BT Tower Hosts Mock Retail Breach

Written by

24 candidates were tasked with tracking down the perpetrators of a data breach who had stolen money using unauthorised bank transfers, physical compromise, LAN intrusion and point of sale devices at the weekend.

In the second face-to-face challenge in Cyber Security Challenge UK’s 2016 series of competitions, the BT Tower hosted the mock investigation into a cyber-attack at the BT Tower in a bid to find the country’s best hidden cyber security talent.

The candidates, selected from a series of online qualifying rounds, were invited to compete against each other to investigate how a fictitious retail company came under vicious cyber-attack, show off their abilities in front of prospective employers and qualify for the Challenge’s grand final Masterclass competition.

Stephanie Daman, CEO of the Cyber Security Challenge UK, said:  “Our events are designed to accurately represent the scenarios that cybersecurity experts in the field experience on a day-to-day basis. The competition that BT has developed plays on current data breaches and hacking techniques and is designed to look for the skills that employers need today.”

The competition was closely monitored by BT’s security team and assessors from top cybersecurity organisations, who judged the candidates on how well they performed tasks in-line with industry best practice. The top performers in this event qualified for the Cyber Security Challenge UK Masterclass which takes place in November this year.

Team Margaret Rock were the winning team on the day, with Tomas Evans from Wales the overall winner of the competition. Nicolay Ulmasov and David Buchanan finished second and third respectively. The top eight competitors have also progressed to Masterclass in November.

“I am delighted to win the BT face-to-face competition, I had a great time with my team and the competition really tested my technical abilities. I’m looking forward to Masterclass and progressing my career in cyber security,” said Evans.

What’s hot on Infosecurity Magazine?