1. /
  2. Cyber Readiness Challenge
Cyber Readiness Challenge

Cyber Readiness Challenge
Protect and Prevail

Look out for a Cyber Readiness Challenge event here!

Recruiting Security Experts Worldwide

Sun Tzu once said, "Know both yourself and your enemy and you can win a hundred battles without jeopardy."

The Symantec Cyber Readiness Challenge is a competition designed for all levels of technical expertise that puts participants in the hacker's shoes to understand their targets, technology and thought processes so they can ultimately better protect their company or agency. This interactive 'capture the flag' style competition will take place at various locations around the globe and participants will have the opportunity to test their skills within a unique and real world environment developed by Symantec, the global leader in security.

  • Sharpen your security skills
  • Expand your security awareness
  • Implement theoretical knowledge
  • Compete against your peers

Bringing together some of the world's leading experts in IT security, this innovative competition will offer a keynote presentation on the current security landscape by renowned security experts and provides a fantastic environment for networking and knowledge sharing.

Space is limited so register today for an event near you to guarantee your place!

Are You Ready for the Cyber Readiness Challenge?

Symantec Cyber Readiness Challenge

Symantec Cyber Readiness Challenge

Are you ready for the Cyber Readiness Challenge?
Watch the video
Symantec Cyber Readiness Challenge Partner Bootcamp Singapore

Symantec Cyber Readiness Challenge Partner Bootcamp Singapore

Watch the video
Symantec Cyber Readiness Challenge GovWare Singapore

Symantec Cyber Readiness Challenge GovWare Singapore

Watch the video

Calendar of Events

Country Event Series Date and Time Register
Taiwan Cyber Readiness Challenge 2 April 2014 By invitation only
Hong Kong Cyber Readiness Challenge 4 April 2014 By invitation only
Korea Cyber Readiness Challenge 30 April 2014 By invitation only
Malaysia Cyber Readiness Challenge 28 May 2014 By invitation only

CYBER READINESS CHALLENGE 2013-2014

OFFICIAL RULES

NO PURCHASE NECESSARY TO ENTER OR WIN

1. DESCRIPTION

The Symantec Cyber Readiness Challenge Event (the “Challenge”) is a competition for IT security enthusiasts. Enthusiasts put themselves in the shoes of hackers and compete within an assimilated real world data center environment provided by Symantec. Symantec presents a series of online challenges or tasks to Participants, whose mission is to protect targets or disrupt the status quo. The Challenge is designed to be fun and competitive for all technical skill levels and to help support global security awareness.

2. SPONSOR

The Challenge is sponsored by Symantec Asia Pacific Pte Ltd, 6 Temasek Boulevard, Suntec City Tower 4 #11-01, Singapore 038986 (the “Sponsor”).

3. ELIGIBILITY – VOID WHERE PROHIBITED

The Challenge is open to persons who are legal residents of Australia, Hong Kong, India, Indonesia, Japan, Korea, Malaysia, New Zealand, Philippines, Singapore, Taiwan, Thailand, Vietnam, and where it not prohibited by law. Participants must have reached the age of majority in country of residence at the time of entering the Challenge in order to participate and have permission from their employer in order to participate. Persons in any of the following categories are NOT eligible to enter, participate, or win in the Challenge: (a) persons who on or after Monday, 3 June, 2013, at 12.00 a.m. Singapore Time ("GMT +8") were or are officers, directors or employees of Sponsor or any of its respective parent, subsidiary, or affiliated companies, or service agencies, or independent contractors of any of the above organizations; (b) individuals engaged in the development, production, or distribution of materials for the Challenge; (c) persons who are immediate family members (defined as spouse or biological or step- mother, father, sister, brother, daughter, or son and each of their respective spouses) of any person in any of the preceding categories, regardless of where they live, and/or individuals who reside in the same household, whether related or not, as any person in any of the preceding categories and (d) any government official, employee or other representative of a state-owned entity. Any questions or issues concerning eligibility shall be determined at the sole discretion of the Sponsor.

4. HOW TO ENTER

No purchase necessary to enter the Challenge, and no entrance or participation fee applies, but prior online registration is required to participate in a specific Challenge location.

Participants must register online at least 72 hours in advance of Participants’ attendance of a specific Challenge. Please see Calendar tab for the relevant registration forms for each event. Additional terms and conditions may apply and will be provided on registration form.

During the Challenge, Participants must use their own laptops or notebook computers for participation in the Challenge. The following minimum system requirements are recommended for the Challenge:

  • 1 Ghz Intel x86 compatible processor (2 Ghz with virtualization extensions recommended)
  • 2 GB of RAM
  • 20 GB of free disk space
  • Windows 2000 or later, OS X 10.4.11 or later, Linux 2.4.10/2.6.4 or later, BackTrack 4 or later

The Sponsor will provide an assimilated real world data center environment within which Participants can participate and compete in the Challenge. The Challenge consists of a series of IT security related challenges or tasks based on a difficulty level according to easy, moderate and hard. Easy tasks are less difficult than moderate tasks, which are both less difficult than hard tasks. Participants who complete a task will have captured an online “flag,” and thereby be awarded the following points based on the difficulty level of such task successfully completed by the Participant:

LEVEL POINTS
Hard 1000 points
Moderate 500 points
Easy 300 points

Points are awarded based on completing each IT security task and are accumulative during the Challenge.

5. WINNERS

During the Challenge, potential winners are selected based on the criteria and scoring of points outlined above and registration terms and conditions, if applicable. Sponsor’s clock is the sole official timekeeper. If a potential winner is found to be ineligible, is not in compliance with the Official Rules, he/she will be disqualified at the sole discretion of the Sponsor. All decisions of the Sponsor are final and binding. If Participant has any questions regarding the rules or scoring of the Challenge, Participant should promptly contact Sponsor in advance of the start date of the Challenge via contact details provided by Sponsor during registration. Any issues or objections regarding the Challenge must be in writing and delivered to the Sponsor. The Sponsor shall be the final arbitrator of any such issue or objection. If an issue or objection cannot be resolved to the Sponsor's satisfaction, the affected Participant will be deemed ineligible to win a prize (if any), but the Official Rules and registration terms and conditions will otherwise continue to govern the affected Participant and the Challenge. A decision or ruling by the Sponsor is final and non-appealable.

6. DATA PRIVACY

All Participants agree that personal data, especially name and address, may be processed, stored, and otherwise used for the purposes and within the context of the Challenge and any other purposes outlined in the Official Rules, Sponsor's Privacy Policy, and any opt-in Participant may have agreed to during the registration process. Participants agree that the data may also be used by the Sponsor in order to check Participants’ identities, emails, postal addresses, telephone numbers, or to otherwise verify the eligibility to participate in the Challenge. Participants agree for Sponsor to use feedback and name of Participant for marketing purposes of Cyber Readiness Challenge. Participants agree to receiving further marketing communication from Sponsor.

7. RELEASE

AS A PARTICIPANT IN THE CHALLENGE, YOU AGREE THAT THE SPONSOR AND ITS SUBSIDIARIES, AGENTS, DIRECTORS, OFFICERS, EMPLOYEES, REPRESENTATIVES, AND ASSIGNS (THE “RELEASED PARTIES”) (A) SHALL NOT BE RESPONSIBLE OR LIABLE FOR ANY LOSSES, DAMAGES, OR INJURIES OF ANY KIND WHATSOEVER RESULTING FROM YOUR PARTICIPATION IN THE CHALLENGE, INCLUDING ACCESS TO AND USE OF SPONSOR’S DATA CENTER, SYSTEM, SOFTWARE, WEBSITE, OR ANY OTHER CHALLENGE-RELATED ELEMENT OR ACTIVITY,OR FROM YOUR ACCEPTANCE, RECEIPT, POSSESSION AND/OR USE OR MISUSE OF THE APPLICABLE PRIZE(S), AND (B) WITHOUT LIMITING THE FOREGOING, ALL ELEMENTS OF THE CHALLENGE ARE PROVIDED AS IS AND WITHOUT ANY WARRANTY, REPRESENTATION, OR GUARANTEE EXPRESS OR IMPLIED, IN FACT OR IN LAW, WITH RESPECT TO THE CHALLENGE OR APPLICABLE PRIZES, INCLUDING, WITHOUT LIMITATION, TO MERCHANTABILITY, QUALITY OR FITNESS FOR A PARTICULAR PURPOSE.

By entering the Challenge, each Participate agrees: (i) to be bound by the Official Rules and by all applicable laws, registration terms and conditions and decisions of Sponsor which shall be binding and final; (ii) to waive any rights to claim ambiguity with respect to the Official Rules; (iii) to waive all of his or her rights to bring any claim, action, or proceeding against Sponsor and its affiliates in connection with the Challenge; and (iv) to forever and irrevocably agree to release, defend, indemnify, and hold harmless Released Parties from any and all claims, lawsuits, judgments, causes of action, proceedings, demands, fines, penalties, liability costs and expenses (including, without limitation, reasonable outside attorneys’ fees) for any injuries, losses or damages of any kind to persons, including death, or property resulting in whole or in part, directly or indirectly, from: (a) the Challenge, including but not limited to any Challenge-related activity or element thereof, and the Participant’s entry, participation, or inability to participate in the Challenge, and (b) the violation of any third party privacy, personal, publicity, or proprietary rights.

8. LIMITATION OF LIABILITY

The Released Parties assume no responsibility for any damage to your computer system, laptop, or notebook, which is occasioned by accessing the Challenge data center, software, system, and/or Website or participating in the Challenge, or for any computer system, phone line, hardware, software, or program malfunctions, or other errors, failures, delayed computer transmissions or network connections that are human or technical in nature. Without limiting the generality of the foregoing, Sponsor is not responsible for lost, interrupted, inaccessible, or unavailable networks, servers, satellites, Internet Service Providers, websites, or other connections; or for miscommunications, failed, jumbled, scrambled, delayed, or misdirected computer, telephone, or cable transmissions; or for any technical malfunctions, failures, difficulties or other errors of any kind or nature; or for the incorrect or inaccurate capture of information, or the failure to capture any information. Sponsor reserves the right in its sole discretion to disqualify any individual who is found to be tampering with the entry process or the operation of the Challenge or the Challenge Website or system, to be acting in violation of the Official Rules, or to be acting in an unsportsmanlike or disruptive manner, or with the intent to disrupt or undermine the legitimate operation of the Challenge, or to annoy, abuse, threaten, or harass any other Participant or Sponsor, and Sponsor reserves the right to seek damages and other remedies from any such person to the fullest extent permitted by law.

9. INDEMNITY

To the maximum extent permitted by law, by participating in the Challenge, Participant agrees to indemnify the Released Parties from any liability, claim, demand, loss, damage, cost, and expenses arising from Participant’s non-compliance with the Official Rules for which Sponsor will or may become liable, including violation of third party rights, including without limitation, intellectual property, confidentiality, privacy, trade secret, and other rights.

10. FORCE MAJEURE

In the event Sponsor is prevented from awarding prize(s) or continuing with the Challenge as contemplated herein by any event beyond its control, including but not limited to fire, flood, natural or man-made epidemic, earthquake, explosion, labor dispute or strike, act of God or public enemy, satellite or equipment failure, computer or system failure, riot or civil disturbance, terrorist threat or activity, war (declared or undeclared) or any federal, state, or local government law, order, or regulation, public health crisis (e.g. SARS), order of any court or jurisdiction, or other cause not reasonably within Sponsor’s direct control (each a “Force Majeure” event or occurrence), then subject to any governmental approval which may be required, Sponsor shall have the sole right to modify, suspend, or terminate the Challenge. If the Challenge is terminated for Force Majeure before the designated end date or time, Sponsor may, if possible, select the winner(s) from the eligible, non-suspect Participants prior to such termination, modification, or suspension.

11. SEVERABILITY

The invalidity or unenforceability of any provision of the Official Rules shall not affect the validity or enforceability of any other provision. In the event that any provision is determined to be invalid or otherwise unenforceable or illegal, the Official Rules shall otherwise remain in effect and shall be construed in accordance with their terms as if the invalid or illegal provision were not contained herein.

12. CHOICE OF LAW

All issues or questions regarding the construction, validity, interpretation, and enforceability of the Official Rules, or the rights and obligations of the Participants and Sponsor in connection with the Challenge, shall be governed by, and construed in accordance with, the laws of Singapore without giving effect to any choice of law or conflict of law rules, which would cause the application of the laws of any jurisdiction other than the State of California. Participants agree that any demand, dispute, claim, or cause of action relating to the Challenge shall be resolved individually without resort to any form of class action and pursuant to Section 5 herein. Participants hereby consent to the jurisdiction and venue residing exclusively within the courts in Singapore.

Rules of Conduct

  1. Participants are expected to behave professionally at all times.
  2. Participants will not tamper with, modify, or attempt to manipulate any element of the competition including scoring and management systems.
  3. Denial of Service (DOS) attacks are not allowed.
  4. Participants will not reboot, shutdown, or intentionally disable the services or functions of the target systems.
  5. Participants will not conduct any offensive actions that scan, attack, or interfere with another participant's system.
  6. Participants will not enter another participant's workspace, nor attempt to deceive, hoax, or assist other participants by any means.
  7. Participants must compete without “outside assistance” from non-participants.
  8. Participants may not publicly disclose information about the competition or targets including flags or their means of obtaining them without the express written consent of Symantec.
  9. Participants understand that violation of this code of conduct or of these rules is grounds for their immediate dismissal and disqualification from the competition, as well as removal from the competition area.

Internet Usage

  1. Internet access may or may not be provided.
  2. Internet resources such as company websites, FAQs, and existing forum responses may be used during competition provided there are no fees, membership, or special access required. Only resources that could reasonably be available to all participants are permitted.
  3. All network activity that takes place on the competition network may be logged and subject to release.

Permitted Materials

  1. Participants may not connect more than one (1) laptop or notebook computer to the competition network unless specifically authorized to do so. Virtual machines may be used as long as only one (1) IP address is in use.
  2. Memory sticks, flash drives, removable drives, CD/DVD ROMS, electronic media, or other similar electronic devices are not allowed unless specifically authorized.
  3. Printed reference materials (books, magazines, checklists, etc.) are permitted.
  4. All competition materials, including equipment, handouts, and participant-generated reports and documents, must remain in the competition area unless specifically authorized. Only materials brought into the competition area may be removed after the competition concludes.

Questions and Disputes

  1. Participants should work with the competition staff to resolve any questions regarding the rules of the competition or scoring methods before the competition begins.
  2. Should any question arise about scoring, the scoring engine, or how they function, participants should immediately contact the competition staff.
  3. Protests must be presented in writing to the competition staff as soon as possible. The competition officials will be the final arbitrators for any protests or questions arising before, during, or after the competition. Rulings by the competition officials are final. All competition results are official and final as of the end of the competition.

Scoring

  1. Scoring will be based on completing tasks that will be provided throughout the competition. Participants accumulate points by successfully obtaining flags and entering them into the scoring system.
  2. Scores will be maintained by the competition officials and may be shared at the end of the competition. Running totals may be provided during the competition. Rankings for some portion of the top participants may be provided during the competition.
  3. Attacking or otherwise interfering with the scoring system is specifically prohibited.

Technical Requirements

1. Participants will provide their own laptop or notebook computer with the following minimum recommended requirements:

  • 1 Ghz Intel x86 compatible processor (2 Ghz with virtualization extensions recommended)
  • 2 GB of RAM
  • 20 GB of free disk space
  • Operating system including Windows 2000 or later, OS X 10.4.11 or later, Linux 2.4.10/2.6.4 or later, and/or Backtrack 4 or later
  • Virtualization, if desired, including VMware Workstation or Player (for Windows or Linux), VMware Fusion (for OS X), or VirtualBox (multiple OS')
  • The latest version of Java

2. Participants will provide their own ethical hacking toolkit, such as Backtrack.

Questions?

Contact us.