Purpose of a secure design hackathon

Insecure design is now included as number 4 in the OWASP Top 10 Web Application Security Risks. The purpose of these Hackathons is to allow security learners at all levels to think outside the box about solving real-world problems.

The types of hypothetical systems or applications are meant to be themes, with multiple applications of their kind, already on the market, with many users. The point of the activity is centered around community-building, and the challenges are meant to facilitate creative though processes, not develop actual applications or products.

The Hackathon are intended to be fun and collaborative, and a good way to connect like-minded individuals and provide a chance for them to build up their project portfolio, on their GitHub accounts and/or YouTube and/or other social media platforms.

Who should participate in this type of hackathon?

Any individual interested to learn about security, or just think about solving real world problems in technology. The structure of each of these Hackathons allow for complete beginners to participate. The problems to solve and questions asked are very high-level and open-ended, in order to encourage diverse perspectives.

General structure of a hackathon

  1. Explain to participants what we expect them to submit for their solutions
  2. Participants form teams and work on their solutions (with access to their team members and our mentorship over Slack, or another team communications platform.
  3. Participants submit their solutions, and present at a later date (perhaps after a week or two).

Assignment

Things for participants to consider and explain in written form:

Deliverables participants may want to submit

Very basic threat modeling related questions to consider, regardless of submission format (Thank you, Adam Shostack, for advising on these question choices)

Some basic questions for a Risk Analysis Team (taken from Phil Martin’s “Simple CISSP” by Phil Martin) may include:

Recognition of Submissions

**Option to submit a pull request to the OWASP Threat Modeling Cookbook project

If you choose this option, please

Before participating, participants are prompted to check the following Creative Commons licensing information.

Past Hackathons