Build security orchestration playbooks for the new Cortex XSOAR Marketplace to automate processes across integrated security tools. Playbooks enable automated orchestration of end-to-end security workflows, from triaging alerts to incident investigation, ticket management, and threat response. Your playbook should be created for submission to one of three categories: general security, Palo Alto Network products, or specific business use cases. Integrate one of our sponsors’ APIs into your solution to be eligible for their related bonus prize.
Eligibility
Individuals – and teams of individuals – must all have reached the age of majority in their jurisdiction of residence at the time of entry.
As per our Company Values, we do not discriminate on the basis of race, religion, national origin, color, sex, gender identity, sexual orientation, social class, economic status, veteran status, disability or age.
The Hackathon is NOT open to:
- Individuals who are residents of, or organizations domiciled in, Brazil, Quebec, Italy, or any country, state, province or territory where the laws of the United States or local law prohibits participating or receiving a prize in the Hackathon (including, but not limited to, Crimea, Cuba, Sudan, Iran, North Korea, Syria and any other country designated by the United States Treasury's Office of Foreign Assets Control)
- Individuals who are employed by any public sector agency, government, organization or other public institution.
For further eligibility restrictions, visit section 3 in the rules.
Requirements
Main Requirements: Build a security playbook for the Cortex XSOAR Marketplace.
Playbooks along with other relevant content need to be submitted on Cortex XSOAR Marketplace by the submission deadline, September 29, 2020 (5:00pm Eastern Time) This includes submission of a pull request on Github using the Marketplace ‘Contribute content’ feature available within the Cortex XSOAR hackathon instances.
Submission Assets:
- Demo video. This must include footage that clearly explains the Playbook’s features and functionality through a comprehensive demo.
- GitHub. Submit the GitHub link to your hackathon contribution. Submit on GitHub then copy the URL for the Pull Request and submit the GitHub Pull Request URL via Devpost form.
- Contribution pack. Provide the title of your playbook (contribution pack).
Prizes
$67,500 in prizes
Best Security Playbook
• $7,500 USD
• Speaking opportunity at Palo Alto Networks Ignite 2020
• Promotion Via Featured Hackathon Video
• Automation Rising 2020 SOAR Hackathon Digital Winners Badge
Runner Up Security Playbook
• $2,500 USD
• Promotion Via Featured Hackathon Blog Post
Best Palo Alto Networks Product Integration Playbook
• $7,500 USD
• Speaking opportunity at Palo Alto Networks Ignite 2020
• Promotion Via Featured Hackathon Video
• Automation Rising 2020 SOAR Hackathon Digital Winners Badge
Runner Up Palo Alto Networks Product Integration Playbook
• $2,500 USD
• Promotion Via Featured Hackathon Blog Post
Best Business Use Case Playbook
• $7,500 USD
• Speaking opportunity at Palo Alto Networks Ignite 2020
• Promotion Via Featured Hackathon Video
• Automation Rising 2020 SOAR Hackathon Digital Winners Badge
Runner Up Business Use Case Playbook
• $2,500 USD
• Promotion Via Featured Hackathon Blog Post
Customer Choice
• $7,500 USD
• Promotion Via Featured Hackathon Video
• Speaking opportunity at Palo Alto Networks Ignite 2020
Sponsor Prize AWS - Security Hub
• $5,000 USD
Sponsor Prize AWS - Security Hub Runner Up
• $2,500 USD
Sponsor Prize Google Chronicle
• $5,000 USD
Sponsor Prize Google Chronicle - Runner Up
• $2,500 USD
Sponsor Prize Sixgill
• $5,000 USD
Sponsor Prize Sixgill - Runner Up
• $2,500 USD
Sponsor Prize RiskIQ
• $5,000 USD
Sponsor Prize RiskIQ - Runner Up
• $2,500 USD
Early Submission Prize
• T-shirt
Staff Winners
(4)
Devpost Achievements
Submitting to this hackathon could earn you:
Judges

Nir Zuk
Founder & CTO, Palo Alto Networks

Slavik Markovich
SVP, Product, Palo Alto Networks

M.K. Palmore
Field CSO Americas, Palo Alto Networks

Kathleen Shadhid
Manager, Security Operations Center, Turner

Heather Gantt-Evans
Senior Director of Security Operations and Cyber Resilience, The Home Depot

Anton Chuvakin
Security Strategy, Google Chronicle

Sarah Guo
General Partner, Greylock Partners

Christoph Straßburger
Head of Cyber Defense Operations, Deutsche Telekom Security GmbH
Judging Criteria
-
Quality of the Idea
Includes creativity and originality of the idea, or shows significant innovation and improvement to an existing idea. -
Value to Enterprise
Demonstrates usefulness to an enterprise, for example by streamlining and automating security operations processes, reducing threat detection and response times, or improving the interoperability and effectiveness of existing security tools. -
Technical Implementation
Includes how well the idea was executed by the developer, including the user experience, the complexity of the scenarios, use of additional integrations, content, threat intel, or other data sources, and whether it consistently performs as expected. -
Project Promotes Inclusion and Diversity
Submissions that describe how their project supports https://www.paloaltonetworks.com/about-us/inclusion-diversity will be given extra consideration for demonstrating how the community can break down barriers in cybersecurity.
Tell your friends
This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.