Terms & Conditions


Participation from University:

  • Preferred to be a Saudi national; must be Saudi Resident if not Citizen
  • Must be a student on an authorized University Team
    • Teams are 3-5 people
  • Authorized Age range between 18-27
  • Male and Female participants are welcome
  • No mixed gender teams
  • Must provide copy of national ID
  • Must agree to a code of conduct and ethics
  • Must agree to split prize money if they win equally amongst their team members
  • Females must have authorization from University if attending on behalf of a University
  • Must bring their own computers to participate
  • Must commit to being available both days to compete starting from 8:30am – 4:30pm
  • Must authorize organizer to include photography and videography for website, press coverage and other reasonable uses
  • Must be able to speak and understand English instructions
  • Must abide by all rules presented on both days of conference including not hacking hotel infrastructure and restricted IP’s

Conditions for Participation from Graduates / Professionals:

  • Team must be independent from any company affiliation (independent non-commercial teams)
  • Preferred to be a Saudi national; must be Saudi Resident if not Citizen
  • Teams should include 3-5 people who are not all from the same company
  • No participation for users working for Cyber Security Hardware, Software or Solutions companies
  • Authorized Age range between 21-27
  • Male and Female participants are welcome
  • No mixed gender teams
  • Must provide copy of national ID
  • Must agree to a code of conduct and ethics
  • Must agree to split prize money if they win equally amongst their team members
  • Must bring their own computers to participate
  • Must commit to being available both days to compete starting from 8:30am – 4:30pm
  • Must authorize organizer to include photography and videography for website, press coverage and other reasonable uses
  • Must be able to speak and understand English instructions
  • Must abide by all rules presented on both days of conference including not hacking hotel infrastructure and restricted IP’s