ENISE
Cybersecurity working group for the Autnomous Communities
ENISE
Infoday: Digital Europe Programme
ENISE
How to protect data? Information classification, DLP and IRM
ENISE
Cybercrime in the Age of Artificial Intelligence: Personal Data and the New Battlefield
Guardia Civil
ENISE
Joint Commission of RETECH Nodes
Its purpose is to coordinate the relationships and common objectives of the participants in the RETECH Call (Territorial Networks for Technological Specialization), in the field of Cybersecurity, of which INCIBE is a part. This Commission will be made up of a representative from each of the autonomous entities that make up Retech, and a representative from INCIBE.
Restricted access
ENISE
Investment initiatives of the Autonomous Communities for 2025
The participating Autonomous Communities of the RETECH Call (Territorial Networks of Technological Specialization) will briefly explain the importance of the program for cybersecurity and sectoral development, as well as its main lines of work and investments to be made in 2025.
Workshop open to the public.
ENISE
ES-ISAC-TIC constitution act
ENISE
Workshop Copilot for Security. Applying AI to cybersecurity
The use of AI is transforming the cybersecurity market and trends. In the Copilot for Security workshop, we will talk about SOC modernization, cognitive defense, how cybercriminals are using AI, and we will redefine a conventional SOC architecture by adding a layer of artificial intelligence on top and seeing its behavior live. We will also present real-life case studies of AI applied to cybersecurity.
ENISE
Capture the Flag
Within the framework of the 18ENISE 2024 event, a CTF (Capture The Flag) will be held. Aimed primarily at university students and technological high school students, this competition will take place at the ENISE event, at the Palacio de Congresos de León. Participants will have to solve technical challenges in an environment that simulates real cybersecurity challenges. It will be a unique opportunity to test themselves and develop their skills.
With these competitions we seek to promote learning and the development of key cybersecurity skills, contributing to the training of future professionals in this field.
Agenda
09:30 to 11:30 – CTF Beginner Level Course: An introduction to CTF challenges for those who are starting out in the world of cybersecurity.
12:00 to 14:00 – CTF Intermediate Level Course: Course aimed at participants with previous knowledge in cybersecurity who are looking for more advanced challenges.
16:00 – Reception of participants: Arrival of the teams and preparation for the competition.
16:15 – Start of the CTF Competition: Teams face a series of challenges in a collaborative and competitive environment.
20:00 – End of the competition: Closing of the event
20:15 – Awards ceremony: Awards ceremony for the top 3 participants.
What to expect from the competition?
Participants will have to solve technical challenges in key areas of cybersecurity such as:
• Cryptography and stenography: Decipher hidden or encrypted messages.
• Forensic analysis: Recover hidden information in memory images or hard drives.
• Malware analysis: Understand and dismantle malicious software.
• Traffic analysis: Investigate suspicious patterns in network traffic.
• OSINT: Use publicly available information on the Internet to solve challenges.
• Web security: Detect and exploit vulnerabilities in web applications.
• Python: Solve challenges using code in this programming language.
• Miscellaneous: Additional challenges covering different areas of cybersecurity.
Competition Format
• 15 challenges divided into three difficulty levels:
o 8 low-difficulty challenges (50 points each).
o 5 medium-difficulty challenges (100 points each).
o 2 high-difficulty challenges (200 points each).
During the event, participants will have clues that will help them solve the challenges. Each clue used will reduce the number of points accumulated.
Registration and Requirements
• Participants must register before October 18 at 11:59 p.m. https://cyberworking.es/ctf-en-enise
• It is essential to bring your own laptop. It is recommended to have Kali Linux installed to access a range of useful tools.
This event is a unique opportunity to learn, develop key cybersecurity skills and test your problem-solving skills in a challenging environment. Don’t miss out!
ENISE
INCIBE-CERT Workshop: Essential Services Operators
Restricted access