top of page

Objectives & Deliverables

In light of the National Cybersecurity Strategy (2023-2027), which aims to raise the level of readiness to confront cyber risks in all sectors of the country, secure information infrastructure and provide integrated electronic services, as part of the country's efforts towards digital transformation and attention to cyber security. Within the framework of this initiative, we offer "We Innovate Hackathon"
This is a hands-on hackathon, your target throughout the event duration is to deliver a working proof of concept of a solution to one or multiple of the below mentioned challenges. Addressing other challenges than the mentioned ones will be out of this hackathon's scope and will not be accepted.

One of the major competences that will be under assessment in our event is your ability to work in teams, your capacity to rally other calibers and motivate them to join your project, accordingly all presentations, mentorship sessions, awards & prizes will all be team based. If you don't have a team ready we will connect you online upon registration with other contestants to form your team.

 

Judging Criteria

  1. A Working Proof of Concept (PoC)
    Ideas shall be submitted with a proof of concept (PoC) to show the feasibility and potential of implementing this new idea.
     

  2. Creativity & Relevance: The solution should be unique, innovative and appropriate to one or more of the listed Hackathon challenges below.
     

  3. Originality: The solution must demonstrate a level of originality not just a copy of the market solutions that exist. It should be either a totally new solution or a significant enhancement on an existing one and in the enhancement case the team should clearly mention the original solution they are basing their enhancement on. Solution plagiarism will force the judgment committee to disqualify the team.
     

  4. Quality and effectiveness: A technical assessment of the quality of the functions of the solution based on the product provided.
     

  5. Applicability: The project's ability to solve problems related to the chosen challenge.
     

  6. Technology: The potential technological and disruptive impact of the solution.
     

  7. Scalability and market potential: Solution usability and scalability in the region and/or globally.

Challeges

Target Challenges

IoT Security

The increasing adoption of IoT devices in various industries has led to a growing concern over their security, given the potential risks of data breaches, cyber-attacks, and unauthorized access. The IoT Security track can include ideas related to Routers Security, Industrial Control system security, critical infrastructure security, automotive security, and similar.

Cyber Threats Detection and Prevention

Threat detection is critical in cybersecurity as it helps to identify potential security breaches before they occur, allowing organizations to take preventative measures to protect their systems and data. This track can include ideas related to Threat Intelligence, Threat Hunting, Logging and Monitoring, SOC automation, Threat detection and prevention on Social Media platforms, and similar.

Compliance

Handling compliance and regulation in cybersecurity can be challenging due to the rapidly evolving threat landscape, the complexity of systems and technologies, and limited resources. This track can include ideas related to compliance management, compliance automation, data privacy management, PII ( Personally Identifiable Information) classification, and similar.

Software Security

Software security is essential for protecting sensitive data, maintaining business continuity, complying with regulations, protecting reputation, and saving costs. Currently, with the digital transformation that is happening across the country, the need for software security is increasing rapidly. The Software Security track can include ideas related to Code analysis, Patch Management, Vulnerability Management, and similar).

Endpoint Protection

Endpoint protection is a critical component of cybersecurity that involves detecting and preventing cyber threats on endpoint devices, such as desktops, laptops, and mobile devices. Some common threats that endpoint protection aims to detect and prevent include ransomware attacks, phishing emails, and malware infections. The End Point Security track can include ideas related to the Detection and Prevention of Ransomware Attacks, Detection and Blocking of Phishing e-mails, Real-Time Protection, Anti-malware Solutions, and similar).

AI in Cybersecurity

The use of Artificial Intelligence (AI) in cybersecurity has gained a lot of attention in recent years due to its potential to significantly enhance the effectiveness and efficiency of cybersecurity solutions. The AI in Cyber Security track can include ideas related to Identifying and Responding to Cyber Threats in real-time, Detection and Prevention of Phishing Attacks, applied machine learning in the automation of vulnerability identification, and similar).

Cybersecurity Educational Games

Cybersecurity awareness games are highly considered an effective tool for promoting cybersecurity knowledge as they provide an engaging and interactive way to learn about cybersecurity risks and best practices to secure against potential cyber threats. This track can include ideas related to simulating phishing attacks, and cybersecurity awareness to school students, public individuals, or professional employees. It can also include education to technical people in an innovative way.

bottom of page