Eskenzi PR ad banner Eskenzi PR ad banner
  • About Us
Friday, 22 September, 2023
IT Security Guru
Eskenzi PR banner
  • Home
  • Features
  • Insight
  • Channel News
  • Events
    • Most Inspiring Women in Cyber 2022
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us
No Result
View All Result
  • Home
  • Features
  • Insight
  • Channel News
  • Events
    • Most Inspiring Women in Cyber 2022
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us
No Result
View All Result
IT Security Guru
No Result
View All Result

“Snowden” wins US Department of Defense’s Cyber Security Challenge

by The Gurus
October 5, 2020
in Editor's News
Share on FacebookShare on Twitter

A tech support officer from the University of Huddersfield has been crowned the top civilian in the 2013 Cyber Security Challenge’s DC3 Digital Forensics Challenge.

Designed by the US Department of Defense Cyber Crime Centre, the Digital Forensics Challenge is a team competition but winner Glyn Snowden entered on his own and was second only to a group of four from Northrop Grumman, making him the highest-ranked civilian in the competition.

The competition requires participants to develop their own tools and scripts, and he completed all of the challenges using only Microsoft Word, open source, freeware and demo software. The exercises required entrants to submit answers and accompanying methodologies to solve puzzles, ranging from image geo tagging analysis, data obfuscation, password recovery, file encryption and advanced steganography.

Snowden has entered this challenge twice before and he competed in the Cyber Security Challenge 2013 Masterclass, which was led by HP and Cassidian. “The only part of my role that requires these skills is when the university staff and students come to me with malware on their computers. I’m able to use the skills I’ve acquired to remove malicious programmes and make their systems more secure,” he said.

“I receive great satisfaction from solving the puzzles involved in analysing, recovering and identifying the artifacts in cyber security. I’ve always been interested in cyber security and now that the internet is such a huge part of our daily lives I believe that it’s important for everyone to understand what it means to be safe online.”

Glyn receives a place on a career-enabling 7Safe university-accredited training course in Application Security Testing worth over £2,000. The three-day course involves learning how to identify security vulnerabilities in web applications such as web-based email and shopping websites.

Stephanie Daman, CEO, Cyber Security Challenge UK said: “It is fantastic to see a UK candidate scoring so highly again and Glyn’s success is remarkable when you consider that he was up against teams of military security professionals.

“The DC3 competition challenges the best of the best and we’re encouraged that there were so many UK entrants this year, reflecting the wealth of untapped cyber talent we have here. Competitions such as DC3 and the Cyber Security Challenge mirror real-life cyber security breaches and are important in giving amateurs a safe environment to test their skills.”

Richard Allen, Education Business Development Manager at 7Safe a PA Group company, said “With cyber attacks increasing in number and severity we’re pleased to be involved in an initiative that is actively encouraging new talent into the sector. For people with natural ability such as Glyn, gaining industry-recognised qualifications is the next step to a career in this exciting profession.”

FacebookTweetLinkedIn
ShareTweet
Previous Post

Second anniversary of Cyber Security Strategy sees Government move to work with private sector

Next Post

Dell integrate technologies to offer enterprise mobility management concept

Recent News

WatchGuard

WatchGuard acquires CyGlass for AI-powered network anomaly detection

September 21, 2023
'open' sign on window ledge

SME Cyber Security – Time for a New Approach?

September 21, 2023
Keeper Security Logo

Keeper Security Named a Market Leader in Privileged Access Management (PAM) by Enterprise Management Associates

September 21, 2023
Synopsys leader in AppSec

Synopsys Recognised as a Leader in Static Application Security Testing by Independent Research Firm

September 20, 2023

The IT Security Guru offers a daily news digest of all the best breaking IT security news stories first thing in the morning! Rather than you having to trawl through all the news feeds to find out what’s cooking, you can quickly get everything you need from this site!

Our Address: 10 London Mews, London, W2 1HY

Follow Us

© 2015 - 2019 IT Security Guru - Website Managed by Calm Logic

  • About Us
No Result
View All Result
  • Home
  • Features
  • Insight
  • Channel News
  • Events
    • Most Inspiring Women in Cyber 2022
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us

© 2015 - 2019 IT Security Guru - Website Managed by Calm Logic

This site uses functional cookies and external scripts to improve your experience.

Privacy settings

Privacy Settings / PENDING

This site uses functional cookies and external scripts to improve your experience. Which cookies and scripts are used and how they impact your visit is specified on the left. You may change your settings at any time. Your choices will not impact your visit.

NOTE: These settings will only apply to the browser and device you are currently using.

GDPR Compliance

Powered by Cookie Information