SlideShare a Scribd company logo
1 of 17
Download to read offline
European Cyber Security Challenge
Greek National Cyber Security Team
Christos Xenakis
Department of Digital Systems
University of Piraeus
• It is acknowledged that there is a growing need for IT security professionals worldwide
• To mitigate this shortage, many countries launch National Cyber Security Competitions
• The aim of these competitions are:
1. Find new and young talents in cyber security
2. Encourage young people to pursue a career in cyber security
• The European Cyber Security Challenge – ECSC adds a Pan-European layer on these
National Competitions
What is about
C. Xenakis, Department of Digital Systems, University of Piraeus 23/8/2017
The European Cyber Security Challenge - ECSC
• It is an initiative of the European Commission supported by ENISA
• Annually, the competition brings together young talents from European Countries to
have fun and compete in cyber security
• The goal of ECSC is to place Cyber Security at the service of humankind
• Promoting:
• An open, safe and secure cyberspace
• A peaceful society with democratic values
• Free and critical thinking
• A Cyber Security championship
C. Xenakis, Department of Digital Systems, University of Piraeus 33/8/2017
This year is the 3rd contest
C. Xenakis, Department of Digital Systems, University of Piraeus 43/8/2017
ECSC 2017 will be hosted in Spain
• In Malaga, by Spanish National Cyber Security Institute (INCIBE)
• 30th October – 3rd November 2017
• Participated Teams: 14
• Competitors per Team: 10
C. Xenakis, Department of Digital Systems, University of Piraeus 53/8/2017
National Team that will take place
Austria Cyprus Denmark Estonia
Germany
Greece Ireland Italy Liechtenstein Norway
Romania Spain United Kingdom
C. Xenakis, Department of Digital Systems, University of Piraeus 63/8/2017
Switcherland
• The leadership for the Greek participation in ECSC 2017 was assigned to the Systems’
Security Laboratory of the Department of Digital Systems of the University of Piraeus
• Constitution of the Greek Team
• Organization of the Greek participation
• Financial administration – Sponsorship
• Dissemination
• The Steering Committee members are:
• Prof. Christos Xenakis
• Prof. Costas Lambrinoudakis
The Greek Participation
C. Xenakis, Department of Digital Systems, University of Piraeus 73/8/2017
• 10 Persons - Contestants
• Should be selected by a National Competition
• Should not be older than 25 years old and legally reside in Greece
• One Coach (an additional may act as alternative) who is responsible for
• Well-being and behavior of the Greek Team
• Making sure that essential information reaches the Team and is understood
• Organizing the Team’s strategy
• A Jury representative
• One from each country that assess the performance
The Greek National Team
C. Xenakis, Department of Digital Systems, University of Piraeus 83/8/2017
Constitution of the Greek Team
• A National Competition will be carried at the Department of Digital Systems, University
of Piraeus
• End of May – begging of June, 2017
• Looking for young, skilled and talented specialists in Cyber Security
• It will be an excellent experience for all of us.
• Participating in the contest is something that you can be proud off.
• Proud being part of the National Team
• Stayed tuned
C. Xenakis, Department of Digital Systems, University of Piraeus 93/8/2017
Competition
• It will be based on the educational exercise Capture-The-Flag (CTF), which gives the
participants experience in:
• Securing a machine or an application
• Conducting and reacting to attacks found in the real world
• Challenges will include:
• Reverse engineering, network sniffing, protocol analysis
• System administration, programming, cryptoanalysis
• Web security, forensics, mobile security
• In both styles: (a) attack/defense and (b) Jeopardy
C. Xenakis, Department of Digital Systems, University of Piraeus 103/8/2017
Milestones
C. Xenakis, Department of Digital Systems, University of Piraeus 113/8/2017
• National teams registration January 2017
• Rules & requisites March 2017
• Kick off meeting of the Steering committee March 2017
• Sponsoring plan April 2017
• Fee model & contract April 2017
• National Competition June 2017
• National Team – contract sign June 2017
• Planning Conference ECSC 2017 – Athens June 2017
• ECSC 2017 Malaga, Spain 30 Oct. – 3 Nov. 2017
Costs & needs associated with the our participation
• Funding is based on sponsorships
• Approx. 7.000 Euros for the participation of the Greek Team in the ECSC 2017
• Flight & accommodation expenses
• Technical contribution to the National Competition
• Equipment, at least 10 high-end laptops
• Team training, coaching, event hosting
• Supplementary equipment
• Communication
C. Xenakis, Department of Digital Systems, University of Piraeus 123/8/2017
Benefits from supporting the Greek Team
• ECSC 2017 will attract media attention
• Meet new and promising talents and explore recruitment opportunities
• Meet influencers and decision-makers in the InfoSec market
• Build a National cyber security network
• Establishing strong and long lasting webs of trust among talented individuals
• Raising awareness on cyber security issues to non technical audiences
C. Xenakis, Department of Digital Systems, University of Piraeus 133/8/2017
Sponsor Packs
C. Xenakis, Department of Digital Systems, University of Piraeus 143/8/2017
• Logo on website of Greek team
• Logo on cover of Greek team
brochure, available on Greek
stand
• Logo on announcements and
updates about the two events
• Mention in press release
announcing Greek mission to
Spain
• Logo on front of t-shirt worn by
Greek team in Spain
• Logo on lanyard worn by Greek
team
• Logo on jacket worn by Greek
team
• One free pass to event in Spain
• Logo on website of Greek
team
• Logo on inside page of Greek
team brochure, available on
Greek stand
• Logo on announcements and
updates about the two
events
• Mention in press release
announcing Greek mission to
Spain
Gold Platinum Diamond
• Logo on website of Greek
team
• Logo on inside page of Greek
team brochure, available on
Greek stand
• Logo on announcements and
updates about the two
events
• Mention in press release
announcing Greek mission to
Spain
• Offer own brochure at Spain
event
• Logo on back of t-shirt worn
by Greek team in Spain
The Greek Team of ECSC 2016 (got the 5th position)
C. Xenakis, Department of Digital Systems, University of Piraeus 153/8/2017
ECSC 2016
C. Xenakis, Department of Digital Systems, University of Piraeus 163/8/2017
Thank you!
Questions?
Prof. Christos Xenakis
Systems Security Laboratory
Department of Digital Systems, School of Information and Communication Technologies
University of Piraeus, Greece
http://ssl.ds.unipi.gr/
http://cgi.di.uoa.gr/~xenakis/
email: xenakis@unipi.gr

More Related Content

Viewers also liked

The evolving threats and the challenges of the modern CISO
The evolving threats and the challenges of the modern CISOThe evolving threats and the challenges of the modern CISO
The evolving threats and the challenges of the modern CISOisc2-hellenic
 
Cyber security-report-2017
Cyber security-report-2017Cyber security-report-2017
Cyber security-report-2017NRC
 
Cyber security presentation
Cyber security presentationCyber security presentation
Cyber security presentationBijay Bhandari
 
Pci standards, from participation to implementation and review
Pci standards, from participation to implementation and reviewPci standards, from participation to implementation and review
Pci standards, from participation to implementation and reviewisc2-hellenic
 
Building next gen malware behavioural analysis environment
Building next gen malware behavioural analysis environment Building next gen malware behavioural analysis environment
Building next gen malware behavioural analysis environment isc2-hellenic
 
Flowchart - Building next gen malware behavioural analysis environment
Flowchart - Building next gen malware behavioural analysis environment Flowchart - Building next gen malware behavioural analysis environment
Flowchart - Building next gen malware behavioural analysis environment isc2-hellenic
 
CyberSecurity Challenge Decision Document
CyberSecurity Challenge Decision Document CyberSecurity Challenge Decision Document
CyberSecurity Challenge Decision Document LeAnn Rhodes
 
Cyber security for children
Cyber security for childrenCyber security for children
Cyber security for childrenAvanzo net
 
GDPR Cyber Insurance 11/1/2017
GDPR Cyber Insurance 11/1/2017GDPR Cyber Insurance 11/1/2017
GDPR Cyber Insurance 11/1/2017isc2-hellenic
 
Deep Learning for Cyber Security
Deep Learning for Cyber SecurityDeep Learning for Cyber Security
Deep Learning for Cyber SecurityAltoros
 
National Cyber Security Policy 2013 (NCSP)
National Cyber Security Policy 2013 (NCSP)National Cyber Security Policy 2013 (NCSP)
National Cyber Security Policy 2013 (NCSP)Gopal Choudhary
 
Hackers and Hacking a brief overview 5-26-2016
Hackers and Hacking a brief overview 5-26-2016Hackers and Hacking a brief overview 5-26-2016
Hackers and Hacking a brief overview 5-26-2016Gohsuke Takama
 
The Future of Cyber Security
The Future of Cyber SecurityThe Future of Cyber Security
The Future of Cyber SecurityStephen Lahanas
 
Cyber crime and cyber security
Cyber crime and cyber securityCyber crime and cyber security
Cyber crime and cyber securityjyoti_lakhani
 

Viewers also liked (19)

The evolving threats and the challenges of the modern CISO
The evolving threats and the challenges of the modern CISOThe evolving threats and the challenges of the modern CISO
The evolving threats and the challenges of the modern CISO
 
Cyber security-report-2017
Cyber security-report-2017Cyber security-report-2017
Cyber security-report-2017
 
Cyber security presentation
Cyber security presentationCyber security presentation
Cyber security presentation
 
Pci standards, from participation to implementation and review
Pci standards, from participation to implementation and reviewPci standards, from participation to implementation and review
Pci standards, from participation to implementation and review
 
Panoptis 2016
Panoptis 2016Panoptis 2016
Panoptis 2016
 
Building next gen malware behavioural analysis environment
Building next gen malware behavioural analysis environment Building next gen malware behavioural analysis environment
Building next gen malware behavioural analysis environment
 
Flowchart - Building next gen malware behavioural analysis environment
Flowchart - Building next gen malware behavioural analysis environment Flowchart - Building next gen malware behavioural analysis environment
Flowchart - Building next gen malware behavioural analysis environment
 
CyberSecurity Challenge Decision Document
CyberSecurity Challenge Decision Document CyberSecurity Challenge Decision Document
CyberSecurity Challenge Decision Document
 
GDPR 11/1/2017
GDPR 11/1/2017GDPR 11/1/2017
GDPR 11/1/2017
 
Cyber security for children
Cyber security for childrenCyber security for children
Cyber security for children
 
GDPR Cyber Insurance 11/1/2017
GDPR Cyber Insurance 11/1/2017GDPR Cyber Insurance 11/1/2017
GDPR Cyber Insurance 11/1/2017
 
Deep Learning for Cyber Security
Deep Learning for Cyber SecurityDeep Learning for Cyber Security
Deep Learning for Cyber Security
 
National Cyber Security Policy 2013 (NCSP)
National Cyber Security Policy 2013 (NCSP)National Cyber Security Policy 2013 (NCSP)
National Cyber Security Policy 2013 (NCSP)
 
Cybersecurity
CybersecurityCybersecurity
Cybersecurity
 
Hackers and Hacking a brief overview 5-26-2016
Hackers and Hacking a brief overview 5-26-2016Hackers and Hacking a brief overview 5-26-2016
Hackers and Hacking a brief overview 5-26-2016
 
The Future of Cyber Security
The Future of Cyber SecurityThe Future of Cyber Security
The Future of Cyber Security
 
Cyber crime and cyber security
Cyber crime and cyber securityCyber crime and cyber security
Cyber crime and cyber security
 
Black hat hackers
Black hat hackersBlack hat hackers
Black hat hackers
 
Cyber security
Cyber securityCyber security
Cyber security
 

Similar to European Cyber Security Challenge - Greel National Cyber Security Team

Trustworthy Infrastructure for Personal Data Management
Trustworthy Infrastructure for Personal Data ManagementTrustworthy Infrastructure for Personal Data Management
Trustworthy Infrastructure for Personal Data ManagementIoannis Krontiris
 
Visual Information Analysis for Crisis and Natural Disasters Management and R...
Visual Information Analysis for Crisis and Natural Disasters Management and R...Visual Information Analysis for Crisis and Natural Disasters Management and R...
Visual Information Analysis for Crisis and Natural Disasters Management and R...Yiannis Kompatsiaris
 
American Public University System (NASDAQ:APEI) - Dr. Clay Wilson is the Prog...
American Public University System (NASDAQ:APEI) - Dr. Clay Wilson is the Prog...American Public University System (NASDAQ:APEI) - Dr. Clay Wilson is the Prog...
American Public University System (NASDAQ:APEI) - Dr. Clay Wilson is the Prog...Investorideas.com
 
APCERT Updates
APCERT UpdatesAPCERT Updates
APCERT UpdatesAPNIC
 
CNCERT Conference 2017: Capacity development in the Asia Pacific
CNCERT Conference 2017: Capacity development in the Asia PacificCNCERT Conference 2017: Capacity development in the Asia Pacific
CNCERT Conference 2017: Capacity development in the Asia PacificAPNIC
 
SC7 Workshop 3: Enhancing cyber defence of cyber space systems
SC7 Workshop 3: Enhancing cyber defence of cyber space systemsSC7 Workshop 3: Enhancing cyber defence of cyber space systems
SC7 Workshop 3: Enhancing cyber defence of cyber space systemsBigData_Europe
 
Update and forward plan for ENUMERATE - Digitisation intelligence for Europe
Update and forward plan for ENUMERATE - Digitisation intelligence for EuropeUpdate and forward plan for ENUMERATE - Digitisation intelligence for Europe
Update and forward plan for ENUMERATE - Digitisation intelligence for EuropeNicholas Poole
 
Case Studies & Issues of Quality in elearning: The 3Sigma Model
Case Studies & Issues of Quality in elearning: The 3Sigma ModelCase Studies & Issues of Quality in elearning: The 3Sigma Model
Case Studies & Issues of Quality in elearning: The 3Sigma ModelCharalambos Vrasidas, Ph.D.
 
Prize by GCSP for Revolution in World Safety 2023.pptx
Prize by GCSP for Revolution in World Safety 2023.pptxPrize by GCSP for Revolution in World Safety 2023.pptx
Prize by GCSP for Revolution in World Safety 2023.pptxScholarshiphive
 
Emerging & Enabling Technologies event, 19 September 17 - presentation by Gav...
Emerging & Enabling Technologies event, 19 September 17 - presentation by Gav...Emerging & Enabling Technologies event, 19 September 17 - presentation by Gav...
Emerging & Enabling Technologies event, 19 September 17 - presentation by Gav...Invest Northern Ireland
 
ENISA - EU strategies for cyber incident response
ENISA - EU strategies for cyber incident responseENISA - EU strategies for cyber incident response
ENISA - EU strategies for cyber incident responseKevin Duffey
 
Industrial Automation Control Systems Cybersecurity Certification. Chapter II
Industrial Automation Control Systems Cybersecurity Certification.  Chapter IIIndustrial Automation Control Systems Cybersecurity Certification.  Chapter II
Industrial Automation Control Systems Cybersecurity Certification. Chapter IIJavier Tallón
 
Presentation of the InVID verification technologies at IPTC 2018
Presentation of the InVID verification technologies at IPTC 2018Presentation of the InVID verification technologies at IPTC 2018
Presentation of the InVID verification technologies at IPTC 2018InVID Project
 
Open Education- importance of communities and networking
Open Education- importance of communities and networkingOpen Education- importance of communities and networking
Open Education- importance of communities and networkingSRCE
 
Pengenalan Forensik Digital
Pengenalan Forensik DigitalPengenalan Forensik Digital
Pengenalan Forensik Digitalyprayudi
 
Digital Security by Design: Information on current EPSRC & ESRC Calls - Maria...
Digital Security by Design: Information on current EPSRC & ESRC Calls - Maria...Digital Security by Design: Information on current EPSRC & ESRC Calls - Maria...
Digital Security by Design: Information on current EPSRC & ESRC Calls - Maria...KTN
 

Similar to European Cyber Security Challenge - Greel National Cyber Security Team (20)

Trustworthy Infrastructure for Personal Data Management
Trustworthy Infrastructure for Personal Data ManagementTrustworthy Infrastructure for Personal Data Management
Trustworthy Infrastructure for Personal Data Management
 
Visual Information Analysis for Crisis and Natural Disasters Management and R...
Visual Information Analysis for Crisis and Natural Disasters Management and R...Visual Information Analysis for Crisis and Natural Disasters Management and R...
Visual Information Analysis for Crisis and Natural Disasters Management and R...
 
American Public University System (NASDAQ:APEI) - Dr. Clay Wilson is the Prog...
American Public University System (NASDAQ:APEI) - Dr. Clay Wilson is the Prog...American Public University System (NASDAQ:APEI) - Dr. Clay Wilson is the Prog...
American Public University System (NASDAQ:APEI) - Dr. Clay Wilson is the Prog...
 
APCERT Updates
APCERT UpdatesAPCERT Updates
APCERT Updates
 
CNCERT Conference 2017: Capacity development in the Asia Pacific
CNCERT Conference 2017: Capacity development in the Asia PacificCNCERT Conference 2017: Capacity development in the Asia Pacific
CNCERT Conference 2017: Capacity development in the Asia Pacific
 
SC7 Workshop 3: Enhancing cyber defence of cyber space systems
SC7 Workshop 3: Enhancing cyber defence of cyber space systemsSC7 Workshop 3: Enhancing cyber defence of cyber space systems
SC7 Workshop 3: Enhancing cyber defence of cyber space systems
 
Update and forward plan for ENUMERATE - Digitisation intelligence for Europe
Update and forward plan for ENUMERATE - Digitisation intelligence for EuropeUpdate and forward plan for ENUMERATE - Digitisation intelligence for Europe
Update and forward plan for ENUMERATE - Digitisation intelligence for Europe
 
Case Studies & Issues of Quality in elearning: The 3Sigma Model
Case Studies & Issues of Quality in elearning: The 3Sigma ModelCase Studies & Issues of Quality in elearning: The 3Sigma Model
Case Studies & Issues of Quality in elearning: The 3Sigma Model
 
Prize by GCSP for Revolution in World Safety 2023.pptx
Prize by GCSP for Revolution in World Safety 2023.pptxPrize by GCSP for Revolution in World Safety 2023.pptx
Prize by GCSP for Revolution in World Safety 2023.pptx
 
Emerging & Enabling Technologies event, 19 September 17 - presentation by Gav...
Emerging & Enabling Technologies event, 19 September 17 - presentation by Gav...Emerging & Enabling Technologies event, 19 September 17 - presentation by Gav...
Emerging & Enabling Technologies event, 19 September 17 - presentation by Gav...
 
ENISA - EU strategies for cyber incident response
ENISA - EU strategies for cyber incident responseENISA - EU strategies for cyber incident response
ENISA - EU strategies for cyber incident response
 
1. Welcome Note
1. Welcome Note1. Welcome Note
1. Welcome Note
 
Industrial Automation Control Systems Cybersecurity Certification. Chapter II
Industrial Automation Control Systems Cybersecurity Certification.  Chapter IIIndustrial Automation Control Systems Cybersecurity Certification.  Chapter II
Industrial Automation Control Systems Cybersecurity Certification. Chapter II
 
Session 2.1 Martin Mühleck
Session 2.1 Martin MühleckSession 2.1 Martin Mühleck
Session 2.1 Martin Mühleck
 
AtinerICT18
AtinerICT18AtinerICT18
AtinerICT18
 
Presentation of the InVID verification technologies at IPTC 2018
Presentation of the InVID verification technologies at IPTC 2018Presentation of the InVID verification technologies at IPTC 2018
Presentation of the InVID verification technologies at IPTC 2018
 
An Introduction to Digital Preservation
An Introduction to Digital PreservationAn Introduction to Digital Preservation
An Introduction to Digital Preservation
 
Open Education- importance of communities and networking
Open Education- importance of communities and networkingOpen Education- importance of communities and networking
Open Education- importance of communities and networking
 
Pengenalan Forensik Digital
Pengenalan Forensik DigitalPengenalan Forensik Digital
Pengenalan Forensik Digital
 
Digital Security by Design: Information on current EPSRC & ESRC Calls - Maria...
Digital Security by Design: Information on current EPSRC & ESRC Calls - Maria...Digital Security by Design: Information on current EPSRC & ESRC Calls - Maria...
Digital Security by Design: Information on current EPSRC & ESRC Calls - Maria...
 

More from isc2-hellenic

General assembly 2016 02 24 1.0
General assembly 2016 02 24 1.0General assembly 2016 02 24 1.0
General assembly 2016 02 24 1.0isc2-hellenic
 
2016 02-14 - tlp-white ce2016 presentation
2016 02-14 - tlp-white ce2016 presentation2016 02-14 - tlp-white ce2016 presentation
2016 02-14 - tlp-white ce2016 presentationisc2-hellenic
 
2016 02-14-nis directive-overview isc2 chapter
2016 02-14-nis directive-overview isc2 chapter2016 02-14-nis directive-overview isc2 chapter
2016 02-14-nis directive-overview isc2 chapterisc2-hellenic
 
Event 16 12-15 kostas papadatos
Event 16 12-15 kostas papadatosEvent 16 12-15 kostas papadatos
Event 16 12-15 kostas papadatosisc2-hellenic
 
Event 16 12-15 panel1
Event 16 12-15 panel1Event 16 12-15 panel1
Event 16 12-15 panel1isc2-hellenic
 
Event 16 12-15 panel2
Event 16 12-15 panel2Event 16 12-15 panel2
Event 16 12-15 panel2isc2-hellenic
 
Event 16 12-15 global information security workforce study 1.0
Event 16 12-15 global information security workforce study 1.0Event 16 12-15 global information security workforce study 1.0
Event 16 12-15 global information security workforce study 1.0isc2-hellenic
 
5. Experience from recent national & international cyber exercises
5. Experience from recent national & international cyber exercises5. Experience from recent national & international cyber exercises
5. Experience from recent national & international cyber exercisesisc2-hellenic
 
4. Mitigating a Cyber Attack
4. Mitigating a Cyber Attack4. Mitigating a Cyber Attack
4. Mitigating a Cyber Attackisc2-hellenic
 
3. APTs Presentation
3. APTs Presentation3. APTs Presentation
3. APTs Presentationisc2-hellenic
 
2. Chapter introduction & update
2. Chapter introduction & update2. Chapter introduction & update
2. Chapter introduction & updateisc2-hellenic
 

More from isc2-hellenic (11)

General assembly 2016 02 24 1.0
General assembly 2016 02 24 1.0General assembly 2016 02 24 1.0
General assembly 2016 02 24 1.0
 
2016 02-14 - tlp-white ce2016 presentation
2016 02-14 - tlp-white ce2016 presentation2016 02-14 - tlp-white ce2016 presentation
2016 02-14 - tlp-white ce2016 presentation
 
2016 02-14-nis directive-overview isc2 chapter
2016 02-14-nis directive-overview isc2 chapter2016 02-14-nis directive-overview isc2 chapter
2016 02-14-nis directive-overview isc2 chapter
 
Event 16 12-15 kostas papadatos
Event 16 12-15 kostas papadatosEvent 16 12-15 kostas papadatos
Event 16 12-15 kostas papadatos
 
Event 16 12-15 panel1
Event 16 12-15 panel1Event 16 12-15 panel1
Event 16 12-15 panel1
 
Event 16 12-15 panel2
Event 16 12-15 panel2Event 16 12-15 panel2
Event 16 12-15 panel2
 
Event 16 12-15 global information security workforce study 1.0
Event 16 12-15 global information security workforce study 1.0Event 16 12-15 global information security workforce study 1.0
Event 16 12-15 global information security workforce study 1.0
 
5. Experience from recent national & international cyber exercises
5. Experience from recent national & international cyber exercises5. Experience from recent national & international cyber exercises
5. Experience from recent national & international cyber exercises
 
4. Mitigating a Cyber Attack
4. Mitigating a Cyber Attack4. Mitigating a Cyber Attack
4. Mitigating a Cyber Attack
 
3. APTs Presentation
3. APTs Presentation3. APTs Presentation
3. APTs Presentation
 
2. Chapter introduction & update
2. Chapter introduction & update2. Chapter introduction & update
2. Chapter introduction & update
 

Recently uploaded

AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024BookNet Canada
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Unlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power SystemsUnlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power SystemsPrecisely
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxnull - The Open Security Community
 

Recently uploaded (20)

AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
 
The transition to renewables in India.pdf
The transition to renewables in India.pdfThe transition to renewables in India.pdf
The transition to renewables in India.pdf
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Unlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power SystemsUnlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power Systems
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
 

European Cyber Security Challenge - Greel National Cyber Security Team

  • 1. European Cyber Security Challenge Greek National Cyber Security Team Christos Xenakis Department of Digital Systems University of Piraeus
  • 2. • It is acknowledged that there is a growing need for IT security professionals worldwide • To mitigate this shortage, many countries launch National Cyber Security Competitions • The aim of these competitions are: 1. Find new and young talents in cyber security 2. Encourage young people to pursue a career in cyber security • The European Cyber Security Challenge – ECSC adds a Pan-European layer on these National Competitions What is about C. Xenakis, Department of Digital Systems, University of Piraeus 23/8/2017
  • 3. The European Cyber Security Challenge - ECSC • It is an initiative of the European Commission supported by ENISA • Annually, the competition brings together young talents from European Countries to have fun and compete in cyber security • The goal of ECSC is to place Cyber Security at the service of humankind • Promoting: • An open, safe and secure cyberspace • A peaceful society with democratic values • Free and critical thinking • A Cyber Security championship C. Xenakis, Department of Digital Systems, University of Piraeus 33/8/2017
  • 4. This year is the 3rd contest C. Xenakis, Department of Digital Systems, University of Piraeus 43/8/2017
  • 5. ECSC 2017 will be hosted in Spain • In Malaga, by Spanish National Cyber Security Institute (INCIBE) • 30th October – 3rd November 2017 • Participated Teams: 14 • Competitors per Team: 10 C. Xenakis, Department of Digital Systems, University of Piraeus 53/8/2017
  • 6. National Team that will take place Austria Cyprus Denmark Estonia Germany Greece Ireland Italy Liechtenstein Norway Romania Spain United Kingdom C. Xenakis, Department of Digital Systems, University of Piraeus 63/8/2017 Switcherland
  • 7. • The leadership for the Greek participation in ECSC 2017 was assigned to the Systems’ Security Laboratory of the Department of Digital Systems of the University of Piraeus • Constitution of the Greek Team • Organization of the Greek participation • Financial administration – Sponsorship • Dissemination • The Steering Committee members are: • Prof. Christos Xenakis • Prof. Costas Lambrinoudakis The Greek Participation C. Xenakis, Department of Digital Systems, University of Piraeus 73/8/2017
  • 8. • 10 Persons - Contestants • Should be selected by a National Competition • Should not be older than 25 years old and legally reside in Greece • One Coach (an additional may act as alternative) who is responsible for • Well-being and behavior of the Greek Team • Making sure that essential information reaches the Team and is understood • Organizing the Team’s strategy • A Jury representative • One from each country that assess the performance The Greek National Team C. Xenakis, Department of Digital Systems, University of Piraeus 83/8/2017
  • 9. Constitution of the Greek Team • A National Competition will be carried at the Department of Digital Systems, University of Piraeus • End of May – begging of June, 2017 • Looking for young, skilled and talented specialists in Cyber Security • It will be an excellent experience for all of us. • Participating in the contest is something that you can be proud off. • Proud being part of the National Team • Stayed tuned C. Xenakis, Department of Digital Systems, University of Piraeus 93/8/2017
  • 10. Competition • It will be based on the educational exercise Capture-The-Flag (CTF), which gives the participants experience in: • Securing a machine or an application • Conducting and reacting to attacks found in the real world • Challenges will include: • Reverse engineering, network sniffing, protocol analysis • System administration, programming, cryptoanalysis • Web security, forensics, mobile security • In both styles: (a) attack/defense and (b) Jeopardy C. Xenakis, Department of Digital Systems, University of Piraeus 103/8/2017
  • 11. Milestones C. Xenakis, Department of Digital Systems, University of Piraeus 113/8/2017 • National teams registration January 2017 • Rules & requisites March 2017 • Kick off meeting of the Steering committee March 2017 • Sponsoring plan April 2017 • Fee model & contract April 2017 • National Competition June 2017 • National Team – contract sign June 2017 • Planning Conference ECSC 2017 – Athens June 2017 • ECSC 2017 Malaga, Spain 30 Oct. – 3 Nov. 2017
  • 12. Costs & needs associated with the our participation • Funding is based on sponsorships • Approx. 7.000 Euros for the participation of the Greek Team in the ECSC 2017 • Flight & accommodation expenses • Technical contribution to the National Competition • Equipment, at least 10 high-end laptops • Team training, coaching, event hosting • Supplementary equipment • Communication C. Xenakis, Department of Digital Systems, University of Piraeus 123/8/2017
  • 13. Benefits from supporting the Greek Team • ECSC 2017 will attract media attention • Meet new and promising talents and explore recruitment opportunities • Meet influencers and decision-makers in the InfoSec market • Build a National cyber security network • Establishing strong and long lasting webs of trust among talented individuals • Raising awareness on cyber security issues to non technical audiences C. Xenakis, Department of Digital Systems, University of Piraeus 133/8/2017
  • 14. Sponsor Packs C. Xenakis, Department of Digital Systems, University of Piraeus 143/8/2017 • Logo on website of Greek team • Logo on cover of Greek team brochure, available on Greek stand • Logo on announcements and updates about the two events • Mention in press release announcing Greek mission to Spain • Logo on front of t-shirt worn by Greek team in Spain • Logo on lanyard worn by Greek team • Logo on jacket worn by Greek team • One free pass to event in Spain • Logo on website of Greek team • Logo on inside page of Greek team brochure, available on Greek stand • Logo on announcements and updates about the two events • Mention in press release announcing Greek mission to Spain Gold Platinum Diamond • Logo on website of Greek team • Logo on inside page of Greek team brochure, available on Greek stand • Logo on announcements and updates about the two events • Mention in press release announcing Greek mission to Spain • Offer own brochure at Spain event • Logo on back of t-shirt worn by Greek team in Spain
  • 15. The Greek Team of ECSC 2016 (got the 5th position) C. Xenakis, Department of Digital Systems, University of Piraeus 153/8/2017
  • 16. ECSC 2016 C. Xenakis, Department of Digital Systems, University of Piraeus 163/8/2017
  • 17. Thank you! Questions? Prof. Christos Xenakis Systems Security Laboratory Department of Digital Systems, School of Information and Communication Technologies University of Piraeus, Greece http://ssl.ds.unipi.gr/ http://cgi.di.uoa.gr/~xenakis/ email: xenakis@unipi.gr