Risk
8/23/2012
05:24 PM
Dark Reading
Dark Reading
Products and Releases
Connect Directly
RSS
E-Mail
50%
50%

International Student Competition 'CyberSecurity For The Next Generation' Kicks Off In North America With Call For Papers

The first round, the North American Cup, is now accepting paper submissions from students

Woburn, MA – August 22, 2012 – Kaspersky Lab, a leading developer of secure content and threat management solutions, announces the start of the regional stage of its international student competition ‘CyberSecurity for the Next Generation 2013’. The first round, the North American Cup, is now accepting paper submissions from students.

Since its launch last year, the North American Cup has been held in partnership with the Polytechnic Institute of New York University (NYU-Poly) Cyber Security Awareness Week (CSAW). The NYU-Poly CSAW challenges are among the oldest and broadest student-led competitions, and are designed to encourage awareness of the increasing threats to privacy and security issues for individuals, governments, business and smart infrastructure.

Kaspersky Lab’s North American Cup at the CSAW annual competition is a unique platform. It brings together young professionals and researchers, IT security experts and professors, and decision makers from the IT business and media from all over the world in a collaborative and creative environment. The event provides the opportunity to present and discuss the most burning issues relating to global cybercrime. The conference will offer young researchers a unique opportunity to present their original research and at the same time improve their knowledge of IT security. Participants will showcase their projects and open themselves to potential new and attractive career opportunities in IT security.

Bachelors, Masters and Ph.D. students from higher education institutions and graduate schools based in the USA and Canada are welcome to enter. Participation is free of charge. To participate applicants need to:

1) Register at the official conference site: http://www.kaspersky.com/educational-events.

2) Submit their research paper by October 16, 2012

3) Prepare a 10 minute presentation (if chosen as a finalist to participate at the conference)

This year’ topics are:

Emerging threats for emerging platforms -- Embedded systems; Mobile security (Android, IOS, Windows Phone); Windows 8, Mac OS & other operating systems, etc. Securing cloud, virtual & ‘big-data’ infrastructure -- Mail services; Storage services; Social networks, etc. Future protection technologies -- Proactive detection technologies; Filtering technologies; Web application security, etc. Securing corporate infrastructure -- Combating advanced persistent threats (APTS)/targeted attacks; Vulnerabilities, exploits; Rootkits/bootkits; Botnets; DDoS attacks; Network security, etc. Security education -- Tools and resources to raise and promote IT security awareness

A program committee consisting of Kaspersky Lab experts, IT security professors and decision-makers from IT business and media will review all papers. The authors of the most interesting and innovative cybersecurity projects will be invited to the conference at NYU-Poly on November 15-17, 2012. The conference is held in a very friendly, creative and supportive atmosphere and promises to be an unforgettable experience.

Kaspersky Lab will cover all participants’ travel and accommodation expenses.

The winners will receive generous cash prizes as well as an invitation to attend and compete in the international final conference, bringing together the best-of-the-best from across the globe. Regional competitions are held in North America, South America, Europe, Asia-Pacific & Middle East and Africa, and Russia & the CIS. The championship stage of this year’s conference will take place in the United Kingdom in May 2013.

For further information about the conference, please visit: http://www.kaspersky.com/about/events/educational-events or http://www.facebook.com/KasperskyConference.

To contact the event coordinators, please send your correspondence to: studconf-america@kaspersky.com.

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Flash Poll
Current Issue
Cartoon
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2014-4907
Published: 2014-07-11
Cross-site scripting (XSS) vulnerability in share/pnp/application/views/kohana_error_page.php in PNP4Nagios before 0.6.22 allows remote attackers to inject arbitrary web script or HTML via a parameter that is not properly handled in an error message.

CVE-2014-4908
Published: 2014-07-11
Multiple cross-site scripting (XSS) vulnerabilities in PNP4Nagios through 0.6.22 allow remote attackers to inject arbitrary web script or HTML via the URI used for reaching (1) share/pnp/application/views/kohana_error_page.php or (2) share/pnp/application/views/template.php, leading to improper hand...

CVE-2014-2963
Published: 2014-07-10
Multiple cross-site scripting (XSS) vulnerabilities in group/control_panel/manage in Liferay Portal 6.1.2 CE GA3, 6.1.X EE, and 6.2.X EE allow remote attackers to inject arbitrary web script or HTML via the (1) _2_firstName, (2) _2_lastName, or (3) _2_middleName parameter.

CVE-2014-3310
Published: 2014-07-10
The File Transfer feature in WebEx Meetings Client in Cisco WebEx Meetings Server and WebEx Meeting Center does not verify that a requested file was an offered file, which allows remote attackers to read arbitrary files via a modified request, aka Bug IDs CSCup62442 and CSCup58463.

CVE-2014-3311
Published: 2014-07-10
Heap-based buffer overflow in the file-sharing feature in WebEx Meetings Client in Cisco WebEx Meetings Server and WebEx Meeting Center allows remote attackers to execute arbitrary code via crafted data, aka Bug IDs CSCup62463 and CSCup58467.

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
Marilyn Cohodas and her guests look at the evolving nature of the relationship between CIO and CSO.