{"id":1094,"date":"2013-02-04T10:07:11","date_gmt":"2013-02-04T15:07:11","guid":{"rendered":"http:\/\/kasperskydaily.com\/uk\/?p=1094"},"modified":"2017-10-12T11:29:55","modified_gmt":"2017-10-12T10:29:55","slug":"next-generation-of-cyber-security-participant-interviews","status":"publish","type":"post","link":"https:\/\/www.kaspersky.co.uk\/blog\/next-generation-of-cyber-security-participant-interviews\/1094\/","title":{"rendered":"Cybersecurity for the Next Generation &#8211; Who Are You?"},"content":{"rendered":"<p>We were able to sit down with the students and graduates who present their researches at Kaspersky Lab`s \u201cCybersecurity for the Next Generation\u201d students conference that took place last week in Ecuador. They expressed to us their hopes, challenges and plans for future.<\/p>\n<p>\u00a0<\/p>\n<p><strong>Presenter: <\/strong>Galoget Latorre<\/p>\n<p><strong>Title of the work: <\/strong>Reverse Engineering: How to create a Basic Environment for Malware Analysis oriented to Undergraduate Students<\/p>\n<p><strong>University: <\/strong>National Polytechnic School of Ecuador<\/p>\n<p><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/86\/2013\/02\/05203555\/NextGen-Presenter-1.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-1105\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/86\/2013\/02\/05203555\/NextGen-Presenter-1.jpg\" alt=\"\" width=\"800\" height=\"533\"><\/a><\/p>\n<p>\u201cI learned of this students conference because my university is hosting the event.\u00a0 For me, personally, it\u2019s a good opportunity to meet international cybersecurity experts and other specialists in the field. I decided to take part in the conference, first of all, because cybersecurity is my passion. Additionally, being chosen to participate is an honor and it`s a great opportunity to gain visibility in the industry in order to find a good job in the future. If my research work wins, I will implement it in the university and do my best to share my ideas with the rest of the world by delving deeper into the topic. In 5 years I see myself getting my PHD at one of the best universities in the world and working for a large IT security company like Kaspersky Lab.\u201d<\/p>\n<p>\u00a0<\/p>\n<p><strong>Presenter: <\/strong>Lilia Elena Gonzalez<\/p>\n<p><strong>Title of the work: <\/strong>Performance comparison of a distance classifier and a feed-forward neural network in the classification of malware variants<\/p>\n<p><strong>University: <\/strong>La Salle University<\/p>\n<p><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/86\/2013\/02\/05203553\/NextGen-Presenter-2.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-1106\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/86\/2013\/02\/05203553\/NextGen-Presenter-2.jpg\" alt=\"\" width=\"800\" height=\"533\"><\/a><\/p>\n<p>\u201cI found out about the conference through Fabio Assolini\u2019s Twitter (@assolini). I\u2019m here because I wanted to know how useful my approach could be for the cybersecurity industry. I believe winning will be a good experience for me in general. In 5 years, I see myself in malware research and analysis.\u201d<\/p>\n<p>\u00a0<\/p>\n<p><strong>Presenter:\u00a0 <\/strong>Jaqueline Carmilema<\/p>\n<p><strong>Title of the work: <\/strong>Detection and Mitigation of MITM Attacks in Storage Cloud Infrastructures<\/p>\n<p><strong>University: <\/strong>National Polytechnic School of Ecuador<\/p>\n<p><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/86\/2013\/02\/05203550\/NextGen-Presenter-3.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-1108\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/86\/2013\/02\/05203550\/NextGen-Presenter-3.jpg\" alt=\"\" width=\"800\" height=\"533\"><\/a><\/p>\n<p>\u201cI\u2019m really happy that Kaspersky Lab supports the research of young professionals. In my opinion, a conference like this is a good chance to present my research and become familiar with industry experts. If my work wins, I would first take a vacation. After, I will do my best to share my research with the security community. In the future, I see myself managing my own company.\u201d<\/p>\n<p>\u00a0<\/p>\n<p><strong>Presenter:<\/strong> Franklin Onofa<\/p>\n<p><strong>Title of the work:<\/strong> Collecting Electronic Evidence of Email Forging using SMTP Headers and Wireshark<\/p>\n<p><strong>University:<\/strong> National Polytechnic School of Ecuador<\/p>\n<p><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/86\/2013\/02\/05203549\/NextGen-Presenter-4.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-1109\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/86\/2013\/02\/05203549\/NextGen-Presenter-4.jpg\" alt=\"\" width=\"800\" height=\"533\"><\/a><\/p>\n<p>\u201cI learned about the conference from my teacher at the National Polytechnic School of Ecuador who knew my interest in cybersecurity and advised me to take part.\u00a0 Participation, itself, is a great challenge for me \u2013 handling the big audience and presenting in a foreign language.\u00a0 If my work wins, I will be really proud of myself and will continue development on the subject. In 5 years, I want to receive my masters degree abroad.\u201d<\/p>\n<p>\u00a0<\/p>\n<p><strong>Presenter:<\/strong> Wilson Castro<\/p>\n<p><strong>Title of the work:<\/strong> Performing and Detecting NOP Sled Exploitation against the NetBIOS Service in Windows Systems<\/p>\n<p><strong>University:<\/strong> National Polytechnic School of Ecuador<\/p>\n<p><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/86\/2013\/02\/05203548\/NextGen-Presenter-5.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-1110\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/86\/2013\/02\/05203548\/NextGen-Presenter-5.jpg\" alt=\"\" width=\"800\" height=\"533\"><\/a><\/p>\n<p>\u201cMy teacher from National Polytechnic School of Ecuador motivated me to take part in this conference and I\u2019m glad that he did so. IT security is a very important topic nowadays and my participation here will make an impact on my future. In 5 years, I see myself working for Kaspersky Lab or if not \u2013 any other security company as a Malware researcher. Another option I see for myself is to have my own business in IT security.\u201d<\/p>\n<p>\u00a0<\/p>\n<p><strong>Presenter:<\/strong> Johanna Malla<\/p>\n<p><strong>Title of the work:<\/strong> Blue Bugging Attack on Cell Phones with Bluetooth Technology<\/p>\n<p><strong>University:<\/strong> National Polytechnic School of Ecuador<\/p>\n<p><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/86\/2013\/02\/05203552\/NEXTGen-Presenter-6.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-1107\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/86\/2013\/02\/05203552\/NEXTGen-Presenter-6.jpg\" alt=\"\" width=\"800\" height=\"533\"><\/a><\/p>\n<p>\u201cI found out about the conference through the National Polytechnic School of Ecuador\u2019s website. I decided to participate because I believe that my research is really interesting for the public. If my work wins, I will continue developing and researching the topic. In the future, I see myself having my own business and doing new projects.\u201d<\/p>\n<p>\u00a0<\/p>\n","protected":false},"excerpt":{"rendered":"<p>We were able to sit down with the students and graduates who present their researches at Kaspersky Lab`s \u201cCybersecurity for the Next Generation\u201d students conference that took place last week<\/p>\n","protected":false},"author":32,"featured_media":1104,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[5],"tags":[282,276],"class_list":{"0":"post-1094","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-news","8":"tag-cybersecurity","9":"tag-nextgen"},"hreflang":[{"hreflang":"en-gb","url":"https:\/\/www.kaspersky.co.uk\/blog\/next-generation-of-cyber-security-participant-interviews\/1094\/"},{"hreflang":"en-in","url":"https:\/\/www.kaspersky.co.in\/blog\/next-generation-of-cyber-security-participant-interviews\/1094\/"},{"hreflang":"en-ae","url":"https:\/\/me-en.kaspersky.com\/blog\/next-generation-of-cyber-security-participant-interviews\/1094\/"},{"hreflang":"en-us","url":"https:\/\/usa.kaspersky.com\/blog\/next-generation-of-cyber-security-participant-interviews\/1094\/"},{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/next-generation-of-cyber-security-participant-interviews\/1094\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/next-generation-of-cyber-security-participant-interviews\/1094\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/next-generation-of-cyber-security-participant-interviews\/1094\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/www.kaspersky.co.uk\/blog\/tag\/cybersecurity\/","name":"Cybersecurity"},"_links":{"self":[{"href":"https:\/\/www.kaspersky.co.uk\/blog\/wp-json\/wp\/v2\/posts\/1094","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.co.uk\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kaspersky.co.uk\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.co.uk\/blog\/wp-json\/wp\/v2\/users\/32"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kaspersky.co.uk\/blog\/wp-json\/wp\/v2\/comments?post=1094"}],"version-history":[{"count":1,"href":"https:\/\/www.kaspersky.co.uk\/blog\/wp-json\/wp\/v2\/posts\/1094\/revisions"}],"predecessor-version":[{"id":10415,"href":"https:\/\/www.kaspersky.co.uk\/blog\/wp-json\/wp\/v2\/posts\/1094\/revisions\/10415"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.co.uk\/blog\/wp-json\/wp\/v2\/media\/1104"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.co.uk\/blog\/wp-json\/wp\/v2\/media?parent=1094"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kaspersky.co.uk\/blog\/wp-json\/wp\/v2\/categories?post=1094"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kaspersky.co.uk\/blog\/wp-json\/wp\/v2\/tags?post=1094"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}