It can take organisations months to discover that their systems have been compromised with nothing stopping sensitive data being exfiltrated the entire time. With this in mind IBM have developed a Capture The Flag (CTF) focused on the dangers of Advanced Persistent Threat. Participants are challenged to hack into purpose built vulnerable systems and run our custom made "malware" that will syphon points for every minute the system is compromised.
Here is an overview of one of our previous Cyber Security Challenges
REGISTRATION TO CYBER CHALLENGE IS NOW CLOSED. Entry to IRISSCERT's Cyber Security Challenge is part of the overall entry to IRISSCERT's annual Conference on Cybercrime. Places for the competition will be allocated on a first-come, first-serve basis.
This year there will be individual and team challenges. Teams will be made up of a maximum of 4 players per team. If your team does not have 4 players we can arrange to allocate individuals to your team if you so wish.
If you are entering a team please email the details of your team including the team name and those who are on your team to email@example.com.
Violation of these rules will lead to immediate expulsion from the exercise.
Anyone adjudged to be breaking any of the above rules will be dealt with severely, ranging from your access to being restricted for a period of time to being eliminated from the competition. The decisions of the judges will be final.
We would like to thank our sponsor for supporting this year's IRISSCON Challenge event.