CTF for Girls
Singapore Second Edition
Contents
INTRODUCTION
As WoSEC organized last year the First CTF for Girls in Singapore, we want to improve our competencies of our community locally and advance diversity.
We are excited to present our plans for THE SECOND CTF FOR GIRLS EVENT in Singapore, and with the help of your valued contribution we are aiming to bring about greater awareness of this cause.
Meeting this goal is vitally important to bring much-needed help and awareness about capable and skilled women in the industry.
OBJECTIVES
- Create a platform for the top information security female pentesters and security professionals in Singapore
- Provide participants with a realistic hacking environment
- Provide participants with motivation and inspiration to continue exploring their journey in cyber security
- Encourage newcomers to join the field
EVENT DETAILS
OVERVIEW
SIZE
We are expecting max 200 attendees and 100 participants. Individual teams will be formed.QUALIFICATION
Professionals and students, 18 years + are invited to the event.LENGTH
The event will span across 2 days. Registration starts at 10am and the actual competition begins at 11am. The competition will end 24 hours later.DATES
The qualifiers for the event will be held on the 12/13th of September 2020.PROPOSED VENUES
The competition will be hold virtually, livestreamed on YouTube.MANPOWER REQUIRED
For the previous run, a team of 5 people will be required for over 200 participants involved.LOGISTICS
We will need full Wi-Fi access in addition and non-restrictive Internet.FOOD
No food will be distributed.RISKS
MISUSE OF KNOWLEDGE
We do not condone the use of knowledge taught in this course for malicious purposes. Hence, although we cover much breadth in our scope and reflects reality as much as possible, we will repeatedly emphasize on a more important aspect: defence. A good portion of points in the CTF will come from knowing how to harden a system, an important skill that secures a system from attacks. Furthermore, participants must sign waiver forms to ensure prevention of misuse of knowledge here.OVERALL SCHEDULE
DAY 1
10:00am – Registration, Distribution of Contest Instructions and Lunch11:00am – Opening Address
11:30pm – Competition
1:00pm – Lunch Break
7:00pm – Dinner & Networking / Keynote Speaker
8pm-7am – Competition
7am – Sharing of Initial Results
11am – End of Competition
11am – Keynote Speaker
12:00pm – Closing Speech & Prize Presentation
TOPIC DOMAINS: CCTV, Video Surveillance, Standards
Video Surveillance System StandardsÂ
Vlado Damjanovski
Author, Lecturer, CCTV Expert
ViDi Labs
Join one of the world’s most renown CCTV specialists and dive into the latest Video Surveillance Standards, AS/NZS 62676. The newly adopted IP VSS standard is based on IEC 62676-5 and measures CCTV camera resolution in a slightly different manner to what was the case in the past. Over the past 35 years of professional CCTV activity Vlado has sought to educate, clarify and demystify the science of CCTV and this session is intended to add some clarity about the latest standards and applications.
Duration – 30 – 60 minutes – incl Q&A
TOPIC DOMAIN: Cyber Security , Awareness, Remote Working
Security Awareness for Remote Workforce
Â
Chirag D Joshi, M.S., CISA, CISM, CRISC, author of ‘7 Rules to Influence Behaviour and Win at Cyber Security Awareness‘Â
Working remotely is inherently different than in the office. Especially when it becomes the norm, as opposed to an occasional event.
Join Chirag for this session as he discusses practical ways to maintain security awareness and promote secure behaviour in these times. After all, most cyber incidents occur due to human errors and mistakes, not complicated technical exploits.
Duration – 30 – 60 minutes – incl Q&A
Â
Â
Â
TOPIC DOMAINS: Cyber Security, Industrial Control Systems, Business Continuity
Effective Business Continuity Preparedness and Disaster Recovery Preparedness for Industrial Control Systems
Daniel Ehrenreich, B.Sc. Engineering, ISO27001 Lead Auditor.
Secure Communications and Control Experts Reliable and safe operation of Industrial Control Systems (ICS) and Supervisory Control and Data Acquisition (SCADA) systems are considered critical for a broad range of industries supporting the wellbeing on a national level. The growing convergence of IT and ICS, long-time separated domains, calls for a special attention and adoption of ICS-oriented best practices.
That being said, these functionalities can be jeopardised internally by an incentivised individual, or through remote access by a hostile organisation; Hence appropriate preventive measures should be taken to mitigate these breaches and minimize possible damages.
Duration – 30 – 60 minutes – incl Q&A
TOPIC DOMAINS: Criminology, Crime, Security Applications
Offenders – what’s their story
Â
Martin Gill – Criminologist
Join Professor Martin Gill, a renowned Criminologist and researcher discussing crime and security with insight from the offender’s perspective. How do offenders select their targets and how should the security industry and organisations posture themselves to present the greatest deterrence.Â
Duration – 30 – 60 minutes – incl Q&A
Media Channels
As the dedicated media provider to the security industry, we are a primary source of information and reference for security industry professionals, as well as end-users. We engage, educate and listen to our audience across multiple channels to provide the best marketing reach. We work with you to help communicate your message. Stay updated by downloading the app today!