Hyper Realistic Cyber Range Competition
07 December 2022
Hack Arena
Welcome to the first cyber range team competition ever to take place at AICS!
Who is the cyber range competition for?
The competition is intended for cyber defense teams: incident response, SOC, or CSIRT team
members.
What is unique about this competition?
Unlike traditional CTFs and hackathons, the teams will be challenged in defending against real
world cyber-attacks in a virtual SOC.
How Does it Work?
The tournament will take place onsite - at AICS, in teams of three.
Each team will log into a cyber range, where you will collaborate to respond to a fully
simulated attack, running in a virtual network. You will use commercial security tools like a SIEM,
firewall and network analysis tools to respond to the incident. The tournament takes place in
teams of three, one team per organization. Please enter your organization name in registration
and we will assign you to your team. You will receive a confirmation and a calendar invite
once all three team members have registered and qualified.
What do you need?
A laptop with the option to connect to the WIFI in the room, without restrictions to connect to
the cloud-based cyber range.
Who is the cyber range competition for?
The competition is intended for cyber defense teams: incident response, SOC, or CSIRT team
members.
What is unique about this competition?
Unlike traditional CTFs and hackathons, the teams will be challenged in defending against real
world cyber-attacks in a virtual SOC.
How Does it Work?
The tournament will take place onsite - at AICS, in teams of three.
Each team will log into a cyber range, where you will collaborate to respond to a fully
simulated attack, running in a virtual network. You will use commercial security tools like a SIEM,
firewall and network analysis tools to respond to the incident. The tournament takes place in
teams of three, one team per organization. Please enter your organization name in registration
and we will assign you to your team. You will receive a confirmation and a calendar invite
once all three team members have registered and qualified.
What do you need?
A laptop with the option to connect to the WIFI in the room, without restrictions to connect to
the cloud-based cyber range.