{"id":8385,"date":"2015-03-12T02:15:58","date_gmt":"2015-03-12T09:15:58","guid":{"rendered":"https:\/\/www.paloaltonetworks.com\/blog\/?p=8385"},"modified":"2015-03-12T09:08:32","modified_gmt":"2015-03-12T16:08:32","slug":"supporting-best-brightest-amateur-cybersecurity-talent","status":"publish","type":"post","link":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/2015\/03\/supporting-best-brightest-amateur-cybersecurity-talent\/","title":{"rendered":"Supporting the Best and Brightest Amateur Cybersecurity Talent"},"content":{"rendered":"<p>By some measures, cybersecurity can be like playing the ultimate multi-level pinball: sweat runs down your brow as you fend off one attack after the other, trying to not let anything through.<\/p>\n<p>Unfortunately, testing cybersecurity chops isn't as simple as pumping a fistful of change through your favourite machine down at the arcade. For the unlucky few the only true test is carried out live and without notice, with money, reputations, or even lives at stake.<!--more--><\/p>\n<p>Which is why initiatives like this week\u2019s <a href=\"http:\/\/cybersecuritychallenge.org.uk\/cyber-terrorist-attack-simulation-to-test-the-uks-brightest-amateur-online-defenders\/\" rel=\"nofollow,noopener\"  target=\"_blank\">Cyber Security Challenge<\/a> are so important to our industry. Palo Alto Networks, in partnership with BT, is proud to support and help design this year's final \u2013 also known as the Masterclass \u2013 in which 42 of the United Kingdom\u2019s brightest up-and-coming industry talent will have their mettle tested in a live cybersecurity exercise.<\/p>\n<p><center><div style=\"max-width:100%\" data-width=\"230\"><span class=\"ar-custom\" style=\"padding-bottom:30.43%;\"><img loading=\"lazy\" decoding=\"async\"  class=\"aligncenter wp-image-8386 size-medium lozad\"  data-src=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/03\/cyber-security-challenge-230x70.jpg\" alt=\"cyber security challenge\" width=\"230\" height=\"70\" srcset=\"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/03\/cyber-security-challenge-230x70.jpg 230w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/03\/cyber-security-challenge-500x152.jpg 500w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/03\/cyber-security-challenge-510x155.jpg 510w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/03\/cyber-security-challenge-131x40.jpg 131w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/03\/cyber-security-challenge.jpg 555w\" sizes=\"auto, (max-width: 230px) 100vw, 230px\" \/><\/span><\/div><\/center>&nbsp;<\/p>\n<p>Starting today, the 48-hour final is the culmination of more than 10 months of qualifying rounds from the Cyber Security Challenge UK. Thousands of participants are now just a few dozen of the UK\u2019s most talented amateur cyber defenders.<\/p>\n<p>Our collaboration with BT on this initiative highlights our partnership in the UK, whereby our full next-generation Enterprise Security Platform is available to BT customers.<\/p>\n<p>In today\u2019s scenario, participants will compete aboard the HMS Belfast to take back control of gun systems that have been taken over by a fictitious cyber terrorist group, and pointed at London\u2019s City Hall. Our amateur cyber defenders have two days to identify how the group broke into a simulated network, and regain control by exploiting accurate vulnerabilities placed there by the scenario designers. They will also need to search for similar gaps in other vital city systems to ensure they\u2019re not exploited by the group.<\/p>\n<p>The Masterclass highlights the need to talk about cybersecurity in terms of both detection and prevention, because ultimately the best risk mitigation is a talent pool of experts backed by an integrated system which allows them to see and manage threats at every point in the network.<\/p>\n<p>We\u2019re excited to help identify the best and brightest, and look forward to welcoming them into the industry as we\u2019re certain they\u2019ll do great things once they emerge from the arena.<\/p>\n<p><em>If you\u2019d like to participate in next year\u2019s challenge, registration opens on Monday, 16 March via <\/em><a href=\"https:\/\/cybersecuritychallenge.org.uk\/registration\/\" rel=\"nofollow,noopener\"  target=\"_blank\"><em>https:\/\/cybersecuritychallenge.org.uk\/registration<\/em><\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>By some measures, cybersecurity can be like playing the ultimate multi-level pinball: sweat runs down your brow as you fend off one attack after the other, trying to not let anything through. &hellip;<\/p>\n","protected":false},"author":40,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[155,133,484],"tags":[1110,1109],"coauthors":[716],"class_list":["post-8385","post","type-post","status-publish","format-standard","hentry","category-cybersecurity-2","category-events","category-government","tag-cyber-security-challenge","tag-masterclass"],"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/8385","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/users\/40"}],"replies":[{"embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/comments?post=8385"}],"version-history":[{"count":5,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/8385\/revisions"}],"predecessor-version":[{"id":8399,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/8385\/revisions\/8399"}],"wp:attachment":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/media?parent=8385"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/categories?post=8385"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/tags?post=8385"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/coauthors?post=8385"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}