Feeds

New UK cyber-champ: Chemist's winning formula cracks 'F1 race hack'

Free radical beats year-long security challenge

Choosing a cloud hosting partner with confidence

Updated A 28-year-old chemist is the new UK Cyber Security Champion after triumphing in a year-long competition that tested computer defence skills.

Stephen Miller, from Hertfordshire, beat thousands of other hopefuls after competing in several online and face-to-face heats. Miller, who works as a lab team manager at a major pharmaceutical company, has taken part in the tournament since it launched in 2010, building up his skills along the way. Although he has no formal computer security training, examiners praised his abilities.

He was named as Blighty's e-champion after the final masterclass round of 2013's Cyber Security Challenge UK on Sunday. Miller's prize includes free access to industry training courses. The runner-up was Steve Jarvis, a 24-year-old from Southampton, who works in the IT team for a hedge fund and also has had no formal cyber-security training.

Miller told El Reg that he'd previously reached the last 25 of the competition two years ago and had also entered other competitions, such as BBC Backstage. He has dabbled in programming with PHP and JavaScript.

"I see more cyber-security as a hobby," he said. "I'm quite established in my career and not ready to make the leap. Nonetheless, getting involved in a challenge like this shows I have other capabilities outside running a chemistry lab."

This year’s final was organised by security teams at HP and Cassidian Cyber Security. The 40 finalists took on the role of infosec professionals at a fictitious technology communications supplier to a Formula 1 racing team, which had been hacked in the lead up to a Grand Prix.

Players had to spot signs of malicious attacks and come up with the best counter-measures, both technical and policy based, to fix them. The competition was designed to test contestants with problems facing real IT security pros in many sectors across industry and government.

Security experts at HP and Cassidian who set up the challenge final praised Miller's business acumen and leadership skills, factors that proved decisive in his victory in the grand final of the Challenge.

In the three years of the Challenge, 40 challenge candidates have gone on to gain paid internships or to secure jobs in information security.

"To succeed in this competition and become the UK’s new cyber security champion, Stephen has had to demonstrate not only exceptional technical skills but also an ability to relate them to a common business scenario," said HP's Jonathan Bathurst.

"This requires an ability to weigh up risk, take into account budgets and operational limitations and be able to present a coherent case to a non-technical audience with sensible measures that are in the best interest of the organisation for the future. It is this skill set that employers value highest of all and the competition was designed to identify."

'A powerful demonstration of the hidden talent'

Stephanie Daman, chief exec of Cyber Security Challenge UK, added: "Stephen’s success in the challenge, as a chemist with no formal training in this profession, is a powerful demonstration of the hidden talent that exists in people from across all types of professional backgrounds."

The culmination of this season's competition was immediately followed by the launch of a new programme of competitions for the 2013-14 Cyber Security Challenge UK. Registrations are now open at www.cybersecuritychallenge.org.uk.

The fourth season of the challenge will include rounds designed specifically for school pupils in regional training camps delivered in partnership with universities. The season will also include a greater range of tests including mobile forensics, incident response, malware analysis, and software vulnerabilities.

Prizes will include a bursary for a master's degree in cyber security, sponsored by the Institute of Engineering and Technology, at three UK universities. This year also sees the debut of a Cyber Security Challenge app for iOS and Android. The app will distribute kill tests, news on the challenge and an access point for advice on computer security careers. It has been launched with a brand new cipher to crack from PwC, available through the app.

Cyber Security Challenge UK runs a series of national competitions ultimately aimed at attracting talented people into the profession, and supporting interested people with information about cyber security careers and learning opportunities. The scheme is supported by government departments, IT firms, universities and trade groups including the Cabinet Office, PwC, BT, GCHQ, QinetiQ, the SANS Institute, Sophos and Blighty's Serious Organised Crime Agency (SOCA). ®

Choosing a cloud hosting partner with confidence

More from The Register

next story
Webcam hacker pervs in MASS HOME INVASION
You thought you were all alone? Nope – change your password, says ICO
You really need to do some tech support for Aunty Agnes
Free anti-virus software, expires, stops updating and p0wns the world
USB coding anarchy: Consider all sticks licked
Thumb drive design ruled by almighty buck
Attack reveals 81 percent of Tor users but admins call for calm
Cisco Netflow a handy tool for cheapskate attackers
Privacy bods offer GOV SPY VICTIMS a FREE SPYWARE SNIFFER
Looks for gov malware that evades most antivirus
Patch NOW! Microsoft slings emergency bug fix at Windows admins
Vulnerability promotes lusers to domain overlords ... oops
prev story

Whitepapers

Why and how to choose the right cloud vendor
The benefits of cloud-based storage in your processes. Eliminate onsite, disk-based backup and archiving in favor of cloud-based data protection.
Getting started with customer-focused identity management
Learn why identity is a fundamental requirement to digital growth, and how without it there is no way to identify and engage customers in a meaningful way.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
Beginner's guide to SSL certificates
De-mystify the technology involved and give you the information you need to make the best decision when considering your online security options.
New hybrid storage solutions
Tackling data challenges through emerging hybrid storage solutions that enable optimum database performance whilst managing costs and increasingly large data stores.