Join us for the AI Cybersecurity Hackathon—a global virtual competition that tests both your creativity and your technical expertise. From February 15th to March 15th, you’ll have the chance to develop and showcase AI-driven solutions aimed at securing systems, protecting sensitive data, and countering emerging cyber threats.
Whether you’re a seasoned cybersecurity professional or a student exploring the intersection of AI and security, this hackathon offers you the chance to:
- Make a real-world impact through AI innovation
- Sharpen your cybersecurity and machine learning skills
- Connect with a vibrant global community of forward-thinking developers
-
Register for the Hackathon
- Sign up on the event platform to receive hackathon updates, rules, and key resources.
-
Collaborate with Peers or Go Solo
- You’re free to form a team or tackle the project independently—choose whichever approach works best for you.
-
Build & Submit Your Project
- Finalize your AI cybersecurity solution by March 15th
- Submit your entry for judging and be in the running for top prizes
Don’t miss this unique opportunity to contribute to cutting-edge cybersecurity solutions while expanding your network and skill set. Good luck, and we can’t wait to see your innovative ideas!
Winners will be announced live at the AI Cybersecurity Summit on March 31st. Learn more and register for the Summit here to watch live. *Registration or attendance to AI Summit is not required to win.
Requirements
Create an open-source (or openly distributed) solution that addresses pressing cybersecurity challenges by integrating AI. Feel free to innovate and experiment with various frameworks, libraries, and techniques. Possible focus areas include, but are not limited to:
- AI-Powered Threat Detection & Incident Response: Build systems that monitor logs, network traffic, or endpoint activity for anomalies, enabling swift detection and automated containment of security threats.
- Automated Incident Response: Integrate a local AI agent (like Concierge) to analyze event data and autonomously take action—e.g., quarantine a compromised server.
- AI-driven Vulnerability Scanning: Combine computer vision (LLAVA, Video-LLaVA) with existing vulnerability databases to flag potential configuration errors or anomalies in hardware setups.
- Interactive Security Dashboards: Use a code assistant to quickly spin up front-end prototypes that visualize threat intelligence, highlight key anomalies, and guide security teams.
- Digital Forensics & Investigation Tools: Leverage machine learning or natural language processing to quickly analyze large volumes of data, reconstruct attack timelines, or identify malicious insiders.
- Automated Penetration Testing & Network Enumeration: Develop AI-driven agents that proactively test networks for vulnerabilities and suggest remediation steps—minimizing manual effort and improving accuracy.
- Predictive Analytics for System Resilience: Use time-series analysis or predictive modeling to forecast system failures or potential attack vectors, helping organizations shore up defenses in advance.
- Automating Cybersecurity Workflows: Streamline repetitive tasks such as patch management, risk assessment, or compliance checks, and reduce human error by integrating AI-based automation.
- Vulnerability Assessment & Zero-Day Detection: Combine AI algorithms with real-time threat intelligence feeds to identify and prioritize vulnerabilities—potentially catching novel attacks before they spread.
- Supply Chain Security & Data Integrity: Employ AI to verify software components, detect tampering, or ensure the integrity of packages and updates across distributed systems.
- Security Education & Awareness: Build interactive AI-driven training platforms or chatbots that educate users on common threats, social engineering tactics, and safe cybersecurity practices.
Remember: Your project must be freely downloadable, free to use, and beneficial to the larger cybersecurity community. Commercial solutions or closed-source projects are not eligible.
What to Submit
-
Detailed Project Description
- Clearly define the problem your solution tackles, the proposed AI-driven approach, and the impact it will have on cybersecurity.
- Highlight how your solution was designed, any unique algorithms or techniques used, and how AI improves upon existing methods.
-
Source Code & Repository
- Provide a link to your project’s code repository (e.g., GitHub, GitLab).
- Create an open-source (or openly distributed) solution that addresses pressing cybersecurity challenges by integrating AI. (each a “Project”).
- Include information on the open-source license you’re using to ensure others can freely adapt and build upon your work.
-
Working Demo
- Showcase your solution in action via a deployed app, Docker container, or hosted instance.
- Alternatively, create a short video or interactive environment (e.g., GitHub Pages, YouTube, or a similar platform) to guide viewers through your tool.
-
Supporting Materials
- Supply a 3–5 minute video walkthrough explaining your project’s features, architecture, and results.
- Provide screenshots, diagrams, or any supplementary documentation (API specs, user guides, etc.) to help others understand and use your creation.
-
Team & Contributor Info
- Include a short bio or description for each contributor, along with pictures if possible.
- If you represent a company or organization, provide a concise overview of its mission and role in your project.
By focusing on open-source principles and immediate practical application, your project can help elevate the cybersecurity community’s capabilities against ever-evolving threats. We look forward to seeing your innovative solutions!
Prizes
Grand Prize – Individual Winner
• Present your submission in an online webcast
• $3,500 Cash Prize
• Travel and Expenses for you people to attend a future summit
• A SANS Course of your choice (valued at $8,000)
• SANS Summit Ticket (valued at $525)
• Virtual coffee with a SANS AI Faculty Member
• Your demo highlighted on SANS website
• Social media promotion of your project
Grand Prize – Team Winner
• Present your submission in an online webcast
• $3,500 Cash Prize
• Travel and Expenses for up to 4 people to attend a future summit
• SANS Summit Tickets for each team member (valued at $525)
• Virtual coffee with a SANS AI Faculty Member
• Your demo highlighted on SANS website
• Social media promotion of your project
Second Prize
• Present your submission in an online webcast
• $1,500 Cash Prize
• SANS Summit Ticket (valued at $525)
• Virtual coffee with a SANS AI Faculty Member
• Your demo highlighted on SANS website
• Social media promotion of your project
Community Prize
• Present your submission in an online webcast
• $1,500 Cash Prize
• SANS Summit Ticket (valued at $525)
• Virtual coffee with a SANS AI Faculty Member
• Your demo highlighted on SANS website
• Social media promotion of your project
Devpost Achievements
Submitting to this hackathon could earn you:
Judges
Rob T. Lee
Chief of Research, SANS Institute
Kate Marshall
Director of Summits, SANS Institute
David Hoelzer
Director of Research, Occulumen, Ltd
Mick Douglas
Managing Partner, InfoSec Innovations
Matt Bromiley
Lead Security Engineer, LimaCharlie
Foster Nethercott
Director/Owner, FORTISEC
Bryce Galbraith
Consultant, Layered Security
Dennis Chow, GSE #288
Director, Detection Engineering at UKG
Austin Nowak
Sr. Detection Engineer at UKG
Erik Kristensen
Director of Ranges and Labs
Judging Criteria
-
1. Creativity & Innovation in AI (15%)
+Originality of Concept: Does the project present a novel approach to AI in cybersecurity? +Innovation in Application: Does the solution leverage AI to address real or emerging cybersecurity challenges -
2. Technological Implementation (20%)
+Software Development Quality: Is the codebase well-structured, documented, and maintainable? +Technical Complexity: Does the solution demonstrate an advanced understanding of AI, data processing, or security engineering principles? -
3. Ethical & Responsible AI (15%)
+Data Handling & Bias Mitigation: Does the project address how user data is collected, processed, or stored? Are efforts taken to mitigate bias? +Model Transparency: Does the submission provide insights into how AI decisions are made? -
Open Source Tool Integration (10%)
+Use of Open-Source Frameworks: Incorporate resources (e.g., Concierge, Continue.dev, Fabric) to enhance functionality? +Openness: Are all components available under an open-source or openly distributed license? Is usage and modification free? -
User Experience & Design (10%)
+Usability & Clarity: Is the solution intuitive and straightforward for developers, security teams, or end-users? +Visual/Interface Design: Does the interface (CLI, GUI, or both) facilitate an efficient workflow, making it easy to adopt and maintain? -
Potential Impact & Practicality (20%)
+Real-World Applicability: Does the project solve a pressing cybersecurity need or address a major industry pain point? +Community Benefit: Solution be adapted to benefit other industries outside cybersec? Clear path to real-world adoption? -
Presentation & Delivery (10%)
+Clarity of Submission: Project description, documentation, and supporting materials (e.g., demo video)easy to follow? +Engagement & Storytelling: Presentation effectively explain the problem, highlight the AI solution, and demonstrate benefits?
Questions? Email the hackathon manager
Tell your friends
This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

