COVID-19, like a clever computer virus, doesn't go in breaking through the firewall, it infiltrates the network, silent, scanning for vulnerabilities to exploit.
Thankfully, we can understand a computer virus exactly... we know our network and we can see how the virus is affecting it... it's just maths in the end, we have enough knowledge to know exactly. Frighteningly, we don't understand nowhere close how the network of organisms and cells that make up our bodies functions, how do we secure our bodies, do our minds feature and what about all the invisible stuff? We are making progress with modern medicine but we surely have a way to go.
Like all problems exist looking for their solutions, what does the post virus world look like and what will the "new new South Africa" be like... more corrupt and less free or fulfilling it's original promise?
Join us for the #hackingthevirus #SS20Hack hackathon, running alongside the 1st virtual edition of the 17th annual ITWeb Security Summit, on 25-28 Aug 2020, where we work on building a better world, together, skills development with future generations, hack and have fun.Register to hack Register to Mentor
ITWeb’s Security Summit will once again provide a comprehensive update on the latest cyber and information security threats and solutions. Hear new best practices for cloud security, AI, IoT, blockchain, DevSecOps and more. Learn how to evolve your IT security, risk and governance strategy to support your business in the digital age.
On the sidelines of the ITWeb Security Summit, ITWeb and Geekulcha will be hosting a virtual - the 4th annual edition of the Security Summit Hackathon. For the Northern Cape, the Department of Economic Development and Tourism (DEDAT) and Sol Plaatje University will once again lead the provincial edition of the Hackathon.
Abstract: According to the World Internet Stats, Africa’s Internet Penetration stands at 39.8%, while this number is still relatively low, it does signal the growth and with growth comes possibilities that come with vulnerabilities. A key question lies around the skills and capacity to help manage the changes.
#hackingthevirus #SS20Hack The annual Security Summit Hackathon is attended by young, talented individuals who want to develop their skills through learning and innovation, and who have a passion for information security, machine learning (ML), artificial intelligence, IOT and other new age technologies. Young local techies will be building solutions that embody proactive security capabilities in helping project Africa's Digital Footprint.
#hackingthevirus #SS20Hack 24 - 27 August 2020 The Security Summit Hackathon is open to beginner, intermediate and advanced software developers to build information security skills that are aligned to industry needs. This is an effort to build capacity that can be imagined and build with the aim of mitigating risks in the ever-changing threat landscape.
#hackingthevirus #SS20Hack 24 - 27 August 2020 The Security Summit 2020 Hackathon will be taking place amid Covid-19 which is forcing everyone to adhere or adapt to a new normal. It is without a doubt that life will never be the same again with our social, civic, educational, economical, livelihoods and other aspects of our lives getting affected.
#hackingthevirus #SS20Hack will be used as an opportunity to challenge young local techies to: a) Build solutions under remote and collaborative setting. b) Learn and develop solutions that enable working or service access in a secure way. c) Help make life easy for citizens, with trust.
#hackingthevirus #SS20Hack Theme: Building Capability for the New Normal - Social and Work Life Teams are required to come up and build innovative solutions that adhere to best practices, standards and tools. Participants must be cautious that their solutions do not compromise the rights of the user and have least vulnerability to cyber threats.
#hackingthevirus #SS20Hack 24 - 27 August 2020 The following are aspects to help guide #hackingthevirus #SS20Hack working angle by the teams in their solutions.
#hackingthevirus #SS20Hack 24 - 27 August 2020
CTF (Capture The Flag) is a kind of information security competition that challenges contestants to solve a variety of tasks ranging from a scavenger hunt on wikipedia to basic programming exercises, to hacking your way into a server to steal data. In these challenges, the contestant is usually asked to find a specific piece of text that may be hidden on the server or behind a webpage.
CTF Challenge at SS20Hack
For a second year, the Security Summit Hackathon will feature a Capture The Flag Challenge led by Snode.
#hackingthevirus #SS20Hack 24 - 27 August 2020
To prepare the participants for the Hackathon, an IDEATHON event will be hosted on the first day of the hackathon, 24 August in Johannesburg and Kimberley, same time, for training and idea generation. A panel of industry leaders (consisting of Hackathon mentors at most) give training sessions for the participants to acquire concepts and guidance in development of their SS20Hack projects.
Summary of Action Plans with the IDEATHON
- First batch of submissions to be sent to mentors. Each team will be allocated to a mentor after evaluation.
- Mentors must choose ideas of interest, ultimately a team to mentor, based on: Innovativeness or novelty of the idea, related field, feasibility and security implementation plan.
- Teams will receive feedback and guidance from the mentors as well as to which mentor is allocated for their team
- A pre-hackathon Meeting/Brief to be done to ensure readiness
Opening, Rules and Schedule
Tiyani Nghonyama , COO, Geekulcha
Goals and objectives of the Hackathon
Ivan Regasek , ITWeb
Capture The Flag Challenge. QnA
Nithen Naidoo , CEO & Founder, Snode Technologies
Cyber risk awareness. QnA
Steve Jump , Cyber Risk Strategist, Coach and Advisor, Custodiet Advisory Services
Web Apps security. QnA
Ridewaan Hanslo , CSIR
InfoSec for Beginners - career goals. QnA
Nadia Veeran-Patel , Luna Secure
International Organisation of Standards related to Information and Cyber Security. QnA
Muhammad Ali, , WWise
What the Hack? A look at common vulnerabilities. QnA
Keitumetsi Tsotetsi , Geekulcha