Cyberthon 2025

Domain 3
Corporate Security

Explore the 5 problem statements focused on cybersecurity innovations.

CT-CS - 01: Secure Coding Analysis Tool

Description: The Secure Coding Analysis Tool is a software solution designed to analyze code written by developers and identify security vulnerabilities or flaws that could be exploited by attackers. The tool focuses on ensuring that the code adheres to secure coding standards and best practices, reducing the risk of security breaches in corporate software systems. This tool is particularly useful in corporate environments to maintain high standards of software security, comply with regulations, and protect sensitive data.

Download PDF

CT-CS - 02: Privacy-Preserving Data Sharing

Description: The Privacy-Preserving Data Sharing System is a solution designed to enable secure and controlled sharing of sensitive corporate data while protecting the privacy of the individuals or entities involved. It ensures that data can be shared for collaboration, analysis, or reporting without exposing confidential or personally identifiable information (PII). The tool uses techniques like encryption, anonymization, data masking, and differential privacy to safeguard data integrity.

Download PDF

CT-CS - 03: Passwordless Authentication

Description: The Passwordless Authentication System is a secure and user-friendly method for accessing corporate systems and applications without relying on traditional passwords. Instead of passwords, the system uses advanced authentication methods such as biometric verification (fingerprint, face recognition), magic links, hardware tokens, or one-time codes sent via email or mobile devices. This approach enhances security, reduces the risk of password-related breaches, and improves the user experience by eliminating the need to remember or manage complex passwords.

Download PDF

CT-CS - 04: Endpoint Security Management

Description: Endpoint Security Management is a system designed to protect all devices (called endpoints) that connect to a corporate network, such as laptops, desktops, mobile phones, and servers. These devices can be entry points for cyber threats like malware, phishing, or unauthorized access. The system monitors, protects, and responds to potential threats on these devices, ensuring the corporate network and sensitive data remain secure. It plays a critical role in safeguarding remote workers, preventing data breaches, and complying with corporate security standards.

Download PDF

CT-CS - 05: Automated Information Security Auditing Tool (GRC Tool)

Description: The Automated Information Security Auditing Tool, also known as a GRC (Governance, Risk, and Compliance) Tool, is designed to automate the process of assessing an organization’s compliance with information security standards, policies, and regulations. This tool evaluates corporate systems, processes, and practices to identify potential security gaps, track risks, and generate comprehensive audit reports. By automating the audit process, it reduces human errors, saves time, and ensures consistent adherence to regulatory requirements like GDPR, ISO 27001, or HIPAA.

Download PDF
Collaborators and Supporters
Hackers Meetup Coimbatore
Coimbatore Flyer