SlideShare a Scribd company logo
European Cyber Security Challenge
Greek National Cyber Security Team
Christos Xenakis
Department of Digital Systems
University of Piraeus
• It is acknowledged that there is a growing need for IT security professionals worldwide
• To mitigate this shortage, many countries launch National Cyber Security Competitions
• The aim of these competitions are:
1. Find new and young talents in cyber security
2. Encourage young people to pursue a career in cyber security
• The European Cyber Security Challenge – ECSC adds a Pan-European layer on these
National Competitions
What is about
C. Xenakis, Department of Digital Systems, University of Piraeus 23/8/2017
The European Cyber Security Challenge - ECSC
• It is an initiative of the European Commission supported by ENISA
• Annually, the competition brings together young talents from European Countries to
have fun and compete in cyber security
• The goal of ECSC is to place Cyber Security at the service of humankind
• Promoting:
• An open, safe and secure cyberspace
• A peaceful society with democratic values
• Free and critical thinking
• A Cyber Security championship
C. Xenakis, Department of Digital Systems, University of Piraeus 33/8/2017
This year is the 3rd contest
C. Xenakis, Department of Digital Systems, University of Piraeus 43/8/2017
ECSC 2017 will be hosted in Spain
• In Malaga, by Spanish National Cyber Security Institute (INCIBE)
• 30th October – 3rd November 2017
• Participated Teams: 14
• Competitors per Team: 10
C. Xenakis, Department of Digital Systems, University of Piraeus 53/8/2017
National Team that will take place
Austria Cyprus Denmark Estonia
Germany
Greece Ireland Italy Liechtenstein Norway
Romania Spain United Kingdom
C. Xenakis, Department of Digital Systems, University of Piraeus 63/8/2017
Switcherland
• The leadership for the Greek participation in ECSC 2017 was assigned to the Systems’
Security Laboratory of the Department of Digital Systems of the University of Piraeus
• Constitution of the Greek Team
• Organization of the Greek participation
• Financial administration – Sponsorship
• Dissemination
• The Steering Committee members are:
• Prof. Christos Xenakis
• Prof. Costas Lambrinoudakis
The Greek Participation
C. Xenakis, Department of Digital Systems, University of Piraeus 73/8/2017
• 10 Persons - Contestants
• Should be selected by a National Competition
• Should not be older than 25 years old and legally reside in Greece
• One Coach (an additional may act as alternative) who is responsible for
• Well-being and behavior of the Greek Team
• Making sure that essential information reaches the Team and is understood
• Organizing the Team’s strategy
• A Jury representative
• One from each country that assess the performance
The Greek National Team
C. Xenakis, Department of Digital Systems, University of Piraeus 83/8/2017
Constitution of the Greek Team
• A National Competition will be carried at the Department of Digital Systems, University
of Piraeus
• End of May – begging of June, 2017
• Looking for young, skilled and talented specialists in Cyber Security
• It will be an excellent experience for all of us.
• Participating in the contest is something that you can be proud off.
• Proud being part of the National Team
• Stayed tuned
C. Xenakis, Department of Digital Systems, University of Piraeus 93/8/2017
Competition
• It will be based on the educational exercise Capture-The-Flag (CTF), which gives the
participants experience in:
• Securing a machine or an application
• Conducting and reacting to attacks found in the real world
• Challenges will include:
• Reverse engineering, network sniffing, protocol analysis
• System administration, programming, cryptoanalysis
• Web security, forensics, mobile security
• In both styles: (a) attack/defense and (b) Jeopardy
C. Xenakis, Department of Digital Systems, University of Piraeus 103/8/2017
Milestones
C. Xenakis, Department of Digital Systems, University of Piraeus 113/8/2017
• National teams registration January 2017
• Rules & requisites March 2017
• Kick off meeting of the Steering committee March 2017
• Sponsoring plan April 2017
• Fee model & contract April 2017
• National Competition June 2017
• National Team – contract sign June 2017
• Planning Conference ECSC 2017 – Athens June 2017
• ECSC 2017 Malaga, Spain 30 Oct. – 3 Nov. 2017
Costs & needs associated with the our participation
• Funding is based on sponsorships
• Approx. 7.000 Euros for the participation of the Greek Team in the ECSC 2017
• Flight & accommodation expenses
• Technical contribution to the National Competition
• Equipment, at least 10 high-end laptops
• Team training, coaching, event hosting
• Supplementary equipment
• Communication
C. Xenakis, Department of Digital Systems, University of Piraeus 123/8/2017
Benefits from supporting the Greek Team
• ECSC 2017 will attract media attention
• Meet new and promising talents and explore recruitment opportunities
• Meet influencers and decision-makers in the InfoSec market
• Build a National cyber security network
• Establishing strong and long lasting webs of trust among talented individuals
• Raising awareness on cyber security issues to non technical audiences
C. Xenakis, Department of Digital Systems, University of Piraeus 133/8/2017
Sponsor Packs
C. Xenakis, Department of Digital Systems, University of Piraeus 143/8/2017
• Logo on website of Greek team
• Logo on cover of Greek team
brochure, available on Greek
stand
• Logo on announcements and
updates about the two events
• Mention in press release
announcing Greek mission to
Spain
• Logo on front of t-shirt worn by
Greek team in Spain
• Logo on lanyard worn by Greek
team
• Logo on jacket worn by Greek
team
• One free pass to event in Spain
• Logo on website of Greek
team
• Logo on inside page of Greek
team brochure, available on
Greek stand
• Logo on announcements and
updates about the two
events
• Mention in press release
announcing Greek mission to
Spain
Gold Platinum Diamond
• Logo on website of Greek
team
• Logo on inside page of Greek
team brochure, available on
Greek stand
• Logo on announcements and
updates about the two
events
• Mention in press release
announcing Greek mission to
Spain
• Offer own brochure at Spain
event
• Logo on back of t-shirt worn
by Greek team in Spain
The Greek Team of ECSC 2016 (got the 5th position)
C. Xenakis, Department of Digital Systems, University of Piraeus 153/8/2017
ECSC 2016
C. Xenakis, Department of Digital Systems, University of Piraeus 163/8/2017
Thank you!
Questions?
Prof. Christos Xenakis
Systems Security Laboratory
Department of Digital Systems, School of Information and Communication Technologies
University of Piraeus, Greece
http://ssl.ds.unipi.gr/
http://cgi.di.uoa.gr/~xenakis/
email: xenakis@unipi.gr

More Related Content

Viewers also liked

The evolving threats and the challenges of the modern CISO
The evolving threats and the challenges of the modern CISOThe evolving threats and the challenges of the modern CISO
The evolving threats and the challenges of the modern CISO
isc2-hellenic
 
Cyber security-report-2017
Cyber security-report-2017Cyber security-report-2017
Cyber security-report-2017
NRC
 
Cyber security presentation
Cyber security presentationCyber security presentation
Cyber security presentation
Bijay Bhandari
 
Pci standards, from participation to implementation and review
Pci standards, from participation to implementation and reviewPci standards, from participation to implementation and review
Pci standards, from participation to implementation and review
isc2-hellenic
 
Panoptis 2016
Panoptis 2016Panoptis 2016
Panoptis 2016
isc2-hellenic
 
Building next gen malware behavioural analysis environment
Building next gen malware behavioural analysis environment Building next gen malware behavioural analysis environment
Building next gen malware behavioural analysis environment
isc2-hellenic
 
Flowchart - Building next gen malware behavioural analysis environment
Flowchart - Building next gen malware behavioural analysis environment Flowchart - Building next gen malware behavioural analysis environment
Flowchart - Building next gen malware behavioural analysis environment
isc2-hellenic
 
CyberSecurity Challenge Decision Document
CyberSecurity Challenge Decision Document CyberSecurity Challenge Decision Document
CyberSecurity Challenge Decision Document
LeAnn Rhodes
 
GDPR 11/1/2017
GDPR 11/1/2017GDPR 11/1/2017
GDPR 11/1/2017
isc2-hellenic
 
Cyber security for children
Cyber security for childrenCyber security for children
Cyber security for children
Avanzo net
 
GDPR Cyber Insurance 11/1/2017
GDPR Cyber Insurance 11/1/2017GDPR Cyber Insurance 11/1/2017
GDPR Cyber Insurance 11/1/2017
isc2-hellenic
 
Deep Learning for Cyber Security
Deep Learning for Cyber SecurityDeep Learning for Cyber Security
Deep Learning for Cyber Security
Altoros
 
National Cyber Security Policy 2013 (NCSP)
National Cyber Security Policy 2013 (NCSP)National Cyber Security Policy 2013 (NCSP)
National Cyber Security Policy 2013 (NCSP)
Gopal Choudhary
 
Cybersecurity
CybersecurityCybersecurity
Cybersecurity
jumanne rajabu
 
Hackers and Hacking a brief overview 5-26-2016
Hackers and Hacking a brief overview 5-26-2016Hackers and Hacking a brief overview 5-26-2016
Hackers and Hacking a brief overview 5-26-2016
Gohsuke Takama
 
The Future of Cyber Security
The Future of Cyber SecurityThe Future of Cyber Security
The Future of Cyber Security
Stephen Lahanas
 
Cyber crime and cyber security
Cyber crime and cyber securityCyber crime and cyber security
Cyber crime and cyber security
jyoti_lakhani
 
Black hat hackers
Black hat hackersBlack hat hackers
Black hat hackers
Santosh Kumar
 
Cyber security
Cyber securityCyber security
Cyber security
Ankush Verma
 

Viewers also liked (19)

The evolving threats and the challenges of the modern CISO
The evolving threats and the challenges of the modern CISOThe evolving threats and the challenges of the modern CISO
The evolving threats and the challenges of the modern CISO
 
Cyber security-report-2017
Cyber security-report-2017Cyber security-report-2017
Cyber security-report-2017
 
Cyber security presentation
Cyber security presentationCyber security presentation
Cyber security presentation
 
Pci standards, from participation to implementation and review
Pci standards, from participation to implementation and reviewPci standards, from participation to implementation and review
Pci standards, from participation to implementation and review
 
Panoptis 2016
Panoptis 2016Panoptis 2016
Panoptis 2016
 
Building next gen malware behavioural analysis environment
Building next gen malware behavioural analysis environment Building next gen malware behavioural analysis environment
Building next gen malware behavioural analysis environment
 
Flowchart - Building next gen malware behavioural analysis environment
Flowchart - Building next gen malware behavioural analysis environment Flowchart - Building next gen malware behavioural analysis environment
Flowchart - Building next gen malware behavioural analysis environment
 
CyberSecurity Challenge Decision Document
CyberSecurity Challenge Decision Document CyberSecurity Challenge Decision Document
CyberSecurity Challenge Decision Document
 
GDPR 11/1/2017
GDPR 11/1/2017GDPR 11/1/2017
GDPR 11/1/2017
 
Cyber security for children
Cyber security for childrenCyber security for children
Cyber security for children
 
GDPR Cyber Insurance 11/1/2017
GDPR Cyber Insurance 11/1/2017GDPR Cyber Insurance 11/1/2017
GDPR Cyber Insurance 11/1/2017
 
Deep Learning for Cyber Security
Deep Learning for Cyber SecurityDeep Learning for Cyber Security
Deep Learning for Cyber Security
 
National Cyber Security Policy 2013 (NCSP)
National Cyber Security Policy 2013 (NCSP)National Cyber Security Policy 2013 (NCSP)
National Cyber Security Policy 2013 (NCSP)
 
Cybersecurity
CybersecurityCybersecurity
Cybersecurity
 
Hackers and Hacking a brief overview 5-26-2016
Hackers and Hacking a brief overview 5-26-2016Hackers and Hacking a brief overview 5-26-2016
Hackers and Hacking a brief overview 5-26-2016
 
The Future of Cyber Security
The Future of Cyber SecurityThe Future of Cyber Security
The Future of Cyber Security
 
Cyber crime and cyber security
Cyber crime and cyber securityCyber crime and cyber security
Cyber crime and cyber security
 
Black hat hackers
Black hat hackersBlack hat hackers
Black hat hackers
 
Cyber security
Cyber securityCyber security
Cyber security
 

Similar to European Cyber Security Challenge - Greel National Cyber Security Team

Trustworthy Infrastructure for Personal Data Management
Trustworthy Infrastructure for Personal Data ManagementTrustworthy Infrastructure for Personal Data Management
Trustworthy Infrastructure for Personal Data Management
Ioannis Krontiris
 
Visual Information Analysis for Crisis and Natural Disasters Management and R...
Visual Information Analysis for Crisis and Natural Disasters Management and R...Visual Information Analysis for Crisis and Natural Disasters Management and R...
Visual Information Analysis for Crisis and Natural Disasters Management and R...
Yiannis Kompatsiaris
 
American Public University System (NASDAQ:APEI) - Dr. Clay Wilson is the Prog...
American Public University System (NASDAQ:APEI) - Dr. Clay Wilson is the Prog...American Public University System (NASDAQ:APEI) - Dr. Clay Wilson is the Prog...
American Public University System (NASDAQ:APEI) - Dr. Clay Wilson is the Prog...
Investorideas.com
 
APCERT Updates
APCERT UpdatesAPCERT Updates
APCERT Updates
APNIC
 
CNCERT Conference 2017: Capacity development in the Asia Pacific
CNCERT Conference 2017: Capacity development in the Asia PacificCNCERT Conference 2017: Capacity development in the Asia Pacific
CNCERT Conference 2017: Capacity development in the Asia Pacific
APNIC
 
SC7 Workshop 3: Enhancing cyber defence of cyber space systems
SC7 Workshop 3: Enhancing cyber defence of cyber space systemsSC7 Workshop 3: Enhancing cyber defence of cyber space systems
SC7 Workshop 3: Enhancing cyber defence of cyber space systems
BigData_Europe
 
Update and forward plan for ENUMERATE - Digitisation intelligence for Europe
Update and forward plan for ENUMERATE - Digitisation intelligence for EuropeUpdate and forward plan for ENUMERATE - Digitisation intelligence for Europe
Update and forward plan for ENUMERATE - Digitisation intelligence for Europe
Nicholas Poole
 
Case Studies & Issues of Quality in elearning: The 3Sigma Model
Case Studies & Issues of Quality in elearning: The 3Sigma ModelCase Studies & Issues of Quality in elearning: The 3Sigma Model
Case Studies & Issues of Quality in elearning: The 3Sigma Model
Charalambos Vrasidas, Ph.D.
 
Prize by GCSP for Revolution in World Safety 2023.pptx
Prize by GCSP for Revolution in World Safety 2023.pptxPrize by GCSP for Revolution in World Safety 2023.pptx
Prize by GCSP for Revolution in World Safety 2023.pptx
Scholarshiphive
 
Emerging & Enabling Technologies event, 19 September 17 - presentation by Gav...
Emerging & Enabling Technologies event, 19 September 17 - presentation by Gav...Emerging & Enabling Technologies event, 19 September 17 - presentation by Gav...
Emerging & Enabling Technologies event, 19 September 17 - presentation by Gav...
Invest Northern Ireland
 
ENISA - EU strategies for cyber incident response
ENISA - EU strategies for cyber incident responseENISA - EU strategies for cyber incident response
ENISA - EU strategies for cyber incident response
Kevin Duffey
 
1. Welcome Note
1. Welcome Note1. Welcome Note
1. Welcome Note
isc2-hellenic
 
Industrial Automation Control Systems Cybersecurity Certification. Chapter II
Industrial Automation Control Systems Cybersecurity Certification.  Chapter IIIndustrial Automation Control Systems Cybersecurity Certification.  Chapter II
Industrial Automation Control Systems Cybersecurity Certification. Chapter II
Javier Tallón
 
Session 2.1 Martin Mühleck
Session 2.1 Martin MühleckSession 2.1 Martin Mühleck
AtinerICT18
AtinerICT18AtinerICT18
AtinerICT18
János Kurdics
 
Presentation of the InVID verification technologies at IPTC 2018
Presentation of the InVID verification technologies at IPTC 2018Presentation of the InVID verification technologies at IPTC 2018
Presentation of the InVID verification technologies at IPTC 2018
InVID Project
 
An Introduction to Digital Preservation
An Introduction to Digital PreservationAn Introduction to Digital Preservation
An Introduction to Digital Preservation
DigitalPreservationEurope
 
Open Education- importance of communities and networking
Open Education- importance of communities and networkingOpen Education- importance of communities and networking
Open Education- importance of communities and networking
SRCE
 
Pengenalan Forensik Digital
Pengenalan Forensik DigitalPengenalan Forensik Digital
Pengenalan Forensik Digital
yprayudi
 
Digital Security by Design: Information on current EPSRC & ESRC Calls - Maria...
Digital Security by Design: Information on current EPSRC & ESRC Calls - Maria...Digital Security by Design: Information on current EPSRC & ESRC Calls - Maria...
Digital Security by Design: Information on current EPSRC & ESRC Calls - Maria...
KTN
 

Similar to European Cyber Security Challenge - Greel National Cyber Security Team (20)

Trustworthy Infrastructure for Personal Data Management
Trustworthy Infrastructure for Personal Data ManagementTrustworthy Infrastructure for Personal Data Management
Trustworthy Infrastructure for Personal Data Management
 
Visual Information Analysis for Crisis and Natural Disasters Management and R...
Visual Information Analysis for Crisis and Natural Disasters Management and R...Visual Information Analysis for Crisis and Natural Disasters Management and R...
Visual Information Analysis for Crisis and Natural Disasters Management and R...
 
American Public University System (NASDAQ:APEI) - Dr. Clay Wilson is the Prog...
American Public University System (NASDAQ:APEI) - Dr. Clay Wilson is the Prog...American Public University System (NASDAQ:APEI) - Dr. Clay Wilson is the Prog...
American Public University System (NASDAQ:APEI) - Dr. Clay Wilson is the Prog...
 
APCERT Updates
APCERT UpdatesAPCERT Updates
APCERT Updates
 
CNCERT Conference 2017: Capacity development in the Asia Pacific
CNCERT Conference 2017: Capacity development in the Asia PacificCNCERT Conference 2017: Capacity development in the Asia Pacific
CNCERT Conference 2017: Capacity development in the Asia Pacific
 
SC7 Workshop 3: Enhancing cyber defence of cyber space systems
SC7 Workshop 3: Enhancing cyber defence of cyber space systemsSC7 Workshop 3: Enhancing cyber defence of cyber space systems
SC7 Workshop 3: Enhancing cyber defence of cyber space systems
 
Update and forward plan for ENUMERATE - Digitisation intelligence for Europe
Update and forward plan for ENUMERATE - Digitisation intelligence for EuropeUpdate and forward plan for ENUMERATE - Digitisation intelligence for Europe
Update and forward plan for ENUMERATE - Digitisation intelligence for Europe
 
Case Studies & Issues of Quality in elearning: The 3Sigma Model
Case Studies & Issues of Quality in elearning: The 3Sigma ModelCase Studies & Issues of Quality in elearning: The 3Sigma Model
Case Studies & Issues of Quality in elearning: The 3Sigma Model
 
Prize by GCSP for Revolution in World Safety 2023.pptx
Prize by GCSP for Revolution in World Safety 2023.pptxPrize by GCSP for Revolution in World Safety 2023.pptx
Prize by GCSP for Revolution in World Safety 2023.pptx
 
Emerging & Enabling Technologies event, 19 September 17 - presentation by Gav...
Emerging & Enabling Technologies event, 19 September 17 - presentation by Gav...Emerging & Enabling Technologies event, 19 September 17 - presentation by Gav...
Emerging & Enabling Technologies event, 19 September 17 - presentation by Gav...
 
ENISA - EU strategies for cyber incident response
ENISA - EU strategies for cyber incident responseENISA - EU strategies for cyber incident response
ENISA - EU strategies for cyber incident response
 
1. Welcome Note
1. Welcome Note1. Welcome Note
1. Welcome Note
 
Industrial Automation Control Systems Cybersecurity Certification. Chapter II
Industrial Automation Control Systems Cybersecurity Certification.  Chapter IIIndustrial Automation Control Systems Cybersecurity Certification.  Chapter II
Industrial Automation Control Systems Cybersecurity Certification. Chapter II
 
Session 2.1 Martin Mühleck
Session 2.1 Martin MühleckSession 2.1 Martin Mühleck
Session 2.1 Martin Mühleck
 
AtinerICT18
AtinerICT18AtinerICT18
AtinerICT18
 
Presentation of the InVID verification technologies at IPTC 2018
Presentation of the InVID verification technologies at IPTC 2018Presentation of the InVID verification technologies at IPTC 2018
Presentation of the InVID verification technologies at IPTC 2018
 
An Introduction to Digital Preservation
An Introduction to Digital PreservationAn Introduction to Digital Preservation
An Introduction to Digital Preservation
 
Open Education- importance of communities and networking
Open Education- importance of communities and networkingOpen Education- importance of communities and networking
Open Education- importance of communities and networking
 
Pengenalan Forensik Digital
Pengenalan Forensik DigitalPengenalan Forensik Digital
Pengenalan Forensik Digital
 
Digital Security by Design: Information on current EPSRC & ESRC Calls - Maria...
Digital Security by Design: Information on current EPSRC & ESRC Calls - Maria...Digital Security by Design: Information on current EPSRC & ESRC Calls - Maria...
Digital Security by Design: Information on current EPSRC & ESRC Calls - Maria...
 

More from isc2-hellenic

General assembly 2016 02 24 1.0
General assembly 2016 02 24 1.0General assembly 2016 02 24 1.0
General assembly 2016 02 24 1.0
isc2-hellenic
 
2016 02-14 - tlp-white ce2016 presentation
2016 02-14 - tlp-white ce2016 presentation2016 02-14 - tlp-white ce2016 presentation
2016 02-14 - tlp-white ce2016 presentation
isc2-hellenic
 
2016 02-14-nis directive-overview isc2 chapter
2016 02-14-nis directive-overview isc2 chapter2016 02-14-nis directive-overview isc2 chapter
2016 02-14-nis directive-overview isc2 chapter
isc2-hellenic
 
Event 16 12-15 kostas papadatos
Event 16 12-15 kostas papadatosEvent 16 12-15 kostas papadatos
Event 16 12-15 kostas papadatos
isc2-hellenic
 
Event 16 12-15 panel1
Event 16 12-15 panel1Event 16 12-15 panel1
Event 16 12-15 panel1
isc2-hellenic
 
Event 16 12-15 panel2
Event 16 12-15 panel2Event 16 12-15 panel2
Event 16 12-15 panel2
isc2-hellenic
 
Event 16 12-15 global information security workforce study 1.0
Event 16 12-15 global information security workforce study 1.0Event 16 12-15 global information security workforce study 1.0
Event 16 12-15 global information security workforce study 1.0
isc2-hellenic
 
5. Experience from recent national & international cyber exercises
5. Experience from recent national & international cyber exercises5. Experience from recent national & international cyber exercises
5. Experience from recent national & international cyber exercises
isc2-hellenic
 
4. Mitigating a Cyber Attack
4. Mitigating a Cyber Attack4. Mitigating a Cyber Attack
4. Mitigating a Cyber Attack
isc2-hellenic
 
3. APTs Presentation
3. APTs Presentation3. APTs Presentation
3. APTs Presentation
isc2-hellenic
 
2. Chapter introduction & update
2. Chapter introduction & update2. Chapter introduction & update
2. Chapter introduction & update
isc2-hellenic
 

More from isc2-hellenic (11)

General assembly 2016 02 24 1.0
General assembly 2016 02 24 1.0General assembly 2016 02 24 1.0
General assembly 2016 02 24 1.0
 
2016 02-14 - tlp-white ce2016 presentation
2016 02-14 - tlp-white ce2016 presentation2016 02-14 - tlp-white ce2016 presentation
2016 02-14 - tlp-white ce2016 presentation
 
2016 02-14-nis directive-overview isc2 chapter
2016 02-14-nis directive-overview isc2 chapter2016 02-14-nis directive-overview isc2 chapter
2016 02-14-nis directive-overview isc2 chapter
 
Event 16 12-15 kostas papadatos
Event 16 12-15 kostas papadatosEvent 16 12-15 kostas papadatos
Event 16 12-15 kostas papadatos
 
Event 16 12-15 panel1
Event 16 12-15 panel1Event 16 12-15 panel1
Event 16 12-15 panel1
 
Event 16 12-15 panel2
Event 16 12-15 panel2Event 16 12-15 panel2
Event 16 12-15 panel2
 
Event 16 12-15 global information security workforce study 1.0
Event 16 12-15 global information security workforce study 1.0Event 16 12-15 global information security workforce study 1.0
Event 16 12-15 global information security workforce study 1.0
 
5. Experience from recent national & international cyber exercises
5. Experience from recent national & international cyber exercises5. Experience from recent national & international cyber exercises
5. Experience from recent national & international cyber exercises
 
4. Mitigating a Cyber Attack
4. Mitigating a Cyber Attack4. Mitigating a Cyber Attack
4. Mitigating a Cyber Attack
 
3. APTs Presentation
3. APTs Presentation3. APTs Presentation
3. APTs Presentation
 
2. Chapter introduction & update
2. Chapter introduction & update2. Chapter introduction & update
2. Chapter introduction & update
 

Recently uploaded

Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Malak Abu Hammad
 
Building Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and MilvusBuilding Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and Milvus
Zilliz
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
Octavian Nadolu
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
Aftab Hussain
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
名前 です男
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems S.M.S.A.
 
Programming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup SlidesProgramming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup Slides
Zilliz
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
DianaGray10
 
Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
Kumud Singh
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
Neo4j
 
Full-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalizationFull-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalization
Zilliz
 
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial IntelligenceAI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
IndexBug
 
Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
innovationoecd
 
GenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizationsGenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizations
kumardaparthi1024
 
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
SOFTTECHHUB
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
Matthew Sinclair
 
GraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracyGraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracy
Tomaz Bratanic
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
Safe Software
 
Infrastructure Challenges in Scaling RAG with Custom AI models
Infrastructure Challenges in Scaling RAG with Custom AI modelsInfrastructure Challenges in Scaling RAG with Custom AI models
Infrastructure Challenges in Scaling RAG with Custom AI models
Zilliz
 
Serial Arm Control in Real Time Presentation
Serial Arm Control in Real Time PresentationSerial Arm Control in Real Time Presentation
Serial Arm Control in Real Time Presentation
tolgahangng
 

Recently uploaded (20)

Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
 
Building Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and MilvusBuilding Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and Milvus
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
 
Programming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup SlidesProgramming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup Slides
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
 
Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
 
Full-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalizationFull-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalization
 
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial IntelligenceAI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
 
Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
 
GenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizationsGenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizations
 
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
 
GraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracyGraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracy
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
 
Infrastructure Challenges in Scaling RAG with Custom AI models
Infrastructure Challenges in Scaling RAG with Custom AI modelsInfrastructure Challenges in Scaling RAG with Custom AI models
Infrastructure Challenges in Scaling RAG with Custom AI models
 
Serial Arm Control in Real Time Presentation
Serial Arm Control in Real Time PresentationSerial Arm Control in Real Time Presentation
Serial Arm Control in Real Time Presentation
 

European Cyber Security Challenge - Greel National Cyber Security Team

  • 1. European Cyber Security Challenge Greek National Cyber Security Team Christos Xenakis Department of Digital Systems University of Piraeus
  • 2. • It is acknowledged that there is a growing need for IT security professionals worldwide • To mitigate this shortage, many countries launch National Cyber Security Competitions • The aim of these competitions are: 1. Find new and young talents in cyber security 2. Encourage young people to pursue a career in cyber security • The European Cyber Security Challenge – ECSC adds a Pan-European layer on these National Competitions What is about C. Xenakis, Department of Digital Systems, University of Piraeus 23/8/2017
  • 3. The European Cyber Security Challenge - ECSC • It is an initiative of the European Commission supported by ENISA • Annually, the competition brings together young talents from European Countries to have fun and compete in cyber security • The goal of ECSC is to place Cyber Security at the service of humankind • Promoting: • An open, safe and secure cyberspace • A peaceful society with democratic values • Free and critical thinking • A Cyber Security championship C. Xenakis, Department of Digital Systems, University of Piraeus 33/8/2017
  • 4. This year is the 3rd contest C. Xenakis, Department of Digital Systems, University of Piraeus 43/8/2017
  • 5. ECSC 2017 will be hosted in Spain • In Malaga, by Spanish National Cyber Security Institute (INCIBE) • 30th October – 3rd November 2017 • Participated Teams: 14 • Competitors per Team: 10 C. Xenakis, Department of Digital Systems, University of Piraeus 53/8/2017
  • 6. National Team that will take place Austria Cyprus Denmark Estonia Germany Greece Ireland Italy Liechtenstein Norway Romania Spain United Kingdom C. Xenakis, Department of Digital Systems, University of Piraeus 63/8/2017 Switcherland
  • 7. • The leadership for the Greek participation in ECSC 2017 was assigned to the Systems’ Security Laboratory of the Department of Digital Systems of the University of Piraeus • Constitution of the Greek Team • Organization of the Greek participation • Financial administration – Sponsorship • Dissemination • The Steering Committee members are: • Prof. Christos Xenakis • Prof. Costas Lambrinoudakis The Greek Participation C. Xenakis, Department of Digital Systems, University of Piraeus 73/8/2017
  • 8. • 10 Persons - Contestants • Should be selected by a National Competition • Should not be older than 25 years old and legally reside in Greece • One Coach (an additional may act as alternative) who is responsible for • Well-being and behavior of the Greek Team • Making sure that essential information reaches the Team and is understood • Organizing the Team’s strategy • A Jury representative • One from each country that assess the performance The Greek National Team C. Xenakis, Department of Digital Systems, University of Piraeus 83/8/2017
  • 9. Constitution of the Greek Team • A National Competition will be carried at the Department of Digital Systems, University of Piraeus • End of May – begging of June, 2017 • Looking for young, skilled and talented specialists in Cyber Security • It will be an excellent experience for all of us. • Participating in the contest is something that you can be proud off. • Proud being part of the National Team • Stayed tuned C. Xenakis, Department of Digital Systems, University of Piraeus 93/8/2017
  • 10. Competition • It will be based on the educational exercise Capture-The-Flag (CTF), which gives the participants experience in: • Securing a machine or an application • Conducting and reacting to attacks found in the real world • Challenges will include: • Reverse engineering, network sniffing, protocol analysis • System administration, programming, cryptoanalysis • Web security, forensics, mobile security • In both styles: (a) attack/defense and (b) Jeopardy C. Xenakis, Department of Digital Systems, University of Piraeus 103/8/2017
  • 11. Milestones C. Xenakis, Department of Digital Systems, University of Piraeus 113/8/2017 • National teams registration January 2017 • Rules & requisites March 2017 • Kick off meeting of the Steering committee March 2017 • Sponsoring plan April 2017 • Fee model & contract April 2017 • National Competition June 2017 • National Team – contract sign June 2017 • Planning Conference ECSC 2017 – Athens June 2017 • ECSC 2017 Malaga, Spain 30 Oct. – 3 Nov. 2017
  • 12. Costs & needs associated with the our participation • Funding is based on sponsorships • Approx. 7.000 Euros for the participation of the Greek Team in the ECSC 2017 • Flight & accommodation expenses • Technical contribution to the National Competition • Equipment, at least 10 high-end laptops • Team training, coaching, event hosting • Supplementary equipment • Communication C. Xenakis, Department of Digital Systems, University of Piraeus 123/8/2017
  • 13. Benefits from supporting the Greek Team • ECSC 2017 will attract media attention • Meet new and promising talents and explore recruitment opportunities • Meet influencers and decision-makers in the InfoSec market • Build a National cyber security network • Establishing strong and long lasting webs of trust among talented individuals • Raising awareness on cyber security issues to non technical audiences C. Xenakis, Department of Digital Systems, University of Piraeus 133/8/2017
  • 14. Sponsor Packs C. Xenakis, Department of Digital Systems, University of Piraeus 143/8/2017 • Logo on website of Greek team • Logo on cover of Greek team brochure, available on Greek stand • Logo on announcements and updates about the two events • Mention in press release announcing Greek mission to Spain • Logo on front of t-shirt worn by Greek team in Spain • Logo on lanyard worn by Greek team • Logo on jacket worn by Greek team • One free pass to event in Spain • Logo on website of Greek team • Logo on inside page of Greek team brochure, available on Greek stand • Logo on announcements and updates about the two events • Mention in press release announcing Greek mission to Spain Gold Platinum Diamond • Logo on website of Greek team • Logo on inside page of Greek team brochure, available on Greek stand • Logo on announcements and updates about the two events • Mention in press release announcing Greek mission to Spain • Offer own brochure at Spain event • Logo on back of t-shirt worn by Greek team in Spain
  • 15. The Greek Team of ECSC 2016 (got the 5th position) C. Xenakis, Department of Digital Systems, University of Piraeus 153/8/2017
  • 16. ECSC 2016 C. Xenakis, Department of Digital Systems, University of Piraeus 163/8/2017
  • 17. Thank you! Questions? Prof. Christos Xenakis Systems Security Laboratory Department of Digital Systems, School of Information and Communication Technologies University of Piraeus, Greece http://ssl.ds.unipi.gr/ http://cgi.di.uoa.gr/~xenakis/ email: xenakis@unipi.gr