{"id":247,"date":"2016-09-29T10:28:49","date_gmt":"2016-09-29T10:28:49","guid":{"rendered":"https:\/\/www.enog.org\/enog-12\/ru\/%d0%bf%d1%80%d0%b5%d0%b7%d0%b5%d0%bd%d1%82%d0%b0%d1%86%d0%b8%d0%b8\/"},"modified":"2016-09-29T10:56:27","modified_gmt":"2016-09-29T10:56:27","slug":"presentations","status":"publish","type":"page","link":"https:\/\/localhost.ripe.net\/enog-12\/ru\/presentations\/","title":{"rendered":"\u041f\u0440\u0435\u0437\u0435\u043d\u0442\u0430\u0446\u0438\u0438"},"content":{"rendered":"
\u0418\u043c\u044f \u0434\u043e\u043a\u043b\u0430\u0434\u0447\u0438\u043a\u0430<\/th> | \u0417\u0430\u0441\u0435\u0434\u0430\u043d\u0438\u0435<\/th> | \u041d\u0430\u0437\u0432\u0430\u043d\u0438\u0435 \u043f\u0440\u0435\u0437\u0435\u043d\u0442\u0430\u0446\u0438\u0438<\/th> | \u0444\u0430\u0439\u043b\u044b<\/th> | \u0414\u0430\u0442\u0430 \u0414\u043e\u0431\u0430\u0432\u043b\u0435\u043d\u0430<\/th><\/tr><\/thead> |
---|---|---|---|---|
Kevin Meynell<\/td> | Plenary<\/td> | The Case for National CERT\/CSIRTs<\/td> | <\/i><\/a> <\/i><\/a> <\/td> | 2016‑10‑04<\/td><\/tr> |
Richard Lamb<\/td> | Closing Plenary and Lightning Talks<\/td> | IoT BS: Where do \"we\" fit in?<\/td> | <\/i><\/a> <\/i><\/a> <\/td> | 2016‑10‑04<\/td><\/tr> |
Alexander Azimov<\/td> | Plenary<\/td> | Internet Roads of Caucasus<\/td> | <\/i><\/a> <\/td> | 2016‑10‑04<\/td><\/tr> |
paul vixie<\/td> | Opening Plenary<\/td> | dns as a defense vector<\/td> | <\/i><\/a> <\/i><\/a> <\/td> | 2016‑10‑02<\/td><\/tr> |
Hisham Ibrahim<\/td> | Opening Plenary<\/td> | IPv6\u2026 Are we there yet?<\/td> | <\/i><\/a> <\/i><\/a> <\/td> | 2016‑10‑03<\/td><\/tr> |
Yuri Kargapolov<\/td> | Plenary<\/td> | New prospective of DNS-technology: 3d Generation of MNP & IMEI Systems Under Convergence Conditions<\/td> | <\/i><\/a> <\/td> | 2016‑09‑30<\/td><\/tr> |
Anton Baskov<\/td> | Tutorial<\/td> | Mutually Agreed Norms for Routing Security<\/td> | <\/i><\/a> <\/td> | 2016‑10‑04<\/td><\/tr> |
Richard Lamb<\/td> | Plenary<\/td> | DNSSEC Update and Implementation Considerations<\/td> | <\/i><\/a> <\/i><\/a> <\/td> | 2016‑10‑03<\/td><\/tr> |
Gergana Petrova<\/td> | Opening Plenary<\/td> | Lightning talk: RIPE Academic Cooperation Initiative (RACI)<\/td> | <\/i><\/a> <\/i><\/a> <\/td> | 2016‑10‑03<\/td><\/tr> |
Vahan Hovsepyan<\/td> | Opening Plenary<\/td> | ARMIX WELCOME TO ENOG<\/td> | <\/i><\/a> <\/i><\/a> <\/td> | 2016‑10‑03<\/td><\/tr> |
Alex Smirnoff<\/td> | Plenary<\/td> | Vulnerability Risk Management for Everyone<\/td> | <\/i><\/a> <\/i><\/a> <\/td> | 2016‑10‑03<\/td><\/tr> |
Talgat Nurlybayev<\/td> | Closing Plenary and Lightning Talks<\/td> | Lightning Talks<\/td> | <\/i><\/a> <\/i><\/a> <\/td> | 2016‑10‑03<\/td><\/tr> |
Alexandra Kulikova<\/td> | Plenary<\/td> | Rolling the Root Zone DNSSEC Key Signing Key<\/td> | <\/i><\/a> <\/i><\/a> <\/td> | 2016‑10‑03<\/td><\/tr> |
Artyom Gavrichenkov<\/td> | Plenary<\/td> | DDoS Attacks in 2017: Beyond Packet Filtering<\/td> | <\/i><\/a> <\/td> | 2016‑10‑03<\/td><\/tr> |
Timothy Denton<\/td> | Plenary<\/td> | How to Think About IXPs if you are a Regulator<\/td> | <\/i><\/a> <\/i><\/a> <\/td> | 2016‑10‑03<\/td><\/tr> |
Taras Geychenko<\/td> | Plenary<\/td> | RIPE Site: Hints From Outside<\/td> | <\/i><\/a> <\/td> | 2016‑10‑04<\/td><\/tr> |
Oleg Demidov<\/td> | Plenary<\/td> | IANA Function Transition Roundtable<\/td> | <\/i><\/a> <\/i><\/a> <\/td> | 2016‑10‑04<\/td><\/tr> |
Michael Yakushev<\/td> | Plenary<\/td> | IANA Function Transition Roundtable<\/td> | <\/i><\/a> <\/i><\/a> <\/td> | 2016‑10‑04<\/td><\/tr> |
George Gotoshia<\/td> | Plenary<\/td> | Launch of Georgian IXP<\/td> | <\/i><\/a> <\/i><\/a> <\/td> | 2016‑10‑04<\/td><\/tr> |
Axel Pawlik<\/td> | Plenary<\/td> | RIPE NCC Update<\/td> | <\/i><\/a> <\/td> | 2016‑10‑04<\/td><\/tr> |
Serge Radovcic<\/td> | Closing Plenary and Lightning Talks<\/td> | Farewell<\/td> | <\/i><\/a> <\/td> | 2016‑10‑04<\/td><\/tr><\/table>\n |