Loading Events
ISSA Thought Leadership Series

Exploring The Frontier For Maliciousness In IPv6

Home » Events » Exploring The Frontier For Maliciousness In IPv6

  • This event has passed so registration is closed.


Interested in getting your message in front of a targeted audience? Click on the link to explore sponsorship opportunities.


CPE Quiz

Click on the link to take the CPE Quiz

Date and Time

May 8, 2019 @ 1:00 pm - 2:00 pm EDT

Event Category

Web Conference

Event Type

ISSA Thought Leadership Series

Event Tags



Candice Benson


Lisa O'Connell


This year saw IPv6 adoption worldwide surpassing the twenty-five percent mark. While previously only used by some innovative attackers, the incentive to explore the space for fresh targets grows as more than a quarter of the Internet is now IPv6-capable. Many organizations are challenged with adequate monitoring of their IPv6 networks, misconfigured devices and a shortage of time to implement IPv6 best practices.

In this session, we’ll aim to spur more conversations and curiosity in the IPv6 security space by:

  • Examining ways to enumerate an oasis of infrastructure in the large desert of addresses
  • Discussing current malware observed with IPv6 capabilities
  • Remarking on some already observed security issues with the protocol


Michael Levin – CEO/Founder, Center for Information Security Awareness

Michael Levin is a nationally known cyber security professional who spent over twenty-two years in the U.S. Secret Service protecting Presidents and Heads of State. Michael retired from the U.S. Department of Homeland Security – as the Deputy Director of the National Cyber Security Division in Washington DC. He enjoyed a distinguished thirty-year career in public service and law enforcement. Michael also served as the Branch Chief of the U.S. Secret Service Electronic Crimes Task Force program in Washington DC, supervising 17 task forces across the country. He worked in the area of computer forensics and cyber-crime investigations for over twenty years. Other assignments included numerous Presidential, Vice Presidential and dignitary protective assignments as well as working at the CIA and NSA as the Secret Service Intelligence Liaison Officer. After this distinguished career and seeing the need, Michael founded the Center for Information Security Awareness – www.CFISA.com. The CFISA was created to explore ways to increase cyber security awareness among many audiences, including consumers, employees, businesses and law enforcement. CFISA provides online and on-site cyber security awareness training services to businesses and organizations of all sizes. His passion for securing the nation's critical infrastructure has led to his tireless efforts to make cyber security awareness training best practices interesting, meaningful and relevant at home and at work.

See Michael Levin‘s full profile.


Chad Anderson – Senior Security Researcher, DomainTools, LLC

Chad Anderson is a Senior Security Researcher at DomainTools. His background is in security-focused operations and automation that he now applies to building, curating and exploring new data sets for security researchers. He has a particular interest in automation, network security and their intersection. His primary focus leans heavily on leveraging open source technologies to improve deployments, network security and systems administration at DomainTools.

See Chad Anderson‘s full profile.

Dipto Chakravarty – Chairman of Security COE, IoT Community

Dipto Chakravarty is the author of three best-selling books on computer architecture and security from McGraw-Hill and Wiley that have been translated in five languages. He has 11 patents to his credit in AI, security and cloud, holds a M.S in Computer Science from U. of Maryland, GMP from Harvard Business School, and EMBA from Wharton School U. Penn. He is currently the Chairman of Security, Privacy and Trust COE for IoT Community, and board member at RANK Software.

See Dipto Chakravarty‘s full profile.

ISSA Webinars and Conference series cover all the continuing education credits to maintain your cyber security certifications. (CPEs, CEUs, ECE, etc). Each hour is equal to one continuing education credit. Certificates of completion are available upon request after completion. For instructions, click here.

Scroll to Top