{"id":5393,"date":"2014-07-14T15:00:52","date_gmt":"2014-07-14T19:00:52","guid":{"rendered":"https:\/\/www.kaspersky.com\/blog\/?p=5393"},"modified":"2020-02-26T10:53:14","modified_gmt":"2020-02-26T15:53:14","slug":"csng-2014-finals","status":"publish","type":"post","link":"https:\/\/www.kaspersky.com\/blog\/csng-2014-finals\/5393\/","title":{"rendered":"Kaspersky Academy Cyber Security for the Next Generation: Stockholm Finals"},"content":{"rendered":"<p class=\"zw-paragraph\" style=\"color: #000000;\"><span class=\"zw-portion\">From\u00a0<\/span><span class=\"zw-portion\">June<\/span><span class=\"zw-portion\">\u00a0<\/span><span class=\"zw-portion\">23<\/span><span class=\"zw-portion\">\u2013<\/span><span class=\"zw-portion\">25 Stockholm<\/span><span class=\"zw-portion\">\u00a0<\/span><span class=\"zw-portion\">h<\/span><span class=\"zw-portion\">ost<\/span><span class=\"zw-portion\">ed<\/span><span class=\"zw-portion\">\u00a0the\u00a0<\/span><span class=\"zw-portion\">Fi<\/span><span class=\"zw-portion\">nal<\/span><span class=\"zw-portion\">\u00a0Round<\/span><span class=\"zw-portion\">\u00a0of\u00a0<\/span><span class=\"zw-portion\">Kaspersky\u00a0<\/span><span class=\"zw-portion\">Lab\u2019s<\/span><span class=\"zw-portion\">\u00a0 \u201c<\/span><span class=\"zw-portion\">CyberSecurity<\/span><span class=\"zw-portion\">\u00a0for the Next Generation\u201d<\/span><span class=\"zw-portion\">\u00a0<\/span><span class=\"zw-portion\">student\u00a0 conference<\/span><span class=\"zw-portion\">. The were 12 studen<\/span><span class=\"zw-portion\">t finalists<\/span><span class=\"zw-portion\">\u00a0<\/span><span class=\"zw-portion\">from\u00a0<\/span><span class=\"zw-portion\">8<\/span><span class=\"zw-portion\">\u00a0different countries\u00a0<\/span><span class=\"zw-portion\">who\u00a0<\/span><span class=\"zw-portion\">had won their way through the regional rounds<\/span><span class=\"zw-portion\">. Over the course of these few days, the students faced 5 challenges:\u00a0 th<\/span><span class=\"zw-portion\">re<\/span><span class=\"zw-portion\">e\u00a0<\/span><span class=\"zw-portion\">individual\u00a0<\/span><span class=\"zw-portion\">challenges\u00a0<\/span><span class=\"zw-portion\">\u2013\u00a0<\/span><span class=\"zw-portion\">the \u201cElevator Pitch\u201d, \u201c<\/span><span class=\"zw-portion\">Future News\u00a0<\/span><span class=\"zw-portion\">Video Report\u201d and \u201cPoster\u201d<\/span><span class=\"zw-portion\">\u00a0\u2013 and two teams event,\u00a0<\/span><span class=\"zw-portion\">\u201cCyber Quiz\u201d and \u201cComputer Security Competition\u201d<\/span><span class=\"zw-portion\">, called \u201cOperation Double \u2013Cross\u201d.<\/span><\/p>\n<p class=\"zw-paragraph\" style=\"color: #000000;\"><span class=\"zw-portion\">The aim of this international event is to\u00a0<\/span><span class=\"zw-portion\">nurture\u00a0<\/span><span class=\"zw-portion\">young people\u00b4s interest in Cyber Security, an area\u00a0<\/span><span class=\"zw-portion\">which<\/span><span class=\"zw-portion\">\u00a0<\/span><span class=\"zw-portion\">is set to become more and more important\u00a0<\/span><span class=\"zw-portion\">as our reliance on technology increases<\/span><span class=\"zw-portion\">.<\/span><\/p>\n<p class=\"zw-paragraph\" style=\"color: #000000;\">\n<\/p><p class=\"zw-paragraph\" style=\"color: #000000;\"><span class=\"zw-portion\">After\u00a0<\/span><span class=\"zw-portion\">a\u00a0<\/span><span class=\"zw-portion\">Welcome Speech by Natalya\u00a0<\/span><span class=\"zw-portion\">Obelets<\/span><span class=\"zw-portion\">, Deputy Head of Educati<\/span><span class=\"zw-portion\">on Initiatives at Kaspersky\u00a0<\/span><span class=\"zw-portion\">Lab;<\/span><span class=\"zw-portion\">\u00a0<\/span><span class=\"zw-portion\">Marie\u00a0<\/span><span class=\"zw-portion\">Alveras<\/span><span class=\"zw-portion\">\u00a0<\/span><span class=\"zw-portion\">Loven<\/span><span class=\"zw-portion\">, Head of CERT-SE Swedish Contingencies Agency, gave a presentation about the way her organization reacts in the face of security problems, informing us that\u00a0<\/span><span class=\"zw-portion\">in<\/span><span class=\"zw-portion\">\u00a02013\u00a0<\/span><span class=\"zw-portion\">we\u00a0<\/span><span class=\"zw-portion\">saw a 62% rise in the number of breaches compared to 2012.<\/span><span class=\"zw-portion\">\u00a0<\/span><span class=\"zw-portion\">(Did you know that you\u00a0<\/span><span class=\"zw-portion\">can<\/span><span class=\"zw-portion\">\u00a0go online and buy a\u00a0<\/span><span class=\"zw-portion\">DDoS<\/span><span class=\"zw-portion\">-attack from $2\/hour or $150 a week?).<\/span><\/p>\n<p class=\"zw-paragraph\" style=\"color: #000000;\"><span class=\"zw-portion\">David Jacoby, Senior Researcher of Kaspersky\u00a0<\/span><span class=\"zw-portion\">Lab,<\/span><span class=\"zw-portion\">\u00a0<\/span><span class=\"zw-portion\">used his\u00a0<\/span><a style=\"color: blue;\" title=\"\" href=\"https:\/\/www.kaspersky.com\/blog\/david-jacoby-on-social-engineering\/\" target=\"_blank\" rel=\"noopener noreferrer nofollow\"><span class=\"zw-portion link\">Social Engineering Experiment<\/span><\/a><span class=\"zw-portion\">\u00a0to\u00a0<\/span><span class=\"zw-portion\">put us in the picture about the ease with which a public institution can be hacked. He emphasized that instead of worrying about future threats, businesses should address the more basic security\u00a0<\/span><span class=\"zw-portion\">requirements which<\/span><span class=\"zw-portion\">\u00a0may cause them problems right now.<\/span><\/p>\n<p class=\"zw-paragraph\" style=\"color: #000000;\"><span class=\"zw-portion\">After the talks were over, it was down to the students to\u00a0<\/span><span class=\"zw-portion\">take the<\/span><span class=\"zw-portion\">\u00a0stage<\/span><span class=\"zw-portion\">\u00a0for the<\/span><span class=\"zw-portion\">\u00a0\u201cElevator Pitch\u201d challenge. Each student was given a time limit of\u00a0<\/span><span class=\"zw-portion\">3<\/span><span class=\"zw-portion\">\u00a0minutes plus a\u00a0<\/span><span class=\"zw-portion\">2<\/span><span class=\"zw-portion\">\u00a0minute<\/span><span class=\"zw-portion\">\u00a0question time to convince the audience of their project. The winner of this\u00a0<\/span><span class=\"zw-portion\">challenge<\/span><span class=\"zw-portion\">\u00a0was<\/span><span class=\"zw-portion\">\u00a0an<\/span><span class=\"zw-portion\">\u00a0Italian student Maurizio\u00a0<\/span><span class=\"zw-portion\">Abb<\/span><span class=\"zw-portion\">\u00e0<\/span><span class=\"zw-portion\">, who\u00a0<\/span><span class=\"zw-portion\">impres<\/span><span class=\"zw-portion\">sed the program committee with\u00a0<\/span><span class=\"zw-portion\">a<\/span><span class=\"zw-portion\">\u00a0<\/span><span class=\"zw-portion\">presentation\u00a0<\/span><span class=\"zw-portion\">of his paper about Honeypots.<blockquote class=\"twitter-pullquote\"><p>Meet young researchers that will shape security world in the next decade<\/p><a href=\"https:\/\/twitter.com\/share?url=https%3A%2F%2Fkas.pr%2FJoj2&amp;text=Meet+young+researchers+that+will+shape+security+world+in+the+next+decade\" class=\"btn btn-twhite\" data-lang=\"en\" data-count=\"0\" target=\"_blank\" rel=\"noopener nofollow\">Tweet<\/a><\/blockquote><\/span><\/p>\n<p class=\"zw-paragraph\" style=\"color: #000000;\"><span class=\"zw-portion\">Next on the agenda was a presentation given by<\/span><span class=\"zw-portion\">\u00a0<\/span><span class=\"zw-portion\">Vyacheslav<\/span><span class=\"zw-portion\">\u00a0<\/span><span class=\"zw-portion\">Zakorzhevsky<\/span><span class=\"zw-portion\">, Vulnerability Research Group Manager<\/span><span class=\"zw-portion\">, who talked about\u00a0<\/span><a style=\"color: blue;\" title=\"\" href=\"https:\/\/www.kaspersky.com\/blog\/exploit\/\" target=\"_blank\" rel=\"noopener noreferrer nofollow\"><span class=\"zw-portion link\">Exploits<\/span><\/a><span class=\"zw-portion\">. As part of the talk, he showed an impressive graph highlighting the vulnerabilities detected in the Java Platform. (Remember to update to the latest version!)<\/span><\/p>\n<p class=\"zw-paragraph\" style=\"color: #000000;\"><span class=\"zw-portion\">For the second\u00a0<\/span><span class=\"zw-portion\">student\u00a0<\/span><span class=\"zw-portion\">challenge<\/span><span class=\"zw-portion\">, the finalists were required to<\/span><span class=\"zw-portion\">\u00a0<\/span><span class=\"zw-portion\">put together a video report detailing\u00a0<\/span><span class=\"zw-portion\">Cyber Security news that we would be likely to come up against in the year 2020. Thanks to his original approach to the challenge, the winner of this\u00a0<\/span><span class=\"zw-portion\">challenge<\/span><span class=\"zw-portion\">\u00a0<\/span><span class=\"zw-portion\">was\u00a0<\/span><span class=\"zw-portion\">\u00a0<\/span><span class=\"zw-portion\">David<\/span><span class=\"zw-portion\">\u00a0<\/span><span class=\"zw-portion\">Korczynski<\/span><span class=\"zw-portion\">\u00a0from Royal Holloway University of London.<\/span><\/p>\n<p class=\"zw-paragraph\" style=\"color: #000000;\"><span class=\"zw-portion\">Challenge number 3 called for the students to represent their project in poster format, using a combination of text, photos and graphics in order to communicate their\u00a0<\/span><span class=\"zw-portion\">research\u00a0 findings<\/span><span class=\"zw-portion\">.\u00a0<\/span><span class=\"zw-portion\">Artem<\/span><span class=\"zw-portion\">\u00a0<\/span><span class=\"zw-portion\">Shumilov<\/span><span class=\"zw-portion\">, from Bauman Moscow State Technical University, achieved first place with<\/span><span class=\"zw-portion\">\u00a0his project on how to improve<\/span><span class=\"zw-portion\">\u00a0Captcha through\u00a0<\/span><span class=\"zw-portion\">Gesture Technology.<\/span><\/p>\n<p class=\"zw-paragraph\" style=\"color: #000000;\"><span class=\"zw-portion\">T<\/span><span class=\"zw-portion\">he last day of the conference\u00a0<\/span><span class=\"zw-portion\">brought four\u00a0<\/span><span class=\"zw-portion\">interesting presentations. Stefan B.\u00a0<\/span><span class=\"zw-portion\">Grinneby<\/span><span class=\"zw-portion\">\u00a0offered advice\u00a0<\/span><span class=\"zw-portion\">about finding<\/span><span class=\"zw-portion\">\u00a0<\/span><span class=\"zw-portion\">that all-important<\/span><span class=\"zw-portion\">\u00a0<\/span><span class=\"zw-portion\">first job in security,<\/span><span class=\"zw-portion\" style=\"color: #ff0000;\">\u00a0<\/span><span class=\"zw-portion\">Maria\u00a0<\/span><span class=\"zw-portion\">Garnaeva<\/span><span class=\"zw-portion\">, Security Researcher at Kaspersky Lab, talked about BlackEnergy2<\/span><span class=\"zw-portion\">\u00a0<\/span><span class=\"zw-portion\">DDoS<\/span><span class=\"zw-portion\">\u00a0bot<\/span><span class=\"zw-portion\">, and Beverly Magda, professor at Georgetown<\/span><span class=\"zw-portion\">\u00a0University,<\/span><span class=\"zw-portion\">\u00a0reminded us of a topic which often seems to be sidelined in the world of cyber security: ethics. Finally, Daniel W K\u00a0<\/span><span class=\"zw-portion\">Tse<\/span><span class=\"zw-portion\">, professor at the City University of Hong Kong, talked about the need for companies to have clearly defined policies regarding their use of social media.<\/span><\/p>\n<p class=\"zw-paragraph\" style=\"color: #000000;\"><span class=\"zw-portion\">The atmosphere of the Hilton Auditorium\u00a0<\/span><span class=\"zw-portion\">was transformed<\/span><span class=\"zw-portion\">\u00a0by the \u201cCyber Quiz\u201d, one of the final student\u00a0<\/span><span class=\"zw-portion\">team\u00a0<\/span><span class=\"zw-portion\">challenges, hosted by\u00a0<\/span><span class=\"zw-portion\">Dr.\u00a0<\/span><span class=\"zw-portion\">Stefano\u00a0<\/span><span class=\"zw-portion\">Ortolani<\/span><span class=\"zw-portion\">, Education Initiatives Manager at Kaspersky Lab. The excitement was\u00a0<\/span><span class=\"zw-portion\">infectious<\/span><span class=\"zw-portion\">, and after a spirited competition, Team 2, made up of<\/span><span class=\"zw-portion\" style=\"color: #365f91;\">\u00a0<\/span><span class=\"zw-portion\">Sergey\u00a0<\/span><span class=\"zw-portion\">Shpak<\/span><span class=\"zw-portion\">\u00a0(National Research Nuclear University\u00a0<\/span><span class=\"zw-portion\">MePhl<\/span><span class=\"zw-portion\">,\u00a0<\/span><span class=\"zw-portion\">Rusia<\/span><span class=\"zw-portion\">), Armando\u00a0<\/span><span class=\"zw-portion\">Miraglia<\/span><span class=\"zw-portion\">\u00a0(<\/span><span class=\"zw-portion\">Vrije<\/span><span class=\"zw-portion\">\u00a0<\/span><span class=\"zw-portion\">Universieit<\/span><span class=\"zw-portion\">\u00a0Amsterdam) and\u00a0<\/span><span class=\"zw-portion\">Wenjuan<\/span><span class=\"zw-portion\">\u00a0Li (City University of Hong Kong<\/span><span class=\"zw-portion\">)<\/span><span class=\"zw-portion\">, emerged victorious.<\/span><\/p>\n<p class=\"zw-paragraph\" style=\"color: #000000;\"><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2014\/07\/06043053\/group_KAcademy.jpg\"><img decoding=\"async\" class=\"aligncenter size-full wp-image-5434\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2014\/07\/06043053\/group_KAcademy.jpg\" alt=\"group_KAcademy\" width=\"800\" height=\"500\"><\/a><\/p>\n<p class=\"zw-paragraph\" style=\"color: #000000;\"><span class=\"zw-portion\">Our<\/span><span class=\"zw-portion\">\u00a0sincerest thanks and congratulations to all the students who participated in the\u00a0<\/span><span class=\"zw-portion\">event,<\/span><span class=\"zw-portion\">\u00a0and of course to the professors and speakers involved.<\/span><\/p>\n<p class=\"zw-paragraph\" style=\"color: #000000;\"><span class=\"zw-portion\">You can find more information about upcoming events\u00a0<\/span><span class=\"zw-portion\">at<\/span><span class=\"zw-portion\">:<\/span><\/p>\n<ul style=\"color: #000000;\" data-level=\"0\">\n<li>\n<p class=\"zw-paragraph\"><a style=\"color: blue;\" title=\"\" href=\"http:\/\/academy.kaspersky.com\/\" target=\"_blank\" rel=\"noopener noreferrer\"><span class=\"zw-portion link\">academy.kaspersky.com<\/span><\/a><\/p>\n<\/li>\n<li>\n<p class=\"zw-paragraph\"><a style=\"color: blue;\" title=\"\" href=\"https:\/\/twitter.com\/Kaspersky_EDU\" target=\"_blank\" rel=\"noopener noreferrer nofollow\"><span class=\"zw-portion link\">twitter.com\/Kaspersky_EDU<\/span><\/a><\/p>\n<\/li>\n<\/ul>\n<p class=\"spacer-para\" style=\"color: #000000;\">\n<\/p>","protected":false},"excerpt":{"rendered":"<p>These young researchers will shape cyberworld in the next decade.<\/p>\n","protected":false},"author":26,"featured_media":5394,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[5],"tags":[282,167,615,574],"class_list":{"0":"post-5393","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-news","8":"tag-cybersecurity","9":"tag-kaspersky-academy","10":"tag-kaspersky-life","11":"tag-news-2"},"hreflang":[{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/csng-2014-finals\/5393\/"},{"hreflang":"en-in","url":"https:\/\/www.kaspersky.co.in\/blog\/csng-2014-finals\/3761\/"},{"hreflang":"en-ae","url":"https:\/\/me-en.kaspersky.com\/blog\/csng-2014-finals\/3659\/"},{"hreflang":"en-us","url":"https:\/\/usa.kaspersky.com\/blog\/csng-2014-finals\/4133\/"},{"hreflang":"en-gb","url":"https:\/\/www.kaspersky.co.uk\/blog\/csng-2014-finals\/4385\/"},{"hreflang":"ru","url":"https:\/\/www.kaspersky.ru\/blog\/csng-2014-finals\/4657\/"},{"hreflang":"ja","url":"https:\/\/blog.kaspersky.co.jp\/csng-2014-finals\/4237\/"},{"hreflang":"ru-kz","url":"https:\/\/blog.kaspersky.kz\/csng-2014-finals\/4657\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/csng-2014-finals\/5393\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/csng-2014-finals\/5393\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/www.kaspersky.com\/blog\/tag\/cybersecurity\/","name":"Cybersecurity"},"_links":{"self":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/5393","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/users\/26"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/comments?post=5393"}],"version-history":[{"count":3,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/5393\/revisions"}],"predecessor-version":[{"id":33233,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/5393\/revisions\/33233"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/media\/5394"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/media?parent=5393"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/categories?post=5393"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/tags?post=5393"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}