Wednesday, April 17, 2024

Cynet Issues Incident Response Challenge 2020 for IR Professionals With $5,000 Prize

Cynet today announced the company’s IR Challenge for incident response professionals.

By participating in this event, Incident Responders challenged to match their skills against colleagues in the first of its kind contest with $5,000 Prize.

Cynet 360 is the world’s first autonomous breach protection platform that consolidates and automates Monitoring & Control, Attack Prevention & Detection and Response Orchestration across the entire environment.

The first-place winner of the contest will receive a $5,000 prize as the contest qualifies the investigative capabilities of participants against a set of challenges designed by top IR experts.

With the launch of this challenge, Cynet has assembled the top analysts and researchers to build out the challenges in this IR contest and ensure that solving the presented problems will strain the skills of even the most experienced responders.

IR Challenge Main Guideline

The main guideline in the IR Challenge is that the tests reflect real-life scenarios rather than artificial mind drills. In light of that, the team has reviewed a large number of documented investigations to distill a total of 28 patterns, starting from easy and becoming progressively more difficult as the IR professional proceeds.

Incident response (IR) is a methodical approach to orchestrating and managing the response after a cyberattack or other security breach.

The objective is to confidently manage the situation in a way that reduces damage and limits recovery time and costs.

Prominent to this process is the ability to conduct a forensic investigation across the attacked environment in order to form a clear understanding of the incident’s root cause, attack vectors and overall impact.

The challenge also tests for IR investigative strengths of participating individuals, allowing them to measure and sharpen their skill set.

“While Capture the Flag challenges that test hacking capabilities are common, there has never been a publicly available test for IR related forensic investigation,” said Dori Harpaz, VP, Marketing, Cynet.

“In the course of this timeframe anyone can try their hand, starting from the first and proceeding to the other increasingly difficult IR challenges. We welcome all participants and will reward the most accomplished with a financial prize, recognition and a certificate of completion.”

Success in the IR Challenge will be based on the results as well as the time it took the contestant to solve. At the end of the two-week contest period, a winner will be declared and the results of the challenge will become available. The Cynet IR Challenge questionnaire will remain online afterward as a free resource for IR practitioners.

If you’re a security professional specialized in malware analysis, forensic investigation, incident response, SOC operations and having the skill cyber incidents To participate in the IR Challenge, please register for free at

The contest will remain open until May 15th, 2020.

Steps to Follow

1. Go the Incident response Challenge website and Signup here

2. Start the Challenge and answer the questions that comprised of a variety of Scneraio based incidents.

3. You will know your score only after completing all 25 challenges.

4. Cynet Alogroithm calculates a score based on the number of correct answers and the time it took to solve each question.

5. You are limited to one entry. Anyone who enters more than once will be disqualified.

6. The winner will be announced 72 hours after the competition closes and you will know the winner’s details on 15th May.

7. Winner will receive the amount of $5000 cash prize.


Latest articles

Trustifi’s Email Security Awareness Training – Empowering MSPs to Train & Protect Clients

In today's digital landscape, email security has become a critical concern for businesses of...

Personal Data Exposed in Massive Global Hack: Understanding the Implications & Guarding Privacy- Axios Security Group

In a digital age where information is the new currency, the recent global hack...

Ex-Security Engineer Jailed For Hacking Decentralized Cryptocurrency Exchanges

Ahmed exploited a vulnerability in a decentralized cryptocurrency exchange's smart contract by injecting fabricated...

Omni Hotels & Resorts Hack: Attackers have Stolen Customer Information

Omni Hotels & Resorts has revealed that it was the target of a recent...

Connect:fun Attacking Organizations Running Fortinet’s FortiClient EMS

A new exploit campaign has emerged, targeting organizations that utilize Fortinet’s FortiClient EMS.Dubbed...

TA558 Hackers Compromised 320+ Organizations’ FTP & SMTP Servers

TA558, a financially motivated threat actor identified in 2018, is targeting several countries but...

Blackjack Hackers Destroyed 87,000 Sensors Using Lethal ICS Malware

A group of cybercriminals known as "Blackjack" has launched a devastating attack on industrial...

Top 3 SME Attack Vectors

Securing the Top 3 SME Attack Vectors

Cybercriminals are laying siege to small-to-medium enterprises (SMEs) across sectors. 73% of SMEs know they were breached in 2023. The real rate could be closer to 100%.

  • Stolen credentials
  • Phishing
  • Exploitation of vulnerabilities

Related Articles