Thursday, March 28, 2024

Cynet Issues Incident Response Challenge 2020 for IR Professionals With $5,000 Prize

Cynet today announced the company’s IR Challenge for incident response professionals.

By participating in this event, Incident Responders challenged to match their skills against colleagues in the first of its kind contest with $5,000 Prize.

Cynet 360 is the world’s first autonomous breach protection platform that consolidates and automates Monitoring & Control, Attack Prevention & Detection and Response Orchestration across the entire environment.

The first-place winner of the contest will receive a $5,000 prize as the contest qualifies the investigative capabilities of participants against a set of challenges designed by top IR experts.

With the launch of this challenge, Cynet has assembled the top analysts and researchers to build out the challenges in this IR contest and ensure that solving the presented problems will strain the skills of even the most experienced responders.

IR Challenge Main Guideline

The main guideline in the IR Challenge is that the tests reflect real-life scenarios rather than artificial mind drills. In light of that, the team has reviewed a large number of documented investigations to distill a total of 28 patterns, starting from easy and becoming progressively more difficult as the IR professional proceeds.

Incident response (IR) is a methodical approach to orchestrating and managing the response after a cyberattack or other security breach.

The objective is to confidently manage the situation in a way that reduces damage and limits recovery time and costs.

Prominent to this process is the ability to conduct a forensic investigation across the attacked environment in order to form a clear understanding of the incident’s root cause, attack vectors and overall impact.

The challenge also tests for IR investigative strengths of participating individuals, allowing them to measure and sharpen their skill set.

“While Capture the Flag challenges that test hacking capabilities are common, there has never been a publicly available test for IR related forensic investigation,” said Dori Harpaz, VP, Marketing, Cynet.

“In the course of this timeframe anyone can try their hand, starting from the first and proceeding to the other increasingly difficult IR challenges. We welcome all participants and will reward the most accomplished with a financial prize, recognition and a certificate of completion.”

Success in the IR Challenge will be based on the results as well as the time it took the contestant to solve. At the end of the two-week contest period, a winner will be declared and the results of the challenge will become available. The Cynet IR Challenge questionnaire will remain online afterward as a free resource for IR practitioners.

If you’re a security professional specialized in malware analysis, forensic investigation, incident response, SOC operations and having the skill cyber incidents To participate in the IR Challenge, please register for free at https://incident-response-challenge.com/.

The contest will remain open until May 15th, 2020.

Steps to Follow

1. Go the Incident response Challenge website and Signup here

2. Start the Challenge and answer the questions that comprised of a variety of Scneraio based incidents.

3. You will know your score only after completing all 25 challenges.

4. Cynet Alogroithm calculates a score based on the number of correct answers and the time it took to solve each question.

5. You are limited to one entry. Anyone who enters more than once will be disqualified.

6. The winner will be announced 72 hours after the competition closes and you will know the winner’s details on 15th May.

7. Winner will receive the amount of $5000 cash prize.

Website

Latest articles

Wireshark 4.2.4 Released: What’s New!

Wireshark stands as the undisputed leader, offering unparalleled tools for troubleshooting, analysis, development, and...

Zoom Unveils AI-Powered All-In-One AI Work Workplace

Zoom has taken a monumental leap forward by introducing Zoom Workplace, an all-encompassing AI-powered...

iPhone Users Beware! Darcula Phishing Service Attacking Via iMessage

Phishing allows hackers to exploit human vulnerabilities and trick users into revealing sensitive information...

2 Chrome Zero-Days Exploited at Pwn2Own 2024: Patch Now

Google has announced a crucial update to its Chrome browser, addressing several vulnerabilities, including...

The Moon Malware Hacked 6,000 ASUS Routers in 72hours to Use for Proxy

Black Lotus Labs discovered a multi-year campaign by TheMoon malware targeting vulnerable routers and...

Hackers Actively Exploiting Ray AI Framework Flaw to Hack Thousands of Servers

A critical vulnerability in Ray, an open-source AI framework that is widely utilized across...

Chinese Hackers Attacking Southeast Asian Nations With Malware Packages

Cybersecurity researchers at Unit 42 have uncovered a sophisticated cyberespionage campaign orchestrated by two...

Mitigating Vulnerability Types & 0-day Threats

Mitigating Vulnerability & 0-day Threats

Alert Fatigue that helps no one as security teams need to triage 100s of vulnerabilities.

  • The problem of vulnerability fatigue today
  • Difference between CVSS-specific vulnerability vs risk-based vulnerability
  • Evaluating vulnerabilities based on the business impact/risk
  • Automation to reduce alert fatigue and enhance security posture significantly

Related Articles