Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
Security NewswireCybersecurity News

World's Biggest Student Cyber Security Games Expands

cyber 2 responsive default
August 3, 2016

The world's largest student-run cyber security event, founded 13 years ago by the New York University Tandon School of Engineering, will expand this year to NYU Abu Dhabi and the Indian Institute of Technology, Kanpur, where finalists from India, the Middle East, North Africa, and the United States will compete simultaneously in November 2016.

The schools also announced they are accepting registrations for the Cyber Security Awareness Week (CSAW) elimination rounds in August and September, which last year pitted nearly 20,000 students – from high schools through doctoral programs – against global competitors, all working from their own computers. The competitions will challenge their knowledge of virtually every aspect of information security, from hardware and software penetration testing and protection to digital forensics and government policy.

This year the best students from India, the Middle East, North Africa, and the United States will earn travel awards to participate in the final rounds, which will be held November 10-12, 2016 at IIT Kanpur, NYU Abu Dhabi, and NYU Tandon. At the regional CSAW campuses, students will network with top professionals who serve as judges, hear experts address emerging issues, meet recruiters eager to fill what is expected to be a shortfall of 1.5 million cyber security professionals by 2020, and face tough competition from teams from other schools.

The CSAW games were founded by Professor Nasir Memon, now chair of the NYU Tandon Department of Computer Science and Engineering, and his students. Students continue to design the contests under the mentorship of information security professionals and faculty and run them from NYU Tandon's student-led Offensive Security, Incident Response and Internet Security (OSIRIS) lab, home also to weekly Hack Nights.

"Data security is a critical global issue. Attackers know no national boundaries, and neither should those who protect our personal privacy and institutions," Memon said. "We are pleased that IIT Kanpur, a world-leading engineering school, recognized the ability of CSAW to engage and educate information security students and decided to introduce the contests to students throughout India. I am equally excited about the role that NYU Abu Dhabi will play this year. In the past CSAW brought high school teams to New York. This year, thanks to the leadership of students and faculty, it will expand its reach to high school and university students across the Middle East and North Africa." Memon heads NYU Abu Dhabi's cyber security program, as well as NYU Tandon's.

"With hobby hackers, foreign state actors, terrorist organizations and other adversaries abounding, cyber security is not just a computer science issue but a national security issue. IIT Kanpur is delighted to join hands with the New York University Tandon School of Engineering to bring the cyber security awareness competitions to India. We hope that Indian institutes and universities will participate in large numbers and show their competitiveness against the teams from all over the world," said Manindra Agrawal, the N. Rama Rao Professor in the IIT Kanpur's Department of Computer Science and Engineering.

Each of the regional finalist competitions will vary slightly in the content. Winners of the final rounds can walk away with cash prizes, scholarships, and more. 

This year, CSAW will include:

Capture the Flag (CTF) hacking competition – This cornerstone challenge attracts upwards of 10,000 remote players each year and provides entry- and mid-level problems to solve at the preliminary stage. Students find themselves competing against professionals and amateurs of all ages in the September remote round, but only the best undergraduate teams qualify for the 30-hour-long marathon of the final round, which is notoriously difficult.

High School Forensics – The entryway into cyber security, this competition attracts students who enjoy solving puzzles, in this case a fictional murder mystery. To encourage newcomers, NYU Tandon students and their mentors developed an online, self-taught curriculum and offer digital workshops.
Embedded Security Challenge – In the world's oldest hardware hacking contest, a Blue Team from NYU Tandon designs a target system. Everyone else – Red

Teams – will hack it, to mimic real-world attacks. The finalists will present their findings to security experts in this challenging, research-oriented contest.

Applied Research Competition – To participate in what is recognized as the most prestigious Best Paper Award for young researchers, doctoral students must submit papers that have already been published in peer-reviewed journals or presented at conferences.

Policy Competition – Challenging contestants to think about the big picture of law, policy, economics, and governance, this competition requires students to develop a policy paper proposing how to overcome market failures in cyber security and better protect consumer privacy and critical infrastructure.

Department of Homeland Security Quiz – Held during the finals, this trivia contest challenges students on technical knowledge as well as history and current events. This year players can use their own smartphones thanks to an app written by former CSAW student team leader Kevin Chung.

Security: Open Source – This new, one-day workshop for professionals, organized by NYU Tandon Computer Science and Engineering Assistant Professor Brendan Dolan-Gavitt, will bring open-source software authors to NYU Tandon and NYU Abu Dhabi to explain their tools.

Entrepreneurial Pitch Competition – Competitors will be invited to pitch commercially viable ideas for real-world security problems to potential funders.

https://csaw.engineering.nyu.edu 

KEYWORDS: cyber security penetration testing

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Security's Top Cybersecurity Leaders 2024

    Security's Top Cybersecurity Leaders 2024

    Security magazine's Top Cybersecurity Leaders 2024 award...
    Security Leadership and Management
    By: Security Staff
  • cyber brain

    The intersection of cybersecurity and artificial intelligence

    Artificial intelligence (AI) is a valuable cybersecurity...
    Security Enterprise Services
    By: Pam Nigro
  • artificial intelligence AI graphic

    Assessing the pros and cons of AI for cybersecurity

    Artificial intelligence (AI) has significant implications...
    Cybersecurity Education & Training
    By: Charles Denyer
Subscribe For Free!
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

  • Duty of Care
    Sponsored byAMAROK

    Integrating Technology and Physical Security to Advance Duty of Care

Popular Stories

Internal computer parts

Critical Software Vulnerabilities Rose 37% in 2024

Coding

AI Emerges as the Top Concern for Security Leaders

Half open laptop

“Luigi Was Right”: A Look at the Website Sharing Data on More Than 1,000 Executives

Person working on laptop

Governance in the Age of Citizen Developers and AI

Shopping mall

Victoria’s Secret Security Incident Shuts Down Website

2025 Security Benchmark banner

Events

June 24, 2025

Inside a Modern GSOC: How Anthropic Benchmarks Risk Detection Tools for Speed and Accuracy

For today's security teams, making informed decisions in the first moments of a crisis is critical.

August 27, 2025

Risk Mitigation as a Competitive Edge

In today’s volatile environment, a robust risk management strategy isn’t just a requirement—it’s a foundation for organizational resilience. From cyber threats to climate disruptions, the ability to anticipate, withstand, and adapt to disruption is becoming a hallmark of industry leaders.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • Security Magazine, with Biggest Ever March Issue, Expands ISC West Plans

    See More
  • Security Magazine, with Biggest Ever March Issue, Expands ISC West Plans

    See More
  • athletes in competition

    Perimeter security strategies for The World Games 2022

    See More

Events

View AllSubmit An Event
  • October 22, 2012

    Industrial Control Systems Cyber-Security Conference

    ICS Cyber-Security is the conference where industrial control systems users, ICS vendors, system security providers and government representatives meet to discuss the latest cyber-incidents, analyze their causes and cooperate on solutions.
View AllSubmit An Event
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing