#Calendario
The Challenge

2020 was a year of valuable learning, the pandemic accelerated the digital transformation in companies. Consequently, today digital assets and individuals are increasingly located outside of traditional business infrastructure, enhancing the threats that any organization could face.

This requires having cybersecurity strategies that provide visibility into the level of risk, allowing us to respond in an agile, timely and automated way to guarantee business continuity in a safe and resilient way.

The Cyberwomen Challenge is a 6-hour online technical workshop, where the participants will use tools that will help them in the analysis of cybersecurity incidents, increasing visibility and providing a complete picture of the evolution of an attack instead of seeing it in silos. This way, participants will live the experience of minimizing the breach in the investigation of incidents and will quickly perform analysis and respond to threats.


Why should you participate?

"We seek to contribute to closing the gender gap in the industry and the cybersecurity skills gap”. 



Learn more about this "Incident Response" Edition





HOW IT WORKS?

Participants must solve around 30 challenges in randomly formed teams and compete against other teams to achieve the highest number of correct answers.



The Requirements
Who can participate?

Women with experience in:  

- Security 

- Infraestructure 

- SOC 

- Incident Response 

- Threat investigation 



You must have previous knowledge in:

Incident Response basics 

- Basic concepts of security and threats 

- Basic concepts of networking 

- Windows and Linux operating systems




  
Technical Requirements

- Laptop or desktop with functioning camera, microphone, and speaker
- Disabled firewall restrictions/ VPN connections
- Zoom client installed and an active Discord account
- Communication and execution access on Zoom and Discord
- Minimum 5Mbps internet connection - try not to use streaming services during the workshop to avoid disruptions










Proteja su espacio de trabajo remoto.

Prácticas de seguridad para empleados, organizaciones y familias para desarrollar sus negocios en línea de manera segura.









El Coronavirus es el señuelo más reciente de los atacantes

Mejores prácticas para minimizar los riesgos asociados con los ataques de ransomware y phishing, así como ideas para apoyar a sus trabajadores remotos.


Section 3 - Column 4. Praesent non velit ut libero condimentum pulvinar sed vitae tellus.
Vestibulum id tristique elit. Suspendisse posuere rutrum sodales. Nam id elit ac sem iaculis lacinia posuere vitae metus.

Topics

• Today's main cybersecurity challenges:
- Visibility gaps
- Increasing log volume
- Technical knowledge gaps
• The importance of detection and response
• The importance of layered visibility
• The importance of XDR in cybersecurity


Participation Guidelines



                                                 


Women who:


Must be of legal age
Being a national of the country hosting the Challenge or working in an organization based in the host country. To participate in the Caribbean edition, you must live in one of the following countries: Antigua and Barbuda, Barbados, Belize, Dominica, Grenada, Guyana, Haiti, Jamaica, Saint Kitts and Nevis, Saint Lucia, Saint Vincent and the Grenadines, Suriname, The Bahamas, or Trinidad and Tobago.  
Backgrounds in information technology are greatly encouraged
If you are a student, you must be in the final stages of your professional education
You must register online as an individual

You must follow our code of conduct

In order to be eligible for the certificate of participation or one of the awards, you must be an active participant during the entire duration of the Challenge



Apoyo durante el Trabajo Remoto

Descargue un trial gratuito por 30 días de Trend Micro Máximum Security y proteja sus dispositivos de virus, malware, robo de identidad, ransomware y otras amenazas en evolución.sus empleados mientras trabajan desde casa. Sin compromisos.


Herramienta de Simulación Phish Insight

Use nuestra herramienta de simulación gratuita de phishing para capacitar y poner a prueba a sus empleados sobre la importancia de identificar correctamente casos de phishing y evitar ataques en cuatro sencillos pasos.



HouseCall™: Escaneo de Seguridad en línea sin Costo

Detecte y elimine virus, gusanos, spyware y otras amenazas maliciosas utilizando la herramienta gratuita de escaneo de seguridad en línea de Trend Micro, HouseCall™.




Awards
2do Lugar

- AWS Cloud Credits (a liberar en diciembre 2021)
- Licencias de software de seguridad para proteger 5 dispositivos personales por un año sin costo
3er Lugar

- Licencias de software de seguridad para proteger 5 dispositivos personales por un año sin costo

Importante
Event Calendar

Up Next
Country
Date and Time
Register here
CARIBBEAN
Thursday, September 9, 2021
8:00 am to 2:00 pm BZ
9:00 am to 3:00 pm JM
10:00 am to 4:00 pm BB, TR, GR, GU, SL, SV


Questions? Contact us »


Section 6 - Column 3. Praesent non velit ut libero condimentum pulvinar sed vitae tellus.
Vestibulum id tristique elit. Suspendisse posuere rutrum sodales. Nam id elit ac sem iaculis lacinia posuere vitae metus.

Section 6 - Column 4. Praesent non velit ut libero condimentum pulvinar sed vitae tellus.
Vestibulum id tristique elit. Suspendisse posuere rutrum sodales. Nam id elit ac sem iaculis lacinia posuere vitae metus.

With the support of



Need a letter to support your participation in the Challenge?

Request a letter »

Do you have questions?
Send us an email!


I want to participate »

Logo-2019_Google-Cloud-Platform.png

Section 7 - Column 4. Praesent non velit ut libero condimentum pulvinar sed vitae tellus.
Vestibulum id tristique elit. Suspendisse posuere rutrum sodales. Nam id elit ac sem iaculis lacinia posuere vitae metus.