{"id":15308,"date":"2019-02-05T15:23:09","date_gmt":"2019-02-05T15:23:09","guid":{"rendered":"https:\/\/www.kaspersky.co.uk\/blog\/sas-2019-podcast-kamluk\/15308\/"},"modified":"2019-11-22T10:01:07","modified_gmt":"2019-11-22T10:01:07","slug":"sas-2019-podcast-kamluk","status":"publish","type":"post","link":"https:\/\/www.kaspersky.co.uk\/blog\/sas-2019-podcast-kamluk\/15308\/","title":{"rendered":"SAS preview: Vitaly Kamluk"},"content":{"rendered":"<p>The 2019 edition of the Kaspersky Lab Security Analyst Summit (aka #TheSAS2019), will take place in Singapore from April 8 to 11. As always, the conference will bring some of the brightest minds in infosec together to share knowledge at a high level.<\/p>\n<p>This year, the conference will come to Asia for the first time. To talk more about Singapore and what people can expect while attending the SAS, I sat down with <a target=\"_blank\" href=\"https:\/\/twitter.com\/vkamluk\" rel=\"noopener noreferrer nofollow\">Vitaly Kamluk<\/a>, who leads the APAC arm of our Global Research and Analysis Team (GReAT) and resides in Singapore.<\/p>\n<p>During our talk, Vitaly offers his insight into the sights that first-time visitors to Singapore should see as well as what the security scene looks like. Given his area of expertise, we couldn\u2019t just talk travel tips. We also discuss his upcoming training session at the conference, entitled Remote Forensics for the Modern Malware Hunter, as well as the forensic tool that he created, Bitscout. The session will cover the following:<\/p>\n<ol>\n<li>Introduction and theory<\/li>\n<li>Building your own remote ninja tool<\/li>\n<li>Exercises:\n<ul>\n<li>Discovering malware remotely<\/li>\n<li>Finding attack infection vectors<\/li>\n<li>Remote disk-image-acquisition methods<\/li>\n<li>Virtualization-based wizardry<\/li>\n<li>Breaking through proprietary disk encryption<\/li>\n<li>Analyzing non-Windows platforms<\/li>\n<li>Converting a compromised host into a safe honeypot<\/li>\n<\/ul>\n<\/li>\n<\/ol>\n<p>To sign up for Vitaly\u2019s training session, please click <a target=\"_blank\" href=\"https:\/\/sas.kaspersky.com\/?utm_source=kdaily&amp;utm_medium=blog&amp;utm_campaign=gl_SAS2019_organic&amp;utm_content=link&amp;utm_term=gl_kdaily_organic_link_blog_SAS2019%23remote-forensics-for-the-modern-malware-hunter\" rel=\"noopener noreferrer nofollow\">here<\/a>. More information on Bitscout is available <a target=\"_blank\" href=\"https:\/\/github.com\/vitaly-kamluk\/bitscout\" rel=\"noopener noreferrer nofollow\">here<\/a>. You can also check out <a target=\"_blank\" href=\"https:\/\/securelist.com\/olympicdestroyer-is-here-to-trick-the-industry\/84295\/\" rel=\"noopener noreferrer\">research<\/a> and <a target=\"_blank\" href=\"https:\/\/youtu.be\/Hgt9K93EHmY\" rel=\"noopener noreferrer nofollow\">video<\/a> on the Olympic Destroyer APT and Vitaly\u2019s talk, \u201c<a target=\"_blank\" href=\"https:\/\/youtu.be\/fbidgtOXvc0\" rel=\"noopener noreferrer nofollow\">The secret power of Yara<\/a>,\u201d from 2017\u2019s Security Analyst Summit.<\/p>\n<p><iframe loading=\"lazy\" src=\"\/\/html5-player.libsyn.com\/embed\/episode\/id\/8528009\/height\/90\/theme\/custom\/thumbnail\/yes\/direction\/backward\/render-playlist\/no\/custom-color\/000000\/\" frameborder=\"0\" scrolling=\"no\" marginwidth=\"0\" marginheight=\"0\" width=\"100%\" height=\"90px\"><\/iframe><\/p>\n<div class=\"podcast-subscribe\"><a data-omniture-download-button-type=\"TrialBuilds\" data-omniture-product-name=\"podcast-itunes\" class=\"itunes\" href=\"https:\/\/itunes.apple.com\/us\/podcast\/talk-security\/id909407206\" target=\"_blank\" rel=\"noopener nofollow\"><img decoding=\"async\" src=\"https:\/\/www.kaspersky.co.uk\/blog\/wp-content\/plugins\/kaspersky-embeds\/img\/button-subscribe-apple.png\"><\/a><a data-omniture-download-button-type=\"TrialBuilds\" data-omniture-product-name=\"podcast-spotify\" class=\"spotify\" href=\"https:\/\/open.spotify.com\/show\/1VGCKlOoQ9C24dJiCHGTK5\" target=\"_blank\" rel=\"noopener nofollow\"><img decoding=\"async\" src=\"https:\/\/www.kaspersky.co.uk\/blog\/wp-content\/plugins\/kaspersky-embeds\/img\/button-subscribe-spotify.png\"><\/a><a data-omniture-download-button-type=\"TrialBuilds\" data-omniture-product-name=\"podcast-rss\" class=\"rss\" href=\"http:\/\/talksecurity.kaspersky-podcasts.libsynpro.com\/rss\" target=\"_blank\" rel=\"noopener nofollow\"><img decoding=\"async\" src=\"https:\/\/www.kaspersky.co.uk\/blog\/wp-content\/plugins\/kaspersky-embeds\/img\/button-subscribe-rss.png\"><\/a><\/div>\n","protected":false},"excerpt":{"rendered":"<p>In this Security Analyst Summit preview, Jeff talks with Vitaly Kamluk of Kaspersky Lab\u2019s Global Research and Analysis team.<\/p>\n","protected":false},"author":636,"featured_media":15309,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[5,2026],"tags":[2430,584,452,337,333,2431,1058],"class_list":{"0":"post-15308","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-news","8":"category-threats","9":"tag-thesas2019","10":"tag-great","11":"tag-podcast","12":"tag-sas","13":"tag-security-analyst-summit","14":"tag-the-sas-2019","15":"tag-vitaly-kamluk"},"hreflang":[{"hreflang":"en-gb","url":"https:\/\/www.kaspersky.co.uk\/blog\/sas-2019-podcast-kamluk\/15308\/"},{"hreflang":"en-in","url":"https:\/\/www.kaspersky.co.in\/blog\/sas-2019-podcast-kamluk\/15198\/"},{"hreflang":"en-ae","url":"https:\/\/me-en.kaspersky.com\/blog\/sas-2019-podcast-kamluk\/12774\/"},{"hreflang":"en-us","url":"https:\/\/usa.kaspersky.com\/blog\/sas-2019-podcast-kamluk\/17143\/"},{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/sas-2019-podcast-kamluk\/25565\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/sas-2019-podcast-kamluk\/22082\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/sas-2019-podcast-kamluk\/22015\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/www.kaspersky.co.uk\/blog\/tag\/sas\/","name":"SAS"},"_links":{"self":[{"href":"https:\/\/www.kaspersky.co.uk\/blog\/wp-json\/wp\/v2\/posts\/15308","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.co.uk\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kaspersky.co.uk\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.co.uk\/blog\/wp-json\/wp\/v2\/users\/636"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kaspersky.co.uk\/blog\/wp-json\/wp\/v2\/comments?post=15308"}],"version-history":[{"count":2,"href":"https:\/\/www.kaspersky.co.uk\/blog\/wp-json\/wp\/v2\/posts\/15308\/revisions"}],"predecessor-version":[{"id":17187,"href":"https:\/\/www.kaspersky.co.uk\/blog\/wp-json\/wp\/v2\/posts\/15308\/revisions\/17187"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.co.uk\/blog\/wp-json\/wp\/v2\/media\/15309"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.co.uk\/blog\/wp-json\/wp\/v2\/media?parent=15308"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kaspersky.co.uk\/blog\/wp-json\/wp\/v2\/categories?post=15308"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kaspersky.co.uk\/blog\/wp-json\/wp\/v2\/tags?post=15308"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}