SlideShare a Scribd company logo
1 of 2
Download to read offline
STUDENT CHALLENGE
9/12
Cyber
We frequently hear the terms “Cyber 9/11” and “Digital Pearl Harbor,” but what might policymakers
do the day after a crisis? The Cyber 9/12 Student Challenge is an annual cyber policy competition
for students across the globe to compete in developing national security policy recommendations
tackling a fictional cyber catastrophe. In 2016, the Student Challenge will take place in Washington,
DC on March 11-12 and in Geneva, Switzerland, on April 7-8.
THE STUDENT CHALLENGE
In Washington, DC, student teams confront a serious
cybersecurity breach of national and international im-
portance. Teams will compose policy recommenda-
tions and justify their decision-making process, con-
sidering the role and implications for relevant civilian,
military, law enforcement, and private sector entities
and updating the recommendations as the scenario
evolves.
In Geneva, Switzerland, in
partnership with the Ge-
neva Centre for Security
Policy (GCSP), students
respond to a major cyber-
attack on European networks. Competitors will pro-
vide recommendations balancing individual national
approaches and a collective crisis management re-
sponse, considering capabilities, policies, and gover-
nance structures of NATO, EU, and individual nations.
The competition fosters a culture of cooperation and
a better understanding of these organizations and
their member states in responding to cyberattacks.
WHAT IS THE CHALLENGE ALL ABOUT?
Now entering its fourth year, the Cyber 9/12 Student
Challenge is a one-of-a-kind competition designed
to provide students across academic disciplines with
a deeper understanding of the policy challenges
associated with cyber crisis and conflict. Part
interactive learning experience and part competitive
scenario exercise, it challenges teams to respond to a
realistic, evolving cyberattack and analyze the threat
it poses to national, international, and private sector
interests.
Students have a unique opportunity to interact with
expert mentors and high-level cyber professionals
while developing valuable skills in policy analysis and
presentation. The competition has already engaged
over four hundred students from universities in the
United States, United Kingdom, France, Poland,
Switzerland, Hungary, Finland, and Estonia.
Gen. Michael Hayden (Ret.), former NSA and CIA
Director, addresses students at the 2015 Challenge in
Washington, DC.
Winners of the 2015 Euro-Atlantic Challenge, Team
Switzerland, with NATO Assistant Secretary General for
Emerging Defense Challenges Ambassador Sorin Ducaru
and GCSP Director Ambassador Christian Dussey.
A MAJOR CYBERATTACK HAS OCCURRED. HOW SHOULD YOUR NATION RESPOND?
HOW TO PARTICIPATE
. . .as a competitor:
Graduate and undergraduate students from any uni-
versity, including defense colleges and military acad-
emies, are invited to apply to compete in teams of
four. There are no requirements for team composition
based on academic majors, education levels, or na-
tionalities of team members.
. . .as a coach:
Each team must recruit a coach to assist in preparing
for the competition. One coach can serve for sever-
al teams. Teams are expected to consult with their
coaches to help develop and revise their policy ideas
for the competition and confer with them during
breaks between competition rounds.
. . .as a judge:
Experts with significant policy and cybersecurity ex-
perience are invited to serve as judges. Judges eval-
uate the student teams’ oral presentations based
on the quality of their policy responses, their deci-
sion-making processes, and their presentation skills.
Previous judges include practitioners from various
sectors, such as government, international organiza-
tions, information and communications technology,
finance, and the press.
. . .as an observer:
All competition events are open to the public, and we
welcome anyone interested in cybersecurity policy to
join us as an observer.
. . .as a sponsor:
The competition is a unique opportunity for companies
to support next-generation cybersecurity education
on both sides of the Atlantic and position themselves
as innovative thought leaders in the field. Depending
on the level of sponsorship, our partners receive great
benefits including recruitment of top tech and policy
talent; advertisement in print and online; promotional
side events; and keynote and judging opportunities.
. . .as a host:
We offer opportunities to host one- or two-day qual-
ifying and affiliated events. These events are run by
students, faculty, or university staff with support from
the Atlantic Council.
To register or for more information, please contact:
Anni Piiparinen
Program Assistant
Cyber Statecraft Initiative - Atlantic Council
Email: APiiparinen@AtlanticCouncil.org
Phone: +1-202-292-5164
AtlanticCouncil.org
1030 15TH STREET, NW | 12TH FLOOR | WASHINGTON, DC 20005 | 202-463-7226
Student team presenting policy recommendations to a
panel of judges in Geneva, 2015.
Heli Tiirmaa-Klaar, Head of Cyber Policy Coordination
at the European External Action Service, in a conversa-
tion with students in Geneva in 2015.
TIMELINE
One Month before the Competition
Teams receive Intelligence Report I. The stage is
set for the simulated cyberattack and the teams
start preparing written policy briefs.
Two Weeks before the Competition
Teams submit the written policy briefs.
Competition Day 1 – Qualifying
Teams give a ten minute presentation to a panel of
judges, followed by ten minutes of judges’ ques-
tions and final feedback. Advancing teams receive
Intelligence Report II.
Competition Day 2 – Semifinal and Final
Semifinalist teams present modified policy rec-
ommendations based on the evolving scenario.
Teams advancing to the final round are given In-
telligence Report III and very limited time to adjust
their recommendations. Finalists present on stage
to a panel of celebrity judges, who award the win-
ning team in a closing reception.
PAST SUPPORTERS
This event was supported by
NATO’s Public Diplomacy Division

More Related Content

What's hot

ICC Bill-International Week
ICC Bill-International WeekICC Bill-International Week
ICC Bill-International Week
Mackenzie Mong
 
Security Statement
Security StatementSecurity Statement
Security Statement
Carl Moon
 
IAEM Rolling Kiosk Presentation
IAEM  Rolling Kiosk PresentationIAEM  Rolling Kiosk Presentation
IAEM Rolling Kiosk Presentation
João Canas
 
The Unleashed Vocational School. Best Practice In The Context Of Education Po...
The Unleashed Vocational School. Best Practice In The Context Of Education Po...The Unleashed Vocational School. Best Practice In The Context Of Education Po...
The Unleashed Vocational School. Best Practice In The Context Of Education Po...
UWirth
 
PROTECT_2015_Maritime Threats to Supply Chain
PROTECT_2015_Maritime Threats to Supply ChainPROTECT_2015_Maritime Threats to Supply Chain
PROTECT_2015_Maritime Threats to Supply Chain
Mar-John Cruz
 
Alliance intern fact sheet 10
Alliance intern fact sheet 10Alliance intern fact sheet 10
Alliance intern fact sheet 10
Ramiz Kurtis
 

What's hot (20)

Five Points Youth Foundation Goodwill Ambassador Audrey Addison Williams USA ...
Five Points Youth Foundation Goodwill Ambassador Audrey Addison Williams USA ...Five Points Youth Foundation Goodwill Ambassador Audrey Addison Williams USA ...
Five Points Youth Foundation Goodwill Ambassador Audrey Addison Williams USA ...
 
Five Points Youth Foundation Goodwill Ambassador Madeline Karita Fleming Minn...
Five Points Youth Foundation Goodwill Ambassador Madeline Karita Fleming Minn...Five Points Youth Foundation Goodwill Ambassador Madeline Karita Fleming Minn...
Five Points Youth Foundation Goodwill Ambassador Madeline Karita Fleming Minn...
 
Five Points Youth Foundation Goodwill Ambassador Orion Darkstar USA United Na...
Five Points Youth Foundation Goodwill Ambassador Orion Darkstar USA United Na...Five Points Youth Foundation Goodwill Ambassador Orion Darkstar USA United Na...
Five Points Youth Foundation Goodwill Ambassador Orion Darkstar USA United Na...
 
Five Points Youth Foundation Goodwill Ambassador Murli Sharma United Nations ...
Five Points Youth Foundation Goodwill Ambassador Murli Sharma United Nations ...Five Points Youth Foundation Goodwill Ambassador Murli Sharma United Nations ...
Five Points Youth Foundation Goodwill Ambassador Murli Sharma United Nations ...
 
Capacity Building in Internet Governance - DiploFoundation
Capacity Building in Internet Governance - DiploFoundationCapacity Building in Internet Governance - DiploFoundation
Capacity Building in Internet Governance - DiploFoundation
 
Publishing Development Research and Adding Value
Publishing Development Research and Adding ValuePublishing Development Research and Adding Value
Publishing Development Research and Adding Value
 
Five Points Youth Foundation Goodwill Ambassador Adegboyega Shamsideen Thomps...
Five Points Youth Foundation Goodwill Ambassador Adegboyega Shamsideen Thomps...Five Points Youth Foundation Goodwill Ambassador Adegboyega Shamsideen Thomps...
Five Points Youth Foundation Goodwill Ambassador Adegboyega Shamsideen Thomps...
 
Five Points Youth Foundation Goodwill Ambassador Tanjena Ahsan Rakhi Banglade...
Five Points Youth Foundation Goodwill Ambassador Tanjena Ahsan Rakhi Banglade...Five Points Youth Foundation Goodwill Ambassador Tanjena Ahsan Rakhi Banglade...
Five Points Youth Foundation Goodwill Ambassador Tanjena Ahsan Rakhi Banglade...
 
ICC Bill-International Week
ICC Bill-International WeekICC Bill-International Week
ICC Bill-International Week
 
Security Statement
Security StatementSecurity Statement
Security Statement
 
International Maritime Rescue Federation singapore MRO
International Maritime Rescue Federation singapore MROInternational Maritime Rescue Federation singapore MRO
International Maritime Rescue Federation singapore MRO
 
Activity report 2012
Activity report 2012Activity report 2012
Activity report 2012
 
Five Points Youth Foundation Goodwill Ambassador Sapkota Pradeep Nepal United...
Five Points Youth Foundation Goodwill Ambassador Sapkota Pradeep Nepal United...Five Points Youth Foundation Goodwill Ambassador Sapkota Pradeep Nepal United...
Five Points Youth Foundation Goodwill Ambassador Sapkota Pradeep Nepal United...
 
Sbmt
SbmtSbmt
Sbmt
 
Five Points Youth Foundation Goodwill Ambassador Robert Raven Jackson Alaska ...
Five Points Youth Foundation Goodwill Ambassador Robert Raven Jackson Alaska ...Five Points Youth Foundation Goodwill Ambassador Robert Raven Jackson Alaska ...
Five Points Youth Foundation Goodwill Ambassador Robert Raven Jackson Alaska ...
 
IAEM Rolling Kiosk Presentation
IAEM  Rolling Kiosk PresentationIAEM  Rolling Kiosk Presentation
IAEM Rolling Kiosk Presentation
 
Imf and ingo
Imf and ingoImf and ingo
Imf and ingo
 
The Unleashed Vocational School. Best Practice In The Context Of Education Po...
The Unleashed Vocational School. Best Practice In The Context Of Education Po...The Unleashed Vocational School. Best Practice In The Context Of Education Po...
The Unleashed Vocational School. Best Practice In The Context Of Education Po...
 
PROTECT_2015_Maritime Threats to Supply Chain
PROTECT_2015_Maritime Threats to Supply ChainPROTECT_2015_Maritime Threats to Supply Chain
PROTECT_2015_Maritime Threats to Supply Chain
 
Alliance intern fact sheet 10
Alliance intern fact sheet 10Alliance intern fact sheet 10
Alliance intern fact sheet 10
 

Similar to Cyber912 student challenge_two_pager_general

Guardian SafeSchool Consulting - Low Res
Guardian SafeSchool Consulting - Low ResGuardian SafeSchool Consulting - Low Res
Guardian SafeSchool Consulting - Low Res
Jeff Ezell
 
S15-CounterTerrorism-Executive_Summary_Final
S15-CounterTerrorism-Executive_Summary_FinalS15-CounterTerrorism-Executive_Summary_Final
S15-CounterTerrorism-Executive_Summary_Final
Brooke Peckins
 
Free dhs ied search procedures workshop in washington
Free dhs ied search procedures workshop in washingtonFree dhs ied search procedures workshop in washington
Free dhs ied search procedures workshop in washington
David Jimenez
 
028_iu_annualreport_2015_v13_web_spreads
028_iu_annualreport_2015_v13_web_spreads028_iu_annualreport_2015_v13_web_spreads
028_iu_annualreport_2015_v13_web_spreads
Leonard B
 
CIS Security Risk Mgmt Solutions Brochure
CIS Security Risk Mgmt Solutions BrochureCIS Security Risk Mgmt Solutions Brochure
CIS Security Risk Mgmt Solutions Brochure
Jeff Ezell
 
Call for Papers (Extended Abstracts): 5th International Conference of the UNE...
Call for Papers (Extended Abstracts): 5th International Conference of the UNE...Call for Papers (Extended Abstracts): 5th International Conference of the UNE...
Call for Papers (Extended Abstracts): 5th International Conference of the UNE...
Graciela Mariani
 
Ewert_Military Information Systems Risk Management
Ewert_Military Information Systems Risk ManagementEwert_Military Information Systems Risk Management
Ewert_Military Information Systems Risk Management
Thomas Ewert
 

Similar to Cyber912 student challenge_two_pager_general (20)

CYBERSECURITY CYBERCRIME CYBER INTELLIGENCE GROUP
CYBERSECURITY CYBERCRIME CYBER INTELLIGENCE GROUPCYBERSECURITY CYBERCRIME CYBER INTELLIGENCE GROUP
CYBERSECURITY CYBERCRIME CYBER INTELLIGENCE GROUP
 
Iafie 2019 call for proposals (extended deadline)
Iafie 2019   call for proposals (extended deadline)Iafie 2019   call for proposals (extended deadline)
Iafie 2019 call for proposals (extended deadline)
 
Guardian SafeSchool Consulting - Low Res
Guardian SafeSchool Consulting - Low ResGuardian SafeSchool Consulting - Low Res
Guardian SafeSchool Consulting - Low Res
 
Centre for Strategic Cyberspace + Security Science / CSCSS Overview
Centre for Strategic Cyberspace + Security Science / CSCSS OverviewCentre for Strategic Cyberspace + Security Science / CSCSS Overview
Centre for Strategic Cyberspace + Security Science / CSCSS Overview
 
Education to cyber security
Education to cyber securityEducation to cyber security
Education to cyber security
 
S15-CounterTerrorism-Executive_Summary_Final
S15-CounterTerrorism-Executive_Summary_FinalS15-CounterTerrorism-Executive_Summary_Final
S15-CounterTerrorism-Executive_Summary_Final
 
2020 Annual Security Report
2020 Annual Security Report 2020 Annual Security Report
2020 Annual Security Report
 
Research Needs in Crisis Management - a European Perspective
Research Needs in Crisis Management - a European PerspectiveResearch Needs in Crisis Management - a European Perspective
Research Needs in Crisis Management - a European Perspective
 
2017 March Tools for Change CGI Newsletter
2017 March Tools for Change CGI Newsletter2017 March Tools for Change CGI Newsletter
2017 March Tools for Change CGI Newsletter
 
International emergency management
International emergency managementInternational emergency management
International emergency management
 
Free dhs ied search procedures workshop in washington
Free dhs ied search procedures workshop in washingtonFree dhs ied search procedures workshop in washington
Free dhs ied search procedures workshop in washington
 
Mid-Atlantic INLETS 2017
Mid-Atlantic INLETS 2017Mid-Atlantic INLETS 2017
Mid-Atlantic INLETS 2017
 
028_iu_annualreport_2015_v13_web_spreads
028_iu_annualreport_2015_v13_web_spreads028_iu_annualreport_2015_v13_web_spreads
028_iu_annualreport_2015_v13_web_spreads
 
Newtok climrefugees_SDengler_Davos_25Aug (2)
Newtok climrefugees_SDengler_Davos_25Aug (2)Newtok climrefugees_SDengler_Davos_25Aug (2)
Newtok climrefugees_SDengler_Davos_25Aug (2)
 
CIS Security Risk Mgmt Solutions Brochure
CIS Security Risk Mgmt Solutions BrochureCIS Security Risk Mgmt Solutions Brochure
CIS Security Risk Mgmt Solutions Brochure
 
Digital Security Resources for Media Trainers!
Digital Security Resources for Media Trainers!Digital Security Resources for Media Trainers!
Digital Security Resources for Media Trainers!
 
Call for Papers (Extended Abstracts): 5th International Conference of the UNE...
Call for Papers (Extended Abstracts): 5th International Conference of the UNE...Call for Papers (Extended Abstracts): 5th International Conference of the UNE...
Call for Papers (Extended Abstracts): 5th International Conference of the UNE...
 
fiinovation-innovative-financial-advisors-pvt-ltd
fiinovation-innovative-financial-advisors-pvt-ltdfiinovation-innovative-financial-advisors-pvt-ltd
fiinovation-innovative-financial-advisors-pvt-ltd
 
Ewert_Military Information Systems Risk Management
Ewert_Military Information Systems Risk ManagementEwert_Military Information Systems Risk Management
Ewert_Military Information Systems Risk Management
 
Safeguarding K-12 Organizations from Cybersecurity Threats WPGC.pdf
Safeguarding K-12 Organizations from Cybersecurity Threats  WPGC.pdfSafeguarding K-12 Organizations from Cybersecurity Threats  WPGC.pdf
Safeguarding K-12 Organizations from Cybersecurity Threats WPGC.pdf
 

More from atlanticcouncil

Tunisia: The Last Arab Spring Country
Tunisia: The Last Arab Spring CountryTunisia: The Last Arab Spring Country
Tunisia: The Last Arab Spring Country
atlanticcouncil
 
Yp day-2015-report-webversion
Yp day-2015-report-webversionYp day-2015-report-webversion
Yp day-2015-report-webversion
atlanticcouncil
 
Defeating the Jihadists in Syria: Competition before Confrontation
Defeating the Jihadists in Syria: Competition before ConfrontationDefeating the Jihadists in Syria: Competition before Confrontation
Defeating the Jihadists in Syria: Competition before Confrontation
atlanticcouncil
 
Gulf innovation web
Gulf innovation webGulf innovation web
Gulf innovation web
atlanticcouncil
 
Acus managing differences report
Acus managing differences reportAcus managing differences report
Acus managing differences report
atlanticcouncil
 

More from atlanticcouncil (20)

Securing Ukraine's Energy Sector
Securing Ukraine's Energy SectorSecuring Ukraine's Energy Sector
Securing Ukraine's Energy Sector
 
Afghanistan and US Security
Afghanistan and US SecurityAfghanistan and US Security
Afghanistan and US Security
 
Crude Oil for Natural Gas: Prospects for Iran-Saudi Reconciliation
Crude Oil for Natural Gas: Prospects for Iran-Saudi ReconciliationCrude Oil for Natural Gas: Prospects for Iran-Saudi Reconciliation
Crude Oil for Natural Gas: Prospects for Iran-Saudi Reconciliation
 
Tunisia: The Last Arab Spring Country
Tunisia: The Last Arab Spring CountryTunisia: The Last Arab Spring Country
Tunisia: The Last Arab Spring Country
 
Foreign Policy for an Urban World: Global Governance and the Rise of Cities
Foreign Policy for an Urban World: Global Governance and the Rise of CitiesForeign Policy for an Urban World: Global Governance and the Rise of Cities
Foreign Policy for an Urban World: Global Governance and the Rise of Cities
 
Toward a Sustainable Peace in the South China Sea
Toward a Sustainable Peace in the South China SeaToward a Sustainable Peace in the South China Sea
Toward a Sustainable Peace in the South China Sea
 
Relaunching the eastern_partnership_web
Relaunching the eastern_partnership_webRelaunching the eastern_partnership_web
Relaunching the eastern_partnership_web
 
2015 Distinguished Leadership Awards
2015 Distinguished Leadership Awards2015 Distinguished Leadership Awards
2015 Distinguished Leadership Awards
 
Camp david 0508
Camp david 0508Camp david 0508
Camp david 0508
 
Harnessing social impact
Harnessing social impactHarnessing social impact
Harnessing social impact
 
Reimagining pakistan s_militia_policy
Reimagining pakistan s_militia_policyReimagining pakistan s_militia_policy
Reimagining pakistan s_militia_policy
 
Yp day-2015-report-webversion
Yp day-2015-report-webversionYp day-2015-report-webversion
Yp day-2015-report-webversion
 
Defeating the Jihadists in Syria: Competition before Confrontation
Defeating the Jihadists in Syria: Competition before ConfrontationDefeating the Jihadists in Syria: Competition before Confrontation
Defeating the Jihadists in Syria: Competition before Confrontation
 
Dynamic Stability: US Strategy for a World in Transition
Dynamic Stability: US Strategy for a World in TransitionDynamic Stability: US Strategy for a World in Transition
Dynamic Stability: US Strategy for a World in Transition
 
Setting the Stage for Peace in Syria: The Case for a Syrian National Stabiliz...
Setting the Stage for Peace in Syria: The Case for a Syrian National Stabiliz...Setting the Stage for Peace in Syria: The Case for a Syrian National Stabiliz...
Setting the Stage for Peace in Syria: The Case for a Syrian National Stabiliz...
 
Mexicos energy reform
Mexicos energy reformMexicos energy reform
Mexicos energy reform
 
Gulf innovation web
Gulf innovation webGulf innovation web
Gulf innovation web
 
Acus managing differences report
Acus managing differences reportAcus managing differences report
Acus managing differences report
 
Artful Balance: Future US Defense Strategy and Force Posture in the Gulf
Artful Balance: Future US Defense Strategy and Force Posture in the GulfArtful Balance: Future US Defense Strategy and Force Posture in the Gulf
Artful Balance: Future US Defense Strategy and Force Posture in the Gulf
 
The Healthcare Internet of Things: Rewards and Risks
The Healthcare Internet of Things: Rewards and RisksThe Healthcare Internet of Things: Rewards and Risks
The Healthcare Internet of Things: Rewards and Risks
 

Recently uploaded

Asymmetry in the atmosphere of the ultra-hot Jupiter WASP-76 b
Asymmetry in the atmosphere of the ultra-hot Jupiter WASP-76 bAsymmetry in the atmosphere of the ultra-hot Jupiter WASP-76 b
Asymmetry in the atmosphere of the ultra-hot Jupiter WASP-76 b
Sérgio Sacani
 
biology HL practice questions IB BIOLOGY
biology HL practice questions IB BIOLOGYbiology HL practice questions IB BIOLOGY
biology HL practice questions IB BIOLOGY
1301aanya
 
SCIENCE-4-QUARTER4-WEEK-4-PPT-1 (1).pptx
SCIENCE-4-QUARTER4-WEEK-4-PPT-1 (1).pptxSCIENCE-4-QUARTER4-WEEK-4-PPT-1 (1).pptx
SCIENCE-4-QUARTER4-WEEK-4-PPT-1 (1).pptx
RizalinePalanog2
 

Recently uploaded (20)

module for grade 9 for distance learning
module for grade 9 for distance learningmodule for grade 9 for distance learning
module for grade 9 for distance learning
 
GBSN - Microbiology (Unit 2)
GBSN - Microbiology (Unit 2)GBSN - Microbiology (Unit 2)
GBSN - Microbiology (Unit 2)
 
FAIRSpectra - Enabling the FAIRification of Spectroscopy and Spectrometry
FAIRSpectra - Enabling the FAIRification of Spectroscopy and SpectrometryFAIRSpectra - Enabling the FAIRification of Spectroscopy and Spectrometry
FAIRSpectra - Enabling the FAIRification of Spectroscopy and Spectrometry
 
COST ESTIMATION FOR A RESEARCH PROJECT.pptx
COST ESTIMATION FOR A RESEARCH PROJECT.pptxCOST ESTIMATION FOR A RESEARCH PROJECT.pptx
COST ESTIMATION FOR A RESEARCH PROJECT.pptx
 
GBSN - Microbiology (Unit 1)
GBSN - Microbiology (Unit 1)GBSN - Microbiology (Unit 1)
GBSN - Microbiology (Unit 1)
 
High Class Escorts in Hyderabad ₹7.5k Pick Up & Drop With Cash Payment 969456...
High Class Escorts in Hyderabad ₹7.5k Pick Up & Drop With Cash Payment 969456...High Class Escorts in Hyderabad ₹7.5k Pick Up & Drop With Cash Payment 969456...
High Class Escorts in Hyderabad ₹7.5k Pick Up & Drop With Cash Payment 969456...
 
Unit5-Cloud.pptx for lpu course cse121 o
Unit5-Cloud.pptx for lpu course cse121 oUnit5-Cloud.pptx for lpu course cse121 o
Unit5-Cloud.pptx for lpu course cse121 o
 
Forensic Biology & Its biological significance.pdf
Forensic Biology & Its biological significance.pdfForensic Biology & Its biological significance.pdf
Forensic Biology & Its biological significance.pdf
 
CELL -Structural and Functional unit of life.pdf
CELL -Structural and Functional unit of life.pdfCELL -Structural and Functional unit of life.pdf
CELL -Structural and Functional unit of life.pdf
 
Zoology 5th semester notes( Sumit_yadav).pdf
Zoology 5th semester notes( Sumit_yadav).pdfZoology 5th semester notes( Sumit_yadav).pdf
Zoology 5th semester notes( Sumit_yadav).pdf
 
9654467111 Call Girls In Raj Nagar Delhi Short 1500 Night 6000
9654467111 Call Girls In Raj Nagar Delhi Short 1500 Night 60009654467111 Call Girls In Raj Nagar Delhi Short 1500 Night 6000
9654467111 Call Girls In Raj Nagar Delhi Short 1500 Night 6000
 
IDENTIFICATION OF THE LIVING- forensic medicine
IDENTIFICATION OF THE LIVING- forensic medicineIDENTIFICATION OF THE LIVING- forensic medicine
IDENTIFICATION OF THE LIVING- forensic medicine
 
Asymmetry in the atmosphere of the ultra-hot Jupiter WASP-76 b
Asymmetry in the atmosphere of the ultra-hot Jupiter WASP-76 bAsymmetry in the atmosphere of the ultra-hot Jupiter WASP-76 b
Asymmetry in the atmosphere of the ultra-hot Jupiter WASP-76 b
 
STS-UNIT 4 CLIMATE CHANGE POWERPOINT PRESENTATION
STS-UNIT 4 CLIMATE CHANGE POWERPOINT PRESENTATIONSTS-UNIT 4 CLIMATE CHANGE POWERPOINT PRESENTATION
STS-UNIT 4 CLIMATE CHANGE POWERPOINT PRESENTATION
 
SAMASTIPUR CALL GIRL 7857803690 LOW PRICE ESCORT SERVICE
SAMASTIPUR CALL GIRL 7857803690  LOW PRICE  ESCORT SERVICESAMASTIPUR CALL GIRL 7857803690  LOW PRICE  ESCORT SERVICE
SAMASTIPUR CALL GIRL 7857803690 LOW PRICE ESCORT SERVICE
 
biology HL practice questions IB BIOLOGY
biology HL practice questions IB BIOLOGYbiology HL practice questions IB BIOLOGY
biology HL practice questions IB BIOLOGY
 
SCIENCE-4-QUARTER4-WEEK-4-PPT-1 (1).pptx
SCIENCE-4-QUARTER4-WEEK-4-PPT-1 (1).pptxSCIENCE-4-QUARTER4-WEEK-4-PPT-1 (1).pptx
SCIENCE-4-QUARTER4-WEEK-4-PPT-1 (1).pptx
 
COMPUTING ANTI-DERIVATIVES (Integration by SUBSTITUTION)
COMPUTING ANTI-DERIVATIVES(Integration by SUBSTITUTION)COMPUTING ANTI-DERIVATIVES(Integration by SUBSTITUTION)
COMPUTING ANTI-DERIVATIVES (Integration by SUBSTITUTION)
 
Proteomics: types, protein profiling steps etc.
Proteomics: types, protein profiling steps etc.Proteomics: types, protein profiling steps etc.
Proteomics: types, protein profiling steps etc.
 
Connaught Place, Delhi Call girls :8448380779 Model Escorts | 100% verified
Connaught Place, Delhi Call girls :8448380779 Model Escorts | 100% verifiedConnaught Place, Delhi Call girls :8448380779 Model Escorts | 100% verified
Connaught Place, Delhi Call girls :8448380779 Model Escorts | 100% verified
 

Cyber912 student challenge_two_pager_general

  • 1. STUDENT CHALLENGE 9/12 Cyber We frequently hear the terms “Cyber 9/11” and “Digital Pearl Harbor,” but what might policymakers do the day after a crisis? The Cyber 9/12 Student Challenge is an annual cyber policy competition for students across the globe to compete in developing national security policy recommendations tackling a fictional cyber catastrophe. In 2016, the Student Challenge will take place in Washington, DC on March 11-12 and in Geneva, Switzerland, on April 7-8. THE STUDENT CHALLENGE In Washington, DC, student teams confront a serious cybersecurity breach of national and international im- portance. Teams will compose policy recommenda- tions and justify their decision-making process, con- sidering the role and implications for relevant civilian, military, law enforcement, and private sector entities and updating the recommendations as the scenario evolves. In Geneva, Switzerland, in partnership with the Ge- neva Centre for Security Policy (GCSP), students respond to a major cyber- attack on European networks. Competitors will pro- vide recommendations balancing individual national approaches and a collective crisis management re- sponse, considering capabilities, policies, and gover- nance structures of NATO, EU, and individual nations. The competition fosters a culture of cooperation and a better understanding of these organizations and their member states in responding to cyberattacks. WHAT IS THE CHALLENGE ALL ABOUT? Now entering its fourth year, the Cyber 9/12 Student Challenge is a one-of-a-kind competition designed to provide students across academic disciplines with a deeper understanding of the policy challenges associated with cyber crisis and conflict. Part interactive learning experience and part competitive scenario exercise, it challenges teams to respond to a realistic, evolving cyberattack and analyze the threat it poses to national, international, and private sector interests. Students have a unique opportunity to interact with expert mentors and high-level cyber professionals while developing valuable skills in policy analysis and presentation. The competition has already engaged over four hundred students from universities in the United States, United Kingdom, France, Poland, Switzerland, Hungary, Finland, and Estonia. Gen. Michael Hayden (Ret.), former NSA and CIA Director, addresses students at the 2015 Challenge in Washington, DC. Winners of the 2015 Euro-Atlantic Challenge, Team Switzerland, with NATO Assistant Secretary General for Emerging Defense Challenges Ambassador Sorin Ducaru and GCSP Director Ambassador Christian Dussey. A MAJOR CYBERATTACK HAS OCCURRED. HOW SHOULD YOUR NATION RESPOND?
  • 2. HOW TO PARTICIPATE . . .as a competitor: Graduate and undergraduate students from any uni- versity, including defense colleges and military acad- emies, are invited to apply to compete in teams of four. There are no requirements for team composition based on academic majors, education levels, or na- tionalities of team members. . . .as a coach: Each team must recruit a coach to assist in preparing for the competition. One coach can serve for sever- al teams. Teams are expected to consult with their coaches to help develop and revise their policy ideas for the competition and confer with them during breaks between competition rounds. . . .as a judge: Experts with significant policy and cybersecurity ex- perience are invited to serve as judges. Judges eval- uate the student teams’ oral presentations based on the quality of their policy responses, their deci- sion-making processes, and their presentation skills. Previous judges include practitioners from various sectors, such as government, international organiza- tions, information and communications technology, finance, and the press. . . .as an observer: All competition events are open to the public, and we welcome anyone interested in cybersecurity policy to join us as an observer. . . .as a sponsor: The competition is a unique opportunity for companies to support next-generation cybersecurity education on both sides of the Atlantic and position themselves as innovative thought leaders in the field. Depending on the level of sponsorship, our partners receive great benefits including recruitment of top tech and policy talent; advertisement in print and online; promotional side events; and keynote and judging opportunities. . . .as a host: We offer opportunities to host one- or two-day qual- ifying and affiliated events. These events are run by students, faculty, or university staff with support from the Atlantic Council. To register or for more information, please contact: Anni Piiparinen Program Assistant Cyber Statecraft Initiative - Atlantic Council Email: APiiparinen@AtlanticCouncil.org Phone: +1-202-292-5164 AtlanticCouncil.org 1030 15TH STREET, NW | 12TH FLOOR | WASHINGTON, DC 20005 | 202-463-7226 Student team presenting policy recommendations to a panel of judges in Geneva, 2015. Heli Tiirmaa-Klaar, Head of Cyber Policy Coordination at the European External Action Service, in a conversa- tion with students in Geneva in 2015. TIMELINE One Month before the Competition Teams receive Intelligence Report I. The stage is set for the simulated cyberattack and the teams start preparing written policy briefs. Two Weeks before the Competition Teams submit the written policy briefs. Competition Day 1 – Qualifying Teams give a ten minute presentation to a panel of judges, followed by ten minutes of judges’ ques- tions and final feedback. Advancing teams receive Intelligence Report II. Competition Day 2 – Semifinal and Final Semifinalist teams present modified policy rec- ommendations based on the evolving scenario. Teams advancing to the final round are given In- telligence Report III and very limited time to adjust their recommendations. Finalists present on stage to a panel of celebrity judges, who award the win- ning team in a closing reception. PAST SUPPORTERS This event was supported by NATO’s Public Diplomacy Division