CyberSEED 2015

Emerging Cybersecurity Trends in Cloud, IoT and Mobility

October 29-30 at UConn

ABOUT CYBERSEED

Hosted by the Comcast Center of Excellence for Security Innovation at the University of Connecticut (CSI), CyberSEED brings together top information security professionals and business leaders to discuss emerging cybersecurity trends and formulate best strategies for tackling current and future threats. In the same academic setting, dozens of universities and colleges compete in unique cybersecurity challenges for prizes.

PARTICIPANTS

SCHOOLS

SESSIONS

SPEAKERS

SPEAKERS

Bruce Schneier

Featured Keynote Speaker

Bruce Schneier

Author; Fellow, Berkman Center for Internet & Society, Harvard Law School; Program Fellow, New America Foundation's Open Technology Institute

SCHEDULE

VENUE

CyberSEED is happening in the Rome Commons Ballroom at the UConn Storrs Campus.

626 Gilbert Road Ext.

Storrs, CT 06269

MORE INFO

Accommodations

Getting here

Nearby hotels

Route from airport

Flying: Bradley International Airport (BDL) serves the greater Hartford area.

 

Parking: If you're staying at the Nathan Hale Inn, there is available parking adjacent to the hotel after you check in. Otherwise, the South Garage (paid parking) is within a 5-minute walk.

  • Nathan Hale Inn (On-Campus)
  • Best Western Regent Inn
  • Holiday Inn Express Vernon-Manchester
  • Quality Inn Vernon
  • Baymont Inn & Suites Manchester
  • Residence Inn by Marriott Manchester

Take S-91 toward Hartford. Take exit 35A I-291E toward Manchester. Follow signs for I-84E/Boston. On I-84 take exit 68 CT-195 toward Tolland/Mansfield. Turn right onto CT-195S/Merrow Rd. Follow for 7 miles. Turn right onto Bolton Road. The Rome Commons Ballroom is on the right.

SPONSORS

MAIN ORGANIZERS

INDUSTRY PARTNERS

COMMUNITY PARTNERS

BECOME A SPONSOR

Interested in becoming a sponsor? Learn about opportunities and benefits.

REQUEST INFO

PARTICIPATING SCHOOLS

Sign up with your email address and be the first to get updates

Submitting Form...

The server encountered an error.

Subscription confirmed!

Competitions FAQ

Past events photos

Are you prepared for CyberSEED? View video to see CyberSEED in action.

The inaugural CyberSEED Conference was in 2014. View 2014 speakers.

  •                About the Cybersecurity Challenges

    The security of computer systems, relying on all the components in the system, including hardware, software, and network among them, is as strong as the weakest link. For this year's CyberSEED competitions, Comcast is sponsoring a series of cybersecurity challenges that address various parts of the computing infrastructure, including network, software, hardware, and - possibly the weakest link of all - humans.

     

    Please note: Students are advised to sign up for either the Capture the Flag Challenge or the Social Engineering Challenge. We recommend not signing up for both of these challenges as they are strenuous competitions. However, all students can sign up for the Internet of Things Challenge.

  •                Capture the Flag Challenge

    The Capture the Flag Challenge is an immersive, interactive competition that uses realistic IT infrastructure to simulate the current threat landscape. Designed for many levels of technical skill and experience, the competition puts participants in the hackers’ shoes to understand their technology and thought processes.

     

    Sponsored by Symantec, the Capture the Flag Challenge asks teams to attack a virtual corporate network in a series of progressively more difficult penetration exercises.  The competition is intended for high-school and college teams.

     

    Participants have the opportunity to:

     

    • Sharpen security skills such as forensics, penetration testing, and more
    • Expand security awareness
    • Learn and try new techniques
    • Compete against their peers for prizes and bragging rights

     

  •                Social Engineering Challenge

    Sometimes, it's not all about technical skills to break into a system.

     

    Are you able to focus your social engineering skills to extract enough useful data from social networks to use in a spear-phishing attack?

     

    The Social Engineering Challenge asks teams to retrieve various bits of information through a number of non-traditional techniques. Additionally, teams will also be expected to propose policies and mitigation methods to guard against any attacks that they were able to exploit. The competition is intended for high-school and college teams.

  •                Internet of Things Challenge

    Today’s electronic systems are universal platforms that increasingly play a role in our daily lives and have enabled previously unimaginable applications such as the Internet of Things (IoT). For instance, Comcast is taking advantage of the enhanced capabilities of smart phones and set-top boxes with apps that give users remote control of their home appliances (lights, thermostat, etc.), the ability to monitor the location of other family members, and other capabilities. Since these IoT devices are going to be embedded in our daily life, the security of these devices must be iron-clad.  However, as these devices are new and often not “battle-tested,” there are often vulnerabilities that can be exploited by malicious hackers.  Recent IoT hacks include the Nest Thermostat, automobile insurance dongles, and ZigBee Home Automation network.

     

    In the IoT Challenge, teams from universities around the world are invited to probe an IoT device of their choice and present their findings at CyberSEED. What private information can you glean from the device? Can you exploit a vulnerability to gain control of the device or other devices on the network? Does the device have hidden functionalities that you can expose to give you access to enhanced services? Are there any safety implications because of security holes in the device – e.g. disabling fire alarms in a home?

     

    View the OWASP IoT Top 10 Projects for some ideas on where to look for vulnerabilities.

     

    How do you participate?

     

    First, your team must register for the challenge.

     

    Teams must submit a ‘letter of intent’ to cyberseed@engr.uconn.edu by October 2, 2015.  This letter should contain the following information:

    • Description of device
    • Name of team
    • Expectations of Security Investigation

     

    Teams should submit, by October 23, 2015, a report discussing their exploit to the CyberSEED IoT challenge. The report should contain the following elements:

    • Description of device
    • Discovered Security Vulnerabilities
    • Demonstrated Exploits based on Vulnerabilities
    • Impact of Exploits – financial, safety, privacy, etc.
    • Suggested Mitigations

     

    Teams will then present their findings at CyberSEED 2015, at the University of Connecticut, Storrs, CT, to a panel of judges. Travel and accommodations will be provided to all attending participants. Further prizes will be awarded at CyberSEED for the best papers and presentations.

     

  •                Travel Awards and Prizes

    Travel Awards

     

    Each team that is accepted into the competition will be granted a travel award to help cover travel expenses. The amount is a fixed stipend dependent on the location of the team. For teams within driving distance (PA, MD, DE, NJ ,NY, and New England), a stipend of $750 per team, and for teams outside the northeast, a stipend of $1500. Teams will make their own travel arrangements and will be given the stipend at the close of the competition.

     

    Prizes

     

    CSI will be providing $100K in cash and prizes for all three challenges.

     

    Internet of Things Challenge:

    First Place - $10,000

    Second Place - $7,500

    Third Place - $5,000

    Fourth Place - $3,000

    Fifth Place - $1,000

     

    Social Engineering Challenge:

    First Place - $10,000

    Second Place - $7,500

    Third Place - $5,000

    Fourth Place - $3,000

    Fifth Place - $1,000

     

    Capture the Flag Challenge:

    First Place - $8,000

    Second Place - $6,000

    Third Place - $4,000

    Fourth Place - $2,000

    Fifth Place - $1,000

  •                Important Dates and Information

    Registration Deadline: October 2, 2015

     

    Notification of Acceptance: Within 48 hours after the registration is received.

     

    Event: October 29-30, 2015

DOCUMENTARY CHALLENGE

Congratulations to Bloomsburg University for winning first place!

 

1st Place: Bloomsburg University

2nd Place: University of New Hampshire

3rd Place: University of New Haven

 

CSI provided cash prizes to the winners of the top three documentaries:

 

1st Place: $1,500

2nd Place: $1,000

3rd Place: $500

2015 Competition Winners

Capture the Flag

 

  1. University of Central Florida
  2. Rensselaer Polytechnic Institute
  3. University of Delaware
  4. Brown University
  5. University of Washington

Social Engineering

 

  1. University of Central Florida
  2. U.S. Air Force Academy
  3. Yale University
  4. Brown University
  5. University of Washington

Internet of Things

 

  1. Rensselaer Polytechnic Institute
  2. University of Central Florida
  3. University of New Haven
  4. University of Washington

CONTACT

Have a question? Send an email to:

cyberseed@engr.uconn.edu

 

We'll get back to you as soon as possible.

Rome Commons Ballroom

626 Gilbert Road Ext.

Storrs, CT 06269

© 2015 CyberSEED

 

cyberseed@engr.uconn.edu