersecurity and compliance consultancy that always stays ahead of regulations, future threats and ever-changing security environments.

Interactive

Interactive

Interactive are a leading Australian IT service provider with services in Cloud, Cyber Security, Data Centres, Business Continuity, Hardware Maintenance, Digital Workplace, and Networks.