Welcome!

News Feed Item

University of Central Florida wins 2014 Raytheon National Collegiate Cyber Defense Competition

Rochester Institute of Technology and University of Alaska, Fairbanks round out the winning schools as government and commercial cyber experts test the skills of teams from across the country

SAN ANTONIO, April 27, 2014 /PRNewswire/ -- University of Central Florida bested nine other finalist teams to win the 2014 Raytheon National Collegiate Cyber Defense Competition (NCCDC), held April 25-27 in San Antonio, Texas. The competition pitted the top ten college and university teams from across the country against each other to keep a fictional business running while under constant cyber-attack. Raytheon Company (NYSE: RTN) presented the competition, which was organized by the Center for Infrastructure Assurance and Security (CIAS) at the University of Texas at San Antonio (UTSA).

University of Central Florida wins 9th Annual Raytheon National Collegiate Cyber Defense Competition.  The competition pitted the top ten college and university teams from across the country to keep a fictional business running while under cyber-attack.

More than 180 colleges and universities and 2,000 undergraduate and graduate students participated in competitions that lead up to this year's national championship, which brought together the winners of 10 regional competitions held across the nation from February through early April.

 "As every sector of our society increases its reliance on networks and devices that must be protected, this competition provides practical experience to help prepare the next generation of cybersecurity  leaders to defend the ever growing internet of things against increasing threats," said Jack Harrington, vice president, Cyber and Special Missions within Raytheon Intelligence, Information and Services. "The Raytheon National Collegiate Cyber Defense Competition brings together the best of the best. Watching these teams test their skills against government and industry cyber experts gives us confidence in our economic and national security."

"This was a great finale to an amazing season," said Dwayne Williams, CIAS director of NCCDC. "Every year the competition gets bigger and better. The competitors are better prepared, the teams are stronger, and the challenges more intense. We know our stakeholders have the resources and vision to help us take the CCDC program to the next level."

Modeled from real world scenarios, the Raytheon NCCDC was the first national cyber security competition designed to test how well college students operate and manage a network infrastructure similar to the networks found in the commercial sector. At the start of the national championship on Friday, each eight-person team inherited an "operational" network for a mock online game hosting company. The teams were required to keep up with the operational needs of their business and their user demands while maintaining service level agreements for all of their critical Internet services. When they successfully completed business tasks and maintained services, the team earned points. When teams violated service level agreements, used recovery and restoration services, or when the team of government and industry cyber experts successfully penetrated a team's network, points were taken from their score.

At the end of the competition, the University of Central Florida team had earned the highest score and the right to take home the coveted Raytheon NCCDC Alamo Cup.

In addition to University of Central Florida's top finish, Rochester Institute of Technology placed second, and University of Alaska, Fairbanks placed third. The ten schools that competed at the championship were:

  • University of Alaska, Fairbanks, At Large Regional CCDC Winner
  • Towson University, Mid-Atlantic Regional Winner
  • Northern Kentucky University, Mid-West Regional Winner
  • Dakota State University, North Central Regional Winner
  • Rochester Institute of Technology, Northeast Regional Winner
  • Western Washington University, Pacific Rim Regional Winner
  • U.S. Air Force Academy, Rocky Mountain Regional Winner
  •  University of Central Florida, Southeast Regional Winner
  • Southern Methodist University, Southwest Regional Winner
  • University of California, Berkeley, Western Regional CCDC Winner

Sponsors of the Raytheon NCCDC include government agencies, colleges and commercial companies. As presenting sponsor, leading cyber provider Raytheon provided resources such as technical guidance and employee volunteers to support the national competition, as well as various regional competitions.

Additional sponsors at the national competition included:

  • Platinum sponsors: Department of Homeland Security (DHS) – Science and Technology, Splunk and Walmart
  • National sponsors: Goldman Sachs, Strategic Cyber LLC, U.S. Army Intelligence and Security Command (INSCOM), and the U.S. Space and Naval Warfare Systems Command (SPAWAR)
  • Gold sponsors: Boeing, FireEye, Guidance Software, Juniper Networks, and Microsoft
  • Silver sponsors: U.S. Air Force Reserve, Federal Bureau of Investigation (FBI), Hospital Corporation of America, Root9B, McAfee, and Trustwave
  • Other sponsors include: Akami, Amazon.com, Def-Logix, Exelis, Grantham University, Open Web Application Security Project (OWASP), Synack, Tesla, and Wolfram Research

About UTSA

The University of Texas at San Antonio is one of the fastest growing higher education institutions in Texas and one of nine academic universities and six health institutions in the UT System. As a multicultural institution, UTSA aims to be a national research university providing access to educational excellence and preparing citizen leaders for the global environment. UTSA serves more than 30,000 students in 134 degree programs in the colleges of Architecture, Business, Education and Human Development, Engineering, Honors, Liberal and Fine Arts, Public Policy, Sciences and Graduate School. Founded in 1969, UTSA is an intellectual and creative resource center and a socioeconomic development catalyst for Texas and beyond. Learn more at www.utsa.edu and www.nationalccdc.org.

About Raytheon

Raytheon Company, with 2013 sales of $24 billion and 63,000 employees worldwide, is a technology and innovation leader specializing in defense, security and civil markets throughout the world. With a history of innovation spanning 92 years, Raytheon provides state-of-the-art electronics, mission systems integration and other capabilities in the areas of sensing; effects; and command, control, communications and intelligence systems, as well as cyber security and a broad range of mission support services. Raytheon is headquartered in Waltham, Mass. For more about Raytheon, visit us at www.raytheon.com and follow us on Twitter @Raytheon.



Media Contact

Media Contact

Jason Kello

Kris Rodriguez

+1.571.250.1428  

+1.210.458.5116

[email protected] 

[email protected]



More than 180 colleges and universities and 2,000 undergraduate and graduate students participated in multiple tournament rounds -- including state, qualifiers and regionals -- that led up to this year's Raytheon National Collegiate Cyber Defense Competition.

Photo - http://photos.prnewswire.com/prnh/20140427/81073
Photo - http://photos.prnewswire.com/prnh/20140427/81074

SOURCE Raytheon Company

More Stories By PR Newswire

Copyright © 2007 PR Newswire. All rights reserved. Republication or redistribution of PRNewswire content is expressly prohibited without the prior written consent of PRNewswire. PRNewswire shall not be liable for any errors or delays in the content, or for any actions taken in reliance thereon.

Latest Stories
SYS-CON Events announced today that CA Technologies has been named “Platinum Sponsor” of SYS-CON's 21st International Cloud Expo®, which will take place October 31-November 2, 2017, at the Santa Clara Convention Center in Santa Clara, CA. CA Technologies helps customers succeed in a future where every business – from apparel to energy – is being rewritten by software. From planning to development to management to security, CA creates software that fuels transformation for companies in the applic...
IT organizations are moving to the cloud in hopes to approve efficiency, increase agility and save money. Migrating workloads might seem like a simple task, but what many businesses don’t realize is that application migration criteria differs across organizations, making it difficult for architects to arrive at an accurate TCO number. In his session at 21st Cloud Expo, Joe Kinsella, CTO of CloudHealth Technologies, will offer a systematic approach to understanding the TCO of a cloud application...
Translating agile methodology into real-world best practices within the modern software factory has driven widespread DevOps adoption, yet much work remains to expand workflows and tooling across the enterprise. As models evolve from pockets of experimentation into wholescale organizational reinvention, practitioners find themselves challenged to incorporate the culture and architecture necessary to support DevOps at scale.
"With Digital Experience Monitoring what used to be a simple visit to a web page has exploded into app on phones, data from social media feeds, competitive benchmarking - these are all components that are only available because of some type of digital asset," explained Leo Vasiliou, Director of Web Performance Engineering at Catchpoint Systems, in this SYS-CON.tv interview at DevOps Summit at 20th Cloud Expo, held June 6-8, 2017, at the Javits Center in New York City, NY.
SYS-CON Events announced today that Secure Channels, a cybersecurity firm, will exhibit at SYS-CON's 21st International Cloud Expo®, which will take place on Oct 31 – Nov 2, 2017, at the Santa Clara Convention Center in Santa Clara, CA. Secure Channels, Inc. offers several products and solutions to its many clients, helping them protect critical data from being compromised and access to computer networks from the unauthorized. The company develops comprehensive data encryption security strategie...
An increasing number of companies are creating products that combine data with analytical capabilities. Running interactive queries on Big Data requires complex architectures to store and query data effectively, typically involving data streams, an choosing efficient file format/database and multiple independent systems that are tied together through custom-engineered pipelines. In his session at @BigDataExpo at @ThingsExpo, Tomer Levi, a senior software engineer at Intel’s Advanced Analytics ...
The goal of Continuous Testing is to shift testing left to find defects earlier and release software faster. This can be achieved by integrating a set of open source functional and performance testing tools in the early stages of your software delivery lifecycle. There is one process that binds all application delivery stages together into one well-orchestrated machine: Continuous Testing. Continuous Testing is the conveyer belt between the Software Factory and production stages. Artifacts are m...
Cloud resources, although available in abundance, are inherently volatile. For transactional computing, like ERP and most enterprise software, this is a challenge as transactional integrity and data fidelity is paramount – making it a challenge to create cloud native applications while relying on RDBMS. In his session at 21st Cloud Expo, Claus Jepsen, Chief Architect and Head of Innovation Labs at Unit4, will explore that in order to create distributed and scalable solutions ensuring high availa...
Cloud adoption is often driven by a desire to increase efficiency, boost agility and save money. All too often, however, the reality involves unpredictable cost spikes and lack of oversight due to resource limitations. In his session at 20th Cloud Expo, Joe Kinsella, CTO and Founder of CloudHealth Technologies, tackled the question: “How do you build a fully optimized cloud?” He will examine: Why TCO is critical to achieving cloud success – and why attendees should be thinking holistically abo...
In IT, we sometimes coin terms for things before we know exactly what they are and how they’ll be used. The resulting terms may capture a common set of aspirations and goals – as “cloud” did broadly for on-demand, self-service, and flexible computing. But such a term can also lump together diverse and even competing practices, technologies, and priorities to the point where important distinctions are glossed over and lost.
Internet-of-Things discussions can end up either going down the consumer gadget rabbit hole or focused on the sort of data logging that industrial manufacturers have been doing forever. However, in fact, companies today are already using IoT data both to optimize their operational technology and to improve the experience of customer interactions in novel ways. In his session at @ThingsExpo, Gordon Haff, Red Hat Technology Evangelist, shared examples from a wide range of industries – including en...
Detecting internal user threats in the Big Data eco-system is challenging and cumbersome. Many organizations monitor internal usage of the Big Data eco-system using a set of alerts. This is not a scalable process given the increase in the number of alerts with the accelerating growth in data volume and user base. Organizations are increasingly leveraging machine learning to monitor only those data elements that are sensitive and critical, autonomously establish monitoring policies, and to detect...
"We're a cybersecurity firm that specializes in engineering security solutions both at the software and hardware level. Security cannot be an after-the-fact afterthought, which is what it's become," stated Richard Blech, Chief Executive Officer at Secure Channels, in this SYS-CON.tv interview at @ThingsExpo, held November 1-3, 2016, at the Santa Clara Convention Center in Santa Clara, CA.
Most companies are adopting or evaluating container technology - Docker in particular - to speed up application deployment, drive down cost, ease management and make application delivery more flexible overall. As with most new architectures, this dream takes a lot of work to become a reality. Even when you do get your application componentized enough and packaged properly, there are still challenges for DevOps teams to making the shift to continuous delivery and achieving that reduction in cost ...
Enterprise architects are increasingly adopting multi-cloud strategies as they seek to utilize existing data center assets, leverage the advantages of cloud computing and avoid cloud vendor lock-in. This requires a globally aware traffic management strategy that can monitor infrastructure health across data centers and end-user experience globally, while responding to control changes and system specification at the speed of today’s DevOps teams. In his session at 20th Cloud Expo, Josh Gray, Chie...