Who is the cyber range competition for?
The competition is intended for cyber defense teams: incident response, SOC, or CSIRT team members.
What is unique about this competition?
Unlike traditional CTFs and hackathons, the teams will be challenged in defending against real world cyber attacks in a virtual SOC.
How Does it Work?
The tournament will take place onsite - at AICS, in teams of three.
Each team will log into a cyber range, where you will collaborate to respond to a fully simulated attack, running in a virtual network. You will use commercial security tools like a SIEM, firewall and network analysis tools to respond to the incident. The tournament takes place in teams of three, one team per organization. Please enter your organization name in registration and we will assign you to your team. You will receive a confirmation and a calendar invite once all three team members have registered and qualified.
What do you need?
A laptop with the option to connect to the WIFI in the room, without restrictions to connect to the cloud-based cyber range.