INTERNATIONAL CYBERSECURITY
CHAMPIONSHIP & CONFERENCE
What is the
International Cybersecurity Championship & Conference?
Addressing Talent Development and Workforce Upskilling Through Gaming
Connect with top cybersecurity experts from around the world while experiencing the excitement of cybersecurity-oriented esports. Seven teams of cyber athletes ages 18-25 will represent over 65 nations in a final championship. In addition to the 600-700 expected attendees, the games will be live-streamed on Twitch to thousands of fans.
As if the action of the games wasn't enough, our speaker lineup will keep you on the edge of your seats. They include leading cyber experts from the US Department of Homeland Security, EU, UAE, Microsoft, Mastercard, Google & Mandiant, and more! These global speakers from governments, corporations, and academia will discuss topics including:
- The power of global collaboration to cultivate a strong, diverse cyber workforce.
- The importance of aligning academia and corporations with cyber games and exercises that drive needed job skills.
- The role of cyber games and exercises for building resilience into our risk strategies.
CONGRATULATIONS!!!
1ST PLACE - TEAM EUROPE
2ND PLACE - TEAM OCEANIA
3RD PLACE - TEAM ASIA
CONGRATULATIONS TO ALL OF THE TEAMS COMPETING IN THE 2023 CHAMPIONSHIP.
EXPERT CYBER TALKS
Nitin Natarajan
Deputy Director, CISA
Rodney J. Petersen
Director, NICE
Despina Spanou
Head of Cabinet for European Commission Vice President Margaritis Schinas
H.E. Dr. Mohamed Al-Kuwaiti
Head of Cyber Security, United Arab Emirates Government (UAE)
-
ERIC BELARDO
Founder of RaicesCyberOrgAdd CTA: Insert > Call-to-Action. Please remove this text. -
PING LOOKDirector, Training & Communications, Microsoft Incident Response Team (formerly DART)Add CTA: Insert > Call-to-Action. Please remove this text.
-
JON BRICKEY, Ph.D.
Senior Vice President & Cybersecurity Evangelist, Mastercard TechnologyAdd CTA: Insert > Call-to-Action. Please remove this text. -
JESSICA GULICKFounder & CEO, PlayCyberAdd CTA: Insert > Call-to-Action. Please remove this text.
-
MATT BERRY
Sr. Director, Field CTO of Cybersecurity, World Wide Technology (WWT)Add CTA: Insert > Call-to-Action. Please remove this text. -
ANGUS BLITTER
Packet Master and Creator of PacketwarsAdd CTA: Insert > Call-to-Action. Please remove this text. -
DANIELLE SANTOSManager of Communications & Operations / Lead for International Engagement, NICEAdd CTA: Insert > Call-to-Action. Please remove this text.
-
TOMÁS MALDONADOCISO, NATIONAL FOOTBALL LEAGUE (NFL)Add CTA: Insert > Call-to-Action. Please remove this text.
-
CARLOS POLOPHacking Content Creator, HalbornAdd CTA: Insert > Call-to-Action. Please remove this text.
-
SIMRAN SAKRANEYCyber Security Strategic Advisor, Google & MandiantAdd CTA: Insert > Call-to-Action. Please remove this text.
-
RON PIKE
Associate Professor & Director, California Center for Cyber Risk, Cal Poly PomonaAdd CTA: Insert > Call-to-Action. Please remove this text. -
DR. AMIT ELAZARI, J.S.D.Co-Founder and CEO, OpenPolicyAdd CTA: Insert > Call-to-Action. Please remove this text.
-
ERIC BASUFounder and CEO, Haiku IncAdd CTA: Insert > Call-to-Action. Please remove this text.
-
DAVID ZEICHICKCommissioner of the National Cyber League and Assistant Professor, Computer Science, California State University - ChicoAdd CTA: Insert > Call-to-Action. Please remove this text.
-
DMITRIY BERYOZASenior Security Researcher, Vectra AIAdd CTA: Insert > Call-to-Action. Please remove this text.
-
PETER HAYPrincipal Security Strategist, SimSpaceAdd CTA: Insert > Call-to-Action. Please remove this text.
-
ATTLEE GAMUNDANI, Ph.DAssociate Professor, Namibia University of Science and TechnologyAdd CTA: Insert > Call-to-Action. Please remove this text.
-
NADEAN TANNERSenior Manager, Education Services, Google/MandiantAdd CTA: Insert > Call-to-Action. Please remove this text.
-
DAN MEACHAMVP, Global Security and Operations, CSO / CISO, Legendary EntertainmentAdd CTA: Insert > Call-to-Action. Please remove this text.
-
SCOTT GIKINGChief Information Security Officer,
Hyundai AutoEver AmericaAdd CTA: Insert > Call-to-Action. Please remove this text. -
CHASE FRAZEMChief Information Security Officer,
VP of IT Risk Management, Sharp HealthCareAdd CTA: Insert > Call-to-Action. Please remove this text. -
ANTONIO "T" SCURLOCKDeputy Chief Learning Officer (CLO), CISAAdd CTA: Insert > Call-to-Action. Please remove this text.
-
KRISTIN DEMORANVILLECEO & Founder, AnzenSageAdd CTA: Insert > Call-to-Action. Please remove this text.
-
JOSH BRUNTYAssociate Professor, Marshall UniversityAdd CTA: Insert > Call-to-Action. Please remove this text.
-
JONATHAN BEHNKEChief Information Officer, City of San DiegoAdd CTA: Insert > Call-to-Action. Please remove this text.
-
JON CHECKExecutive Director, Cyber Protection Solutions, Raytheon Intelligence & SpaceAdd CTA: Insert > Call-to-Action. Please remove this text.
-
NICK IPPOLITOTraining Labs Architect, Hack The Box (HTB)Add CTA: Insert > Call-to-Action. Please remove this text.
-
DEMOSTHENES IKONOMOUHead of Capacity Building Unit, ENISAAdd CTA: Insert > Call-to-Action. Please remove this text.
-
DR. IOANNIS AGRAFIOTISCybersecurity Expert at European Union Agency for Cybersecurity (ENISA)Add CTA: Insert > Call-to-Action. Please remove this text.
-
DR. JOSH BRUNTYAssociate Professor & Director of the Cyber Forensics & Security Graduate Program. Marshall UniversityAdd CTA: Insert > Call-to-Action. Please remove this text.
-
ZACHARY WILLIAMSFCC/C10F INOCCS Lead, NIWC Pacific Cybersecurity Division StaffAdd CTA: Insert > Call-to-Action. Please remove this text.
-
BRIAN SAKTechnical Solutions Architect, CiscoAdd CTA: Insert > Call-to-Action. Please remove this text.
-
STEWART KINGIndustry Advisor, Tata Consultancy ServicesAdd CTA: Insert > Call-to-Action. Please remove this text.
Join us at the Conference: Expert CYBER Talks
CONFERENCE AGENDA
Schedule subject to change
8:30AM - 8:50AM |
Welcome & Opening Remarks Eric Belardo, Executive Director and Founder, Raices Cyber Org
Jessica Gulick, Commissioner, US Cyber Team
|
8:50AM - 9:00AM |
Opening AnnouncementsJonathan Behnke, CIO for the City of San Diego Department of Information Technology
|
9:00AM - 9:30AM |
Coaches PanelJoin us for a conversation with a few of our team coaches. Moderator: Eric Belardo, Executive Director and Founder, Raices Cyber Org Panelists:
|
9:45AM - 10:30AM |
Changing the Game: Why Innovation is the Key to SuccessDan Meacham, VP, Global Security and Operations, CSO / CISO at Legendary Entertainment
|
10:40AM - 11:00AM |
Cloud: A Game Changer For Red Teaming & PrivacyCarlos Polop Martin, Hacking Content Creator, Halborn |
11:10AM - 11:55AM |
D1 CyberA panel of academic leaders discusses the use of cyber games in academia. Moderator: Dan Manson, Chairman at NCL, Inc. Panelists:
|
1:45PM - 3:45PM |
WWT presents Cisco XDR Capture the Flag WorkshopThis workshop will introduce you to Cisco XDR, a new product that supercharges your SecOps teams by correlating data and telemetry from your email, network, cloud, workloads, and endpoints enabling visibility and context into advanced threats. Come compete in this CTF-style activity where you earn points by uncovering details about simulated incidents and use the tools to respond to threats in the environment. |
8:45AM - 9:05AM |
Arena Keynote:Rodney J. Petersen, Director, NICE Introduction by Jon Check, Executive Director, Cyber Protection Solutions, Raytheon Intelligence & Space |
9:45AM - 10:15AM |
Building High-Performing Cyber TeamsSecurity executives discuss how they cultivate high-performance cyber teams through team training, cyber games, and exercises. Moderator: Tomás Maldonado, CISO, NFL Panelists:
|
10:30AM - 10:45AM |
US Cyber Team Sponsor RecognitionJessica Gulick, Commissioner of the US Cyber Team would like to thank and recognize sponsors and partners for their support. |
10:50AM - 11:20AM |
Cyber Implications of the Rise of AIJulian Zottl, Chief Technology Officer, Raytheon Technologies |
11:30AM - 12:00PM |
Getting Value From Cyber ExercisesSimran Sakraney, Cybersecurity Consultant, and Nadean Tanner, Senior Manager, Education Services at Google/Mandiant |
1:45PM - 2:30PM |
Cyber Ranges: Building, Operating, And MaintainingAngus Blitter, Packet Master and Creator of Packetwars, and Matt Berry, Senior Director (Global Field Cyber CTO) at WWT |
8:45AM - 9:05AM |
Arena KeynoteNitin Natarajan, Deputy Director, Cybersecurity and Infrastructure Security Agency (CISA) United States Department of Homeland Security Introduction by Jon Brickey Ph.D., Senior Vice President, Cybersecurity Evangelist, Mastercard Technology |
9:15AM - 9:45 AM |
Featured Fireside Chat With HE DR. Mohamed Hamad Al-KuwaitiAntonio "T" Scurlock, Deputy Chief Learning Officer at CISA, discusses the UAE Cybersecurity Council’s award-winning Cyber Pulse initiative, which provides cyber culture awareness on a national level, with HE DR. Mohamed Hamad Al-Kuwaiti. |
9:45AM - 10:25AM |
Achieving Resilience In Critical InfrastructureCritical infrastructure security executives discuss the need for continuous team training and exercises as a vital part of their risk management strategies. Moderator: Jon Brickey Ph.D., Senior Vice President, Cybersecurity Evangelist, Mastercard Technology Panelists:
|
10:30AM - 11:10AM |
Unlocking Cyber Potential — Cyber Athlete & Game Maker PanelA panel of gamers and game makers discuss the evolution of cyber games and its future. Moderator: Ping Look, Director, Training & Communications at Microsoft Incident Response Team Panelists:
|
11:20AM - 12:00PM |
Hacking Policy and Policy Hacking — A Hacker Guide to the Universe of Cyber PolicyDr.Amit Elazari, Co-Founder and CEO of OpenPolicy, will discuss how Cybersecurity Policy has transformed our industry globally. This domain also serves as an amazing opportunity to drive impact at scale and collaborate with the hacker ecosystem to drive better policies and better security – that advance all users. This talk invites the audience to explore the latest trend in cyber policy globally, focusing on areas such as secure development, workforce, vulnerability disclosure, product security, and anti-hacking laws. We will cover the latest developments from the National Cyber Security Strategy to the EU Cyber Resilience Act – and introduce the audience to the world of policy hacking, and policy “hacking”. |
1:45PM - 2:30PM |
Featured Fireside Chat with Despina Spanou, Head of Cabinet for European Commission Vice President Margaritis SchinasNICE's Danielle Santos discusses the EU's Cybersecurity Skills Academy Initiatives with Despina Spanou. |
INTERNATIONAL CYBERSECURITY CHALLENGE
7 TEAMS COMPETE IN cAPTURE THE fLAG, ATTACK & dEFENSE, AND HARDWARE SECURITY
Join us at the Conference: INTERNATIONAL CYBERSECURITY CHALLENGE
Cybersecurity
Games
Training
Platforms
Cybersecurity
Escape Rooms
Don't Miss This Special Feature
CISA INL Escape Room
CISA and Idaho National Lab will host an immersive Escape Room adventure to test your cybersecurity and infrastructure protection skills.
This Escape Room will challenge you through a series of traditional time-bound challenges for all skill levels. Cybersecurity puzzles involve wireless technologies, Open Source Intelligence (OSINT) analysis, database exploitation, network discovery, industrial control systems, cryptography, Arduino backed puzzles, and more. Come have fun while learning more about cybersecurity with CISA and Idaho National Lab.
Limited spots available. Event registration required.
WHAT IS IC3?
The International Cybersecurity Championship and Conference (IC3) event is designed to attract top talent and raise global awareness of the power of games to upskill the cybersecurity industry.
Through its exciting, competition-based forum, the IC3 helps individuals further their cybersecurity education and skills. IC3 is designed with three primary components. The first is a speaker session showcasing top leaders in Cybersecurity Games and Exercises from around the world. The second is the hands-on expo of cyber games, immersive training, and exercises. Finally, the program includes the 2023 International Cybersecurity Challenge (ICC), a championship tournament featuring global teams (25 years and younger).
The cybersecurity championship tournament is composed primarily of capture-the-flag and attack-and-defend games. It is an annual challenge that moves from country to country each year and is organized by the ENISA International Cybersecurity Challenge Program (ICC). Teams representing global regions travel to this multiday event to compete in challenges related to web application and system exploitation, cryptography, reverse engineering, hardware challenges, and attack/defense.
Championship Game Platforms Providers
METACTF creates hands-on, interactive, and learning-based cybersecurity training that makes it easy to skill up your workforce. Our training platform breaks down complex cybersecurity concepts into engaging challenges that simulate real-world scenarios. Learn more at https://metactf.com/companies. Learn More
At Traboda, our team of cyber-security experts offers tailored solutions that ensure your organization remains secure. With our portfolio of products and services catering to recruitment, training, automation and auditing needs, we have an end-to-end solution to your organization's security. Our proven expertise and support help you stay ahead in the ever-evolving world of cyber-security. Choose us as your trusted partner for the highest levels of security and peace of mind. Learn more at https://traboda.com/. Learn More