2019 poster session
Cybersecurity & Awareness Fair

How To Enter The 2023 CSAF Poster Contest

The field of cybersecurity is constantly evolving with new threats and technologies emerging on a regular basis. The primary objective of this contest is to enhance the audience's understanding and awareness of cybersecurity-related issues. For contestants, the contest aims to facilitate career opportunities, create with a strong foundation for future dissertations, enhance their communication skills. The most outstanding entries in each category will be selected for the final presentation at the Cyber Security and Awareness Fair based on the quality of the abstract and poster draft submission.

The Cybersecurity and Awareness Fair (CSAF) Poster Contest is an in-person event. Students from a school or university that is physically located outside of a 30-mile radius of the Cal Poly Pomona campus are highly encouraged to enter the contest. (see eligibility and submission information) On the day of the event, you (or your team) will be provided a space at a table to discuss your poster with attendees. Please arrive on campus no later than 8:30am to set up your poster.  Your Physical poster on display at the CSAF shall consist of a standard 36" high x 48" wide poster board, or equivalent (center panel shall be 24" wide with 12" side panels on either side of the center panel).  A time for judging session will be scheduled for you and/or your team.  The team of judges comes from industry leaders, government agencies, and education. You and/or your team will need to be prepared to answer questions from a wide range of perspectives and discuss your research in depth.

The contest has two different opportunities for entry based on the individual or team’s skillset and desired audience: Cyber Awareness Poster and Cyber Problem-Solving Proof of Concept Poster.

  • The Cyber Security Awareness Poster is an opportunity to educate event attendees about a cybersecurity topic. It is to bring a topic into focus that encourages discussion that resonates with their peers. The team size is limited to a maximum of 2 persons. Those chosen for the final competition will submit a poster (.pdf) and poster presentation video (.mp4). 
  • The Cyber Problem-Solving Proof of Concept is meant to explore the vulnerabilities of the cyber domain in depth and to search for ways to reduce or eliminate cybersecurity risks. The team size is limited to a maximum of 4 members. Those chosen for the final competition will submit a poster (.pdf), proof of concept demonstration video, and poster presentation video (.mp4).  Please note that your demonstration video should not violate any local, state, or federal laws and regulations, as well as your institutional policies. Any unauthorized or unlawful activities, including but not limited to hacking, data theft, or disruption of systems, are strictly prohibited and may result in legal consequences.  If you are unsure, please contact the poster organizers before the submission. 

Potential Sample Topics – Contestants are welcome to choose any topic that is related to cybersecurity; these are simply here for ideas to get you started:

  • Is it possible to avoid being tracked in today's society?
  • Generative AI's impact on privacy and cybersecurity 
  • The Privacy Paradox: Balancing Convenience and Privacy in the Digital Age
  • How Surveillance Capitalism Exploits our Data
  • Digital Forensics and Incident Response
  • Strategies and technologies that can empower users to regain control over their personal data
  • The Ethics of AI in Cybersecurity
  • Surveillance Technologies and Vulnerabilities
  • Algorithmic Bias and the 2024 Election
  • The Role of Regulation and Technology
  • The Evolution of Cybercrime: How AI and Machine Learning are Changing the Game

PRIZE INFORMATION

This contest is generously sponsored by ISACA Los Angeles Chapter.

  1. The Cyber Security and Awareness Fair committee will award each winner after the event. If it is a team, the award amount will be divided by the number of members.
  2. Depending on the size of the award, taxes may be applicable and are the responsibility of the winner(s).
  3. All decision(s) of the judge(s) is/are final.

Cyber Security Problem-Solving Proof of Concept Poster:

  • First Place $1000
  • Second Place $850
  • Third Place $750
  • Fourth Place $550
  • Fifth place $350

Cyber Security Awareness Poster:

  • First Place $500
  • Second Place $400
  • Third Place $300
  • Fourth Place $200
  • Fifth Place $100

IMPORTANT DATES AND DEADLINES

  • September 29, 2023, at 5:00 PM PST – Poster Submission Deadline. No late entries will be accepted.
  • October 2, 2023 - Students will be notified of their acceptance.
  • October 6, 2023 – Accepted students attend boot camp on how to present.
  • October 20, 2023, at 10 AM PST- Final poster, research paper, and presentation video link must be completed and uploaded. No late work will be accepted.
  • October 26, 2023, 10 AM – 2 PM PST- Presentation for competition: full team must be available.

ELIGIBILITY AND SUBMISSION INFORMATION - (updated on 9/19/23 to match Whova requirements)

Eligibility to compete: undergraduate and graduate college students currently enrolled at an accredited college listed on the  Department of Education website with a .edu email address that is active for the semester or quarter of the contest High School students are eligible, they must include a letter from a sponsoring teacher along with the teacher’s high school email address. Top submissions in each category will be chosen for final presentation at the Cyber Security and Awareness Fair based on the abstract and poster draft submission. All selections made by the CSAF committee are final and binding.  

Contestants must be available to present their entry from 10am-2pm in the Cal Poly Pomona Bronco Student Center for Final Judging. Students from a school or university that is physically located outside of a 30-mile radius of the Cal Poly Pomona campus are highly encouraged to enter the contest. Contestants chosen from this pool will be given an opportunity to have their submission judged via Zoom session if they are unable to attend judging in person. Prior accommodations must be approved by the judging committee in writing when the abstract is accepted to the contest. All judges' decisions are final and binding. 

INITIAL ENTRY REQUIREMENTS (Deadline to enter is September 29, 2023 at 5:00pm)

Awareness Entries: (open to high school and college students)

  1. Abstract (max 3000 characters) - paste text into your Whova Ticket.
  2. High school students include the sponsoring teacher information along with the teacher’s high school email address when entering in the Whova Form.
  3. College Submissions without a .edu email address will not be accepted.

Proof of Concept Entries: (only open to college students). 

  1. Abstract (max 3000 characters) - paste text into your Whova Ticket clearly defining your proof of concept with 3 citations from the past 2 years.
  2. Submissions without a .edu email address will not be accepted.

Submit your entry here: Click Here To Register

If you have questions regarding submission issues, please email Mohammad Husain (mihusain@cpp.edu) or Anna Carlin (ACarlin@fullcoll.edu)


CYBER AWARENESS POSTER AND VIDEO CRITERIA (limit 2 persons either college or high school)

  • Abstract
    • One page clearly stating the learning objective of the poster. (High school students include the sponsoring teacher letter along with the teacher’s high school email address)
  •  Poster
    • Contestant must submit their presentation using the required poster template, submissions that do not use the poster template will not be accepted.
    • Required Template for ALL PostersPoster Template (PPT)
    • The initial poster submission in Whova can be a DRAFT as a placeholder. Your Final poster that is judged for the contest must be uploaded in Whova by 10/24/22.
    • Digital poster must be uploaded into Whova as a PDF using provided template.
    • Physical poster being presented at CSAF must be on standard trifold poster board (36" high x 48" wide poster board -- center panel 24" wide with 12" side panels on both sides of the center panel)
  • Video
    • Maximum length of 5 minutes to present poster and explain awareness topic. Submit it in .mp4 format.

Submit your entry: Click Here To Register


If you have questions regarding submission issues, please email Mohammad Husain (mihusain@cpp.edu) or Anna Carlin (ACarlin@fullcoll.edu)

CYBER PROBLEM-SOLVING PROOF OF CONCEPT POSTER AND VIDEOS (max team limit 4 members college only)

Security and privacy research are at the forefront of innovation. The goal of the Cyber Problem-Solving Proof of Concept Contest is to inspire students and attendees through Cal Poly Pomona’s learn by doing approach where you will create a proof of concept (PoC) demonstrating how your idea or method works. It could be a new way to stop hackers exploiting a security flaw in a home network using a Raspberry PI or a way to monitor data usage of apps on your smart phone to identify surveillance capitalism with concise visualization-based tracking methodologies. The key is that you must be able to clearly show how your proof identifies and solves a cybersecurity problem to attendees and/or judges. 

The cybersecurity PoC presented at the college competition is a demonstration of concepts, techniques, or methodologies related to cybersecurity. It is not intended to represent a comprehensive solution or a complete implementation. The PoC is solely for educational and demonstration purposes and does not constitute professional advice or guidance.

  • Abstract
    • One page clearly defining your proof of concept with 3 citations from the past 2 years.

  • Poster
    • Contestants must submit their presentations using the required poster template, submissions that do not use the poster template will not be accepted.
    • The initial poster submission in Whova can be a DRAFT as a placeholder. Your Final poster that is judged for the contest must be uploaded in Whova by 10/24/22.
    • Required Template for ALL PostersPoster Template (PPT)
    • Digital poster must be uploaded into Whova as a PDF using provided template.
    • Physical poster being presented at CSAF must be on standard trifold poster board (36" high x 48" wide poster board -- center panel 24" wide with 12" side panels on both sides of the center panel)
  • Videos – Demonstration and Poster Presentation
    • Maximum length of 5 minutes for the demonstration video and 5 minutes for the poster presentation.  Submit as 2 separate .mp4 files.
    • Relevance to the field of cyber security, information assurance and forensics – The topics need be related to the theme of the cyber security and awareness fair. How someone can securely use computing and handheld devices in an Internet connected environment, how not to become a victim of a cyberattacks, discussion of existing cyberattacks and defense techniques for computing and handheld devices including their communication networks
    • Potential for practical impact - The topic should be real life application oriented. It should be a topic that can be easily communicated to a non-technical person who might be a user of that technology in real life. An audience should be able to relate it to everyday life and understand the implication of the topic presented.

POSTER RECOMMENDATIONS

  • Properly identify in the abstract and on the poster the title of presentation, student(s) name(s), and school being represented.
  • Posters shall consist of a standard 36" high x 48" wide poster board, or equivalent (center panel shall be 24" wide with 12" side panels on either side of the center panel).
  • Poster boards shall be of standard student presentation quality and shall stand on their own when opened.
  • Participants may use tape, glue, or pushpins to make attachments to the poster.
  • All supporting display material must fit on the poster in the space provided.
  • Students may use technology to augment or clarify their proof; however, electrical power will NOT be supplied. CPP guest WiFi is available in the room.
  • Use clear poster graphics where possible, realize the person you are speaking with might not be able to see them.
  • Use a large enough font to be visible by someone standing up to 6 feet away from the poster (minimum of 18 point).
  • Be sure to leave enough white space to allow people to focus on what is most important for them to see.
  • When using graphics, do not put too much information in one figure or chart.
  • When using text, avoid long sentences; instead use bulleted statements
  • If using acronyms, spell out the name of the acronym followed by the acronym in parentheses and its definition. (i.e., Advanced Persistent Threat (APT) – establishing and extending footholds within the information technology infrastructure of organizations for purposes of continually exfiltrating information)

VIDEO REQUIREMENTS

The video presentation is intended to showcase your poster to the hybrid audience and is used for judging during the event. Presenters are required to provide the video in .mp4 format and be available for live questions with the judges. All team members must attend the live question period.

  • Recording and posting of video specification will be provided to those presenting at the event during the boot camp on October 14, 2023.
  • Maximum length of the video is 5 minutes for Cyber Awareness Poster Presentation, 5 minutes for Proof-of-Concept Poster Presentation and 10 minutes for the Proof of Concept Demonstration.
  • Each team member must present in the video. Do not go over the allotted time.
  • Visual materials must be comprised of the abstract content and the poster only. Make sure content is capable of being easily read on a screen.
  • Contestant/Team will be given a 30-minute window for the judging.

VIDEO RECOMMENDATIONS

  • Dress professionally.
  • Check your audio and lighting.
  • Establish eye contact as if you were in a physical room.
  • State the learning objective or statement of the problem and its economic, social, and/or environmental implications for the international cybersecurity community.
  • Prepare a short statement to walk the viewers through your figures to discuss your project.
  • Be prepared to briefly discuss your hypothesis, point out your work, address key pieces of data, and summarize your conclusions.
  • Point to specific parts of your poster as you explain your project.
  • Speak to the viewers, not your poster.
  • Keep in mind that you likely know much more about your project than the viewers. Don’t assume knowledge on their part.
  • Presentations should be discussed, rather than simply read.

Submissions will be evaluated by the judges using the following criteria:

  • Relevance to the field of cyber security, information assurance and forensics.
  • Does the abstract make a clear case for how the topic fits into a larger context?
  • Degree of originality – Originality is indispensable to the processes of creation and innovation at all levels. In evaluating originality, consider the three elements of scientific work: hypothesis, methods, and results. Submissions to this category must be based on an original hypothesis, backed by sound research using scientific methods, and needs to present the results as an original idea. Rather than summarizing what is already known into a new format, does this entry produce new knowledge through observations, experiments, or new approaches to solving existing problems in the field of cybersecurity, information assurance, or forensics?
  • Does the poster show originality or creativity in research design and/or interpretation?
  • Does it address a new problem, or an old problem in a new way?
  • Technical depth - This will measure whether the presenter(s) have completed a thorough review of the existing literature to present adequate information to the audience and be able to answer the queries of an audience.
  • The overall quality of the submission – This attempts to evaluate the overall impression of the student’s research achievement.
  • Was there evidence of progress towards the goals & objectives?
  • Was there evidence that the project led to learning beyond the classroom?

PAST EXAMPLES: Click Here