This tactical CTF leverages OSINT and cyber investigative tools to collect evidence against a fictional threat actor network utilizing digital evidence in the form of flags worth varying amounts of points based on technical difficulty. Attendees may compete as individuals or as a team. Sponsored by Nisos.

This event takes place at the RH-ISAC Summit but requires a separate registration.

Eligibility:

Analysts, engineers, and tactical operations teams from retail and hospitality companies only

Sponsored by Nisos

Nisos logo