{"id":3505,"date":"2023-10-12T14:49:35","date_gmt":"2023-10-12T18:49:35","guid":{"rendered":"https:\/\/community.mis.temple.edu\/ncae-c\/?page_id=3505"},"modified":"2025-03-26T14:23:10","modified_gmt":"2025-03-26T18:23:10","slug":"competitions","status":"publish","type":"page","link":"https:\/\/community.mis.temple.edu\/ncae-c\/competitions\/","title":{"rendered":"Competitions"},"content":{"rendered":"<h2>New Jersey Institute of Technology Capture The Flag (CTF) Cybersecurity Competition<\/h2>\n<p>JerseyCTF\u00a0is a beginner-friendly Capture the Flag competition that aims to inspire interest in cybersecurity. Hosted by the New Jersey Institute of Technology <a href=\"https:\/\/nam10.safelinks.protection.outlook.com\/?url=https%3A%2F%2F4ucg64bbb.cc.rs6.net%2Ftn.jsp%3Ff%3D0012HHGmlnsBOtth8zZp61UYB0uB73DBbTMoK3koGZw_85_3hX8rGceCd03R8jBUnJ-KRR-1MmR_cTMUFAay6-bHMHNI5O_qeTxBsO-mSWqgZtyx4sYQ_EzJNSVmIIF3Taxt4wpwlws8SCGnFEgUJJNzA%3D%3D%26c%3D0TSyqSR52h3JqAWORe6Yf3fuFmcLuRDPqpKwp4_qHh_ZakvqHBAnXQ%3D%3D%26ch%3D7IRWgmTcTSTOR2EctZyPNb3s6BmleWzvUDK-NB_RpY2iUWBViahp5Q%3D%3D&amp;data=05%7C02%7Cdavid.lanter%40temple.edu%7C1c0a5810e8c442c1106708dd626b0bf2%7C716e81efb52244738e3110bd02ccf6e5%7C0%7C0%7C638774934089631262%7CUnknown%7CTWFpbGZsb3d8eyJFbXB0eU1hcGkiOnRydWUsIlYiOiIwLjAuMDAwMCIsIlAiOiJXaW4zMiIsIkFOIjoiTWFpbCIsIldUIjoyfQ%3D%3D%7C0%7C%7C%7C&amp;sdata=hkFZ4iJkGrNxbrJFPdQS%2BkvkfK4tafGm1%2FJVCRaFAkg%3D&amp;reserved=0\">(NJIT)<\/a>,\u00a0<a href=\"https:\/\/nam10.safelinks.protection.outlook.com\/?url=https%3A%2F%2F4ucg64bbb.cc.rs6.net%2Ftn.jsp%3Ff%3D0012HHGmlnsBOtth8zZp61UYB0uB73DBbTMoK3koGZw_85_3hX8rGceCd03R8jBUnJ-V3827Yi2MTNa44G6xzWvrLaJnLwrlFdzq33GSro07FFT4ds6vCwlMBj9JMbXH6v_FmZhOafGW6EP28E_c5G8Hw%3D%3D%26c%3D0TSyqSR52h3JqAWORe6Yf3fuFmcLuRDPqpKwp4_qHh_ZakvqHBAnXQ%3D%3D%26ch%3D7IRWgmTcTSTOR2EctZyPNb3s6BmleWzvUDK-NB_RpY2iUWBViahp5Q%3D%3D&amp;data=05%7C02%7Cdavid.lanter%40temple.edu%7C1c0a5810e8c442c1106708dd626b0bf2%7C716e81efb52244738e3110bd02ccf6e5%7C0%7C0%7C638774934089646231%7CUnknown%7CTWFpbGZsb3d8eyJFbXB0eU1hcGkiOnRydWUsIlYiOiIwLjAuMDAwMCIsIlAiOiJXaW4zMiIsIkFOIjoiTWFpbCIsIldUIjoyfQ%3D%3D%7C0%7C%7C%7C&amp;sdata=8ocZgGBrBlsr3271UfPajyT0C9aoxKFUHAMq82Sz3rI%3D&amp;reserved=0\">NICC<\/a>,\u00a0<a href=\"https:\/\/nam10.safelinks.protection.outlook.com\/?url=https%3A%2F%2F4ucg64bbb.cc.rs6.net%2Ftn.jsp%3Ff%3D0012HHGmlnsBOtth8zZp61UYB0uB73DBbTMoK3koGZw_85_3hX8rGceCd03R8jBUnJ-QrEwBAkKFL0NErrwiXTX8V7_VOT4g5E5Tfpjf3w7LTq2XFI6TFxhhPBEE0peI2PnqVPDfuptloupwHnh1Ii8SNAFXfepeggD%26c%3D0TSyqSR52h3JqAWORe6Yf3fuFmcLuRDPqpKwp4_qHh_ZakvqHBAnXQ%3D%3D%26ch%3D7IRWgmTcTSTOR2EctZyPNb3s6BmleWzvUDK-NB_RpY2iUWBViahp5Q%3D%3D&amp;data=05%7C02%7Cdavid.lanter%40temple.edu%7C1c0a5810e8c442c1106708dd626b0bf2%7C716e81efb52244738e3110bd02ccf6e5%7C0%7C0%7C638774934089661177%7CUnknown%7CTWFpbGZsb3d8eyJFbXB0eU1hcGkiOnRydWUsIlYiOiIwLjAuMDAwMCIsIlAiOiJXaW4zMiIsIkFOIjoiTWFpbCIsIldUIjoyfQ%3D%3D%7C0%7C%7C%7C&amp;sdata=WwdbqqfyBBsjPzpdiNtb62PtlVZOpaEnkbnqxHPSCu4%3D&amp;reserved=0\">ACM<\/a>, and\u00a0<a href=\"https:\/\/nam10.safelinks.protection.outlook.com\/?url=https%3A%2F%2F4ucg64bbb.cc.rs6.net%2Ftn.jsp%3Ff%3D0012HHGmlnsBOtth8zZp61UYB0uB73DBbTMoK3koGZw_85_3hX8rGceCd03R8jBUnJ-2_C_VX_8WOEcJj44JUM120aFVabrzFWFyoIT-e7qAE4N4k9gvEnfdRxug9PSieZZEWRwxBmFpWhzpPoZ3He0cw%3D%3D%26c%3D0TSyqSR52h3JqAWORe6Yf3fuFmcLuRDPqpKwp4_qHh_ZakvqHBAnXQ%3D%3D%26ch%3D7IRWgmTcTSTOR2EctZyPNb3s6BmleWzvUDK-NB_RpY2iUWBViahp5Q%3D%3D&amp;data=05%7C02%7Cdavid.lanter%40temple.edu%7C1c0a5810e8c442c1106708dd626b0bf2%7C716e81efb52244738e3110bd02ccf6e5%7C0%7C0%7C638774934089677739%7CUnknown%7CTWFpbGZsb3d8eyJFbXB0eU1hcGkiOnRydWUsIlYiOiIwLjAuMDAwMCIsIlAiOiJXaW4zMiIsIkFOIjoiTWFpbCIsIldUIjoyfQ%3D%3D%7C0%7C%7C%7C&amp;sdata=Tf%2F3p%2Bi8pNFfoDr2u%2BTletmiuBk9nRNOstixpIZzTBI%3D&amp;reserved=0\">NJIT&#8217;s SCI Program<\/a>, we are pleased to invite you to our\u00a0<strong>IN-PERSON &amp; VIRTUAL<\/strong>\u00a024-hour jeopardy-style cybersecurity competition on\u00a0<strong>March 29th and 30th<\/strong>,\u00a0<strong>2025\u00a0<\/strong>with communications over\u00a0Discord.<\/p>\n<p>Event link: <a href=\"https:\/\/jerseyctf.com\/\">https:\/\/jerseyctf.com\/<\/a><\/p>\n<p>Join the Discord: <a href=\"https:\/\/discord.com\/invite\/Rm3XrBPxeg\">https:\/\/discord.com\/invite\/Rm3XrBPxeg<\/a><\/p>\n<hr \/>\n<h2>Social Engineering Competition (SEC) 2025<\/h2>\n<p><a href=\"https:\/\/community.mis.temple.edu\/ncae-c\/files\/2023\/10\/Screenshot-2023-10-13-at-14.02.03.png\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-3563\" src=\"https:\/\/community.mis.temple.edu\/ncae-c\/files\/2023\/10\/Screenshot-2023-10-13-at-14.02.03-300x59.png\" alt=\"\" width=\"432\" height=\"85\" srcset=\"https:\/\/community.mis.temple.edu\/ncae-c\/files\/2023\/10\/Screenshot-2023-10-13-at-14.02.03-300x59.png 300w, https:\/\/community.mis.temple.edu\/ncae-c\/files\/2023\/10\/Screenshot-2023-10-13-at-14.02.03-1024x202.png 1024w, https:\/\/community.mis.temple.edu\/ncae-c\/files\/2023\/10\/Screenshot-2023-10-13-at-14.02.03-768x152.png 768w, https:\/\/community.mis.temple.edu\/ncae-c\/files\/2023\/10\/Screenshot-2023-10-13-at-14.02.03-1536x303.png 1536w, https:\/\/community.mis.temple.edu\/ncae-c\/files\/2023\/10\/Screenshot-2023-10-13-at-14.02.03-2048x404.png 2048w\" sizes=\"auto, (max-width: 432px) 100vw, 432px\" \/><\/a><\/p>\n<p><strong>Theme:<\/strong> Critical intersection of infrastructure, social engineering, and AI\u2014three pillars reshaping the threat landscape.<\/p>\n<p>Critical infrastructure like power grids, transportation networks, and healthcare systems is increasingly connected, making it more vulnerable to sophisticated attacks. Social engineering exploits human trust to breach defenses, often serving as the gateway for such threats. Meanwhile, AI, while a powerful tool for innovation, can also be weaponized to automate attacks, craft convincing phishing schemes, and outpace traditional defenses. Together, these factors create a complex web of vulnerabilities that demand innovative thinking and technical expertise.<\/p>\n<p>This competition is not about AI tools themselves, but rather how social engineering is influenced by the use of AI tools. The competition seeks to engage students\u2019 critical thinking by focusing on issues of efficiency, validity, quality, and automation when it comes to using these tools in the context of social engineering and AI.<\/p>\n<p>For more information, <a href=\"https:\/\/sites.temple.edu\/socialengineering\/theme\/\">click here<\/a>.<\/p>\n<hr \/>\n<h2><strong>Summer Social Engineering Competition (SEC) 2024<\/strong><\/h2>\n<p><a href=\"https:\/\/community.mis.temple.edu\/ncae-c\/files\/2023\/10\/Screenshot-2023-10-13-at-14.02.03.png\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-3563\" src=\"https:\/\/community.mis.temple.edu\/ncae-c\/files\/2023\/10\/Screenshot-2023-10-13-at-14.02.03-300x59.png\" alt=\"\" width=\"432\" height=\"85\" srcset=\"https:\/\/community.mis.temple.edu\/ncae-c\/files\/2023\/10\/Screenshot-2023-10-13-at-14.02.03-300x59.png 300w, https:\/\/community.mis.temple.edu\/ncae-c\/files\/2023\/10\/Screenshot-2023-10-13-at-14.02.03-1024x202.png 1024w, https:\/\/community.mis.temple.edu\/ncae-c\/files\/2023\/10\/Screenshot-2023-10-13-at-14.02.03-768x152.png 768w, https:\/\/community.mis.temple.edu\/ncae-c\/files\/2023\/10\/Screenshot-2023-10-13-at-14.02.03-1536x303.png 1536w, https:\/\/community.mis.temple.edu\/ncae-c\/files\/2023\/10\/Screenshot-2023-10-13-at-14.02.03-2048x404.png 2048w\" sizes=\"auto, (max-width: 432px) 100vw, 432px\" \/><\/a><\/p>\n<p>The SEC allows students to compete in a\u00a0<em>purely<\/em> social engineering experience that is grounded in the social sciences. The competition offers a timely and unique platform for students to learn about social engineering in a hands-on, engaging, and ethical manner. The competition has a different theme each year to demonstrate the relevance of social engineering across various cybersecurity areas and is open to high school, undergraduate, and graduate students.<\/p>\n<p>The\u00a0<strong>theme<\/strong>\u00a0for the\u00a0<strong>2024<\/strong> competition is <strong>Tax Scams<\/strong>, and the event will be taking place\u00a0<strong>virtually<\/strong> on Fridays, Saturdays, and Sundays.<\/p>\n<p><strong><em>The exact dates are To Be Announced.<\/em><\/strong><\/p>\n<p>Please note that we have merged with the CollegiateSECTF, which was held in October, to streamline our efforts and resources. Our Twitter handle remains the same:\u00a0<a href=\"https:\/\/twitter.com\/CollegiateSECTF\" target=\"_blank\" rel=\"noopener\">@CollegiateSECTF<\/a>\u00a0and all announcements will be made via this account and this website.<\/p>\n<p><em><strong>Registration for the 2024 Social Engineering Competition is in early Spring<\/strong><\/em><\/p>\n<hr \/>\n<h2><strong>Drexel University&#8217;s FIC3: Fraud and Internal Controls Case Competition<\/strong><\/h2>\n<p class=\"xmsonormal\"><span style=\"font-size: 12.0pt;font-family: 'Times New Roman',serif\"><strong>Date:<\/strong> Drexel University is hosting a Fraud and Internal Controls Case Competition on <strong>Friday, February 10, 2023 from 8AM to 5PM<\/strong> on Drexel\u2019s campus.<\/span><\/p>\n<p><b>More information can be found here: <\/b><a href=\"https:\/\/www.lebow.drexel.edu\/event\/2024\/02\/09\/fic3-fraud-and-internal-control-case-competition\">Fraud and Internal Control Case Competition<\/a><\/p>\n<p><strong>Description:<\/strong>\u00a0Student teams analyze a real-life inspired case and then present their comprehensive analysis and solutions to a panel of judges. The top six teams earn a VISA gift card prize.<\/p>\n<p class=\"xmsonormal\"><span style=\"font-size: 12.0pt;font-family: 'Times New Roman',serif\"><strong>\u00a0Location:<\/strong>\u00a0<\/span>GHall 220<\/p>\n<p><b>REGISTER: <\/b><a href=\"https:\/\/forms.monday.com\/forms\/bc9192b8fd3b9bb82256dfaf4c8c2099?r=use1\">LeBow.Drexel.edu\/Events<\/a><\/p>\n<hr \/>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>New Jersey Institute of Technology Capture The Flag (CTF) Cybersecurity Competition JerseyCTF\u00a0is a beginner-friendly Capture the Flag competition that aims to inspire interest in cybersecurity. Hosted by the New Jersey Institute of Technology (NJIT),\u00a0NICC,\u00a0ACM, and\u00a0NJIT&#8217;s SCI Program, we are pleased to invite you to our\u00a0IN-PERSON &amp; VIRTUAL\u00a024-hour jeopardy-style cybersecurity competition on\u00a0March 29th and 30th,\u00a02025\u00a0with communications [&hellip;]<\/p>\n","protected":false},"author":4657,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_genesis_hide_title":false,"_genesis_hide_breadcrumbs":false,"_genesis_hide_singular_image":false,"_genesis_hide_footer_widgets":false,"_genesis_custom_body_class":"","_genesis_custom_post_class":"","_genesis_layout":"","jetpack_post_was_ever_published":false,"footnotes":""},"class_list":{"0":"post-3505","1":"page","2":"type-page","3":"status-publish","5":"entry"},"jetpack_sharing_enabled":false,"jetpack_shortlink":"https:\/\/wp.me\/P2CTMC-Ux","_links":{"self":[{"href":"https:\/\/community.mis.temple.edu\/ncae-c\/wp-json\/wp\/v2\/pages\/3505","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/community.mis.temple.edu\/ncae-c\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/community.mis.temple.edu\/ncae-c\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/community.mis.temple.edu\/ncae-c\/wp-json\/wp\/v2\/users\/4657"}],"replies":[{"embeddable":true,"href":"https:\/\/community.mis.temple.edu\/ncae-c\/wp-json\/wp\/v2\/comments?post=3505"}],"version-history":[{"count":20,"href":"https:\/\/community.mis.temple.edu\/ncae-c\/wp-json\/wp\/v2\/pages\/3505\/revisions"}],"predecessor-version":[{"id":3932,"href":"https:\/\/community.mis.temple.edu\/ncae-c\/wp-json\/wp\/v2\/pages\/3505\/revisions\/3932"}],"wp:attachment":[{"href":"https:\/\/community.mis.temple.edu\/ncae-c\/wp-json\/wp\/v2\/media?parent=3505"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}