PwnTillDawn Online Battlefield’s Competition is the 100% online version which will allow selected contenders to put their offensive skills to the test and from anywhere.
PwnTillDawn Online Battlefield’s Competition is an intensive 24 hour/non-stop competition where 50+ participants will evolve within a network comprised of many machines affected by real life vulnerabilities witnessed by wizlynx group through hundreds of penetration tests conducted for companies and organizations of various sizes and industries. The PwnTillDawn “Capture-the-flag” (CTF) will challenge contestants to break into as many machines as possible using a succession of weaknesses and vulnerabilities. Upon the compromise of a machine, contestants will have to collect flags awarding a certain amount of points.
Goodwill Event Edition Changes
This edition of the PwnTillDawn competition will be slightly different from the previous ones, in fact, you will not only participate for yourself but also you will help less fortunate young students to get Cyber Security trainings.
When the total of the points from the flags discovered by the participants will reach different thresholds (based on the number of players) a training will be granted! We are counting on you to discover as many flags as possible so we can give away all the trainings!
In addition to sponsoring the trainings, the top 3 classified participants will also win the following prizes:
1st Place: A $150 USD Amazon/Spotify/Netflix gift card
2nd Place: A $75 USD Amazon/Spotify/Netflix gift card
3rd Place: A $50 USD Amazon/Spotify/Netflix gift card
New Addition -> TEAMS
For this Goodwill edition of the PwnTillDawn we are also releasing a new feature: TEAMS.
A maximum of 3 players can join a team and participate to the Goodwill Competition. ———
Due to limited spots available for the competition, registrations will undergo a selection process where your passion, motivation, and experience for offensive security will be assessed. We therefore strongly encourage you to submit a complete application.
The competition will start at 7am CEST
Limited tools authorised during the competition!
No cooperation between single participants and between different teams
The shift left of the security and defining everything as code become a new trend for cybersecurity. In this talk, Ken from AWS will share with you a solution that helped users define their guardrails in code, and enforce the guardrails from preventative, detective and responsive perspective.
– The Guardrail-as-Code framework that encompasses Cloud Adoption Framework Security Perspective
– Build the close loop of Directive, Preventative, Detective and Responsive control on AWS
– Open source and AWS native tools to realise the architecture
Practice Manager, DevOps & Security, AWS GCR Professional Services
Ken led cloud security and transformation projects in Australia and the Greater China Region. He has experience helping organizations with their security and transformation journeys in banking, insurance, retail, health service and manufacturing industries. Ken maintains a range of well-recognized certificates and holds MBA from a global top 30 business school. He is a regular speaker at AWS and other associates’ conferences in the region.
The Webinar is conducted in English with English Presentation Material.
Please install Zoom software/app for your PC, Mobile or Tablet.
For the Meeting ID and Passcode, it will be sent by a separate email after the registration.
Highlight: 2020 has caught many businesses off guard. Users, data, devices, critical business applications and networks have left the office and become more distributed.
This shift in the way we work & do business has resulted in companies losing visibility into what was happening in their corporate and their employees’ personal networks, devices, and applications. This shift has also seen several cybercriminals and sophisticated hacking groups rapidly adjusting their techniques and tactics to take advantage of the situation.
Whether you are a Fortune 500 company or a small/medium enterprise, there are fundamentally three things you need to protect: data, devices, applications, and the network itself. Register for this session to: See how Hong Kong ranks in DDOS attacks distribution globally
See how Hong Kong ranks in DDOS attacks distribution globally
Stay ahead of the cyberattack vectors & see how Cloudflare helps in combating these attacks
Find out what is the hype on Zero- Trust Security & how Cloudflare One can future- proof your cybersecurity capability regardless of the shift in workforce situation
Stay on for a supercharged Q&A session and test your cybersecurity readiness!
Cybersecurity is one of the fastest growing professions today. So how do you grow your career and reap the benefits? CISSP: 5 letters that prove your expertise. The CISSP helps you prepare for real-time incidents and stand out as the expert employers are looking for. In fact, it proves you have what it takes to effectively design, develop and manage the overall security posture of an organization.
Join us live online on Mar 2 to learn everything you need to know about getting CISSP certified. In this 60-minute info-session, you’ll learn:
Why it has never been more important to be a Qualified Cybersecurity Professional
The value of CISSP certification
What you will learn in official training for the CISSP exam
What to expect from the CISSP exam
How to become endorsed and earn the CISSP certification
And, get to ask any question that will support your certification journey.
Tony Vizza, CISSP, CCSP
Director of Cyber Security Advocacy – Asia-Pacific, (ISC)²