University Road Show 2015



Similar documents
Cyber Security Challenge Australia.

Contestant Requirements:

INTERNATIONAL CYBEREX 2015

The Open Cyber Challenge Platform *

CYBER SECURITY TRAINING SAFE AND SECURE

Symantec Cyber Readiness Challenge Player s Manual

AISA NATIONAL CONFERENCE 2015 TRUST IN INFORMATION SECURITY. 14 October 2015 OPENING ADDRESS LYNWEN CONNICK

Hackers are here. Where are you?

Computer Security and Investigations

SYMPOSIUM PROGRAM DAY ONE

National Cyber League Certified Ethical Hacker (CEH) TM Syllabus

CyberNEXS Global Services

Threat Intelligence Pty Ltd Specialist Security Training Catalogue

June 2014 WMLUG Meeting Kali Linux

New-Age Undergraduate Programme BCA Cloud Technology & Information Security (3 Year Full-Time Programme)

Impact of Cybersecurity Education in High Schools and Small Businesses in Hawaii. Challenges and Opportunities NICE Conference 2015

Hackers are here. Where are you?

Careers in Cyber Operations. Defence Signals Directorate

Rethinking Information Security for Advanced Threats. CEB Information Risk Leadership Council

Course Descriptions November 2014

An Accelerated Pathway to Careers in Cybersecurity for Transitioning Veterans. NICE Annual Conference November 2015

NSA/DHS Centers of Academic Excellence for Information Assurance/Cyber Defense

RXP SERVICES LIMITED ABN Release to Australian Stock Exchange

Cybersecurity Delivering Confidence in the Cyber Domain

Ty Miller. Director, Threat Intelligence Pty Ltd

Cyber Security in Taiwan's Government Institutions: From APT To. Investigation Policies

Logical Operations CyberSec First Responder: Threat Detection and Response (CFR) Exam CFR-110

Introduction to Cyber Security

ABSTRACT' INTRODUCTION' COMMON'SECURITY'MISTAKES'' Reverse Engineering ios Applications

E-SECURITY REVIEW 2008 DISCUSSION PAPER FOR PUBLIC CONSULTATION

Microsoft s cybersecurity commitment

Top 10 Anti-fraud Tips: The Cybersecurity Breach Aftermath

Security Intelligence Services. Cybersecurity training.

SELECTION // ASSESSMENT // TRAINING EXAMINATION //GRADUATION

Introduction to Cyber Defense Competition. Module 16

Patrick Fair Partner, ITC and Data Security Specialist Baker & McKenzie. Developments in Security Regulation

Bachelor of Information Technology

Cyber Defense Operations Graduate Certificate

Programme In Information Security Management

Information Technology 2015 Programmes

Michelle Govan & Anand Philip Network & Security Engineering

FRONT RUNNER DIPLOMA PROGRAM INFORMATION SECURITY Detailed Course Curriculum Course Duration: 6 months

CANVAS: a Regional Assessment Exercise for Teaching Security Concepts

2012 North American Managed Security Service Providers Growth Leadership Award

Course Content Summary ITN 261 Network Attacks, Computer Crime and Hacking (4 Credits)

93% of large organisations and 76% of small businesses

EC-Council Certified Security Analyst (ECSA)

CYBERTRON NETWORK SOLUTIONS

Content Security: Protect Your Network with Five Must-Haves

Effective Methods to Detect Current Security Threats

Zak Khan Director, Advanced Cyber Defence

Close the security gap with a unified approach. Detect, block and remediate risks faster with end-to-end visibility of the security cycle

HackMiami Web Application Scanner 2013 PwnOff

WAN security threat landscape and best mitigation practices. Rex Stover Vice President, Americas, Enterprise & ICP Sales

Nine Cyber Security Trends for 2016

Westpac Asian Exchange Scholarship Funding Guidelines Semester

Talented People to Secure Our Future. Judy Baker, Director Cyber Security Challenge UK

Penetration Testing with Kali Linux

MELBOURNE SYDNEY BRISBANE PERTH AUCKLAND MEDIA KIT

Customer Value Enhancement, Endpoint Security Products Global, 2011

Symantec Cyber Security Services: DeepSight Intelligence

The Incident Response Playbook for Android and ios

Minnesota State Community and Technical College Detroit Lakes Campus

Information Security Engineering

Media Shuttle s Defense-in- Depth Security Strategy

MSc Cyber Security UKPASS P Course 1 Year Full-Time, 2-3 Years Part-Time

Degrees and diplomas. Film and Television. swinburne.edu.au

WEBChallenge Theme Adopt a Nonprofit. Program Guide

Security for Financial Services: Addressing the Perception Gaps in a Dynamic Landscape

Effective Methods to Detect Current Security Threats

Certified Cyber Security Analyst VS-1160

INTERNSHIP PROJECT DESCRIPTION

PTSv2 in pills: The Best First for Beginners who want to become Penetration Testers. Self-paced, online, flexible access

ISACA S CYBERSECURITY NEXUS (CSX) October 2015

When a student leaves this intensive 5 day class they will have hands on understanding and experience in Ethical Hacking.

Cyber Threats Insights from history and current operations. Prepared by Cognitio May 5, 2015

Fighting Advanced Threats

Security & Exploitation

SIMULATED ATTACKS. Evaluate Susceptibility Using PhishGuru, SmishGuru, and USBGuru MEASURE ASSESS

Automating Linux Malware Analysis Using Limon Sandbox Monnappa K A monnappa22@gmail.com

Exploring a National Cyber Security Exercise for Community Colleges

CYBERSECURITY BEST PRACTICES FOR SMALL AND MEDIUM PENNSYLVANIA UTILITIES

Transcription:

University Road Show 2015

What we will cover Working in Cyber Security The Challenge The Prizes Hints & Tips Q&A

Working in Cyber Security

Life as a Cyber Security Professional Varied Valued Interesting Challenging Meaningful

The Challenge

About the Challenge A cyber security competition for Australian university undergraduate and TAFE students Promote cyber security as an interesting and challenging career option Highlight the key skills required in a cyber security career Inspire more students to develop cyber security skills

Scenario Enterprise Cloud Wellness Initiative

ECWI Formed when some CEOs mistook a number of Hollywood movies for documentaries The initiative aims to stop Hollywood style attacks by providing Cloud Wellness advice and assistance to enterprises Recent third party review found that confusing job titles and misunderstanding of job roles has led to a situation where no ECWI staff are actually familiar with cyber security This is where your team comes in

Your Mission Perform a penetration test of the ECWI intranet site Perform a penetration test of the ECWI internal corporate network and provide reports for non technical staff Conduct forensic analysis to investigate malicious activity on ECWI networks and systems Detect and defend against real-time threats on a network and share the information gained with ECWI partners

Challenge Components Linked Challenges Corporate Network Penetration Testing Web Penetration Testing Forensics Network Detect & Defend Extra Challenges Crypto Programming Password Cracking

Registration Info Up to 60 teams competing Teams may only contain Undergraduate and TAFE students. Maximum 4 people per team (no individuals) Institutes can register up to 4 teams Registrations close 4 September 2015 University/TAFE faculty contact will be able to apply on our website cyberchallenge.com.au Teams will receive an information pack with support contacts, login credentials, etc.

Scoring Players submit flags and answers to score points Team with the highest number of points wins Tie-breaker first to score final flag wins Limited submissions means that you may not get all points for a question End game scores are NOT final. Challenge Control will review responses and team positions may change after the competition ends Real time public display of teams scores and progress Challenge Control may review flag submissions

Team/Player Access Each team will be given access to their own sandbox network Players will use OpenVPN to connect to their teams sandbox network from their University/TAFE You will have an opportunity before the game to test your VPN connectivity. Do this before game day, from the location you will be playing from. Details will be provided in player packs. Default routes will be pushed to disallow access to the internet. Plan for this. Flags and Answers are submitted in the scoreboard website Each team will get a single login account Read the terms and conditions you have been provided. You will be required to accept them when you first login to the scoring site The scoreboard is not in scope. Targeting it will result in team disqualification

Event details Cyber Security Challenge Australia 2015 will start at noon Wednesday 30th September (EST) and finish at noon on Thursday 1st October (EST) Challenge Control will be available for the entire duration of the competition on IRC Telstra s network support team will be available via phone or IRC

The Prizes

Prizes Major Prize: Flights, accommodation and entry to DEFCON 2016 for the winning team (courtesy of Hacklabs) Flights, accommodation and entry to Ruxcon Melbourne 2015 for the top three teams (courtesy of PwC) Flights, accommodation and entry to Kiwicon Wellington 2015 for the top three teams (courtesy of the Commonwealth Bank of Australia) Samsung Gear VR (powered by Oculus) headsets for the winning team and swag bags for the winners of another category (TBA) (courtesy of Facebook) Cisco Live tickets for the winning team and a number of Meraki devices for other categories (TBA) (courtesy of Cisco) Devices and merchandise for winners of some categories (TBA) (courtesy of Telstra) Mentoring day in Canberra for female participants (courtesy of the Department of the Prime Minister and Cabinet) Further prizes to be announced

Hints & Tips

Hints & Tips - Practice The best way to practice is to play other CTFs CySCA 2014 in a box https://www.cyberchallenge.com.au/inabox.html ctftime.org Upcoming CTF schedule Previous CTF event write-ups CSAW, PlaidCTF, 9447ctf picoctf.com Almost perpetual CTF Challenges still available Includes introductory resources

Hints & Tips Tools Get comfortable using these tools! Kali Linux 1.1.0a Metasploit Burp suite SQLmap Wireshark Native disassembler (IDA or objdump) Debugger (GDB) Text editor (vim, emacs) Managed Disassembler (ILSpy) Volatility

Hints & Tips - Other We recommend having a sleep during the competition. Make sure that you eat and stay hydrated Some teams prefer to schedule sleep Having more open ended answers this year there is the possibility that you may not get all points for a question. You might not want to do these while fatigued. Before submitting the explain to a non-technical person answers. Pass it to a team mate to review/sanity check.

A little message from our sponsors

Work for Telstra Who we are: Telstra is Australia s leading telecommunications and Information services company offering a full range of communications services. We actively seek out new growth opportunities and new technology in Australia and around the world, with our international presence spanning 20 countries, including a growing footprint in Asia. Millions of customers rely on Telstra s network to deliver a diverse range of products and services, and to ensure their information is kept safe and secure This includes thousands of major enterprise customers who rely on us to manage their IT networks. What we do: We work closely with agencies in the public and private sectors to defend both our substantial core along with our customer / partner networks against regular attempts at cyber attack and intrusion. How we do it: We have a security team of 330 people with a range of information security skills, knowledge and experience. We also work closely with experienced technical professionals within and outside of Telstra, including IT Designers, Solution Architects, Engineers and Technology Build and Operate experts. Career Opportunities: We are always on the lookout for enthusiastic graduates with a proven set of security skills who are genuinely passionate about a career as a Information Security professional. This Cyber Security Challenge is a great way to gain an insight into our industry showcasing your skills to employers like Telstra and our partners in the room. Careers in Telstra website ~ https://careers.telstra.com/

Work for PwC Who we are What we do What we re like My experience at PwC What we re looking for Careers at PwC - www.pwc.com.au/student Vacationers, Graduates, Industry-Based Learning Students

Work for ASD Cyber analysts/cyber security specialists Systems infrastructure specialists Software developers Penetration testers Reverse engineers and malware analysts Intrusion analysts Internships & Graduate positions asd.gov.au/careers

Work for CBA The Commonwealth Bank offers careers in: penetration testing incident response Analytics cybercrime investigations, software development and more. CommBank is proud to sponsor the 2015 Cyber Security Challenge and to offer the top three teams flights, accommodation and tickets to: Kiwicon 9 Wellington, NZ Dec 10-11, 2015 commbank.com.au/graduates

Work for Cisco Cisco 2015 Midyear Security Report

Work for HackLabs What we do Why we do it Who we are Team Experiences What we re looking for Graduate & Internship Roles http://www.hacklabs.com/careers/

Work for Facebook Facebook is a global communications platform that connects 1.49 billion people around the world, including 13 million Australians. Security is a top priority for us. To learn more about Security@Facebook, check out the Facebook Security Page: https://www.facebook.com/security To learn more about careers at Facebook visit: https://www.facebook.com/careers

Any Questions? www.cyberchallenge.com.au