Cyber Security Challenge part deux launches
The search for the next UK Cyber Security Champion kicks off this month.


The second Cyber Security Challenge UK has been launched, as the search for future experts in the industry continues.
As IT PRO learned at the 2011 InfoSec conference, this year's challenge will see a number of new competitions added to the line-up.
The central difference between this iteration and the last will be the increased frequency of competitions.
Organisers have also put together three skill sets they want addressed, including secure network design and informed defence, as well as the ability to investigate and understand cyber crime.
"Last year was a huge success in terms of identifying new talent and also introducing careers in the security industry as a real option to many people who had perhaps previously not considered it or thought they were not good enough,'" said James Lyne, director of technology strategy at Sophos.
"We've taken candidate feedback on both the challenges and the registration process into account and this year's new and enhanced challenges aim to make the whole experience even more fun and to test an even greater number of skills."
SAIC has joined the fold of platinum sponsors and will be running a competition where challengers will have their progress graphically tracked using the firm's CyberNEXS training model.
Get the ITPro daily newsletter
Sign up today and you will receive a free copy of our Future Focus 2025 report - the leading guidance on AI, cybersecurity and other IT challenges as per 700+ senior executives
This year's competition has also received 180,000 of Government funding.
Anyone can now register for the competition via the Challenge's brand new website.
The first competition ended in March as Dan Summers, a postman from Wakefield, was named as the Cyber Security Champion. He took home a range of career-enhancing rewards worth around 6,000 after beating 25 other contestants in the final.
Over 4,000 people entered the competition last year, surpassing organisers' expectations.
Tom Brewster is currently an associate editor at Forbes and an award-winning journalist who covers cyber security, surveillance, and privacy. Starting his career at ITPro as a staff writer and working up to a senior staff writer role, Tom has been covering the tech industry for more than ten years and is considered one of the leading journalists in his specialism.
He is a proud alum of the University of Sheffield where he secured an undergraduate degree in English Literature before undertaking a certification from General Assembly in web development.
-
Cleo attack victim list grows as Hertz confirms customer data stolen
News Hertz has confirmed it suffered a data breach as a result of the Cleo zero-day vulnerability in late 2024, with the car rental giant warning that customer data was stolen.
By Ross Kelly
-
Lateral moves in tech: Why leaders should support employee mobility
In-depth Encouraging staff to switch roles can have long-term benefits for skills in the tech sector
By Keri Allan
-
96% of SMBs are missing critical cybersecurity skills – here's why
News The skills shortage hits SMBs worse as they often suffer from a lack of budget and resources
By George Fitzmaurice
-
Sophos Firewall Virtual review: Affordable network protection for those that like it virtualized
Reviews Extreme network security that's cheaper than a hardware appliance and just as easy to deploy
By Dave Mitchell
-
MSPs are struggling with cyber security skills shortages
News A shortage of tools and difficulties keeping pace with solutions were also ranked as key issues for MSPs
By George Fitzmaurice
-
Nearly 70 software vendors sign up to CISA’s cyber resilience program
News Major software manufacturers pledge to a voluntary framework aimed at boosting cyber resilience of customers across the US
By Solomon Klappholz
-
Sophos and Tenable team up to launch new managed risk service
News The new fully managed service aims to help organizations manage and protect external attack surfaces
By Daniel Todd
-
Ransomware groups are using media coverage to coerce victims into paying
News Threat actors are starting to see the benefits of a more sophisticated media strategy for extracting ransoms
By Solomon Klappholz
-
Shrinking cyber attack “dwell times” highlight growing war of attrition with threat actors
News While teams are becoming more proficient at detecting threats, attackers are augmenting their strategies
By Ross Kelly
-
Cyber security in the retail sector
Whitepapers Retailers need to ensure their business operations and internal data aren't breached
By ITPro