• Keine Ergebnisse gefunden

What is CSAW ? VIDEO of CSAW 2018

N/A
N/A
Protected

Academic year: 2022

Aktie "What is CSAW ? VIDEO of CSAW 2018"

Copied!
9
0
0

Wird geladen.... (Jetzt Volltext ansehen)

Volltext

(1)
(2)

The Cyber Security Awareness Week (CSAW) is an international cybersecurity event for students

Its objective is to bring together students of all levels of education (from high school to PhD students) on the field of cybersecurity

CSAW includes competitions, conferences, as well as a forum, which provides a great opportunity to companies and institutions to promote themselves and exchange with participating students

The qualifying events for each competition are held online and the finalists are then gathered for the CSAW event

What is CSAW ?

VIDEO of CSAW 2018

(3)

2018 WORLDWIDE COMPETITIONS QUICK FACTS

INTERNATIONAL QUALIFICATIONS

107

COUNTRIES REPRESENTED

FINALS IN 6 HUBS

~10,000

PARTICIPANTS

390

FINALISTS 100+

JUDGES

36

MAIN SPONSORS

(4)

EUROPE FINALS IN VALENCE - FRANCE

9

COUNTRIES

110

FINALISTS

20

UNIVERSITIES

15

INDUSTRIAL EXPERTS

2

CYBERSECURITY KEY NOTES

350

PARTICIPANTS

(5)

2018 Sponsors and Partners

(6)

4 competitions

•High School Forensics

Cybersecurity initiation contest for high school students

•Capture The Flag

36 hour-long cybersecurity contest for computer science and communication networks students (10 teams of 4 finalists)

•Applied Research

The finalists (cybersecurity PhD students) present the results of their work to a jury of experts (10 finalists)

•Embedded Security Challenge

Security competition in the field of Internet of Things for master students and PhD students in embedded systems / hardware security (10 teams of 2-3 finalists)

Cybersecurity Conferences

Cyber Security Exhibitions: Career Fair

(7)

Embedded Security Challenge 2019:

https://www.csaw.io/esc

CSAW ESC 2019 will task contestants with hacking the firmware of a custom RFID card reader using reverse engineering tools developed by the United States National Security Agency (NSA).

Competition details and registration form:

https://github.com/TrustworthyComputing/csaw_es c_2019

(8)

WEDNESDAY 6 NOVEMBER

THURSDAY 7 NOVEMBER FRIDAY 8 NOVEMBER

PM Welcoming reception (CTF finalists)

20 h Capture The Flag contest start (36 hour-long) 18 h Welcoming of other finalists

Sponsors Keynotes

8 h End of Capture The Flag competition

9 h Welcoming reception (sponsors, judges & visitors) RED team competition final start (8 hour-long) 10 h Cybersecurity exhibitions : carreer fair,

Cybersecurity demo

Applied Research finalists presentations Embedded Security Challenge finals (open to visitors)

17 h End of the contests 17 h 30 Awards ceremony

19 h Networking and closing ceremony

Preliminary Program

(9)

Referenzen

ÄHNLICHE DOKUMENTE

The 2019 challenge will task competitors with hacking the firmware of a vulnerable RFID reader with professional level United States National Security Agency (NSA)

Halle (Saale), Berlin, Berlin-Neukölln, Chemnitz, Hannover, Köln, Leipzig, Reutlingen, Stuttgart, Ulm, Erfurt, Jena, Marburg, Nordhausen, Brand-Erbisdorf, Bernburg,

Rechtliche Grundlagen für forensische Untersuchungen analysieren und nach Vorgaben anwenden Prinzipien der IT Forensik unterscheiden. forensische Untersuchungen an

He specialises in data use, negotiating data - related contracts, data security issues, cloud projects and IT contracts and provides support in setting up platform models and

The major objective of this focus group is to elicit probabilities corresponding to each variable in our qualitative BN model that could help to determine the major cause

Zweitverwertung von Daten für Forschungszwecke (Art. Datenerhebung auf Grund gesetzlicher Spezialvorschriften ... Geeignete Garantien nach Art. Die dreistufige Prüfung nach

Sich hieraus ergebende Schäden, die durch Cyberpolicen versichert werden können, sind unter anderem der Software- und Datenwiederherstellungsaufwand, erhöhte Be-

3.2.2 Typische Sicherheitsmaßnahmen im Layered-Security-Konzept .... Enterprise Layered Security