CSX NORTH AMERICA
CSX ASIA PACIFIC
17-19 OCTOBER | LAS VEGAS, NV, USA
CSX 2016 North America has come to a close and was a resounding success. We would like to thank all of our speakers and volunteers for helping to create an energetic and collaborative learning atmosphere. But most importantly, we would like to thank all of you who attended. None of this would be possible without your passion for learning and dedication to your profession. We are looking forward to seeing all of you again next year in Washington, DC!
Washington Marriott Wardman Park
Be on the lookout for special discounts on early registration!
Click here for
The CSX Cyber Challenge, a network security competition, has sessions tailored to both first-time gamers and experienced competitors. Dive deeper into your interactive cyber security experience while still earning CPEs and the chance to win prizes! Bring your personal laptop or tablet and go head-to-head with your conference colleagues!
The CSX Cyber Challenge is a timed competition event brought to you by the CIAS (founders of the National Collegiate Cyber Defense Competition). At the beginning of the competition, common resources are available for players to scan, assess, and penetrate. To claim ownership of a service, players must plant their flag, an assigned hexadecimal string, inside the banner of the service. An automated scanner detects ownership changes and awards ownership of the service to the individual whose flag appears in the service banner. At random intervals, an automated scoring engine checks the status and functionality of all critical services. If a player has ownership of a functional critical service during a successful service check, that player is awarded points for owning and maintaining a critical service. Individuals accumulate points for each critical service they control and continue to accumulate points as long as they own and maintain those critical services. Competitors that fail to secure resources and services they have captured may have them taken away by rival teams. Throughout the competition new resources are added to the common pool, forcing players to choose between defending existing assets and going after new assets. The player with the highest point total at the end of the competition wins the grand prize.
All player names will remain publicly anonymous. Competitors will be assigned a hash and icon at the beginning of the session. These hash names and icons will appear on the scoreboard as players accumulate points.
Both sessions take place on Tuesday, October 18, 2016
Morning Cyber Challenge (Essential): 10:00-12:15
Afternoon Cyber Challenge (Advanced): 2:45-5:15
Is this your first opportunity to try out a hands-on cyber competition? No worries! Once registered, you will receive an email from ISACA to give you VPN access to the Cyber Challenge portal. This portal contains guidance and expectations about the game. More importantly, it gives you FREE access to a live game environment where you can practice your skills and train yourself for the competition.
Customized Competition Levels
The targets available during each session will be geared towards the advertised skill level.
Essential (Morning): The targets in the beginner session will consistent mainly of systems with well-known, easily exploitable vulnerabilities. Targets may contain accounts with no password, easy to guess or default credentials, vulnerabilities that are directly exploitable via Metasploit, backdoors on well-known ports, and so on. These targets are designed for players with little to no assessment/exploitation experience.
Advanced (Afternoon): The targets in the Intermediate/Advanced session will consist primarily of systems requiring a higher degree of skill and experience in assessment and exploitation techniques. Targets may contain SQL injection vulnerabilities, allow user access but require privilege escalation for administrator/root access, contain hidden backdoors, contain PHP-based backdoors, be partially protected by firewalls, and so on. Most of the targets will require multiple steps and privilege escalations to obtain root/administrator level access.
Be sure to pre-register for one of the 50 slots during your overall conference registration process by selecting either the Essential or Advanced Cyber Challenge. Once registered, you will receive an email from ISACA within 24 hours to give you VPN access to the Cyber Challenge portal. This portal contains guidance and expectations about the game. More importantly, it gives you FREE access to a live game environment where you can practice your skills and train yourself for the competition. Registration will continue onsite until slots are filled to capacity.
A grand prize will be given to the highest scorer for each competition. This prize will be a 32GB, Wi-Fi-only tablet. 2nd place will get a 1 TB Solid State Drive. 3rd will get a 500 GB Solid State Drive.