On 31 October we’re staging a hair-raising student hackathon here at our Manchester HQ, aimed at bridging the skills gap in the cybersecurity industry.

In the first event of its kind in the North West, 50 computer science students from Edge Hill University will take part in a ‘real-life’ hacking challenge.  Taking place over the course of five hours, we will simulate the work carried out on a daily basis by penetration testers here at Secarma.

Ten teams will compete against each other. Their ghoul, or goal, is to find vulnerabilities in a replica of a real-life business IT environment, with points awarded for identifying weaknesses and providing recommendations for fixing the problem.

The exercise is formulated and organised by some of the world’s top ethical hackers and provides a window into the skills required to join the cybersecurity industry.

More cyber experts are needed to combat a sharp rise in data breaches, computer viruses and ransomware.  Government statistics reveal almost half (46%) of UK businesses suffered a cyber-attack in 2016.

Our Head of Education, says: “Cyber-attacks like this year’s WannaCry ransomware, which crippled the NHS, are becoming more frequent and more serious.  This hackathon is a bit of fun for Halloween but real cyber-attacks are extremely frightening. 

“We need to recruit more white-hat hackers to stay one step ahead of the criminals. By running an event like this we want to encourage more talent to take up a career in the cybersecurity industry.”

Secarma’s ultimate aim is to extend the hackathon to different universities and eventually establish a national inter-university challenge.

Secarma Chairman said: “It’s exciting to be hosting an event of this kind, inspiring young people to take up a career in tech and cybersecurity.  

“Barely a day goes by without a cyber-attack making headlines and the risks continue to grow.  It’s a fantastic opportunity for students to understand what a career in penetration testing involves alongside some of the best talent in the world.”

Latest

Securing Financial Transactions in the Digital Age

The digital revolution has radically changed how we both handle our money and the steps to securing ...

The Role of AI in Cybersecurity Friend or Foe

In this article, we'll explore the role of AI in Cybersecurity the potential benefits it provides, a...

Consulting on IoT and PSTI for manufacturers

IOT Self-Statement of Compliance for PSTI?

Often when our IoT consultants find themselves deep in conversation about the Product Security and T...