Join us on Tuesday, May 18 for our monthly chapter meeting with a special guest speaker:  

Enumerating and Attacking w/ IPv6
Tyrone Wilson, CEO, Cover6 Solutions

We will be hosting the meeting virtually
Conference Call Information: 
https://register.gotowebinar.com/register/2048147584971774479

Abstract
In 1998, the Internet Protocol Version 6 (IPv6) was developed as a next generation Internet Protocol (IP) standard to replace IPv4, when it was believed that the Internet was running out of IP addresses. The new IPv6 protocol was built to handle packets more efficiently, improve performance, increase security, and reduce the size of routing tables by making them more hierarchical. Companies reported that complexity, costs, and time hindered their efforts to move to IPv6. The adoption of IPv6 was delayed because many organizations have been using Network Address Translation (NAT) as a way to extend the life of their IPv4 addresses, but this temporary work around is no longer sustainable. Twenty-Five years later, it’s about time we put more focus on expanding the availability of IP addresses to accommodate the explosion in the number of internet devices and implementing a more secure internet protocol. Tyrone E. Wilson will discuss how you can use open-source tools to provide a better understanding of the IPv6 Protocol. He will also demonstrate how to perform network enumeration and attacks over IPv6. 

Speaker bio
Mr. Tyrone E. Wilson is a cybersecurity professional with 24 years of experience in information technology and systems configuration, including information systems and network security. In addition, Wilson possesses extensive knowledge in conducting computer network defense, vulnerability assessments, cyber threat analysis, and incident response activities. As a former United States Army Cybersecurity Analyst, Wilson developed security structures to protect American intelligence systems from foreign threats. Currently, Wilson is the Founder and President of Cover6 Solutions, which teaches companies and cybersecurity professionals various aspects of information security, penetration testing, and IPv6.

Must use the link above to register if you plan to attend.