Loading…
Type: Security clear filter
arrow_back View All Dates
Thursday, June 11
 

8:30am PDT

Are You Interested in the CISSP Exam
Thursday June 11, 2026 8:30am - 9:30am PDT
I passed the Certified Information Systems Security Professional (CISSP) exam in 2025. This presentation would be for anyone who may be interested in the exam and learning how I went about preparing for it.
Speakers
avatar for Sam Quantz

Sam Quantz

CIO, Salt Lake City School District
Thursday June 11, 2026 8:30am - 9:30am PDT
Room 1412

9:45am PDT

Security Threat & Mitigations in IPv6
Thursday June 11, 2026 9:45am - 10:45am PDT
For the past 2 years, I have been presenting information regarding IPv6. Things to think about when deploying it, planning for it, and looking at detailed configs like SLAAC vs DHCPv6. This is mostly to help bring awareness to the community. This year, my final IPv6 presentation will be specifically about security. I will be going over some of the security risks that can be exploited in IPv6 and how to mitigate them. IPv6 is still new and unfamiliar to many. This is intended to make people aware of the security considerations to make before deploying IPv6.
Speakers
JH

Jared Hainline

Sr. Network Services Administrator, Salt Lake City SD
I started my career doing phone support for AOL.  Yes, I am that old!  Then worked for another local ISP before moving to the school district.  I started at the District doing desktop support and moved to Novell Server administration and then got my CCNA and moved to network administration... Read More →
Thursday June 11, 2026 9:45am - 10:45am PDT
Room 1412

1:15pm PDT

Internet Routing Security - Secure your subnets using RPKI and ROAs
Thursday June 11, 2026 1:15pm - 2:15pm PDT
We will discuss the importance of securing and validating prefix/subnet announcements using the RPKI infrastructure and the ROA. This discussion will review how they work, why they matter, and how to implement them.

Internet routing protocols were designed with a weak security posture, creating vulnerable attack vectors via route hijacking. We’ll break down how RPKI works at a practical level, including certificate hierarchy, ROA creation, and route validation states (valid, invalid, not found). We’ll walk through real-world examples of route leaks and hijacks, showing how RPKI can prevent or mitigate these events. Attendees will leave with a clear understanding of how to implement RPKI/ROA in their environment and immediately improve routing security.
Speakers
JH

Jesse Howerton

NetOps Manager, UEN
Thursday June 11, 2026 1:15pm - 2:15pm PDT
Room 1412
 
Share Modal

Share this link via

Or copy link

Filter sessions
Apply filters to sessions.
Filtered by Date -