title text
Threat Interceptors 4

Test your skills at hunting threats, tracking the actions of cyber-attackers, and mitigating cyber-risks.

Join the Threat Interceptors Challenge, a capture the flag (CTF) competition, and prove your threat hunting prowess.

Register for the challenge

The Threat Interceptors Challenge begins on 14 June 2021

days

hrs

min

sec

So, what’s the Threat Interceptors Challenge?

The Threat Interceptors Challenge will consist of a threat hunting scenario with various objectives. Your challenge as a threat interceptor, should you choose to accept it, will be to understand how the attacker breached the network, tracing their nefarious activity inside the perimeter to discern potential data at risk, and mitigate the attack as quickly as possible to soften the blow to your organization’s business continuity, among other tasks.

To complete the challenge you will use Accedian’s Skylight Interceptor solution, a behavior-based intrusion detection system.

The challenge is estimated to take less than 4 hours to complete as an individual. The window to test your skills will be between 11:00 AM EDT June 14th, 2021 to 11:00 AM EDT June 16th, 2021 (48 hours). The winner will be announced live, at the Get Resilient, Stay Resilient cybersecurity seminar, following the closing of the challenge.

See more frequently asked questions on the challenge at the bottom of this page.

hoodie-hacker

You can win big!

All hackathon participants completing the challenge will receive a Certificate of Completion and report to share detailing their success.

Top performers are up for big cash prizes!
First place = $1337 USD
Second place = $337 USD
Third place = $137 USD

There will also be 5 random drawings for $50 USD gift cards.

trophy

Frequently Asked Questions

  • What is a capture the flag (CTF) style hackathon?

    A cyber security CTF hackathon is a competition between security professionals and/or students learning about cyber security. This competition is used as a learning tool for everyone that is interested in cyber security and it can help sharpen the tools they have learned during their training.
  • What should I expect from this challenge?

    The challenge will consist of a threat hunting scenario with various objectives. Your challenge as a threat interceptor will be to understand how the attacker breached the network, tracing their nefarious activity inside the perimeter to discern potential data at risk, and mitigate the attack as quickly as possible to soften the blow to your organization’s business continuity, among other tasks. 
  • What are the requirements needed to successfully complete this challenge?

    To complete the challenge, you will use Accedian’s Skylight Interceptor solution. You should have a good understanding of the defensive side of cybersecurity, network-based detection systems and what attacks you are defending against. A good working knowledge of offensive tactics, knowing how to test your network and devices to find the vulnerabilities before the hackers do is critical.

  • What do I need to prepare for the challenge ahead of time?

    Get your cyber security skills ready! This is a hands-on event, you’ll need your energy, your knowledge, some snacks on hand and your favorite tools to analyze PCAPs.

  • Who should participate?

    Anyone looking for a challenge!! This is a great opportunity for like-minded people to come together and implement new ideas. Anyone having a good understanding of cyber security, hunting threats, intrusion detection and mitigating cyber-risks will be able to complete this challenge!

  • What are the benefits of participating?

    Learn and create new concepts and ideas! You will be challenged with intense problem-solving scenarios that will facilitate the creation of innovative ideas and concepts. It also instantly increases your knowledge and skill level. The fact that there are time constraints makes the task more exciting and brings out the best in people. Your participation will also add value to your resume. It signals to people that you have programming skills, experience working in intense time frames, and that you know how to win.

  • How long will it take me to complete the challenge?

    The challenge is estimated to take less than 4 hours to complete as an individual. The window to test your skills will be between 8:00 AM Pacific US time June 14th, 2021 to 8:00 AM Pacific US time June 16th, 2021 (48 hours).

  • How are winners chosen?

    The winners will be announced live following the closing of the challenge window on June 16th at 12pm EST. The top three individuals to mitigate the cyber threat the quickest, in the shortest periods of time, will be our grand winners who will receive money as their prize (1st, 2nd & 3rd place). There will also be five random drawings of Amazon gift cards. All participants who complete the Hackathon will receive a certificate of successful completion.

  • Where will the CTF hackathon take place?

    From the comfort of your own home! This CTF is completely virtual.

  • Who can I contact for troubleshooting issues?

    If you encounter any issues during the hackathon time frame, please reach out to hackathon@accedian.com and we will respond as soon as possible.

  • Have more questions?

    Reach out to us at hackathon@accedian.com

Event supporters

sourcecode underdefense