Hello,
Want to know what a Security Analyst Summit is? Why and who is there? Learn about SCADA exploits in US prisons? Look at the flight of woodpeckers in the Mayan jungle? All truth from one of the summit participants in this post.

Today I would like to tell you about such an event as
Security Analyst Sammit . This is a young conference organized by Kaspersky Lab for the fourth time ... or the fifteenth - depending on how you count it. The constant chip of konfa is the communication of experts in the field of computer security in an informal setting: not just without a tie, but right in beach slippers, shorts and Hawaii. This year we decided to hold an event in the winter, and there was a problem with beach slippers, which no one wanted to refuse. Therefore, it was decided to fly closer to the equator, and the choice fell on the Yucatan Peninsula. By the way, it was previously inhabited by precisely those same Indians with a vulnerable calendar: in December of this year, a buffer overflow occurred, but the universe did not fall, and did not even hang, which is good news.
')
Welcome speech from the boss on the side of the fountainUpon arrival we were waited by a warm azure sea, white sparkling sand, an air-conditioned conference hall and three days of konfy. As you understand, the choice of participants who are ready to work in such inhuman conditions is not a simple matter. This year there were specialists from a dozen companies, including Adobe, Boeing, CrySyS Lab (guys who found DuQU), Kaspersky Lab (well, without us;)), Microsoft, Team Cymru, and cyber police from Interpol, Germany , Holland, Romania and independent writers.
Hall with participants. Many, by the way, tweetted: look for the hash tag # SAS2012This is the fourth time we invite external people to konfu, and this year, in addition to LK, Adobe, Barracuda and ThreatPost have become sponsors. Interest in the conference is gradually growing and, I hope, in the foreseeable future we will grow to the level of Industry Events. More precisely, to be honest, it has already grown - the level of reports and speakers spoke for itself.
Now about the
meat prezah. For starters, I’ll say that they were richer than AVARs and VBs presented recently in the disguised AVAR. The speeches were really interesting and incendiary with real facts based on real surveys, incidents and operational activities, in the case of cyber policemen. By the way, the speaker was mega-fun: each preza ended not only with stormy applause, but also with a shot of tequila, and each block with another shot. The moderators of the long sessions were of course the hardest of all, however, we chose the most trained specialists, who hardened their will at previous summits:

Well, in the appendage each keeper got a keg of tequila, drunk with a company of fresh acquaintances in the evening. On the second day, when we got enough kegs of tequila and were able to put a part on the tables in front of the conference hall, coffee breaks became even more fun:

Coffeebreak - Kaspersky style;)The most credible speeches were from the Dutch cyber police: about the
closure of Bredolaba , the calculation and, most difficultly, the collection of evidence on the owner, the fight against child pornography in the network; Interpol about the organization of
cyberinterpol (Finally! Casper has already
buzzed all this in
ten years ).
Peter Zinn (Dutch police) answer questions from the audienceAn interesting research team of independent researchers from the United States, who managed to develop and conduct a test attack using the exploit for SCADA, which allows you to gain complete control over the entire control system of a particular prison: from the doors to the cameras, to the perimeter defense. It turned out that the Internet in prison is like a gopher: you don’t see it, but it exists! The plan of such institutions naturally does not imply any Ethernet, and even more no Wi-Fi. However, time goes on, and in prisons, too, they pull wires, and they do connect critical computers to the web. And what do the guards do at night for these computers, I will not tell you;). The exploit, by the way, was written to SCADA from Siemens, but in principle nothing prevents this from being done for another supplier. The whole research cost $ 2500 - agree, a frivolous amount for those who want to leave the prison "ahead of time".
I also remember the reports about
Malvara attacking POS-terminals (those that are in each store), the treatment of legal sites (webmasters only in 3% of cases respond to the messages that they have an infected site),
“the whole truth about Duqu” , the
identification of fake Facebook accounts , analysis of fresh APT, about the
fight against exploits in Adobe and Malware by mail (in the literal sense of the word, that is, transmitted by Russian Post :).
Brad Arkin from Adobe about bugs (apparently, rather big)
Levy from team Cymru is broadcasting a 60 Gbit / s DDoS attack analysisThose who work well, also rely and have a good rest. The consolidation of new acquaintances and the team spirit of the fighters against viruses, Trojans and their authors took place in the setting of the wild jungles and the Mayan pyramids on the third day. At the general council they decided not to sacrifice anyone ... well, almost;). Suddenly, it turned out that different types of woodpeckers work in the company: flying, running, and even woodpecker:
Although some representatives even in the jungle talked about work
SAS has grown into a useful, interesting, and not unimportant, very positive event. Yes, disputes of privacy fighters, experts and cyber police officers were sometimes very hot, but a great atmosphere (well, barrels with fiery water) helped to defuse the situation and find a common language, as well as truth. The main message of the conference: “Let's take the bull by the horns” - I mean, all the interesting stories should be supported by the case: Malvar Detective, treatment sites and catching criminals. Looking forward to next year!
Summit participant: senior virus analyst at Kaspersky Lab Yuri Namestnikov