Judging Criteria

Transparent evaluation framework ensuring fair and comprehensive assessment of all submissions.

Evaluation Framework

Scoring Breakdown

Our judges evaluate projects across four key dimensions, each weighted to reflect their importance in cybersecurity innovation.

Innovation

Idea quality and relevance to cybersecurity challenges

30%

Evaluation Points

  • Novel approach to existing problems
  • Creative use of emerging technologies
  • Unique perspective on security challenges
  • Potential to influence industry practices

Examples

  • Using AI/ML in unexpected ways for threat detection
  • Novel cryptographic approaches
  • Creative social engineering prevention methods
  • Innovative user experience for security tools
Technical Execution

Technical execution and code quality

30%

Evaluation Points

  • Code quality and architecture
  • Technical feasibility and scalability
  • Security best practices implementation
  • Performance and efficiency

Examples

  • Clean, well-documented code
  • Proper error handling and edge cases
  • Efficient algorithms and data structures
  • Secure coding practices
Design/UX

Presentation clarity

20%

Evaluation Points

  • User interface design quality
  • User experience and usability
  • Accessibility considerations
  • Visual design and branding

Examples

  • Intuitive user interface
  • Clear user flows and interactions
  • Responsive design across devices
  • Accessible design principles
Business Value

Real-world applicability and impact

20%

Evaluation Points

  • Market need and problem validation
  • Commercial viability and scalability
  • Real-world impact potential
  • Business model and monetization

Examples

  • Clear target market identification
  • Validated problem-solution fit
  • Scalable business model
  • Measurable impact metrics
Judging Process

How Judging Works

A structured evaluation process ensuring every project receives fair and thorough assessment.

Initial Review
2 hours

Judges review all submissions and score based on criteria

Shortlisting
1 hour

Top projects are selected for final presentation round

Demo Day
4 hours

Finalists present live to judges and community

Final Scoring
30 minutes

Judges finalize scores and select winners

What Judges Look For

Key Evaluation Areas

Understanding what makes a winning project across different aspects of cybersecurity innovation.

Technical Excellence
  • Clean, maintainable code
  • Proper security practices
  • Scalable architecture
  • Performance optimization
Innovation Factor
  • Novel problem-solving approach
  • Creative use of technology
  • Unique market positioning
  • Potential for industry impact
User Experience
  • Intuitive interface design
  • Clear user workflows
  • Accessibility compliance
  • Mobile responsiveness
Business Potential
  • Clear value proposition
  • Market validation
  • Scalable business model
  • Competitive advantage
Track-Specific Focus

Specialized Criteria

Each track has specific emphasis areas while maintaining the core evaluation framework.

AI + SecurityAI/ML in security applications

Track Focus

AI/ML in security applications

Special Emphasis

  • Defensive AI systems
  • AI-assisted monitoring
  • Model safety
  • Robustness tooling
Network SecurityNetwork and infrastructure security

Track Focus

Network and infrastructure security

Special Emphasis

  • Software security
  • Infrastructure tools
  • Protocol security
  • Physical network security
TomfooleryFun, absurd, but working solutions

Track Focus

Fun, absurd, but working solutions

Special Emphasis

  • Creative execution
  • Working prototypes
  • Humor and innovation
  • Technical depth despite absurdity
Open InnovationHigh-impact innovative solutions

Track Focus

High-impact innovative solutions

Special Emphasis

  • Real-world applicability
  • Technical innovation
  • Market impact
  • Scalability
Resources

Additional Information

Download detailed judging criteria and find answers to common questions about the evaluation process.

Download Criteria

Get the complete judging criteria document with detailed explanations and examples.

Download PDF
Meet the Judges

Learn about our expert panel of judges and their backgrounds in cybersecurity.

View Speakers & Judges