Thu. Nov 14th, 2019

OpenIDEO Visual Language Cybersecurity Challenge Prize $7,000

Call Deadline: August 16, 2019 
Value of Amount: $7,000 

Program Overview 


Too often, visuals in the cybersecurity space reflect surface-level understanding influenced by sensationalist media. We see pictures of locks, white men in hoodies, or green 1s and 0s that do little to convey the reality of this complicated, critically important topic. With this Challenge, we hope to elevate imagery that better represents the cybersecurity space in an accessible and compelling manner.


  • The Hewlett Foundation is offering prizes to shortlisted candidates and winners in recognition of their commitment and time to this process.
  • Up to twenty-five, shortlisted candidates will receive $500 and up to five final winners will receive $7,000. Students are encouraged to apply and are eligible to win.


  • Teams
  • Note that we are only able to consider individual contributions during the evaluation process due to legal considerations. Submissions from teams will be ineligible to proceed to the shortlist.

  • Artistic Medium
  • We welcome submissions of any artistic medium that feel they can satisfy the Evaluation Criteria. This includes but is not limited to graphic design, illustration, comics, video, animation, and infographic.


  • Creative Commons Consent
  • To be considered for winning this Challenge, we are asking that all shortlisted finalists consent to free licensure via the Creative Commons website. We’ll provide more guidance to shortlisted participants during the Challenge. We believe that this type of licensing helps ensure your work reaches the widest possible audience by giving permission in advance for others to republish it. More importantly, it helps advance knowledge because it allows others to build on your work—remixing it into new forms (while still acknowledging your role in creating the underlying content).
  • Employment Status
  • Note that employees, relatives, and officers of the Hewlett Foundation are not eligible to win. Employees of IDEO are not eligible to win.
  • Geographic Location



Eligibility Countries 

  • Argentina, Australia, Brazil, Canada, China, Colombia, France, Germany, India, Japan, Mexico, Netherlands, Peru, South Africa, Spain, United Kingdom, and the United States of America.


Evualitioan Criteria 

Visually Compelling: Visuals must clearly communicate a discrete aspect of cybersecurity, and communicate meaning instantly by employing design elements such as composition, colors, shapes, characters and image/text relationship.

  • Artistic Quality: Visuals must be well-conceived and well-executed within the visual creator’s medium of choice.
  • Expands the Conversation: Visuals must be additive to the cybersecurity space. We’re eager to think beyond current visual representations with original art that innovates, elevates, inspires, and pushes creativity at the edges.

For final selection, we’ll evaluate your submission based on shortlisting criteria in addition to the following:

  • Translating Power: Visuals must increase understanding and access to cybersecurity in a way that is easily and quickly digested by someone who does not have cybersecurity expertise. Where possible, the visuals should work in different contexts and be durable in their timelessness.
  • Technical Accuracy: Visuals must include accurate depictions of a discrete aspect of cybersecurity.

The selection panel will be comprised of representation from Hewlett Foundation, IDEO, and external partners which may include other funders in the space, technical experts, visual designers, journalists, policymakers, and academic institutions.

What We’re Not Looking For

  • Overly abstract or conceptual submissions not based on a technical understanding of cybersecurity.
  • Overused, stereotypical, fear-inducing images of cybersecurity. These create personal misperceptions and aversions and may lead to a series of repercussions regarding the public understanding of cybersecurity and data safety.
  • Misrepresentation or overgeneralization of the cybersecurity space.





Touches Challenge Link

Leave a Reply

Your email address will not be published. Required fields are marked *