Can Anyone Beat the Dutch Hackers?

Share Article

The regional finalists of the Global CyberLympics competition, EC-Council Foundation’s worldwide hacking event, were officially announced, with two teams from The Netherlands looking to continue their country’s three-year winning streak in Barcelona, Spain.

Global CyberLympics Mission Statement

the world is watching to see if the dominant Dutch can finally be unseated as the reigning world champions of hacking

The best hacking teams on the planet have battled each other in competitions all over the world to make it to the finals of the Global CyberLympics. Two teams from each region earned their spots in the finals:

South America
Proteus – Brazil
Honey BadgERS – Peru

North America
Cyber Padawans 1 – Maryland, US
IDK IDC – Texas, US

Europe
Hack.ERS – Netherlands
Sector C – Netherlands

Africa
Lights – Sudan
Sudan T00r – Sudan

Asia
aaaaaa – India
Foresty – Indonesia

Australia
PentestACLs – Australia
AlpacaHackers – Australia

The world championship rounds of the Global CyberLympics competition will be held alongside ISACA’s European Computer Audit, Control and Security (CACS)/Information Security and Risk Management (ISRM) Conference in Barcelona, Spain, on September 29, and the world is watching to see if the dominant Dutch can finally be unseated as the reigning world champions of hacking. With a winning streak of three years behind them, the challenging teams have their work cut out for them as the Dutch are very used to winning it all. The top contenders to topple the Dutch are the US and Australia teams as their qualifying regional scores came closest to the reigning champions’.

This year EC-Council Foundation, the non-profit behind the games, has partnered with global IT association ISACA to bring the live hacking event to a larger audience.

Global CyberLympics is an online ethical hacking, computer network defense game, dedicated to finding the top computer network defense teams. Teams are made up of 4 to 6 players, and each round serves as an elimination round until only winning teams remain. The top winning eligible teams from every continent are invited to play the game live in person at the world finals.

Global CyberLympics’ goal is to raise awareness towards increased education and ethics in information security through a series of cyber competitions that encompass forensics, ethical hacking, and defense. One key initiative for Global CyberLympics is to foster an environment that creates child online protection through education. The mission statement of the Global CyberLympics is “Unifying Global Cyber Defense through the Games.”

About EC-Council Foundation
EC-Council Foundation is a charitable and educational organization dedicated to educating and training individuals in cyber security. Established in 2012 by EC-Council, the foundation seeks to raise awareness, build capacity across nations and ultimately unify global cyber defense. EC-Council Foundation is the creator and organizer of Global CyberLympics, Hacker Halted, TakeDownCon, The Global CISO Form and Live.Learn.Secure., an education and training program. For more information regarding EC-Council Foundation or any of its programs, visit http://www.eccouncilfoundation.org.

About ISACA
With more than 115,000 constituents in 180 countries, ISACA® (http://www.isaca.org) helps business and IT leaders build trust in, and value from, information and information systems. Established in 1969, ISACA is the trusted source of knowledge, standards, networking, and career development for information systems audit, assurance, security, risk, privacy and governance professionals. ISACA offers the Cybersecurity Nexus™, a comprehensive set of resources for cybersecurity professionals, and COBIT®, a business framework that helps enterprises govern and manage their information and technology. ISACA also advances and validates business-critical skills and knowledge through the globally respected Certified Information Systems Auditor® (CISA®), Certified Information Security Manager® (CISM®), Certified in the Governance of Enterprise IT® (CGEIT®) and Certified in Risk and Information Systems Control™ (CRISC™) credentials. The association has more than 200 chapters worldwide.

Share article on social media or email:

View article via:

Pdf Print

Contact Author

Devona Valdez
Visit website