SlideShare a Scribd company logo
STUDENT CHALLENGE
9/12
Cyber
We frequently hear the terms “Cyber 9/11” and “Digital Pearl Harbor,” but what might policymakers
do the day after a crisis? The Cyber 9/12 Student Challenge is an annual cyber policy competition
for students across the globe to compete in developing national security policy recommendations
tackling a fictional cyber catastrophe. In 2016, the Student Challenge will take place in Washington,
DC on March 11-12 and in Geneva, Switzerland, on April 7-8.
THE STUDENT CHALLENGE
In Washington, DC, student teams confront a serious
cybersecurity breach of national and international im-
portance. Teams will compose policy recommenda-
tions and justify their decision-making process, con-
sidering the role and implications for relevant civilian,
military, law enforcement, and private sector entities
and updating the recommendations as the scenario
evolves.
In Geneva, Switzerland, in
partnership with the Ge-
neva Centre for Security
Policy (GCSP), students
respond to a major cyber-
attack on European networks. Competitors will pro-
vide recommendations balancing individual national
approaches and a collective crisis management re-
sponse, considering capabilities, policies, and gover-
nance structures of NATO, EU, and individual nations.
The competition fosters a culture of cooperation and
a better understanding of these organizations and
their member states in responding to cyberattacks.
WHAT IS THE CHALLENGE ALL ABOUT?
Now entering its fourth year, the Cyber 9/12 Student
Challenge is a one-of-a-kind competition designed
to provide students across academic disciplines with
a deeper understanding of the policy challenges
associated with cyber crisis and conflict. Part
interactive learning experience and part competitive
scenario exercise, it challenges teams to respond to a
realistic, evolving cyberattack and analyze the threat
it poses to national, international, and private sector
interests.
Students have a unique opportunity to interact with
expert mentors and high-level cyber professionals
while developing valuable skills in policy analysis and
presentation. The competition has already engaged
over four hundred students from universities in the
United States, United Kingdom, France, Poland,
Switzerland, Hungary, Finland, and Estonia.
Gen. Michael Hayden (Ret.), former NSA and CIA
Director, addresses students at the 2015 Challenge in
Washington, DC.
Winners of the 2015 Euro-Atlantic Challenge, Team
Switzerland, with NATO Assistant Secretary General for
Emerging Defense Challenges Ambassador Sorin Ducaru
and GCSP Director Ambassador Christian Dussey.
A MAJOR CYBERATTACK HAS OCCURRED. HOW SHOULD YOUR NATION RESPOND?
HOW TO PARTICIPATE
. . .as a competitor:
Graduate and undergraduate students from any uni-
versity, including defense colleges and military acad-
emies, are invited to apply to compete in teams of
four. There are no requirements for team composition
based on academic majors, education levels, or na-
tionalities of team members.
. . .as a coach:
Each team must recruit a coach to assist in preparing
for the competition. One coach can serve for sever-
al teams. Teams are expected to consult with their
coaches to help develop and revise their policy ideas
for the competition and confer with them during
breaks between competition rounds.
. . .as a judge:
Experts with significant policy and cybersecurity ex-
perience are invited to serve as judges. Judges eval-
uate the student teams’ oral presentations based
on the quality of their policy responses, their deci-
sion-making processes, and their presentation skills.
Previous judges include practitioners from various
sectors, such as government, international organiza-
tions, information and communications technology,
finance, and the press.
. . .as an observer:
All competition events are open to the public, and we
welcome anyone interested in cybersecurity policy to
join us as an observer.
. . .as a sponsor:
The competition is a unique opportunity for companies
to support next-generation cybersecurity education
on both sides of the Atlantic and position themselves
as innovative thought leaders in the field. Depending
on the level of sponsorship, our partners receive great
benefits including recruitment of top tech and policy
talent; advertisement in print and online; promotional
side events; and keynote and judging opportunities.
. . .as a host:
We offer opportunities to host one- or two-day qual-
ifying and affiliated events. These events are run by
students, faculty, or university staff with support from
the Atlantic Council.
To register or for more information, please contact:
Anni Piiparinen
Program Assistant
Cyber Statecraft Initiative - Atlantic Council
Email: APiiparinen@AtlanticCouncil.org
Phone: +1-202-292-5164
AtlanticCouncil.org
1030 15TH STREET, NW | 12TH FLOOR | WASHINGTON, DC 20005 | 202-463-7226
Student team presenting policy recommendations to a
panel of judges in Geneva, 2015.
Heli Tiirmaa-Klaar, Head of Cyber Policy Coordination
at the European External Action Service, in a conversa-
tion with students in Geneva in 2015.
TIMELINE
One Month before the Competition
Teams receive Intelligence Report I. The stage is
set for the simulated cyberattack and the teams
start preparing written policy briefs.
Two Weeks before the Competition
Teams submit the written policy briefs.
Competition Day 1 – Qualifying
Teams give a ten minute presentation to a panel of
judges, followed by ten minutes of judges’ ques-
tions and final feedback. Advancing teams receive
Intelligence Report II.
Competition Day 2 – Semifinal and Final
Semifinalist teams present modified policy rec-
ommendations based on the evolving scenario.
Teams advancing to the final round are given In-
telligence Report III and very limited time to adjust
their recommendations. Finalists present on stage
to a panel of celebrity judges, who award the win-
ning team in a closing reception.
PAST SUPPORTERS
This event was supported by
NATO’s Public Diplomacy Division

More Related Content

PDF
Cyber912 student challenge_two_pager_sponsors
PDF
Cyber 9/12 Student Challenge General Information
PDF
Tunis 05052008 Rispens Noel
PDF
Factsheet_ENG_WHITE_Mar_2015
PPT
The Role of Open in African Higher Education - Namibia
PPTX
Methods and Compliance Programs for Anti-Corruption, Pascal HANS
PPTX
Protecting our assets – A partnership approach Securing Asia 2013
PDF
Five Points Youth Foundation Goodwill Ambassador Denisa Gokovi Albania United...
Cyber912 student challenge_two_pager_sponsors
Cyber 9/12 Student Challenge General Information
Tunis 05052008 Rispens Noel
Factsheet_ENG_WHITE_Mar_2015
The Role of Open in African Higher Education - Namibia
Methods and Compliance Programs for Anti-Corruption, Pascal HANS
Protecting our assets – A partnership approach Securing Asia 2013
Five Points Youth Foundation Goodwill Ambassador Denisa Gokovi Albania United...

What's hot (20)

PDF
Five Points Youth Foundation Goodwill Ambassador Audrey Addison Williams USA ...
PDF
Five Points Youth Foundation Goodwill Ambassador Madeline Karita Fleming Minn...
PDF
Five Points Youth Foundation Goodwill Ambassador Orion Darkstar USA United Na...
PDF
Five Points Youth Foundation Goodwill Ambassador Murli Sharma United Nations ...
PPT
Capacity Building in Internet Governance - DiploFoundation
PDF
Publishing Development Research and Adding Value
PDF
Five Points Youth Foundation Goodwill Ambassador Adegboyega Shamsideen Thomps...
PDF
Five Points Youth Foundation Goodwill Ambassador Tanjena Ahsan Rakhi Banglade...
DOCX
ICC Bill-International Week
DOCX
Security Statement
PPT
International Maritime Rescue Federation singapore MRO
PDF
Five Points Youth Foundation Goodwill Ambassador Sapkota Pradeep Nepal United...
PDF
Five Points Youth Foundation Goodwill Ambassador Robert Raven Jackson Alaska ...
PPT
IAEM Rolling Kiosk Presentation
PPTX
Imf and ingo
PPT
The Unleashed Vocational School. Best Practice In The Context Of Education Po...
PDF
PROTECT_2015_Maritime Threats to Supply Chain
PDF
Alliance intern fact sheet 10
Five Points Youth Foundation Goodwill Ambassador Audrey Addison Williams USA ...
Five Points Youth Foundation Goodwill Ambassador Madeline Karita Fleming Minn...
Five Points Youth Foundation Goodwill Ambassador Orion Darkstar USA United Na...
Five Points Youth Foundation Goodwill Ambassador Murli Sharma United Nations ...
Capacity Building in Internet Governance - DiploFoundation
Publishing Development Research and Adding Value
Five Points Youth Foundation Goodwill Ambassador Adegboyega Shamsideen Thomps...
Five Points Youth Foundation Goodwill Ambassador Tanjena Ahsan Rakhi Banglade...
ICC Bill-International Week
Security Statement
International Maritime Rescue Federation singapore MRO
Five Points Youth Foundation Goodwill Ambassador Sapkota Pradeep Nepal United...
Five Points Youth Foundation Goodwill Ambassador Robert Raven Jackson Alaska ...
IAEM Rolling Kiosk Presentation
Imf and ingo
The Unleashed Vocational School. Best Practice In The Context Of Education Po...
PROTECT_2015_Maritime Threats to Supply Chain
Alliance intern fact sheet 10
Ad

Similar to Cyber912 student challenge_two_pager_general (20)

PDF
The Day After: Preparing to Respond to National Cyber Crises
PDF
Intervento Marco Angelini a International Business Forum
PPTX
Education to cyber security
PDF
CSFI-Cyber_Conflict_Post_Exercise
PDF
CYBERSEC conference brochure
PDF
Cyber Security and Resiliency Policy Framework 1st Edition A. Vaseashta
PDF
Resourcing the US 2030 Cyber Strategy
PDF
What's Next in Cybersecurity Policy
PDF
Cyber Defense: three fundamental steps
PDF
Cyber Warfare Europe 2011
PPTX
AWC711_Topic1_Engen_Lecture - To Share.pptx
PDF
No Shortcuts Why States Struggle To Develop A Military Cyberforce Max Smeets
PPTX
Cybersecurity Education and Workforce Development
PDF
CYBER ARTICLE ON LMCO
PDF
A Strategy for Addressing Cyber Security Challenges
PPT
Hackers in the national cyber security
PDF
2021. Top Cyber News MAGAZINE Margo Koniuszewski
PDF
Top Cyber News Magazine. Margo Koniuszewski
PDF
CybersecurityTFReport2016 PRINT
PDF
National Strategies against Cyber Attacks - Philip Victor
The Day After: Preparing to Respond to National Cyber Crises
Intervento Marco Angelini a International Business Forum
Education to cyber security
CSFI-Cyber_Conflict_Post_Exercise
CYBERSEC conference brochure
Cyber Security and Resiliency Policy Framework 1st Edition A. Vaseashta
Resourcing the US 2030 Cyber Strategy
What's Next in Cybersecurity Policy
Cyber Defense: three fundamental steps
Cyber Warfare Europe 2011
AWC711_Topic1_Engen_Lecture - To Share.pptx
No Shortcuts Why States Struggle To Develop A Military Cyberforce Max Smeets
Cybersecurity Education and Workforce Development
CYBER ARTICLE ON LMCO
A Strategy for Addressing Cyber Security Challenges
Hackers in the national cyber security
2021. Top Cyber News MAGAZINE Margo Koniuszewski
Top Cyber News Magazine. Margo Koniuszewski
CybersecurityTFReport2016 PRINT
National Strategies against Cyber Attacks - Philip Victor
Ad

More from atlanticcouncil (20)

PPTX
Securing Ukraine's Energy Sector
PDF
Afghanistan and US Security
PDF
Crude Oil for Natural Gas: Prospects for Iran-Saudi Reconciliation
PDF
Tunisia: The Last Arab Spring Country
PDF
Foreign Policy for an Urban World: Global Governance and the Rise of Cities
PDF
Toward a Sustainable Peace in the South China Sea
PDF
Relaunching the eastern_partnership_web
PPTX
2015 Distinguished Leadership Awards
PDF
Camp david 0508
PDF
Harnessing social impact
PDF
Reimagining pakistan s_militia_policy
PDF
Yp day-2015-report-webversion
PDF
Defeating the Jihadists in Syria: Competition before Confrontation
PDF
Dynamic Stability: US Strategy for a World in Transition
PDF
Setting the Stage for Peace in Syria: The Case for a Syrian National Stabiliz...
PDF
Mexicos energy reform
PDF
Gulf innovation web
PDF
Acus managing differences report
PDF
Artful Balance: Future US Defense Strategy and Force Posture in the Gulf
PDF
The Healthcare Internet of Things: Rewards and Risks
Securing Ukraine's Energy Sector
Afghanistan and US Security
Crude Oil for Natural Gas: Prospects for Iran-Saudi Reconciliation
Tunisia: The Last Arab Spring Country
Foreign Policy for an Urban World: Global Governance and the Rise of Cities
Toward a Sustainable Peace in the South China Sea
Relaunching the eastern_partnership_web
2015 Distinguished Leadership Awards
Camp david 0508
Harnessing social impact
Reimagining pakistan s_militia_policy
Yp day-2015-report-webversion
Defeating the Jihadists in Syria: Competition before Confrontation
Dynamic Stability: US Strategy for a World in Transition
Setting the Stage for Peace in Syria: The Case for a Syrian National Stabiliz...
Mexicos energy reform
Gulf innovation web
Acus managing differences report
Artful Balance: Future US Defense Strategy and Force Posture in the Gulf
The Healthcare Internet of Things: Rewards and Risks

Recently uploaded (20)

PPTX
DRUG THERAPY FOR SHOCK gjjjgfhhhhh.pptx.
PPTX
TOTAL hIP ARTHROPLASTY Presentation.pptx
PPTX
Classification Systems_TAXONOMY_SCIENCE8.pptx
PDF
Phytochemical Investigation of Miliusa longipes.pdf
PDF
AlphaEarth Foundations and the Satellite Embedding dataset
PPTX
2. Earth - The Living Planet earth and life
PPTX
7. General Toxicologyfor clinical phrmacy.pptx
PPTX
Protein & Amino Acid Structures Levels of protein structure (primary, seconda...
PPTX
The KM-GBF monitoring framework – status & key messages.pptx
PPTX
ognitive-behavioral therapy, mindfulness-based approaches, coping skills trai...
PPT
Chemical bonding and molecular structure
PPTX
Comparative Structure of Integument in Vertebrates.pptx
PPTX
GEN. BIO 1 - CELL TYPES & CELL MODIFICATIONS
PPTX
ANEMIA WITH LEUKOPENIA MDS 07_25.pptx htggtftgt fredrctvg
PPTX
INTRODUCTION TO EVS | Concept of sustainability
PDF
VARICELLA VACCINATION: A POTENTIAL STRATEGY FOR PREVENTING MULTIPLE SCLEROSIS
PPTX
EPIDURAL ANESTHESIA ANATOMY AND PHYSIOLOGY.pptx
PDF
Sciences of Europe No 170 (2025)
PDF
CAPERS-LRD-z9:AGas-enshroudedLittleRedDotHostingaBroad-lineActive GalacticNuc...
PPTX
ECG_Course_Presentation د.محمد صقران ppt
DRUG THERAPY FOR SHOCK gjjjgfhhhhh.pptx.
TOTAL hIP ARTHROPLASTY Presentation.pptx
Classification Systems_TAXONOMY_SCIENCE8.pptx
Phytochemical Investigation of Miliusa longipes.pdf
AlphaEarth Foundations and the Satellite Embedding dataset
2. Earth - The Living Planet earth and life
7. General Toxicologyfor clinical phrmacy.pptx
Protein & Amino Acid Structures Levels of protein structure (primary, seconda...
The KM-GBF monitoring framework – status & key messages.pptx
ognitive-behavioral therapy, mindfulness-based approaches, coping skills trai...
Chemical bonding and molecular structure
Comparative Structure of Integument in Vertebrates.pptx
GEN. BIO 1 - CELL TYPES & CELL MODIFICATIONS
ANEMIA WITH LEUKOPENIA MDS 07_25.pptx htggtftgt fredrctvg
INTRODUCTION TO EVS | Concept of sustainability
VARICELLA VACCINATION: A POTENTIAL STRATEGY FOR PREVENTING MULTIPLE SCLEROSIS
EPIDURAL ANESTHESIA ANATOMY AND PHYSIOLOGY.pptx
Sciences of Europe No 170 (2025)
CAPERS-LRD-z9:AGas-enshroudedLittleRedDotHostingaBroad-lineActive GalacticNuc...
ECG_Course_Presentation د.محمد صقران ppt

Cyber912 student challenge_two_pager_general

  • 1. STUDENT CHALLENGE 9/12 Cyber We frequently hear the terms “Cyber 9/11” and “Digital Pearl Harbor,” but what might policymakers do the day after a crisis? The Cyber 9/12 Student Challenge is an annual cyber policy competition for students across the globe to compete in developing national security policy recommendations tackling a fictional cyber catastrophe. In 2016, the Student Challenge will take place in Washington, DC on March 11-12 and in Geneva, Switzerland, on April 7-8. THE STUDENT CHALLENGE In Washington, DC, student teams confront a serious cybersecurity breach of national and international im- portance. Teams will compose policy recommenda- tions and justify their decision-making process, con- sidering the role and implications for relevant civilian, military, law enforcement, and private sector entities and updating the recommendations as the scenario evolves. In Geneva, Switzerland, in partnership with the Ge- neva Centre for Security Policy (GCSP), students respond to a major cyber- attack on European networks. Competitors will pro- vide recommendations balancing individual national approaches and a collective crisis management re- sponse, considering capabilities, policies, and gover- nance structures of NATO, EU, and individual nations. The competition fosters a culture of cooperation and a better understanding of these organizations and their member states in responding to cyberattacks. WHAT IS THE CHALLENGE ALL ABOUT? Now entering its fourth year, the Cyber 9/12 Student Challenge is a one-of-a-kind competition designed to provide students across academic disciplines with a deeper understanding of the policy challenges associated with cyber crisis and conflict. Part interactive learning experience and part competitive scenario exercise, it challenges teams to respond to a realistic, evolving cyberattack and analyze the threat it poses to national, international, and private sector interests. Students have a unique opportunity to interact with expert mentors and high-level cyber professionals while developing valuable skills in policy analysis and presentation. The competition has already engaged over four hundred students from universities in the United States, United Kingdom, France, Poland, Switzerland, Hungary, Finland, and Estonia. Gen. Michael Hayden (Ret.), former NSA and CIA Director, addresses students at the 2015 Challenge in Washington, DC. Winners of the 2015 Euro-Atlantic Challenge, Team Switzerland, with NATO Assistant Secretary General for Emerging Defense Challenges Ambassador Sorin Ducaru and GCSP Director Ambassador Christian Dussey. A MAJOR CYBERATTACK HAS OCCURRED. HOW SHOULD YOUR NATION RESPOND?
  • 2. HOW TO PARTICIPATE . . .as a competitor: Graduate and undergraduate students from any uni- versity, including defense colleges and military acad- emies, are invited to apply to compete in teams of four. There are no requirements for team composition based on academic majors, education levels, or na- tionalities of team members. . . .as a coach: Each team must recruit a coach to assist in preparing for the competition. One coach can serve for sever- al teams. Teams are expected to consult with their coaches to help develop and revise their policy ideas for the competition and confer with them during breaks between competition rounds. . . .as a judge: Experts with significant policy and cybersecurity ex- perience are invited to serve as judges. Judges eval- uate the student teams’ oral presentations based on the quality of their policy responses, their deci- sion-making processes, and their presentation skills. Previous judges include practitioners from various sectors, such as government, international organiza- tions, information and communications technology, finance, and the press. . . .as an observer: All competition events are open to the public, and we welcome anyone interested in cybersecurity policy to join us as an observer. . . .as a sponsor: The competition is a unique opportunity for companies to support next-generation cybersecurity education on both sides of the Atlantic and position themselves as innovative thought leaders in the field. Depending on the level of sponsorship, our partners receive great benefits including recruitment of top tech and policy talent; advertisement in print and online; promotional side events; and keynote and judging opportunities. . . .as a host: We offer opportunities to host one- or two-day qual- ifying and affiliated events. These events are run by students, faculty, or university staff with support from the Atlantic Council. To register or for more information, please contact: Anni Piiparinen Program Assistant Cyber Statecraft Initiative - Atlantic Council Email: APiiparinen@AtlanticCouncil.org Phone: +1-202-292-5164 AtlanticCouncil.org 1030 15TH STREET, NW | 12TH FLOOR | WASHINGTON, DC 20005 | 202-463-7226 Student team presenting policy recommendations to a panel of judges in Geneva, 2015. Heli Tiirmaa-Klaar, Head of Cyber Policy Coordination at the European External Action Service, in a conversa- tion with students in Geneva in 2015. TIMELINE One Month before the Competition Teams receive Intelligence Report I. The stage is set for the simulated cyberattack and the teams start preparing written policy briefs. Two Weeks before the Competition Teams submit the written policy briefs. Competition Day 1 – Qualifying Teams give a ten minute presentation to a panel of judges, followed by ten minutes of judges’ ques- tions and final feedback. Advancing teams receive Intelligence Report II. Competition Day 2 – Semifinal and Final Semifinalist teams present modified policy rec- ommendations based on the evolving scenario. Teams advancing to the final round are given In- telligence Report III and very limited time to adjust their recommendations. Finalists present on stage to a panel of celebrity judges, who award the win- ning team in a closing reception. PAST SUPPORTERS This event was supported by NATO’s Public Diplomacy Division