The Australian Cyber Security Centre (ACSC) and Splunk Boss of the Security Operations Centre (BOTS) Day is underway today with up to 650 players participating across Australia and New Zealand.
The region’s biggest capture-the-flag-style event tests the skills of cyber security professionals in our largest business, government and education organisations.
Rhys from the Gold Coast Council says ‘the event provides the team with the opportunity to sharpen our IR skills against simulated events and threat scenarios in a fun and educational day.’
For the first time, New Zealand has joined the competition that tests and strengthens incident responders’ defensive technical skills across the banking, energy, telecommunications and other national sectors.
Players are competing against each other from the ACSC’s national centres in Canberra, Sydney, Melbourne, Adelaide, Perth and Brisbane. This year extra teams in Hobart, Darwin, Auckland and Wellington join fellow security operations centre analysts to hunt a malicious actor in a fictitious scenario.
Connected by video link, participants work their way through questions about security incidents and earn points for speed and technique, on a platform provided by Splunk Inc.
Security consultant, Chris from Telstra can’t wait to get on the tools. ‘It’s a great practical event that really tests our response skills, so we can take those learnings back into the workplace.’
Head of the ACSC, Rachel Noble, says ‘The event is an invaluable opportunity to strengthen national cyber resilience and cooperation by bringing people together to build collective cyber defences.’
‘It is one of the largest national events in our region’s cyber security calendar. It has developed a strong following that continues to grow every year, and is a regular part of the ACSC’s cyber security capability-building events.’
‘Increasing national cyber security resilience is a team effort. Events like this help us build a community that’s even better equipped to detect, respond to and prevent cybercrime and other malicious intrusions.’