Welcome!

@BigDataExpo Authors: John Basso, Liz McMillan, Dana Gardner, Elizabeth White, Steven Lamb

News Feed Item

University of Central Florida wins 2014 Raytheon National Collegiate Cyber Defense Competition

Rochester Institute of Technology and University of Alaska, Fairbanks round out the winning schools as government and commercial cyber experts test the skills of teams from across the country

SAN ANTONIO, April 27, 2014 /PRNewswire/ -- University of Central Florida bested nine other finalist teams to win the 2014 Raytheon National Collegiate Cyber Defense Competition (NCCDC), held April 25-27 in San Antonio, Texas. The competition pitted the top ten college and university teams from across the country against each other to keep a fictional business running while under constant cyber-attack. Raytheon Company (NYSE: RTN) presented the competition, which was organized by the Center for Infrastructure Assurance and Security (CIAS) at the University of Texas at San Antonio (UTSA).

University of Central Florida wins 9th Annual Raytheon National Collegiate Cyber Defense Competition.  The competition pitted the top ten college and university teams from across the country to keep a fictional business running while under cyber-attack.

More than 180 colleges and universities and 2,000 undergraduate and graduate students participated in competitions that lead up to this year's national championship, which brought together the winners of 10 regional competitions held across the nation from February through early April.

 "As every sector of our society increases its reliance on networks and devices that must be protected, this competition provides practical experience to help prepare the next generation of cybersecurity  leaders to defend the ever growing internet of things against increasing threats," said Jack Harrington, vice president, Cyber and Special Missions within Raytheon Intelligence, Information and Services. "The Raytheon National Collegiate Cyber Defense Competition brings together the best of the best. Watching these teams test their skills against government and industry cyber experts gives us confidence in our economic and national security."

"This was a great finale to an amazing season," said Dwayne Williams, CIAS director of NCCDC. "Every year the competition gets bigger and better. The competitors are better prepared, the teams are stronger, and the challenges more intense. We know our stakeholders have the resources and vision to help us take the CCDC program to the next level."

Modeled from real world scenarios, the Raytheon NCCDC was the first national cyber security competition designed to test how well college students operate and manage a network infrastructure similar to the networks found in the commercial sector. At the start of the national championship on Friday, each eight-person team inherited an "operational" network for a mock online game hosting company. The teams were required to keep up with the operational needs of their business and their user demands while maintaining service level agreements for all of their critical Internet services. When they successfully completed business tasks and maintained services, the team earned points. When teams violated service level agreements, used recovery and restoration services, or when the team of government and industry cyber experts successfully penetrated a team's network, points were taken from their score.

At the end of the competition, the University of Central Florida team had earned the highest score and the right to take home the coveted Raytheon NCCDC Alamo Cup.

In addition to University of Central Florida's top finish, Rochester Institute of Technology placed second, and University of Alaska, Fairbanks placed third. The ten schools that competed at the championship were:

  • University of Alaska, Fairbanks, At Large Regional CCDC Winner
  • Towson University, Mid-Atlantic Regional Winner
  • Northern Kentucky University, Mid-West Regional Winner
  • Dakota State University, North Central Regional Winner
  • Rochester Institute of Technology, Northeast Regional Winner
  • Western Washington University, Pacific Rim Regional Winner
  • U.S. Air Force Academy, Rocky Mountain Regional Winner
  •  University of Central Florida, Southeast Regional Winner
  • Southern Methodist University, Southwest Regional Winner
  • University of California, Berkeley, Western Regional CCDC Winner

Sponsors of the Raytheon NCCDC include government agencies, colleges and commercial companies. As presenting sponsor, leading cyber provider Raytheon provided resources such as technical guidance and employee volunteers to support the national competition, as well as various regional competitions.

Additional sponsors at the national competition included:

  • Platinum sponsors: Department of Homeland Security (DHS) – Science and Technology, Splunk and Walmart
  • National sponsors: Goldman Sachs, Strategic Cyber LLC, U.S. Army Intelligence and Security Command (INSCOM), and the U.S. Space and Naval Warfare Systems Command (SPAWAR)
  • Gold sponsors: Boeing, FireEye, Guidance Software, Juniper Networks, and Microsoft
  • Silver sponsors: U.S. Air Force Reserve, Federal Bureau of Investigation (FBI), Hospital Corporation of America, Root9B, McAfee, and Trustwave
  • Other sponsors include: Akami, Amazon.com, Def-Logix, Exelis, Grantham University, Open Web Application Security Project (OWASP), Synack, Tesla, and Wolfram Research

About UTSA

The University of Texas at San Antonio is one of the fastest growing higher education institutions in Texas and one of nine academic universities and six health institutions in the UT System. As a multicultural institution, UTSA aims to be a national research university providing access to educational excellence and preparing citizen leaders for the global environment. UTSA serves more than 30,000 students in 134 degree programs in the colleges of Architecture, Business, Education and Human Development, Engineering, Honors, Liberal and Fine Arts, Public Policy, Sciences and Graduate School. Founded in 1969, UTSA is an intellectual and creative resource center and a socioeconomic development catalyst for Texas and beyond. Learn more at www.utsa.edu and www.nationalccdc.org.

About Raytheon

Raytheon Company, with 2013 sales of $24 billion and 63,000 employees worldwide, is a technology and innovation leader specializing in defense, security and civil markets throughout the world. With a history of innovation spanning 92 years, Raytheon provides state-of-the-art electronics, mission systems integration and other capabilities in the areas of sensing; effects; and command, control, communications and intelligence systems, as well as cyber security and a broad range of mission support services. Raytheon is headquartered in Waltham, Mass. For more about Raytheon, visit us at www.raytheon.com and follow us on Twitter @Raytheon.



Media Contact

Media Contact

Jason Kello

Kris Rodriguez

+1.571.250.1428  

+1.210.458.5116

[email protected] 

[email protected]



More than 180 colleges and universities and 2,000 undergraduate and graduate students participated in multiple tournament rounds -- including state, qualifiers and regionals -- that led up to this year's Raytheon National Collegiate Cyber Defense Competition.

Photo - http://photos.prnewswire.com/prnh/20140427/81073
Photo - http://photos.prnewswire.com/prnh/20140427/81074

SOURCE Raytheon Company

More Stories By PR Newswire

Copyright © 2007 PR Newswire. All rights reserved. Republication or redistribution of PRNewswire content is expressly prohibited without the prior written consent of PRNewswire. PRNewswire shall not be liable for any errors or delays in the content, or for any actions taken in reliance thereon.

@BigDataExpo Stories
Cloud analytics is dramatically altering business intelligence. Some businesses will capitalize on these promising new technologies and gain key insights that’ll help them gain competitive advantage. And others won’t. Whether you’re a business leader, an IT manager, or an analyst, we want to help you and the people you need to influence with a free copy of “Cloud Analytics for Dummies,” the essential guide to this explosive new space for business intelligence.
You think you know what’s in your data. But do you? Most organizations are now aware of the business intelligence represented by their data. Data science stands to take this to a level you never thought of – literally. The techniques of data science, when used with the capabilities of Big Data technologies, can make connections you had not yet imagined, helping you discover new insights and ask new questions of your data. In his session at @ThingsExpo, Sarbjit Sarkaria, data science team lead ...
WebRTC is bringing significant change to the communications landscape that will bridge the worlds of web and telephony, making the Internet the new standard for communications. Cloud9 took the road less traveled and used WebRTC to create a downloadable enterprise-grade communications platform that is changing the communication dynamic in the financial sector. In his session at @ThingsExpo, Leo Papadopoulos, CTO of Cloud9, discussed the importance of WebRTC and how it enables companies to focus...
Qosmos has announced new milestones in the detection of encrypted traffic and in protocol signature coverage. Qosmos latest software can accurately classify traffic encrypted with SSL/TLS (e.g., Google, Facebook, WhatsApp), P2P traffic (e.g., BitTorrent, MuTorrent, Vuze), and Skype, while preserving the privacy of communication content. These new classification techniques mean that traffic optimization, policy enforcement, and user experience are largely unaffected by encryption. In respect wit...
Manufacturers are embracing the Industrial Internet the same way consumers are leveraging Fitbits – to improve overall health and wellness. Both can provide consistent measurement, visibility, and suggest performance improvements customized to help reach goals. Fitbit users can view real-time data and make adjustments to increase their activity. In his session at @ThingsExpo, Mark Bernardo Professional Services Leader, Americas, at GE Digital, discussed how leveraging the Industrial Internet a...
IoT generates lots of temporal data. But how do you unlock its value? You need to discover patterns that are repeatable in vast quantities of data, understand their meaning, and implement scalable monitoring across multiple data streams in order to monetize the discoveries and insights. Motif discovery and deep learning platforms are emerging to visualize sensor data, to search for patterns and to build application that can monitor real time streams efficiently. In his session at @ThingsExpo, ...
Choosing the right cloud for your workloads is a balancing act that can cost your organization time, money and aggravation - unless you get it right the first time. Economics, speed, performance, accessibility, administrative needs and security all play a vital role in dictating your approach to the cloud. Without knowing the right questions to ask, you could wind up paying for capacity you'll never need or underestimating the resources required to run your applications.
Ovum, a leading technology analyst firm, has published an in-depth report, Ovum Decision Matrix: Selecting a DevOps Release Management Solution, 2016–17. The report focuses on the automation aspects of DevOps, Release Management and compares solutions from the leading vendors.
SYS-CON Events announced today that LeaseWeb USA, a cloud Infrastructure-as-a-Service (IaaS) provider, will exhibit at the 19th International Cloud Expo, which will take place on November 1–3, 2016, at the Santa Clara Convention Center in Santa Clara, CA. LeaseWeb is one of the world's largest hosting brands. The company helps customers define, develop and deploy IT infrastructure tailored to their exact business needs, by combining various kinds cloud solutions.
UpGuard has become a member of the Center for Internet Security (CIS), and will continue to help businesses expand visibility into their cyber risk by providing hardening benchmarks to all customers. By incorporating these benchmarks, UpGuard's CSTAR solution builds on its lead in providing the most complete assessment of both internal and external cyber risk. CIS benchmarks are a widely accepted set of hardening guidelines that have been publicly available for years. Numerous solutions exist t...
Up until last year, enterprises that were looking into cloud services usually undertook a long-term pilot with one of the large cloud providers, running test and dev workloads in the cloud. With cloud’s transition to mainstream adoption in 2015, and with enterprises migrating more and more workloads into the cloud and in between public and private environments, the single-provider approach must be revisited. In his session at 18th Cloud Expo, Yoav Mor, multi-cloud solution evangelist at Cloudy...
Extreme Computing is the ability to leverage highly performant infrastructure and software to accelerate Big Data, machine learning, HPC, and Enterprise applications. High IOPS Storage, low-latency networks, in-memory databases, GPUs and other parallel accelerators are being used to achieve faster results and help businesses make better decisions. In his session at 18th Cloud Expo, Michael O'Neill, Strategic Business Development at NVIDIA, focused on some of the unique ways extreme computing is...
The cloud market growth today is largely in public clouds. While there is a lot of spend in IT departments in virtualization, these aren’t yet translating into a true “cloud” experience within the enterprise. What is stopping the growth of the “private cloud” market? In his general session at 18th Cloud Expo, Nara Rajagopalan, CEO of Accelerite, explored the challenges in deploying, managing, and getting adoption for a private cloud within an enterprise. What are the key differences between wh...
SYS-CON Events announced today that Venafi, the Immune System for the Internet™ and the leading provider of Next Generation Trust Protection, will exhibit at @DevOpsSummit at 19th International Cloud Expo, which will take place on November 1–3, 2016, at the Santa Clara Convention Center in Santa Clara, CA. Venafi is the Immune System for the Internet™ that protects the foundation of all cybersecurity – cryptographic keys and digital certificates – so they can’t be misused by bad guys in attacks...
Security, data privacy, reliability, and regulatory compliance are critical factors when evaluating whether to move business applications from in-house, client-hosted environments to a cloud platform. Quality assurance plays a vital role in ensuring that the appropriate level of risk assessment, verification, and validation takes place to ensure business continuity during the migration to a new cloud platform.
Aspose.Total for .NET is the most complete package of all file format APIs for .NET as offered by Aspose. It empowers developers to create, edit, render, print and convert between a wide range of popular document formats within any .NET, C#, ASP.NET and VB.NET applications. Aspose compiles all .NET APIs on a daily basis to ensure that it contains the most up to date versions of each of Aspose .NET APIs. If a new .NET API or a new version of existing APIs is released during the subscription peri...
There will be new vendors providing applications, middleware, and connected devices to support the thriving IoT ecosystem. This essentially means that electronic device manufacturers will also be in the software business. Many will be new to building embedded software or robust software. This creates an increased importance on software quality, particularly within the Industrial Internet of Things where business-critical applications are becoming dependent on products controlled by software. Qua...
In addition to all the benefits, IoT is also bringing new kind of customer experience challenges - cars that unlock themselves, thermostats turning houses into saunas and baby video monitors broadcasting over the internet. This list can only increase because while IoT services should be intuitive and simple to use, the delivery ecosystem is a myriad of potential problems as IoT explodes complexity. So finding a performance issue is like finding the proverbial needle in the haystack.
"We host and fully manage cloud data services, whether we store, the data, move the data, or run analytics on the data," stated Kamal Shannak, Senior Development Manager, Cloud Data Services, IBM, in this SYS-CON.tv interview at 18th Cloud Expo, held June 7-9, 2016, at the Javits Center in New York City, NY.
DevOps at Cloud Expo – being held November 1-3, 2016, at the Santa Clara Convention Center in Santa Clara, CA – announces that its Call for Papers is open. Born out of proven success in agile development, cloud computing, and process automation, DevOps is a macro trend you cannot afford to miss. From showcase success stories from early adopters and web-scale businesses, DevOps is expanding to organizations of all sizes, including the world's largest enterprises – and delivering real results. Am...