Asset-1

Winners

of Fiercest Competitor 3.0

The real-world challenges pushed us to think quickly and creatively as we built and presented an application within a tight deadline. Meeting talented problem solvers from across the country and working well with my team made the experience exciting, intense, and fun.

Fiercest Winner
Win 1
Asset-1

1st Runner Up

of Fiercest Competitor 3.0

Our team had an amazing time at PwC's 6-hour hackathon, solving a problem with new teammates. Seamless collaboration led us to the top 5, and we proudly became 1st runner-up. A big thanks to our mentor for their invaluable insights, making the experience both memorable and rewarding!

1 st Runner Up
Win 3
Asset-1

2nd Runner Up

of Fiercest Competitor 3.0

Thank you for organizing such an exciting event! A key highlight was networking with talented problem solvers from across the country. The real-world problem statements pushed us to think quickly and adapt to a strict tech stack, learning new technologies within just 6 hours. It was a thrilling, fun, and invaluable learning experience.

2 nd Runner Up
winner 2
Slide top banner

Can YOU Outsmart & Outcode other competitors?

PwC Acceleration Centers in India is pleased to announce the Third edition of its Cyber Hackathon “Fiercest Competitor 3.0” where students from select Engineering Institutions battle it out to identify multiple cybersecurity vulnerabilities and come up with innovative solutions to mitigate risks.
Join the quest and put your coding skills to bat in a virtual battleground fighting real-world cyberattacks!
Slide 2
Slide Picture BG

Cyber Recruit Boot Camp- 60 mins

Elevate your code and prove your superior skills compared to your peers in all AI Protected skill Test.

Candidates who are participating from the list of identified colleges will receive invitations for Round 1 of the hackathon. This initial round will entail an AI-proctored online assessment.

Prove your expertise in:
  • Computer Fundamentals 
  • Cyber Security Concepts 
  • Programming (Java, C#, Python, etc.)
Slide 3
Slide Picture BG

Cyberverse Battle Drill - 60 mins

Uncover the hidden vulnerabilities and strengthen your cybersecurity skills through hands-on exercises.

Hands-on exercise to solve a tech challenge, designed as a gamified application. The focus of this round would be to gauge the candidate’s understanding about common security vulnerabilities and ways to exploit those as an ethical hacker.

Slide 4
Slide Picture BG

This is Cyberwar! - 6 Hr In Person

Bring your innovative ideas to life and showcase your app development expertise through captivating presentations.

Candidates will be invited for Round 3 (on campus) which will consist of a hands-on exercise to build an application, followed by a project presentation. This round aims to build secure applications using standard cyber security libraries, within a limited timeframe, while working in a team. The candidates will also be given time to present the application and explain the security measures implemented in their applications.

Prove your expertise in:
  • App Development: 5 hrs (Group Activity)
  • Presentation: 1 hour
Slide 5
Slide Picture BG

Hackathon Schedule

Slide 6

Eligibility

  • B.E / B.Tech: CS/IT/ECE or MCA
  • Mandatory to have Cyber Security as Major or Elective
  • 2025 passing out batch
  • Aggregate 60% / 6 CGPA & above with no active backlogs
  • Final year students from select engineering colleges
Unlocking Participation:
  • Registration link will be shared with your placement cell
  • Eligible students will receive assessment login credentials
  • Use same Email ID throughout the process
  • All assessments are AI proctored. Any integrity breach may lead to elimination from competition & any further hiring opportunity
  • Use fully working condition Laptop / Desktop
Slide 7
Slide Picture BG

What's in it for me?

Slide 8_1Slide 8_2

System Requirements

  • Use laptop or desktop with stable internet (at least 5mbps), no smartphones or tabs allowed
  • Recommend Chrome > 100 or Firefox >95; Incognito and private tabs not supported
  • Enable webcam and microphone. No headphones during rounds 1 & 2
  • Install Glider AI plugins for monitoring, avoid using ad blockers
  • Turn off Bluetooth and disconnect devices
  • Power backup advisable
Slide 9
Slide Picture BG

Q&A

pwc.com

© 2024 PwC. All rights reserved. Not for further distribution without the permission of PwC. “PwC” refers to the network of member firms of PricewaterhouseCoopers International Limited (PwCIL), or, as the context requires, individual member firms of the PwC network. Each member firm is a separate legal entity and does not act as agent of PwCIL or any other member firm. PwCIL does not provide any services to clients. PwCIL is not responsible or liable for the acts or omissions of any of its member firms nor can it control the exercise of their professional judgment or bind them in any way. No member firm is responsible or liable for the acts or omissions of any other member firm nor can it control the exercise of another member firm’s professional judgment or bind another member firm or PwCIL in any way.