New Zealand
Cyber Security Challenge 2016

Qualifying Round:
Dates: 17th June - 1st July
Location: Online

Competitive Round:
Dates: 14th July - 15th July
Location: The University of Waikato Campus

Back Next
1
2
3
4
Man

New Zealand
Cyber Security Challenge 2016


Qualifying Round:
Dates: 17th June - 1st July
Location: Online


Competitive Round:
Dates: 14th July - 15th July
Location: The University of Waikato Campus








Competition Overview

Round Zero

Round Zero is an online "Capture the Flag" challenge and is a teaser of what will happen on the challenge day. Four challenges are available for completion within two weeks. The top teams, up to 150 people, will be invited to compete in Rounds One and Two on the University of Waikato campus.


Training

Training will be provided by an Industry professional on the 14th July for Round One and Two participants. The training session will be interactive (not just a boring lecture!) where you will get to try out the new techniques learnt during the training session. You should then be armed to complete the challenges!


Round One

Round One is be a "Capture the Flag" style challenge, similar to Round Zero, but more challenging. Teams have 3 hours to capture as many flags as possible. The more difficult the challenge, the more points the flag is worth. The top 5 teams will advance to Round Two.


Round Two

Round Two is a Red team vs. Blue team style challenge where the 5 Blue teams are given admin credentials to a vulnerable server. Each team must harden and protect their own server against attacks from the Red teams.

Round 0

Round 0 Instructions

You should have received an email with the instructions required to participate in Round 0. If you haven't, please email info@crow.org.nz.


Round 0 Rules

  • Please use the name and email address that you registered with initially for your account on the scoreboard

  • Each participant has to participate as an individual, even if they registered as a group

  • Only emails that have been used to register will be considered for Top 150 placement

  • Competitors are expected to fully embrace principles of good sportsmanship - to compete fairly, and to not try to exploit the game system or the rules in unintended ways

  • Any signs of foul play will be cause for immediate disqualification


Individual Participation for Round 0

  • Each participant has to attempt Round 0 on their own, even if they registered as a group initially

  • The score for the team will be averaged after the closing date for Round 0


Selection Process for Top 150

  1. Final scores for each team will be averaged and published on the NZCSC'16 website

  2. The Top 150 competitors will be chosen from the updated scoreboard

Training

To ensure that participants are adequately prepared to face the challenges on the 15th, we have partnered with SafeStack to provide a training session starting at 9am on the 14th July. If you want to get a headstart in the competition, we recommend looking at some of the materials provided below.


Preparation before the Training Session

  • OWASP Top 10

    - The 2013 OWASP Top 10 by Dave Wichers

  • Basic HTML, CSS, PHP and JavaScript

    - While you will not be required to write any actual code, it might be helpful to be able to inspect a snippet of HTML, CSS, PHP or JavaScript and understand what that piece of code does.

    - w3schools

    - Code Academy

    - Mozilla Developer Network tutorials

  • LAMP and WAMP stack

    ServerWatch.com's LAMP Tutorial

  • Linux system administration

    - TLDP(The Linux Documentation Project)'s System Administrator's Guide

    - Linode.com's Linux System Administration Basics

  • hackthissite.org

    - HackThisSite.org is a free training ground for users to test and expand their hacking skills via an open learning environment where hacking challenges, articles, resources, and discussions of the latest happenings in hacker culture are hosted.

  • Hypertext Transfer Protocol (HTTP)

    - Mozilla's Guide to HTTP

  • Competition Rules

    Check back later - we will publish the competition rules and other relevant information shortly!

    Prizes

    Check back later - we will publish the competition prizes and other relevant information as soon as they are finalised!

    Schedule

    14 July: Training


    Time
    Location
    Description
    9.00
    R Block labs
    Training, Laura Bell
    12.00
    R Block foyer
    Lunch break + Registration for teams
    13.00
    R Block labs
    Training, Laura Bell
    16.00
    R Block labs
    Training, ZX Security

    15 July: Talks and Job Fair


    Time
    Location
    Description
    9.00
    PWC Lecture Theatre
    Talks
    11.15
    MSB foyer
    Job fair + lunch


    15 July: Competition


    Time
    Location
    Description
    13.00
    R Block foyer
    Final registration
    13.30
    R Block labs
    Welcoming, rules, and assigning participants to machines
    14.00
    R Block labs
    Round 1
    17.00
    R Block Foyer
    Break
    18.00
    R Block labs
    Round 2
    20.00
    R Block Foyer
    Prize giving


    Venue

    We're currently in the process of confirming the venues for the different component of the two-day event and will update this section shortly!

    Accomodation

    We'll update this section with some accomodation option for out-of-town competitors. Check back later - we'll have some special deals listed.

    Talks

    Time

    9.00

    9.05

    9.20

    9.35

    10.00

    10.30

    11.00

    11.30

    Description

    Welcoming speech, Assoc. Prof. Stepjen Joe, FCMS

    Dr Ryan Ko, Cyber Security Lab

    Mr. Paul Ash, NCPO

    Mr. Jeff Garae, Cyber Security Lab

    Dr Daisuke Inoue, NICT

    Mr. Stuart Wilson, Endace

    Mr. Tim Goddard, Kordia

    Start of job fair

    Abstract

    Blood, sweat, tears and joy - the first three years of NZ's first cyber security lab.

    In this talk, Dr Ko will introduce the journey of the lab since its founding, the key research and teaching achievements, and the Cyber Security Researchers of Waikato (CROW)'s contribution to the NZ cyber security movement.


    Dr Ryan Ko

    Dr Ryan Ko is a Senior Lecturer with the Computer Science department of the University of Waikato, New Zealand. His main research focus is in the areas of Cyber Security, Cloud Data Provenance, Applied Cryptography and Cloud Computing Security and Trust. He heads the Cyber Security Researchers of Waikato (CROW), and serves as the Science Leader of the NZD12.23 million MBIE funded STRATUS project.

    Prior to joining the faculty, he was a lead computer scientist with Hewlett-Packard (HP) Labs' Cloud and Security Lab. Recipient of the University of Waikato Early Career Academic Excellence Award and the Cloud Security Alliance Ron Knode Service Award, he is active as co-chair and board member of several cyber security industry consortia and chapters, including the ISO/IEC JTC 1/SC 27 committee. He holds a B.Eng (Hons.) (Computer Engineering) and Ph.D. from Nanyang Technological University, Singapore, and is a member of IEEE and ACM.

    Mr Paul Ash

    Check back later - we'll be adding Paul's bio and abstract soon!

    Abstract

    Check back later - we will add the talk abstract once it is finalised.


    Mr. Kimmo Ulkuniemi

    Mr Kimmo Ulkuniemi, INTERPOL Global Complex for Innovation Assistant Director for Strategy and Outreach has worked in the Finnish Police since 1992.

    Prior to his appointment to INTERPOL he was Deputy Head of the Europol National Unit in Finland and was responsible for Europol coordination in Finnish law enforcement.

    Mr Ulkuniemi has more than 10 years' experience in international police cooperation in INTERPOL, Europol and Schengen and he has experience on the investigation and international cooperation on cybercrimes. He has also worked in the Council of European Union and the United Nations.

    Abstract

    Whether we realise it or not, the security of all web applications and secure networked software depends on our ability to generate high quality, unpredictable random numbers. When this is done badly, attackers may steal our information and identities. Tim will explore some of the issues involved with using insecure random number generators, and how attackers can abuse these issues to ruin your day.


    Mr. Tim Goddard, Kordia

    Tim works as a penetration tester at Aura Infosec in Wellington, breaking critical systems so they can be re-made better. His background in software development gives him a solid idea of what things should look like, which comes in handy for identifying when something's out of whack. His areas of research and interest centre around cryptography, and its use to protect the confidentiality, integrity and authenticity of everyday information.

    Endace

    Check back later - we will add the bio and talk abstract for the Endace representative once they are finalised.

    Abstract

    More than 25 years ago, a Japanese manga “Ghost in the Shell” (GITS) illustrated a futuristic cyberpunk world, where everything is mutually connected, hacked, and protected with highly sophisticated technologies. To realize the world of GITS, NICT, a sole Japanese national research institute in ICT field, is researching cutting-edge Cybersecurity technologies such as a large-scale darknet (unused IP addresses) monitoring system NICTER, a darknet-based alert system DAEDALUS, and an anti-APT platform NIRVANA-KAI. In this talk, we present these technologies with real-time visualizations.


    Dr. Daisuke Inoue, NICT

    Daisuke Inoue received his B.E. and M.E. degrees in electrical and computer engineering and Ph.D. degree in engineering from Yokohama National University in 1998, 2000 and 2003, respectively. He joined Communications Research Laboratory (CRL), Japan, in 2003. CRL was relaunched as National Institute of Information and Communications Technology (NICT) in 2004, where he is currently the director of Cybersecurity Laboratory. He received several awards including the best paper award at the 2002 Symposium on Cryptography and Information Security (SCIS 2002), the commendation for science and technology by the minister of MEXT, Japan, in 2009, the Good Design Award 2013, and the Asia-Pacific Information Security Leadership Achievements 2014.

    T-Shirt Design

    We're currently in the process of confirming the t-shirt design and will update this section shortly!

    Travel Grants

    Our sponsors have been very generous this year, so we have been able to budget for 10 travel grants worth $250 each. If you made it through the qualifying round to Round 1, we will include a copy of the application form with your invite!

    CROW

    CROW is a research group located in the Department of Computer Science at The University of Waikato.

    With the emergence of cloud computing technologies and prevalent mobile device usage, we are witnessing the diminishing effectiveness of traditional cyber security approaches such as perimeter defence, intrusion detection and infrastructure hardening.

    To address this, CROW focuses on six major themes: Provenance, User-Centricity, Visualisation, Economics, Hardware, and Tools & Datasets. Together, these six themes enable the return of control of data to users, thereby reducing reliance on third-party vendors or trust relationships commonly found in most cyber security contracts today.

    Organising Teams
    CORE TEAM

    Brandon Nicholson
    Cameron Brown
    Harris Lin
    Joshua Scarsbrook
    Mark Will
    Meena Mungro
    Ryan Ko
    Sam Shute
    Sivadon Chaisiri


    ROUND ZERO and ONE

    Brandon Nicholson
    Mark Will
    Sam Shute


    ROUND TWO

    Joshua Scarsbrook
    Harris Lin


    SPECIAL THANKS

    Our Sponsors
    Eva JT Hou (Graphic Designer)
    Tim Hampton (Website Developer)
    CS3 (Computer Science Student Society)
    FCMS (Faculty of Computer and Mathematical Sciences)
    TSG (Technical Support Group)

    Contact Us
    Physical Address

    Cyber Security Lab
    The University of Waikato
    2nd Floor, FG-Link
    Gate 8
    Hillcrest Road
    Hamilton
    NEW ZEALAND


    Postal Address

    Cyber Security Lab
    Department of Computer Science
    The University of Waikato
    Private Bag 3105
    Hamilton 3240
    NEW ZEALAND

    Courier Address

    Cyber Security Lab
    Department of Computer Science
    c/- The Mailroom
    The University of Waikato
    21 Ruakura Road
    Hamilton
    NEW ZEALAND


    Telephone

    +64 7 837 9404


    Facsimile

    +64 7 838 4155
    Attention to Cyber Security Lab.


    Email

    info AT crow.org.nz

    CSC in the Past
    NZ Cyber Security Challenge 2015

    NZCSC'15 was open to all of New Zealand and participants were split into 3 categories: Secondary, Tertiary, and Industry/Open. The competition had 2 rounds: Round 1 was a capture-the-flag style challenge. Round 2, open to the top 5 teams of Round 1, was a Red team vs. Blue team style challenge where 5 Blue teams defended their systems against the Red team, which included Industry professionals from Insomnia Security and PWC Digital.

    Website: https://cybersecuritychallenge.org.nz/2015/

    NZ Cyber Security Challenge 2014

    The first instalment of the Cyber Security Challenge was open to University of Waikato students only. CSC'14 had a single round - a capture-the-flag style challenge where the participants solved challenges to acquire flags. The event served its purpose: to gauge students' interest in a Cyber Security-themed competition. Over 70 students registered, attended the training and participated in the competition, which encouraged the organisers to plan the next CSC.

    Website: https://cybersecuritychallenge.org.nz/2014/

    Previous Winners
    2015
    Winner

    Nicholas Shaw, Swikrit Khanal, Tim Hampton

    2014
    Winner

    Matthew Law, Marc Tiehuis, Carlin St Pierre

    Platinum sponsors
    Gold sponsors
    Silver sponsors
    Training Partner
    Organisers




    New Zealand
    Cyber Security Challenge 2016

    Qualifying Round:
    Dates: 17th June - 1st July
    Location: Online

    Competitive Round:
    Dates: 14th July - 15th July
    Location: The University of Waikato Campus





    Competition Overview

    Round Zero

    Round Zero is an online "Capture the Flag" challenge and is a teaser of what will happen on the challenge day. Four challenges are available for completion within two weeks. The top teams, up to 150 people, will be invited to compete in Rounds One and Two on the University of Waikato campus.


    Training

    Training will be provided by an Industry professional on the 14th July for Round One and Two participants. The training session will be interactive (not just a boring lecture!) where you will get to try out the new techniques learnt during the training session. You should then be armed to complete the challenges!


    Round One

    Round One is be a "Capture the Flag" style challenge, similar to Round Zero, but more challenging. Teams have 3 hours to capture as many flags as possible. The more difficult the challenge, the more points the flag is worth. The top 5 teams will advance to Round Two.


    Round Two

    Round Two is a Red team vs. Blue team style challenge where the 5 Blue teams are given admin credentials to a vulnerable server. Each team must harden and protect their own server against attacks from the Red teams.

    Round 0

    Round 0 Instructions

    You should have received an email with the instructions required to participate in Round 0. If you haven't, please email info@crow.org.nz.


    Round 0 Rules

    • Please use the name and email address that you registered with initially for your account on the scoreboard

    • Each participant has to participate as an individual, even if they registered as a group

    • Only emails that have been used to register will be considered for Top 150 placement

    • Competitors are expected to fully embrace principles of good sportsmanship - to compete fairly, and to not try to exploit the game system or the rules in unintended ways

    • Any signs of foul play will be cause for immediate disqualification


    Individual Participation for Round 0

    • Each participant has to attempt Round 0 on their own, even if they registered as a group initially

    • The score for the team will be averaged after the closing date for Round 0


    Selection Process for Top 150

    1. Final scores for each team will be averaged and published on the NZCSC'16 website

    2. The Top 150 competitors will be chosen from the updated scoreboard

    Training

    To ensure that participants are adequately prepared to face the challenges on the 15th, we have partnered with SafeStack to provide a training session starting at 9am on the 14th July. If you want to get a headstart in the competition, we recommend looking at some of the materials provided below.


    Preparation before the Training Session

  • OWASP Top 10

    - The 2013 OWASP Top 10 by Dave Wichers

  • Basic HTML, CSS, PHP and JavaScript

    - While you will not be required to write any actual code, it might be helpful to be able to inspect a snippet of HTML, CSS, PHP or JavaScript and understand what that piece of code does.

    - w3schools

    - Code Academy

    - Mozilla Developer Network tutorials

  • LAMP and WAMP stack

    ServerWatch.com's LAMP Tutorial

  • Linux system administration

    - TLDP(The Linux Documentation Project)'s System Administrator's Guide

    - Linode.com's Linux System Administration Basics

  • hackthissite.org

    - HackThisSite.org is a free training ground for users to test and expand their hacking skills via an open learning environment where hacking challenges, articles, resources, and discussions of the latest happenings in hacker culture are hosted.

  • Hypertext Transfer Protocol (HTTP)

    - Mozilla's Guide to HTTP

  • Competition Rules

    Check back later - we will publish the competition rules and other relevant information shortly!

    Prizes

    Check back later - we will publish the competition prizes and other relevant information as soon as they are finalised!

    Schedule

    14 July: Training


    Time
    Location
    Description
    9.00
    R Block labs
    Training, Laura Bell
    12.00
    R Block foyer
    Lunch break + Registration for teams
    13.00
    R Block labs
    Training, Laura Bell
    16.00
    R Block labs
    Training, ZX Security


    15 July: Talks and Job Fair


    Time
    Location
    Description
    9.00
    PWC Lecture Theatre
    Talks
    11.15
    MSB foyer
    Job fair + lunch


    15 July: Competition


    Time
    Location
    Description
    13.00
    R Block foyer
    Final registration
    13.30
    R Block labs
    Welcoming, rules, and assigning participants to machines
    14.00
    R Block labs
    Round 1
    17.00
    R Block Foyer
    Break
    18.00
    R Block labs
    Round 2
    20.00
    R Block Foyer
    Prize giving
    Venue

    We're currently in the process of confirming the venues for the different component of the two-day event and will update this section shortly!

    Accomodation

    We'll update this section with some accomodation option for out-of-town competitors. Check back later - we'll have some special deals listed.

    Job Fair

    The Cyber Security Job Fair starts at 11.30 in MSB Foyer on Friday 15 July and will feature booths with representatives from our sponsors, the Faculty of Computing and Mathematical Sciences (FCMS) at the University of Waikato and a registration booth for the competition. The job fair will be held in conjunction with lunch and end at 13.00.


    We're currently in the process of confirming the companies featuring in the job fair and will update this section shortly!

    Talks

    Time

    9.00

    9.05

    9.20

    9.35

    10.00

    10.30

    11.00

    11.30

    Description

    Welcoming speech, Assoc. Prof. Stepjen Joe, FCMS

    Dr Ryan Ko, Cyber Security Lab

    Mr. Paul Ash, NCPO

    Mr. Jeff Garae, Cyber Security Lab

    Dr Daisuke Inoue, NICT

    Mr. Stuart Wilson, Endace

    Mr. Tim Goddard, Kordia

    Start of job fair

    Abstract

    Blood, sweat, tears and joy - the first three years of NZ's first cyber security lab.

    In this talk, Dr Ko will introduce the journey of the lab since its founding, the key research and teaching achievements, and the Cyber Security Researchers of Waikato (CROW)'s contribution to the NZ cyber security movement.


    Dr Ryan Ko

    Dr Ryan Ko is a Senior Lecturer with the Computer Science department of the University of Waikato, New Zealand. His main research focus is in the areas of Cyber Security, Cloud Data Provenance, Applied Cryptography and Cloud Computing Security and Trust. He heads the Cyber Security Researchers of Waikato (CROW), and serves as the Science Leader of the NZD12.23 million MBIE funded STRATUS project.

    Prior to joining the faculty, he was a lead computer scientist with Hewlett-Packard (HP) Labs' Cloud and Security Lab. Recipient of the University of Waikato Early Career Academic Excellence Award and the Cloud Security Alliance Ron Knode Service Award, he is active as co-chair and board member of several cyber security industry consortia and chapters, including the ISO/IEC JTC 1/SC 27 committee. He holds a B.Eng (Hons.) (Computer Engineering) and Ph.D. from Nanyang Technological University, Singapore, and is a member of IEEE and ACM.

    Mr Paul Ash

    Check back later - we'll be adding Paul's bio and abstract soon!

    Abstract

    Check back later - we will add the talk abstract once it is finalised.


    Mr. Kimmo Ulkuniemi

    Mr Kimmo Ulkuniemi, INTERPOL Global Complex for Innovation Assistant Director for Strategy and Outreach has worked in the Finnish Police since 1992.

    Prior to his appointment to INTERPOL he was Deputy Head of the Europol National Unit in Finland and was responsible for Europol coordination in Finnish law enforcement.

    Mr Ulkuniemi has more than 10 years' experience in international police cooperation in INTERPOL, Europol and Schengen and he has experience on the investigation and international cooperation on cybercrimes. He has also worked in the Council of European Union and the United Nations.

    Abstract

    Whether we realise it or not, the security of all web applications and secure networked software depends on our ability to generate high quality, unpredictable random numbers. When this is done badly, attackers may steal our information and identities. Tim will explore some of the issues involved with using insecure random number generators, and how attackers can abuse these issues to ruin your day.


    Mr. Tim Goddard

    Tim works as a penetration tester at Aura Infosec in Wellington, breaking critical systems so they can be re-made better. His background in software development gives him a solid idea of what things should look like, which comes in handy for identifying when something's out of whack. His areas of research and interest centre around cryptography, and its use to protect the confidentiality, integrity and authenticity of everyday information.

    Endace

    Check back later - we will add the bio and talk abstract for the Endace representative once they are finalised.

    Abstract

    More than 25 years ago, a Japanese manga “Ghost in the Shell” (GITS) illustrated a futuristic cyberpunk world, where everything is mutually connected, hacked, and protected with highly sophisticated technologies. To realize the world of GITS, NICT, a sole Japanese national research institute in ICT field, is researching cutting-edge Cybersecurity technologies such as a large-scale darknet (unused IP addresses) monitoring system NICTER, a darknet-based alert system DAEDALUS, and an anti-APT platform NIRVANA-KAI. In this talk, we present these technologies with real-time visualizations.


    Dr. Daisuke Inoue, NICT

    Daisuke Inoue received his B.E. and M.E. degrees in electrical and computer engineering and Ph.D. degree in engineering from Yokohama National University in 1998, 2000 and 2003, respectively. He joined Communications Research Laboratory (CRL), Japan, in 2003. CRL was relaunched as National Institute of Information and Communications Technology (NICT) in 2004, where he is currently the director of Cybersecurity Laboratory. He received several awards including the best paper award at the 2002 Symposium on Cryptography and Information Security (SCIS 2002), the commendation for science and technology by the minister of MEXT, Japan, in 2009, the Good Design Award 2013, and the Asia-Pacific Information Security Leadership Achievements 2014.

    T-Shirt Design

    We're currently in the process of confirming the t-shirt design and will update this section shortly!

    Travel Grants

    Our sponsors have been very generous this year, so we have been able to budget for 10 travel grants worth $250 each. If you made it through the qualifying round to Round 1, we will include a copy of the application form with your invite!

    CROW

    CROW is a research group located in the Department of Computer Science at The University of Waikato.

    With the emergence of cloud computing technologies and prevalent mobile device usage, we are witnessing the diminishing effectiveness of traditional cyber security approaches such as perimeter defence, intrusion detection and infrastructure hardening.

    To address this, CROW focuses on six major themes: Provenance, User-Centricity, Visualisation, Economics, Hardware, and Tools & Datasets. Together, these six themes enable the return of control of data to users, thereby reducing reliance on third-party vendors or trust relationships commonly found in most cyber security contracts today.

    Organising Teams
    CORE TEAM

    Brandon Nicholson
    Cameron Brown
    Harris Lin
    Joshua Scarsbrook
    Mark Will
    Meena Mungro
    Ryan Ko
    Sam Shute
    Sivadon Chaisiri


    ROUND ZERO and ONE

    Brandon Nicholson
    Mark Will
    Sam Shute


    ROUND TWO

    Joshua Scarsbrook
    Harris Lin


    SPECIAL THANKS

    Our Sponsors
    Eva JT Hou (Graphic Designer)
    Tim Hampton (Website Developer)
    CS3 (Computer Science Student Society)
    FCMS (Faculty of Computer and Mathematical Sciences)
    TSG (Technical Support Group)

    Contact Us
    Physical Address

    Cyber Security Lab
    The University of Waikato
    2nd Floor, FG-Link
    Gate 8
    Hillcrest Road
    Hamilton
    NEW ZEALAND


    Postal Address

    Cyber Security Lab
    Department of Computer Science
    The University of Waikato
    Private Bag 3105
    Hamilton 3240
    NEW ZEALAND

    Courier Address

    Cyber Security Lab
    Department of Computer Science
    c/- The Mailroom
    The University of Waikato
    21 Ruakura Road
    Hamilton
    NEW ZEALAND


    Telephone

    +64 7 837 9404


    Facsimile

    +64 7 838 4155
    Attention to Cyber Security Lab.


    Email

    info AT crow.org.nz

    CSC in the Past
    NZ Cyber Security Challenge 2015

    NZCSC'15 was open to all of New Zealand and participants were split into 3 categories: Secondary, Tertiary, and Industry/Open. The competition had 2 rounds: Round 1 was a capture-the-flag style challenge. Round 2, open to the top 5 teams of Round 1, was a Red team vs. Blue team style challenge where 5 Blue teams defended their systems against the Red team, which included Industry professionals from Insomnia Security and PWC Digital.

    Website: https://cybersecuritychallenge.org.nz/2015/

    NZ Cyber Security Challenge 2014

    The first instalment of the Cyber Security Challenge was open to University of Waikato students only. CSC'14 had a single round - a capture-the-flag style challenge where the participants solved challenges to acquire flags. The event served its purpose: to gauge students' interest in a Cyber Security-themed competition. Over 70 students registered, attended the training and participated in the competition, which encouraged the organisers to plan the next CSC.

    Website: https://cybersecuritychallenge.org.nz/2014/

    Previous Winners
    2015
    Winner

    Nicholas Shaw, Swikrit Khanal, Tim Hampton

    2014
    Winner

    Matthew Law, Marc Tiehuis, Carlin St Pierre

    Platinum sponsors
    Gold sponsors
    Silver sponsors
    Training Partner
    Organisers