This year’s CyberCall is looking for solutions in the following (but not limited to) areas:

Cybersecurity for Artificial intelligence (AI)
Safeguarding AI systems and the data they process from various cyber adversarial attacks in order to maintain the integrity, confidentiality, trustworthiness and reliability of AI applications in an increasingly connected and digital world.

AI for cybersecurity
Harnessing the power of AI to strengthen cyber defences, improve threat detection, and respond more effectively to the evolving and sophisticated nature of cyber threats, thereby helping organisations protect their systems, data and networks from cyber attacks.

Quantum Safe
Protecting critical digital systems, data, and infrastructure from the potential threat of Cryptographically Relevant Quantum Computers by transitioning to quantum-resistant solutions and enabling cryptographic agility and defense-in-depth.

Operational Technology (OT) / Internet of Things (IoT) security
Safeguarding critical infrastructure, Industrial Control Systems (ICS) and internet-connected devices from cyber threats and vulnerabilities.

Cloud security
Safeguarding data, applications, resources and infrastructure hosted in cloud environments, while maintaining the confidentiality, integrity and availability of resources in the cloud.

Privacy-Enhancing Technologies (PET)
Safeguarding the privacy of individuals and confidentiality of their data while using systems and digital services, thereby empowering individuals to manage their data securely and complying with privacy regulations.
For a start, CSA has put together a list of end-users who are looking for solutions in some of the areas mentioned above.
CS01: AI-Powered Automated Analysis of Privileged Access Management Session Logs and Screen Recordings
Develop a cost-effective, standalone AI component that seamlessly integrates with existing Privileged Access Management (PAM) systems to autonomously analyse session screen recordings…
2025 End User Challenge Statement
CS01: AI-Powered Automated Analysis of Privileged Access Management Session Logs and Screen Recordings
Challenge
Develop a cost-effective, standalone AI component that seamlessly integrates with existing Privileged Access Management (PAM) systems to autonomously analyse session screen recordings and log data for irregular or suspicious user behaviour.
The solution should address the inefficiencies and potential for oversight in manual reviews, whilst overcoming the interpretive challenges of non-natural language logs to provide accurate, actionable security insights.
Background
PAM serves as an identity security mechanism that identifies and obstructs unauthorised entry to vital assets while monitoring the activities of privileged users
during their access to these critical resources. The system records user sessions through logs and screen video captures.
Whenever there is a requirement to perform changes to the system (such as patches or updates to certain component), the administrator or the vendor will do it through the organisation’s PAM setup. The PAM solution will perform recording of the entire session from logon to the completion of the change. This is required as a regulation for CII (OT).
Analysing these recordings is currently done manually, which is tedious and timeconsuming. The commands are difficult to interpret because they are not written in natural language (system commands) and operators could open multiple command prompt in a single terminal. The video recordings are long and cumbersome to review, making it easy for important details to be overlooked. In addition, there are a lot of videos accumulated in the organisation over the past few years, manual review of these videos will take a long time. Therefore, there is a clear need for a cost-effective, private AI driven internal solution that can be easily integrated into the existing PAM framework to automate and improve the analysis process (extract, analyse, classify, and alert/report). The AI solution should operate across the four stages from the analysis process.
For example, in an OT environment, when data diode bypass occurs, a vendor will RDP to the terminal server and access the target device for troubleshooting or maintenance. The AI should be able to review the vendor’s actions via screen recordings after the session has ended and flag any suspicious activities during a post-event audit. This includes identifying malicious actions such as attempting to access devices other than the intended target, or deviations from standard plant activities like the creation of new accounts or changes to firewall rules.
Another example is in an IT environment, where users typically access servers to perform upgrades or patching in accordance with release notes. The AI should be capable of reviewing the user’s actions via session recordings after the event has concluded and flagging any deviations from the release notes or unexpected and suspicious activities during the post-event audit.
Requirements
The solution should encompass, but not be limited to, the following features:
- Extract and process data from PAM solutions, handling both text-formatted
logs and screen recording videos. - Conduct behavioural analysis after PAM sessions to ensure compliance with benchmarks.
- Identify and flag anomalies from internal administrator and third-party support staff during post-session analyses.
- Recognise acceptable behaviours that may deviate from benchmarks but are not considered security risks.
- Allow for benchmark and configuration settings to be input in various formats, including change management request (could be in document or email format) release notes and natural language instructions.
- Performance standards: Achieve minimum 80% accuracy with maximum 20% false positive rate for deployment; 95% accuracy with maximum 5% false positive rate for production usage.
- Utilise User and Entity Behaviour Analytics (UEBA) training with ‘golden images’ and typical user behaviour patterns as references.
- Operate efficiently without excessive bandwidth, time, or processing power
consumption. - Classify the confidence level of detected anomalies into categories such as HIGH, MEDIUM, and LOW.
- Provide post-session alerts for detected anomalies.
- Enable querying of recording contents using natural language.
- Generate analysis reports in a user-friendly format.
- An advantageous feature would be the capability for the solution to automatically conduct real-time behavioural analysis, assess user actions against established benchmarks or blacklisted processes, and where necessary, proactively manage and restrict user access to specific assets.
Additional Information
- Compatible with various PAM solutions on the market. Integrate smoothly
with existing PAM systems without complex setup procedures or loss of
existing PAM features. - Be compatible with both Information Technology (IT) and OT environments, accommodating one-way data transfer from OT to IT using Data Diodes.
- Function in offline environments, particularly in Operational Technology (OT) settings.
- The solution may be a non-video analytic tool, provided it meets the requirement.
- Training of the AI model would be executed with sensitive data privacy and concerns.
- Operate efficiently without excessive bandwidth, time, or processing power consumption.
CS02: Artificial Intelligence (AI) assisted Automated Patch Management and Testing Across Diverse Information Technology Environments
Develop an automate patch management, pre- and post-patch testing activities across both Windows and Linux systems, aiming to reduce manual effort and enhance operational efficiency…
2025 End User Challenge Statement
CS02: Artificial Intelligence (AI) assisted Automated Patch Management and Testing Across Diverse Information Technology Environments
Challenge
Develop an automate patch management, pre- and post-patch testing activities across both Windows and Linux systems, aiming to reduce manual effort and enhance operational efficiency.
Background
Modern Information Technology (IT) environments consist of large and diverse technology stacks, supporting a wide array of systems and applications. The infrastructure team regularly receives numerous patch requests, impacting critical business services and security posture.
Currently, patch management and testing are performed manually, involving extensive coordination, planning, and prioritisation among team members. Each day typically begins with manual task assignments, followed by patch application, system verification, and planned production rollouts. This process is time-consuming, resource-intensive, and subject to human error.
Given the increasing volume and frequency of patches, there is a strong need for automation to streamline patch management, improve turnaround time, and reduce operational risks. Automating both the patch deployment and subsequent testing phases presents a significant opportunity for time savings and efficiency gains.
Ideally, the operating system services and applications after patch applied should be fully functional, before application team does their regression testing. Any technical errors should be clearly reported for the product vendor to resolve.
Requirements
The solution should encompass, but not be limited to, the following features:
- Automated patch management and AI assisted pre and post deployment testing capabilities that operate across both Windows and Linux environments, supporting a wide range of market-leading IT products and technologies.
- Static analysis of patch file to provide insights prior actual testing in actual environment.
- Generation of detailed testing reports pre and post deployment, specifically highlighting failed use cases and other actionable insights.
- Monitoring dashboards that provide real-time visibility of patch status, enabling effective coordination and workflow management across teams.
- Solutions that help reduce the time to patch as a quantifiable metric of improvement.
- (Good to have) Additional patch verification controls, such as malware detection on patch files, to enhance security and trust in automated patching.
- The solution must be adaptable and extensible to support integration with various IT products and technologies in the market.
- Adhere to industry best practices and relevant regulations where applicable
Additional Information
- Compatible with various PAM solutions on the market. Integrate smoothly with existing PAM systems without complex setup procedures or loss of existing PAM features.
- Be compatible with both Information Technology (IT) and OT environments, accommodating one-way data transfer from OT to IT using Data Diodes.
- Function in offline environments, particularly in Operational Technology (OT) settings.
- The solution may be a non-video analytic tool, provided it meets the requirement.
- Training of the AI model would be executed with sensitive data privacy and concerns.
- Operate efficiently without excessive bandwidth, time, or processing power consumption
CS03: Inter-Agency Cryptocurrency Investigation Collaboration Platform
Develop a secure, real-time information sharing platform that enables multiple agencies to collaborate on cryptocurrency investigations while maintaining operational security…
2025 End User Challenge Statement
CS03: Inter-Agency Cryptocurrency Investigation Collaboration Platform
Challenge
Develop a secure, real-time information sharing platform that enables multiple agencies to collaborate on cryptocurrency investigations while maintaining operational security and avoiding duplication of investigative efforts across blockchain addresses and entities.
Background
Singapore and the surrounding region face increasing illicit activities including money laundering, fraud, ransomware attacks and cross-border crimes, which increasingly leverage digital assets/cryptocurrencies.
Currently, authorities conduct cryptocurrency investigations independently, leading to duplication of efforts when multiple agencies unknowingly investigate the same wallet addresses or entities. This siloed approach creates inefficiencies that strain agencies’ resources as cryptocurrency crime volume increases and investigations get more complex.
Existing market solutions are primarily blockchain analysis tools for individual users rather than secure, multi-agency collaboration platforms that can support sensitive information sharing whilst maintaining strict access controls and operational security requirements.
Requirements
The solution should encompass, but not be limited to, the following features:
- Secure database with bulk upload functionality for cryptocurrency
information such as wallet addresses with associated investigation
metadata - Wallet address clustering and relationship mapping functionality
- Quick wallet address lookup to verify existing agency interest
- Real-time duplicate detection and alert notification when multiple agencies input identical wallet addresses or associations with known wallet address clusters
- Automated OSINT enrichment for wallet addresses of interest
- Real-time newsfeed on crypto security incidents, exploits and local crypto news
- Configurable role-based access control by agencies, departments and user roles.
- User authentication integration with official authentication system
- Comprehensive analytics dashboard with metrics on wallets, duplicates detected, and platform usage statistics
- Comprehensive audit trail for all logins and data access
- Knowledge base repository for investigation
- API integration with user-specified commercial blockchain intelligence databases for deeper insights on wallet addresses and wallet clustering relationships.
- Darknet monitoring to identify compromised or exposed agency-controlled wallet addresses.
- Secure wallet seed phrase management with encryption and multi-level access control
CSOC: Open Category
Innovative cybersecurity proposals that do not fulfill any of the Challenge Statements can be submitted under the “Open Category”. The proposal should clearly explain the issue(s)…
2025 Open Category Challenge
CSOC: Open Category
Innovative cybersecurity proposals that do not fulfill any of the Challenge Statements can be submitted under the “Open Category”. The proposal should clearly explain the issue(s) that it aims to address, demonstrate innovation in solving the identified problem (e.g., no existing solution, improvement(s) on existing solutions), and have concrete go-to-market plans.
For proposals submitted under the Open Category, the applicant company must secure at least one committed end-user by the third milestone. This end-user must be interested in deploying the solution if the project is successful. The company can leverage on “minimum viable products”* and/or market-ready technologies to develop cybersecurity applications with new features and functionalities that would meet the new and emerging demands of cybersecurity users.
Solution providers can submit proposals in the following focus areas including, but not limited to:

*A minimum viable product is a product with just enough features to satisfy early customers and to provide feedback for future product development.