On 31 October we’re staging a hair-raising student hackathon here at our Manchester HQ, aimed at bridging the skills gap in the cybersecurity industry.

In the first event of its kind in the North West, 50 computer science students from Edge Hill University will take part in a ‘real-life’ hacking challenge.  Taking place over the course of five hours, we will simulate the work carried out on a daily basis by penetration testers here at Secarma.

Ten teams will compete against each other. Their ghoul, or goal, is to find vulnerabilities in a replica of a real-life business IT environment, with points awarded for identifying weaknesses and providing recommendations for fixing the problem.

The exercise is formulated and organised by some of the world’s top ethical hackers and provides a window into the skills required to join the cybersecurity industry.

More cyber experts are needed to combat a sharp rise in data breaches, computer viruses and ransomware.  Government statistics reveal almost half (46%) of UK businesses suffered a cyber-attack in 2016.

Our Head of Education, says: “Cyber-attacks like this year’s WannaCry ransomware, which crippled the NHS, are becoming more frequent and more serious.  This hackathon is a bit of fun for Halloween but real cyber-attacks are extremely frightening. 

“We need to recruit more white-hat hackers to stay one step ahead of the criminals. By running an event like this we want to encourage more talent to take up a career in the cybersecurity industry.”

Secarma’s ultimate aim is to extend the hackathon to different universities and eventually establish a national inter-university challenge.

Secarma Chairman said: “It’s exciting to be hosting an event of this kind, inspiring young people to take up a career in tech and cybersecurity.  

“Barely a day goes by without a cyber-attack making headlines and the risks continue to grow.  It’s a fantastic opportunity for students to understand what a career in penetration testing involves alongside some of the best talent in the world.”

Latest

Looking for vulnerabilities in systems

Security Essentials Series – Vulnerability Scans vs Penetration Tests

Our Cyber security basics series continues with a look at whether your current situation requires vu...

Data protection

Security Essentials Series – Why is Cyber Essentials good for GDPR?

This Security Essentials Series blog focuses on data protection and why Cyber Essentials is a good s...

Origins of cybercrime

Security Essentials Series – 80% of Cyber Threats are Protected by Cyber Essentials

As we continue our focus on basic cyber protections, we delve into a little more detail on the CE st...