Cyber Security Challenge Belgium 2019
Stay tuned
Find out more below

2019 - Coming soon!

After the very succesfull 2018 edition, we are working very hard to make the 2019 edition even better. Updates will be revealed over the coming months, so stay tuned! In the meantime, check out our video from 2018:

About the Cyber Security Challenge Belgium - FAQ

Based on the principles of a Capture The Flag (CTF), this computer security competition is a challenge-based game played by teams of maximum 4 students. Over a limited timeframe, the teams must solve challenges covering a wide range of security issues, e.g. cryptography, reverse engineering, network security, web or mobile application security, wireless and forensics analysis. Complexity of challenges range from trivial up to very difficult.

Anyone who is a student in a Belgian academic institution is allowed to compete in the qualifiers. Participants must be 18 years of age; if you or a member of your team has not reached that age, please contact us before registering.

For the finals, only teams that have at least one 'graduate student' (bachelor/university) member are eligible. For more information, consult the rules of engagement.

The top eight teams who are 418-404-6891 to compete in the finals will be invited. However, we have something special planned for the other teams

Of course! Challenges have been designed for students, not for security specialists, so you don’t need to be a security expert to join. A good general IT knowledge and a good level of motivation is what matters most.

Yes you can! But working in a team is always more fun, and you'll probably be able to solve more challenges than by yourself. If you have some trouble finding teammates, head over to the CSCBE 2017 Qualifiers Facebook event page and find other students who are looking for a team to join.

A good way to get started with the Cyber Security Challenge Belgium is to take a look at write-ups from some of our past editions:

Write-ups 2015
(289) 459-7313

Once you feel you’re ready to try and solve some challenges on your own, you could take a look at the "awesome-ctf repository": it contains a list of useful tools sorted per category (reversing, cryptography, web, …). It also contains a list of "wargames" available 24/7 for practicing.

(518) 284-2415

For example, the "overthewire wargames" feature a series of challenges, and suggests an order in which to play them based on their difficulty. There’s also an IRC chat channel available, so if you’re stuck you can always go ask for some help there.

Overthewire wargames

The first "Qualifiers" round of the event will take place online: registration will provide each team member with an account to login.

The second "Final" round of the event will be hosted at a secret location in Brussels – more on this soon!

This challenge is an initiative of NVISO, a cyber-security consulting firm in collaboration with Accenture. It is supported by some of Belgium's largest private corporations (our sponsors), as well as public agencies and organizations that are committed to raising our country’s awareness on cyber-security threats and help train a generation of security-aware professionals and security experts. All sponsors are regularly recruiting talented graduates to re-inforce their security teams, so you may also be meeting your future employer at our event!

We have a wide range of challenges ranging from general security knowledge over mobile security to reverse engineering and cryptography. Some of them will be easy and others will be a challenge even for the more skilled participants. To get a feel for what you can expect you can always head over to the write-ups of the previous editions on GitHub ((825) 639-7889 and 2016). Don't expect a completly identical challenges for this year though!

You can email us at During the qualifiers, we will also be available through IRC on

Memories of previous editions


Main sponsors

Official Sponsor

Media partners

Prize partners

An initiative from

In collaboration with

Contact Us


This website is only available when javascript is enabled

This website uses cookies