{"id":3932,"date":"2025-07-28T11:02:49","date_gmt":"2025-07-28T08:02:49","guid":{"rendered":"https:\/\/cybersecurity.imhbusiness.com\/?post_type=logo&#038;p=3932"},"modified":"2025-07-28T11:02:49","modified_gmt":"2025-07-28T08:02:49","slug":"cyprus-cyber-security-challenge-ccsc","status":"publish","type":"logo","link":"https:\/\/cybersecurity.imhbusiness.com\/2025\/logo\/cyprus-cyber-security-challenge-ccsc\/","title":{"rendered":"Cyprus Cyber Security Challenge (CCSC)"},"content":{"rendered":"<p>The Cyprus Computer Society in cooperation with information security specialists in Cyprus, from both<br \/>\nacademia and the industry, are organising the Cyprus Cyber Security Challenge (CCSC), a competition which<br \/>\naims select and train the Cyprus National Team which competes at the annual European Cyber Security<br \/>\nChallenge (ECSC) which takes place annually. The competition is organized with the aim of identifying<br \/>\nnew talents in the field of cyber security (ages 14-25), as well as encouraging young people to pursue<br \/>\na cyber security career. The ECSC is an initiative of the European Agency for Network and Information<br \/>\nSecurity (ENISA). The participants are asked to solve challenges related to web security, mobile security,<br \/>\ncrypto puzzles, reverse engineering and forensics and will collect points for each challenge they solve.<br \/>\n(https:\/\/ccsc.org.cy\/)<\/p>\n","protected":false},"featured_media":3933,"menu_order":0,"template":"","format":"standard","meta":{"_acf_changed":false},"categories":[],"tags":[],"class_list":["post-3932","logo","type-logo","status-publish","format-standard","has-post-thumbnail","hentry"],"acf":[],"_links":{"self":[{"href":"https:\/\/cybersecurity.imhbusiness.com\/2025\/wp-json\/wp\/v2\/logo\/3932","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cybersecurity.imhbusiness.com\/2025\/wp-json\/wp\/v2\/logo"}],"about":[{"href":"https:\/\/cybersecurity.imhbusiness.com\/2025\/wp-json\/wp\/v2\/types\/logo"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/cybersecurity.imhbusiness.com\/2025\/wp-json\/wp\/v2\/media\/3933"}],"wp:attachment":[{"href":"https:\/\/cybersecurity.imhbusiness.com\/2025\/wp-json\/wp\/v2\/media?parent=3932"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cybersecurity.imhbusiness.com\/2025\/wp-json\/wp\/v2\/categories?post=3932"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cybersecurity.imhbusiness.com\/2025\/wp-json\/wp\/v2\/tags?post=3932"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}