top of page
WE Innovate-06.png

Cybersecurity Hackathon
2023

Objectives & Deliverables

In light of the National Cybersecurity Strategy (2023-2027), which aims to raise the level of readiness to confront cyber risks in all sectors of the country, secure information infrastructure and provide integrated electronic services, as part of the country's efforts towards digital transformation and attention to cyber security. Within the framework of this initiative, we offer "We Innovate Hackathon"
This is a hands-on hackathon, your target throughout the event duration is to deliver a working proof of concept of a solution to one or multiple of the below mentioned challenges. Addressing other challenges than the mentioned ones will be out of this hackathon's scope and will not be accepted.

One of the major competences that will be under assessment in our event is your ability to work in teams, your capacity to rally other calibers and motivate them to join your project, accordingly all presentations, mentorship sessions, awards & prizes will all be team based. If you don't have a team ready we will connect you online upon registration with other contestants to form your team.

 

Judging Criteria

  1. A Working Proof of Concept (PoC)
    Ideas shall be submitted with a proof of concept (PoC) to show the feasibility and potential of implementing this new idea.
     

  2. Creativity & Relevance: The solution should be unique, innovative and appropriate to one or more of the listed Hackathon challenges below.
     

  3. Originality: The solution must demonstrate a level of originality not just a copy of the market solutions that exist. It should be either a totally new solution or a significant enhancement on an existing one and in the enhancement case the team should clearly mention the original solution they are basing their enhancement on. Solution plagiarism will force the judgment committee to disqualify the team.
     

  4. Quality and effectiveness: A technical assessment of the quality of the functions of the solution based on the product provided.
     

  5. Applicability: The project's ability to solve problems related to the chosen challenge.
     

  6. Technology: The potential technological and disruptive impact of the solution.
     

  7. Scalability and market potential: Solution usability and scalability in the region and/or globally.

Challeges

Target Challenges

IoT Security

The increasing adoption of IoT devices in various industries has led to a growing concern over their security, given the potential risks of data breaches, cyber-attacks, and unauthorized access. The IoT Security track can include ideas related to Routers Security, Industrial Control system security, critical infrastructure security, automotive security, and similar.

Cyber Threats Detection and Prevention

Threat detection is critical in cybersecurity as it helps to identify potential security breaches before they occur, allowing organizations to take preventative measures to protect their systems and data. This track can include ideas related to Threat Intelligence, Threat Hunting, Logging and Monitoring, SOC automation, Threat detection and prevention on Social Media platforms, and similar.

Compliance

Handling compliance and regulation in cybersecurity can be challenging due to the rapidly evolving threat landscape, the complexity of systems and technologies, and limited resources. This track can include ideas related to compliance management, compliance automation, data privacy management, PII ( Personally Identifiable Information) classification, and similar.

Software Security

Software security is essential for protecting sensitive data, maintaining business continuity, complying with regulations, protecting reputation, and saving costs. Currently, with the digital transformation that is happening across the country, the need for software security is increasing rapidly. The Software Security track can include ideas related to Code analysis, Patch Management, Vulnerability Management, and similar).

Endpoint Protection

Endpoint protection is a critical component of cybersecurity that involves detecting and preventing cyber threats on endpoint devices, such as desktops, laptops, and mobile devices. Some common threats that endpoint protection aims to detect and prevent include ransomware attacks, phishing emails, and malware infections. The End Point Security track can include ideas related to the Detection and Prevention of Ransomware Attacks, Detection and Blocking of Phishing e-mails, Real-Time Protection, Anti-malware Solutions, and similar).

AI in Cybersecurity

The use of Artificial Intelligence (AI) in cybersecurity has gained a lot of attention in recent years due to its potential to significantly enhance the effectiveness and efficiency of cybersecurity solutions. The AI in Cyber Security track can include ideas related to Identifying and Responding to Cyber Threats in real-time, Detection and Prevention of Phishing Attacks, applied machine learning in the automation of vulnerability identification, and similar).

Cybersecurity Educational Games

Cybersecurity awareness games are highly considered an effective tool for promoting cybersecurity knowledge as they provide an engaging and interactive way to learn about cybersecurity risks and best practices to secure against potential cyber threats. This track can include ideas related to simulating phishing attacks, and cybersecurity awareness to school students, public individuals, or professional employees. It can also include education to technical people in an innovative way.

Rules & Regulations

Who is this hackathon for?

 

The intended beneficiaries of the Hackathons are young cybersecurity computer engineers or software developers who meet the following eligibility criteria:

  • Citizens from the following countries (Algeria, Bahrain, Egypt, Indonesia, Kuwait, Iraq, Jordan, Lebanon, Libya, Oman, Qatar, Malaysia, Morocco, Palestine, Saudi Arabia, Sudan, Tunisia, Turkey, Yemen, or United Arab Emirates)

  • Minimum age is 18 years old.

  • The passport must be valid until at least Dec 2023

  • To be able to commit to following the entire Hackathon program, the online bootcamp first 2 weeks of may and in person on site during the main event from 16-18 May (please refer to the timeline page for the latest schedule updates)

  • To be fluent in Arabic and English in writing and speaking. 

  • Have communication & presentation skills

  • Knowledge in any Cybersecurity domain

  • To be interested or have a passion for using technology to develop digitally innovative cybersecurity solutions.

  • To have basic coding skills and some experience in at least one of the development technologies.

  • To have an active laptop that can be brought to Cairo, Egypt at the time of the hackathon.

  • Be familiar with one or more of the hackathon’s listed themes.

Registration Notes: 
 

  • Participants are encouraged to form teams not exceeding 4 members and apply.

  • Individual applicants are also welcomed to apply, WE Innovate will place the nominated individual applicants in teams during team formation phase listed in the timeline.

  • In all cases each contestant will apply individually and in case you have a team formed, all team members need to enter their team’s name in their individual application, otherwise applicant will be considered as an individual application. It is important to mention your team name because team applicants are usually rank higher in the screening stage.

  • To apply, you don’t have to have an idea of a developed prototype, but it’s best to have an idea of the challenge you’re going to address among the themes & challenges listed here.


 

Team Formation:

 

Ideally, teams should have skills diversity, such as:

  • Solution building and coding skills (must): programming and development of systems and technological solutions, either by implementing new codes or by structuring and installing existing solutions.

  • The topic (recommended): Understanding of one or more of the hackathon’s themes and challenges.

  • Business (recommended): Business modeling and proposed value development. Creativity and innovation can strategize to develop products or services using an effective business model, analyze potential risks and project validity, and mobilize the necessary resources.

  • Design (optional): The use of design tools for visual communication, including attention to user experience Dynamics and creativity are especially encouraged to represent team ideas with the most adapted tools.

Evaluation criteria

 

Screening stage
 

This stage’s objective is to confirm your eligibility to the competition and decide whether your team, your solution and your technical approach are on track to a potential PoC successful delivery or not. 

In the screening presentation you are not required to demo any working solution at this stage, you only need to present the following:

  1. Your topic of choice and your target problem statement you’re planning to solve and why did you choose it.

  2. Your literature review or research results on the available solutions to your chosen problem statement 

  3. Your proposed solution to your chosen problem statement and what will you be doing differently.

  4. Your team and why did you choose each other.


 

Final Pitch
 

Each team will be responsible for presenting their final work in an interesting and concise manner where the submission does not exceed 5 min, and specific evaluation criteria must be followed in the submission. 

The team can adopt any presentation tool they see fit such as presentation, visual aids, short videos and live demos.

Presentation must include a working proof of concept (PoC). A PoC is the minimum technical implementation that shoes that your idea is possible and that your team have the capability of building it.

Based on the presentation, a jury composed of experts in different fields will select from among the prototypes presented, the top 3 solutions and are selected according to the following criteria:

  1. A Working Proof of Concept (PoC): Ideas shall be submitted with a proof of concept (PoC) to show the feasibility and potential of implementing this new idea.

  2. Creativity: The solution should be unique, innovative and appropriate to the challenge theme in question.

  3. Originality: The solution must demonstrate a level of originality not just a copy of the market solutions that exist. It should be either a totally new solution or a significant enhancement on an existing one and in the enhancement case the team should clearly mention the original solution they are basing their enhancement on. Solution plagiarism will force the judgment committee to disqualify the team.

  4. Quality and effectiveness: A technical assessment of the quality of the functions of the solution based on the product provided.

  5. Applicability: The project's ability to solve problems related to the chosen challenge.

  6. Technology: The potential technological and disruptive impact of the solution.

  7. Scalability and market potential: Solution usability and scalability in the region and/or globally.

bottom of page