To check full list of winners of different challenges, please click here.
To check Solutions of Rounds please go to Solution Section of the website.
2017 challenge known for Challenge Winner Repeat Performance .
It was a repeat performance by the overall champions team Arcton, Nathaniel Watson, Jeremy Symon and Grady Hooker took out last year's Challenge.
Representing industry, they walked away with a cheque for $2500 and NetHui fellowships. Jeremy is currently doing a Masters of Computer Science at Waikato and working at Gallagher, and Grady and Nathaniel are former Waikato Computer Science students now working in the computer science industry.
overall runners-up 418ShortAndStout - Michael Robertson and Brent Vollebregt - placed top in the tertiary division and took home $1800.
Top performers in the high school division after Rounds 1 and 2, SQL Sharks twins Sam and Josh Hogan also took out first place in the new Policy Round. Contestants were tested on responsible disclosures, asked to critique a really badly-written cyber policy, and suggest incident response next steps for a fictitious event.
The winning team from the industry division after Rounds 1 and 2 were Jack Haystead, Daniel Tebbutt and Declan ter Veer-Burke. They took home a cheque for $1800.
nZCSC'17 hit all the right keys with VIPs from the Government Communications Security Bureau (GCSB) and INTERPOL attending. GCSB director Andrew Hampton told the Challengers it wasn't long ago that people were saying cyber security should be on the agenda but now the agenda is cyber security.
although, In this year's Challenge CROW collaborated with Japan's National Institute of
Communications and Information Technology ( NICT ) to up the ante in the visualisation of
the attack and defend networks of the competition. CROW member Cameron Brown worked with Koei Suzuki to customise the NIRVANA Kai visualisation to show network traffic between the Round 3 servers. The collaboration is mutually beneficial as NICT will utilise CROW technology in the future. NICT supply the visualisations for Japan's largest cyber security competition SECCON.
team Name: Hodor (462,250 points)
team Members: Sjoerd de Feijter, Matthew Stringer, Vladimir Petko
industry category team, representing Gallagher Group
due to the popularity of the competition in 2015, we introduced an online qualifying round, Round Zero. 267 participants registered for Round Zero and attempted the challenges between the 17 June - 1st July, after which the Top 150 were chosen to attend the competition on the 14 and 15 July.
participants competed in two rounds: Round One, a capture-the-flag style challenge and Round Two, a Red team vs. Blue team game where the Blue teams had to defend their vulnerable servers from attacks from the Red teams, which consisted of an Industry Professional from Gallagher and two CROW members.
team Name: ter B
nZCSC'15 was open to all of New Zealand and participants were split into 3 categories: Secondary, Tertiary, and Industry/Open.
the competition had 2 rounds: Round 1 was a capture-the-flag style challenge. Round 2, open to the top 5 teams of Round 1, was a Red team vs. Blue team style challenge where 5 Blue teams defended their systems against the Red team, which included Industry professionals from Insomnia Security and PWC Digital.
the first instalment of the Cyber Security Challenge was open to University of Waikato students only.
cSC'14 had a single round - a capture-the-flag style challenge where the students participants solved challenges to acquire flags. The event served its purpose: to gauge students' interest in a Cyber Security-themed competition. Over 70 students registered, attended the training and paticipated in the competition, which encouraged the organisers to plan the next CSC.
location: UNIVERSITY OF WAIKATO CAMPUS
an introduction into the cyber security technologies used today. learn the ins and outs of security, and what you will need to know for the competition.
location: UNIVERSITY OF WAIKATO CAMPUS
at tap you will have access to companies from the cybersecurity. Come and network with leading companies and government agencies.
location: UNIVERSITY OF WAIKATO CAMPUS
ever flown a drone?
or are you a self-proclaimed, pro drone-pilot?
come on down for the drone side challenge. guaranteed a good time.
location: UNIVERSITY OF WAIKATO CAMPUS
a bunch of speakers from the cyber security industry talking about what's relevant today.
what better way than to learn from the experts.
location: UNIVERSITY OF WAIKATO CAMPUS
According to data from the 2017 Global Information Security Workforce Study (GISWS), women comprise only 11% of the information security workforce – a number that has remained steady since 2013. The study also found that women in cybersecurity have higher levels of education than men, but fewer hold senior-level positions, and they receive less pay (Ref: Women in Cybersecurity Report).
To address this, the organising team of the NZCSC organize a “Women in Cyber Security Workshop" as a side event this year. A workshop by women for women, including technical challenges, career panel discussion and prizes!
location : ONLINE
round zero is a qualifying one of capture-the-flag. After the round closes the top 150 participants will be invites to rounds one and two.
details will be sent to registered participants on the 18th.
round zero will be avaliable for the full two weeks (18th - 29th June).
location : UNIVERSITY OF WAIKATO CAMPUS
ROUND 01
after qualifying, the top 150 participants will compete at the UoW campus.
each participants will have 10+ capture-the-flag challenges with a 2hour time limit.
round one is worth 90% of your final score.
ROUND 02
cyber security policy challenge.
prizes for top teams in three categories (highschool, university, industry) for rounds 1 and 2.
worth 10% of your final score.
ROUND 03
top five teams (Blue Teams) from Rounds 1 and 2, take turns defending their server from attackers (Red Team).
$2550
$2100
$810
$20 per challenge in cash
$50 per challenge in cash
$700
$270
Established in 2012, CROW is a research group located in the Department of Computer Science at The University of Waikato.
With the emergence of cloud computing technologies and prevalent mobile device usage, we are witnessing the diminishing effectiveness of traditional cyber security approaches such as perimeter defence, intrusion detection and infrastructure hardening.
To address this, CROW focuses on six major themes: Provenance, User-Centricity, Visualisation, Economics, Hardware, and Tools & Datasets. Together, these six themes enable the return of control of data to users, thereby reducing reliance on third-party vendors or trust relationships commonly found in most cyber security contracts today