Due Date: August 16, 2019

Applications are open for the OpenIDEO Cybersecurity Visuals Difficulty 2019 The Difficulty looks for to offer responses to the how may we reimagine a more engaging and relatable visual language for cybersecurity.

Frequently, visuals in the cybersecurity area show surface area level understanding affected by sensationalist media. We see images of locks, white males in hoodies, or green 1sts and 0s that do little to communicate the truth of this made complex, seriously essential subject. With this Difficulty, they want to raise images that much better represents the cybersecurity area in an available and engaging way.


  • All individuals get access to resources and neighborhood assistance
  • As Much As 25 shortlisted factors will get mentorship from a cybersecurity professional and $500 each
  • As much as 5 winners will get $7,000 each


  • Open to visual developers from varied backgrounds excited to use their ability to this essential work.
  • Qualified nations consist of: Argentina, Australia, Brazil, Canada, China, Colombia, France, Germany, India, Japan, Mexico, Netherlands, Peru, South Africa, Spain, UK, and United States of America.

Choice Process

Throughout shortlisting, they will assess your submission based upon the following requirements:

  • Aesthetically Engaging: Visuals should plainly interact a discrete element of cybersecurity, and interact implying immediately by using style aspects such as structure, colors, shapes, characters and image/text relationship.
  • Creative Quality: Visuals should be well-conceived and well-executed within the visual developer’s medium of option.
  • Broadens the Discussion: Visuals should be additive to the cybersecurity area. We aspire to believe beyond present graphes with initial art that innovates, raises, influences, and presses imagination at the edges.

For last choice, they will assess your submission based upon shortlisting requirements in addition to the following:

  • Equating Power: Visuals should increase understanding and access to cybersecurity in such a way that is quickly and rapidly absorbed by somebody who does not have cybersecurity competence. Where possible, the visuals need to operate in various contexts and be resilient in their timelessness.
  • Technical Precision: Visuals should consist of precise representations of a discrete element of cybersecurity.


Click on this link to share your concept

To find out more, see OpenIDEO Cybersecurity Visuals Difficulty

Technology Used by Successwful Businesses