UA
SkyRift CTF

SkyRift CTF

Format: Offline
Date: 2 / 5 / 26
Time: 11:00
Place: Kyiv (venue TBA)
Registration: Until April 30

About the event

Cybersecurity of autonomous platforms is one of the most urgent technical challenges of our time — and one that can no longer be left to a narrow circle of specialists.

 

SkyRift CTF is a team-based Capture the Flag competition built around a realistic attack scenario: participants work through the infrastructure of a technology company, extract intelligence from a compromised chatbot, escalate access to a server, and ultimately reach a target system operating in reconnaissance mode. The objective — breach the network perimeter, identify vulnerabilities, and gain control of the command infrastructure.

 

This is not a sandbox exercise for its own sake. It is a full attack chain in a controlled environment, designed to reflect how adversaries actually operate against real-world systems.

Technology Partners

IronCyber is a Ukrainian cybersecurity startup that develops hands-on attack scenarios based on real, modern cyber incidents. The company transforms the experience of Ukrainian cybersecurity professionals—gained while countering large-scale attacks—into structured learning formats designed to strengthen organizational cyber resilience.

 

The virtual environment simulating live IT infrastructure is powered by Cyber Ranges.

 

SkyRift CTF is held as part of Kyiv Defense Tech Week — a multi-day forum bringing together engineers, startups, researchers, investors, and military professionals around defense innovation.

Format

Teams of 3 to 5 participants. Individual registration is welcome — we will match you with a team. Each participant brings their own laptop. Difficulty level: intermediate. Prior CTF experience is an advantage, but not required. Estimated competition duration: up to 4 hours.

Who should participate

Students and early-career professionals in cybersecurity looking to test themselves in a realistic scenario
Engineers and developers with foundational knowledge of networking and Linux environments
IT and information security professionals interested in the intersection of cybersecurity and defense technology
Tech program participants and graduates seeking hands-on experience beyond the classroom
Anyone who wants to understand what real attack vectors look like — and how to defend against them

What to expect

A realistic attack scenario targeting the infrastructure of a company developing autonomous systems
A fully provisioned technical environment simulating live IT infrastructure, powered by Cyber Ranges
A live leaderboard displayed throughout the competition, with real-time team standings
Named participation certificates for all competitors
Educational grants from SET University awarded to winning teams

Schedule

11:00 Registration and seating
11:15 Welcome from the organizers
11:30 Competition begins
15:30 Results and award ceremony
16:00 Networking

Join if you have the technical background — and want to test it where cybersecurity meets defense tech, alongside people for whom this is not an abstract problem.

Register Now →

You may be interested in

Upcoming online event masters

Admission to an IT Master’s Program: How to Pass the EVI and EFVV

29 / 4 / 26, 17:00
Upcoming online event

Redesigning Women’s Health: Data, Products, and Innovation

21 / 4 / 26, 17:00
Past online event

SET Open Day: Master’s 2026

15 / 4 / 26, 18:00
We use cookies to improve your experience.