CTF Gameplay 

Join the Exclusive Capture The Flag Tournament at CyberTek Tech Festival 2026!

Whether you’re an experienced professional or just starting your journey in this field, this game is for you! No specialized technical knowledge is required to join the fun.

We’re inviting 10 two-person teams to participate. Don’t have a teammate? No problem — sign up anyway, and we’ll pair you with a partner.

All we ask is that you bring a positive attitude, a willingness to learn, and an openness to facing a potentially steep learning curve, depending on your current skill set.

Requirements

  • Please bring a properly configured laptop with sufficient access rights to install software.
  • A basic understanding of the industrial OT/ICS environment is expected.
  • Participants must be able to independently operate both software and hardware.

  • Prior experience in network assessment, IT/OT security evaluation, and software reverse engineering is highly beneficial and recommended to get the most out of this event.
  • Remember – CTF is just a game – have fun, play fair, and respect other teams!

 

When and where:

CTF CyberTek 2026

Game Rules

  • Only individuals physically present at the event venue may participate in the CTF. No exceptions.

  • It is strictly prohibited to trade, receive, or share flags, or to give hints to other teams.
  • Collaboration is allowed only between teammates. No collaboration with other teams is permitted.

  • Participants may not seek help from anyone outside their team (e.g., friends, colleagues) to solve challenges.

  • Fair Play – Attacking the competition infrastructure, organizers, or other teams is strictly forbidden.

  • Respect the competition – Cheating, sabotaging, or interfering with other teams will not be tolerated.

  • Teams that violate these rules will be disqualified and forfeit all prizes.

  • Instructors may, at their discretion, offer hints or guidance to all participants.

  • Instructors have the final and binding decision on all matters related to the event.

Participation in the event implies acceptance of and adherence to the above rules.

Trainers:

  • Bo Hermansen is a seasoned Senior Security Advisor with 13 years of comprehensive experience in the cybersecurity domain. His expertise spans offensive security, vulnerability management, web application security, network security, mobile app testing, firewall reviews, red team operations, and OT penetration testing. For the past two years, Bo has focused specifically on securing industrial infrastructure, bringing specialized knowledge to the unique challenges of operational technology environments. He has a solid understanding of the interface between IT and OT systems and is able to communicate effectively with both technical teams and non-technical stakeholders, helping to align security practices with organizational needs.

  • Alexander Koefoed is a dedicated OT Security Researcher with a Master of Science in Cybersecurity (Cand. Polyt.) from Aalborg University. His expertise spans systems development, reverse engineering, and web and network security, with a strong focus on securing critical infrastructure.

  • Piotr Urbańczyk – GRID, C)NFE, C)PTE, GIAC Advisory Board,Senior SCADA Security Architect at Tekniska.Professionally involved in cybersecurity since 2006, and with  networks since 2001. He famously broke his parents’ first computer in 1992. Piotr brings extensive, battle-tested experience from both multinational corporations and state-owned enterprises.The majority of his professional career has been focused on energy sector systems. At Tekniska, he is responsible for designing secure control system architectures. Both professionally and as a hobby, he continues to “break” computers, networks, and systems—always with the owners’ permission. He is a certified network engineer, digital forensics specialist, and penetration tester. He holds the prestigious GRID certification and serves on the GIAC Advisory Board—some say he really knows ICS security.

SPONSORS:

Scroll to Top