Security is You(th) Hackathon

 

SECURITY IS YOU(TH)! - AN EVENT DEDICATED TO THE FUTURE GENERATION OF SECURITY PROFESSIONALS

 

Security is You(th) is a Europe-wide initiative designed to engage and inspire the next generation of security professionals through hands-on challenges, mentorship, and networking opportunities.

 

The Security is You(th) Hackathon will see teams of students enrolled in security-related Master's Programs discuss the resolution of a case study in the field of corporate security. Each team will present its solution in front of a jury of security professionals, who will vote for the best presentation.

 

The team will be communicated on May 6, 2025. Each team will be composed of a maximum of 5 participants.

 

On June 6, remotely, the activities will be presented and the defined case studies will be communicated to the teams. Each team will work independently to resolve the chosen case study by preparing a presentation, which will be completed and sent via email no later than 9:00 am on the following day.

 

On June 7, the teams will present their work in person to a jury of security managers and security experts. Each presentation must be in English and respect the time limit that will be communicated upon admission (approximately 15-20 minutes per team). It will not be possible to participate in the presentation remotely.

 

Each participant of the winning team will be able to choose an ASIS Certificate Course to enroll in (click here to discover the available courses).

 

Participants can register using the form available at the following link: Participant Registration

 

 

 

Read the official event rules & format below.

 

1. Eligibility

  • Open to students in security-related fields (e.g., cybersecurity, risk management, criminology, intelligence studies).

  • Each participant must register in advance via the official sign-up form.

  • Registration is open to grounds of up to 5 participants or individual registration. Individual participants will be assigned to a team.

2. Team Formation & Participation

 

  • Teams will be communicated 1 month before the event.

  • Teams will be composed of a maximum of 5 participants.

  • Mixed-discipline teams will be encouraged.

  • Participants are expected to actively contribute to their teams.

3. Competition Format

1️⃣ One Month Before the EventParticipants receive communication about their team and other team members.

 

 

2️⃣ One Week Before the Event:

 

  • Participants receive a broad security theme (e.g., "Cyber Resilience in Smart Cities") to guide their initial research.

  • They are provided with recommended readings and resources to help frame their understanding of the topic.

3️⃣ Day 1 – Online Challenge Briefing & Hackathon:

 

  • Participants join a live online briefing where they receive a specific challenge within the theme (e.g., "Design a response plan for a cyber attack on public infrastructure").

  • This session will provide essential context, rules, and expectations for the competition.

  • Teams will be given real-world security challenges to solve within the allocated time.

4️⃣ Day 2 Morning – 9:00 AM – Challenge Submission Deadline:

 

Teams must submit an abstract that includes:

 

✅ A brief summary of their approach
✅ A clear problem statement/breakdown
✅ A detailed solution explanation
✅ Supporting materials (slides, diagrams, etc.)

 

5️⃣ Day 2 Afternoon – 2:00 PM – Live Presentations & Judging:

 

  • In the afternoon, teams will present their solutions to a panel of industry judges.

  • The panel will evaluate submissions based on innovation, feasibility, technical execution, and presentation quality.

  • The presentation will be livestreamed.

4. Judging Criteria

 

Submissions will be evaluated based on:

 

✅ Innovation & Creativity – How unique and forward-thinking is the solution?
✅ Feasibility – Can the solution be realistically implemented?
✅ Technical Execution – How well does the team apply security knowledge?
✅ Impact & Relevance – How effectively does the solution address the challenge?
✅ Presentation & Communication – How well is the idea articulated?

 

5. Submission Guidelines

 

  • Teams must submit their final solutions by the deadline which is 9:00am day of presentation.

  • Submissions should include a brief summary, clear problem statement/breakdown, proposed solution explanation, and supporting materials (slides, diagrams, etc.).

6. Prizes

 

  • The top-performing team will receive vouchers to complete an ASIS certification course of their choosing from the list available here.

  • All participants will receive a certificate of participation.

7. Code of Conduct

 

  • Respect & Collaboration – All participants must engage professionally and respectfully.

  • Original Work – Teams must submit original work developed during the hackathon.

  • No Plagiarism or Misconduct – Any form of cheating, plagiarism, or disruptive behaviour will result in disqualification.

  • Decision Finality – Judges’ decisions are final and cannot be contested.

8. Post-Event Opportunities

 

  • Winning solutions may be featured in industry publications and shared with ASIS France and ASIS Europe members.

  • Participants of the winning team may be invited to ASIS France Chapter Events to present their challenge and solutions. 

  • Participants will have the opportunity to network with security professionals and potential employers.

9. Contact & Support

 

 

 

Sponsor ASIS Is You(th) Sponsor ASIS Is You(th)