2018 Fall Conference IPv6 & IOT: Price of Admission

 

Venue: 4160 Dublin Blvd Suite 145, Dublin, CA 94568, November 9th, 2018
Doors open at 
8:00 AM
Reception 5:00 PM
Sitemap
If Cybersecurity is the theme to your action-packed security career, then conquering IPv6 and IOT is the price of admission. Without facility and strategy in the face of these two key area, it’s game over before you even get butter on your popcorn. 

The November 9th IPv6+IOT: Price of Admission one-day security event includes 11 speakers and six guided product demonstration offering 8 CPE for full attendance. Learn more at https://isc2-eastbay-chapter.org, LinkedIn, Facebook

8 hours of Continuing Professional Education upon Lab completion and returning your survey. Download the Fall Flyer ISC2 Eastbay chapter – Nov 9th, 2018, conference.
  • By 2020 Gartner predicts the Internet of Things (IoT) will demand 26 Billion IP addresses, while four out of the five world Regional Internet Registries are already out of IPv4 space
  • IPv6 puts immediate pressure on all Federal IT System Administrators and IT Professionals who are already a mandated to have all system be fully transitioned by 2012
  • The US government specifies that all network backbones of all federal agencies are IPv6 and the US government requires federal agencies to provide native dual-stacked IPv4/IPv6 access to external/public services and that internal clients utilize IPv6
  • Security advantages of IPv6
  • IPv6 attacks likely to increase with adoption
  • Security challenges of IPv6
  • Avoid the security pitfalls of IPv6
  • IPv6 denial-of-service attack: pretty much every modern mobile device and PC has IPv6 turned on as a default, so when those IPv6 attacks come, they are going to hit hard, and a lot of network engineers haven’t retrained sufficiently to even know what remains to prepare
  • Understanding IPv6 security issues, threats, defenses – where IPv6 may be the Internet’s next superhighway for zero-day attacks.

The IPv4 to IPv6 transition can present issues for an enterprise without resources to redesign its network. Experts and vendors discuss how to ensure IPv6 connectivity.

Pricing:

(ISC)2 is happy to accept member ID from its partner professional organizations:

ISACA, ISSA, ISC2

  • Early Bird Member* $105
  • Early Bird Non-Member* $120
  • Student $45

Registration after November 1st

  • Member or Affiliate Member $130
  • Non-Member $145
  • Sorry no more student passes

If you are experiencing hardship and wish to attend, please have proof of (ISC)2 membership or ISACA membership and reach out to Director Education & Career Development Jing Zhang-Lee, or
Conference Director Robin Basham

Registration 8:00 AM – 8:50, Speaker Reception, Closing Remarks and Raffle 5:30 – 6:30 PM

Speaker Bar
Session 1.1: 9:00 – 10:00  Meet Scott Hogg 9:00 – 10:00

Celebrating the Sixth Year Anniversary of World IPv6 Launch

Scott Hogg

Cloud, security, and network protocols consultant, trainer, author, and presenter. 
1-1 Hear from the creators of the 2018 IPv6 Adoption Report

The future of the Internet depends on IPv6! This report covers its global trends, including details about adoption rates at service providers, content providers, and enterprise networks. Technology executives, IT architects, and key business decision makers are encouraged to read it for a better understanding of the current status of IPv6 as well as the critical importance of adopting and managing it to securely connect to the IPv6 Internet of today.  (Scroll to the bottom of this page to read much more.)

More About Hexabuild: HexaBuild is an IT professional services consultancy comprised of industry-recognized IT subject matter experts and thought leaders. Our core team has a combined 60+ years of experience, multiple expert-level vendor certifications, and several publications by recognized technology presses. HexaBuild specializes in managing IPv6 adoption initiatives and large-scale cloud deployments for both enterprises and service providers. Services include address planning, hardware and software assessments, network/IT environment audits, on-prem to cloud migration and integration, and personnel training.

Session 1.2: 10:00-11:00 Meet Tyler Haske 10:00-11:00

Addressing and Zero Touch Provisioning

Tyler Haske, US Government/ReadyLogo IPv6 Certification Test Engineer at Cisco

Tyler is responsible for helping all of Cisco’s products achieve two IPv6 certifications: USGv6 and IPv6 ReadyLogo. USGv6 is a profile or a collection of purchasing requirements the US government wants to see for IPv6 readiness. Many US government departments require this certification to buy equipment. Indirectly my department protects millions of dollars worth of public sector deals.
1-2 Session Description: Addressing and Zero touch provision is about…

More about Tyler:  IPv6 ReadyLogo is the industry standard certification. It ensures equipment does basic things like responding to pings, address itself automatically with SLAAC, and do neighbor discovery correctly. IPv6 has some different design paradigms so it’s important to check correctness. The certification suite is about 400+ tests.

Tyler will share his experience managing the IPv6 testing infrastructure, in automating tests, and the substantially important steps of pushing IPv6 readiness within Cisco as a company.

Cisco (NASDAQ: CSCO) enables people to make powerful connections-whether in business, education, philanthropy, or creativity. Cisco hardware, software, and service offerings are used to create the Internet solutions that make networks possible-providing easy access to information anywhere, at any time. Cisco was founded in 1984 by a small group of computer scientists from Stanford University. Since the company’s inception, Cisco engineers have been leaders in the development of Internet Protocol (IP)-based networking technologies. Today, with more than 71,000 employees worldwide, this tradition of innovation continues with industry-leading products and solutions in the company’s core development areas of routing and switching, as well as in advanced technologies such as home networking, IP telephony, optical networking, security, storage area networking, and wireless technology. In addition to its products, Cisco provides a broad range of service offerings, including technical support and advanced services. Cisco sells its products and services, both directly through its own sales force as well as through its channel partners, to large enterprises, commercial businesses, service providers, and consumers.

Session 1:3 11:00-Noon Meet Barak Feldman 11:00-Noon

Privileged Account Risks and Where to Find Them – Part 2: What are the roles on IOT devices?

Barak Feldman is a National Director at CyberArk. He works with Fortune 500 organizations and federal agencies to help them develop long-term cybersecurity strategies built on privileged account security best practices. He brings deep technical and business experience to his role, with a focus on areas such as regulatory compliance, policy management, access management, and proactive risk mitigation techniques. BarakFerdmanCyberArkBarak Feldman
1-3 Session Description: Accelerate Results: Privileged Account Risks and Where to Find Them – Part 2: What are the roles on IOT devices?

Where it’s imperative to maintain speed and agility without compromising secrets used by privileged admin users, CI/CD tools, homegrown applications, and infrastructure – protect the pipeline and integrity of resulting products. This session will discuss:

  • What is the role of Privilege in IoT?
  • We’re not talking phones and tablets,
  • We’re talking networked devices like Printers,
  • Network Video Recorders,
  • Healthcare systems, and many others.
  • Maintaining compliance and reducing risk in this new Cloud and automation frontier is the challenge of the day

About: CyberArk is the only security company laser-focused on striking down targeted cyber threats, those that make their way inside to attack the heart of the enterprise. Dedicated to stopping attacks before they stop business, CyberArk is trusted by the worldís leading companies ó including more than 45% of the Fortune 100 companies ó to protect their highest value information assets, infrastructure, and applications. For over a decade CyberArk has led the market in securing enterprises against cyber attacks that take cover behind insider privileges and attack critical enterprise assets. Today, only CyberArk is delivering a new category of targeted security solutions that help leaders stop reacting to cyber threats and get ahead of them, preventing attack escalation before irreparable business harm is done. At a time when auditors and regulators are recognizing that privileged accounts are the fast track for cyber attacks and demanding stronger protection, CyberArkís security solutions master high-stakes compliance and audit requirements while arming businesses to protect what matters most. With offices and authorized partners worldwide, CyberArk is a vital security partner to more than 3,200 global businesses, including more than 45% of the Fortune, 100 more than 25% of the Global 2000, CyberArk has offices in the U.S., Israel, Australia, France, Germany, Italy, Japan, Netherlands, Singapore, Spain, Turkey and the U.K.

Luncheon Round Table Meet California’s County CISOs Noon to 1:00 PM
California County CISO Round Table

Making sure we don’t break the world

We have invited the CISOs from Contra Costa, Santa Clara, Palo Alto, and Past CISO from San Diego.  We shall see how many CISO’s we can get for the day. If you are a CISO with California County present or past responsibilities, please reach out to conferencedirector@isc2-eastbay-chapter.org
Luncheon Roundtable: From CJIS to USGv6 and IPv6 ReadyLogo, what are the challenges in managing entire counties who increasingly depend on IOT for all the most basic necessities for how we live?
Session 1:5 1:00-2:00 PM Meet Ed Horley 1:00-2:00 PM

Ed Horley, Chief Executive Officer of HexaBuild, Inc.

Ed is the Co-Chair of the California IPv6 Task Force, holding that position since 2010. He is an international speaker on IPv6 and is actively involved in the advocacy of IPv6 through his work on the CAv6TF and the North American IPv6 Task Force. He has an extensive background in networking and technology, with over 20 years of experience in designing, deploying and supporting data center and enterprise networks.
1- 4 Session Description and More about Ed Horley: Ed is the author of the Apress book Practical IPv6 for Windows Administrators and is a Pluralsight author for two courses, both on IPv6. He was also the technical reviewer or editor for the following titles: Understanding IPv6, Third Edition from Microsoft Press, IPv6 Essentials Third Edition from O’Reilly Media and IPv6 Address Planning from O’Reilly Media. Ed previously worked for IT solutions provider Groupware Technology for seven years, where for the last two years he held the position of VP of Engineering. During his tenure at Groupware, he was instrumental in the development of Groupware’s Cloud Practice as well as the overall growth of its engineering structure and talent.

About Hexabuild: HexaBuild is an IT professional services consultancy comprised of industry-recognized IT subject matter experts and thought leaders. Our core team has a combined 60+ years of experience, multiple expert-level vendor certifications, and several publications by recognized technology presses. HexaBuild specializes in managing IPv6 adoption initiatives and large-scale cloud deployments for both enterprises and service providers. Services include address planning, hardware and software assessments, network/IT environment audits, on-prem to cloud migration and integration, and personnel training.

Session 1.6: 2:00-3:00 Meet Your Mentors – Hiring Panel The Skills to Succeed


netskope

1-6 Session Description: If you find yourself wishing you could gain a practical understanding of the when, why or how of so many necessary products and technologies, the Lab sessions were designed for you. Attendees will be presented with live lab choices at 2:00 PM. Once in their designated lab location, there will be a half hour of live instruction and interaction, followed by a takeaway assignment to be turned in by no later than 6 PM. Attendees will have an additional half hour of networking to work with their peers and mentors. The chapter will use Lab Leader feedback and attendee responses in our online Survey-Monkey feedback form.
Tabletop lab structure allows groups of five or more participants in a guided activity designed to foster the real-world application of core ISC2 education domain topics. Exhibitors and Chapter Members must examine impacts from IPv6 and IOT and the rest is up to you and your mentor.

  • CyberArk: GET NEW CONTENT Role Based Privileged Access Management – Cory Brown and Brian Kennedy
  • Securonix: GET NEW CONTENT Continuous Monitoring
  • ZScaler: GET NEW CONTENT
  • The Skybox: GET NEW CONTENT
  • Attivo Network: GET NEW CONTENT
  • Netskope: GET NEW CONTENT
  • Optiv: Get New content
  • Tanium: Get New Content
  • Hiring Managers – KForce, Robert Half, Vivo Inc.
3:00-3:30 PM

We Break 4 Cake

3:00-3:30 PM

Cake Sponsors are:

Hexabuild



Cake Sponsors are:

 KFORCE

Session 1- 6: 3:30-5:00 Meet Sean Codero Meet Pete Scalfini

IPv6 TLDR: Everything you didn’t want to know or hear about IPv6 and the changing IPv4 landscape- in less than 12 Parsecs

Sean Cordero, VP of Cloud Strategy at Netskope

Pete Sclafani, COO & Co-Founder of 6Connect

1-6 Session Description: Everything you didn’t want to know or hear about IPv6 and the changing IPv4 landscape- in less than 12 Parsecs

The continued and increased rate of IPv6 adoption on a global scale marches on. Internet and Cloud service providers have continued to limit the usage of IPv4 due to cost, performance, and interoperability reasons. Now, the industry-wide shift has started to impact how our users and systems communicate with Internet-based services and placed new security considerations due to this new paradigm.
Join industry leaders Pete Sclafani, COO and co-founder of 6connect, and Sean Cordero, VP of Cloud Strategy at Netskope to hear from them on the impacts IPv6 adoption is having across the industry, the pitfalls to avoid as an organization begins adoption, and the impact to securing Cloud and on-premise based technologies.
Attendees will walk away with real-world examples and actionable steps to empower their understanding and engagement in their organization’s IPv6 efforts and begin
  1. The worldwide and industry shifts driving IPv6 adoption
  2. Understand the information risk implications of not controlling engaging in the efforts to drive IPv6 adoption.
  3. Preparing your organization for the operational and technical changes IPv6 introduces to your team.
  4. Avoidable mistakes which can lead to long-term, negative, business impacts  
netskope

About Netskope: Netskope is the leader in cloud security. Using patented technology, Netskopeís cloud-scale security platform provides context-aware governance of all cloud usage in the enterprise in real time, whether accessed from the corporate network, remote, or from a mobile device. This means that security professionals can understand risky activities, protect sensitive data, stop online threats, and respond to incidents in a way that fits how people work today. With granular security policies, the most advanced cloud DLP, and unmatched breadth of workflows, Netskope is trusted by the largest companies in the world. Netskope ó security evolved.

About 6Connect: 6connect is the leader in network resource provisioning and automation. 6connect’s unique Dynamic Network ProVisioning (DNP) platform enables centralized provisioning of physical and virtual devices across distributed and mobile networks, cloud platforms, web-hosting platforms, and data centers. Innovative customers like Dell, PCCW, Swisscom, Terremark, iLand Cloud Infrastructure, and CyrusOne utilize DNP to accelerate service delivery time, accurately provision complex network protocols, and dramatically reduce network complexity and costs, while achieving industry change management and compliance requirements. 6connect is based in Silicon Valley and employs an engineering team that includes some of the world’s foremost experts in IPv4/IPv6 technology, network architecture design, and systems automation. https://www.6connect.com/

We

Remember

Robert E. Stroud

Recognition

 

We honor his memory through scholarship.

ISACA News  ISACA’s 2014-15 Board Chair Robert E Stroud passed away Monday, 3 September 2018. He was struck by a vehicle while jogging on Long Island, New York, USA. Stroud was 55 years old.
Stroud brought boundless energy and enthusiasm into everything he did for ISACA—and those contributions were many. During his term as board chair, he was a driving force in the launch of ISACA’s Cybersecurity Nexus™ (CSX). Prior to that, he was international vice president of ISACA, a member of the Strategic Advisory Council and Governance Committee, and chair of ISACA’s International Organization for Standardization (ISO) Liaison Subcommittee. He was a COBIT champion and contributed to COBIT 4.0, 4.1 and 5, and numerous COBIT mapping documents. Additionally, he was involved in the creation of ISACA’s Basel II, Risk IT and Val IT guidance. He was deeply engaged with the association for 12 years, serving on more than 15 groups and speaking at countless conferences over that time.
“ISACA lost a dedicated leader, an engaged board member, a passionate colleague and, most notably, a very dear friend,” said ISACA Board Chair Rob Clyde, CISM, in his tribute to Rob Stroud. “Rob was always looking forward to new trends, new challenges, and new opportunities so he could best serve his clients, his colleagues, and his friends, whether bonds were just formed or existed for decades. His exuberance lit up the room wherever he went, and he was truly a guiding light and progressive proponent for the association and our professional community. Rob’s enduring spirit of innovation will continue to influence ISACA and our global family for years to come.”

Dinner is

Texas Barb-B-Q

Armadillos

Wine

Cheese

Many thanks to HexaBuld

Securonix

Platinum Sponsor, live demonstration visualizing the threat, actionable intelligence

Securonix
Securonix is working to radically transform all areas of data security with actionable security intelligence. Our purpose-built advanced security analytics technology mines, enriches, analyzes, scores and visualizes customer data into actionable intelligence on the highest risk threats from within and outside their environment. Using signature-less anomaly detection techniques that track users, account, and system behavior, Securonix is able to automatically and accurately detect the most advanced cyber threats, insider threats, and fraud attacks. Globally customers are using Securonix to address the most basic and complex needs around insider threat detection and monitoring, high privileged activity monitoring,  data exfiltration, enterprise and web fraud detection, application risk monitoring, cloud security monitoring, cyber threat monitoring and access risk management. Securonix uses a Hadoop platform to provide unlimited scalability and open data model. http://www.securonix.com

Skybox Security

Gold sponsor, live demonstration assigning the policy that proves our governance is in place
The software uses analytics to prioritize on organization’s risk exposures and recommends informed action to best address those exposures. These capabilities extend across highly complex networks, including those in physical, virtual, cloud and operational technology (OT) environments. By integrating with more than 120 networking and security technologies, the company’s broad platform, the Skybox™ Security Suite, enables organizations to reduce security risks that attackers can find and exploit, such as device misconfigurations and policy violations, as well as exposed and unpatched vulnerabilities.
Netskope, Platinum Sponsor, live demonstration, mapping the path of business, the evolution of cloud security Netskope is the leader in cloud security. Using patented technology, Netskopeís cloud-scale security platform provides context-aware governance of all cloud usage in the enterprise in real time, whether accessed from the corporate network, remote, or from a mobile device. This means that security professionals can understand risky activities, protect sensitive data, stop online threats, and respond to incidents in a way that fits how people work today. With granular security policies, the most advanced cloud DLP, and unmatched breadth of workflows, Netskope is trusted by the largest companies in the world. Netskope ó security evolved. netskope
Zscaler, Gold Sponsor, live demonstration enables secure mobile enterprise in real time, architecting the secure enterprise network Zscaler enables the worldís leading organizations to securely transform their networks and applications for a mobile and cloud-first world. Its flagship services, Zscaler Internet Access, and Zscaler Private Access create fast, secure connections between users and applications, regardless of device, location, or network. Zscaler services are 100% cloud-delivered and offer the simplicity, enhanced security, and improved user experience that traditional appliances or hybrid solutions are unable to match. Used in more than 185 countries, Zscaler operates the worldís largest cloud security platform, protecting thousands of enterprises and government agencies from cyber attacks and data loss. Zscaler
HexaBuild, in addition to making their CEO, Co-Founders and COO available to all of us for the entire day,  contributes the morning breakfast and afternoon cake.  Sweet! HexaBuild is an IT professional services consultancy comprised of industry-recognized IT subject matter experts and thought leaders. Our core team has a combined 60+ years of experience, multiple expert-level vendor certifications, and several publications by recognized technology presses. HexaBuild specializes in managing IPv6 adoption initiatives and large-scale cloud deployments for both enterprises and service providers. Services include address planning, hardware and software assessments, network/IT environment audits, on-prem to cloud migration and integration, and personnel training.
CyberArk, gold, contributes lab leaders and speakers in addition to actively sponsoring our last summer event. CyberArk is the only security company laser-focused on striking down targeted cyber threats, those that make their way inside to attack the heart of the enterprise. Dedicated to stopping attacks before they stop business, CyberArk is trusted by the worldís leading companies ó including more than 45% of the Fortune 100 companies ó to protect their highest value information assets, infrastructure, and applications. For over a decade CyberArk has led the market in securing enterprises against cyber attacks that take cover behind insider privileges and attack critical enterprise assets. Today, only CyberArk is delivering a new category of targeted security solutions that help leaders stop reacting to cyber threats and get ahead of them, preventing attack escalation before irreparable business harm is done. At a time when auditors and regulators are recognizing that privileged accounts are the fast track for cyber attacks and demanding stronger protection, CyberArkís security solutions master high-stakes compliance and audit requirements while arming businesses to protect what matters most. With offices and authorized partners worldwide, CyberArk is a vital security partner to more than 3,200 global businesses, including more than 45% of the Fortune, 100 more than 25% of the Global 2000, CyberArk has offices in the U.S., Israel, Australia, France, Germany, Italy, Japan, Netherlands, Singapore, Spain, Turkey and the U.K. CyberArkMd
Saba Software

Our Venue Sponsor has contributed their offices and resources to make this day possible. As a result, we will be able to offer a thousand dollars to a local scholarship for students wanting more opportunities in the field of cybersecurity.

Saba makes software that transforms the working lives of millions of people, and increases growth and success for thousands of businesses around the world. We help organizations create the catalyst for exceptional employee engagement, with a powerful cloud platform that delivers a continuous development experience – from personalized training and collaboration to real-time coaching, goal setting and feedback. Today thousands of customers worldwide, in virtually every industry, count on Saba to engage their people, connect their teams, and get the critical insight they need to prove the impact of talent on business success.
New Gold Sponsor, Attivio Networks provides lab leaders and speakers. Attivo Networks® is the leader in deception for cybersecurity defense. Founded in 2011, Attivo Networks provides a comprehensive deception platform that in real-time detects inside-the-network intrusions in networks, public and private data centers, and specialized environments such as Industrial Control System (ICS) SCADA, Internet of Things (IoT), and Point of Sale (POS) environments. Founded on the premise that even the best security systems cannot prevent all attacks, Attivo provides the required visibility and actionable, substantiated alerts to detect, isolate, and defend against cyber attacks. Unlike prevention systems, Attivo assumes the attacker is inside the network and uses high-interaction decoys and endpoint, server, and application deception lures placed ubiquitously across the network to deceive threat actors into revealing themselves. With no dependencies on signatures or attack pattern matching, the BOTsink deception server is designed to accurately and efficiently detect the reconnaissance and lateral movement of advanced threats, stolen credential, ransomware, man-in-the-middle, and phishing attacks. The Attivo Multi-Correlation Detection Engine (MCDE) captures and analyzes attacker IPs, methods, and actions that can then be viewed in the Attivo Threat Intelligence Dashboard, exported for forensic reporting in IOC, PCAP, STIX, CSV formats or can be used to automatically update SIEM and prevention systems for blocking, isolation, and threat hunting. The ThreatOps offering simplifies incident response through information sharing, incident response automation, and the creation of repeatable playbooks.
We welcome The Unified Compliance Framework® (UCF) as a new Silver Sponsor, a speaker and recent ISC2 partner in providing certifications for controls and compliance mapping. The Unified Compliance Framework® (UCF) was created by Dorian Cougias and his research partner, Marcelo Halpern of the international law firm Perkins Coie, which oversees all legal aspects of the UCF. This patented GRC framework is used as a core component of advanced GRC solutions by leading software publishers, certified auditors and consultants worldwide.

Unified Compliance’s dynamic SaaS portal, the Common Controls Hub, provides a new interface to the UCF that aids in extracting needed data from the framework easily and helps compliance professionals keep pace with the ever-evolving regulatory demands, confidently manage risk, and ease resource and budget barriers. The Common Controls Hub gives users rapid access to its massive data repository of more than 90,000 individual mandates from 800-plus laws and standards from around the globe. Sorting through the most up-to-date demands, figuring out which controls they need to implement and how they overlap is now a quick process with just a few simple mouse clicks.

The Common Controls Hub simplifies the need to locate, research, interpret, and reconcile new and evolving mandates by giving compliance professionals the ability to centrally scope, define and maintain regulatory demands online. Companies can now automatically compile custom, harmonized control lists in minutes by vertical industries, market segments, and geographies.”

ThankYouEveryone
How to become a member: Please directly contact our Chapter President Lee Neely and fill out the membership form https://isc2-eastbay-chapter.org/membership/
EnterpriseGRC Thank you Chevron, for providing us space and food for the last two years.
Optiv
(This 1-day event counts towards 8 hours of Continuing Professional Education CPE)
Your friends and colleagues at (ISC)2 East Bay Chapter chapter can’t wait to see you. We hope you join us in giving special thanks to the conference committee volunteers, without whom, such events would not be possible. Providing weekly meetings, binding flyers, drafting letters, being a liaison to our gracious speakers, updating and proofing our brochures, and assisting in the overall quality management of the Fall Conference, we acknowledge R. Daniell Lee, Atul Kumar, Maura Jones, Jason Hoffman and others as well as all members of the Board of Directors for their added responsibilities in coordinating our conference business, and for all the wisdom provided by the full membership of our board. Your support is greatly appreciated.
Yours Sincerely,

Robin Basham, Conference Director

The (ISC)2 East Bay Chapter Board of Directors

We push you in

Learn more about our topic by reading a blog From Scott Hogg

June 6, 2018, marks the 6-year anniversary of what is known as World IPv6 Launch. This event, which was coordinated by the Internet Society (ISOC), took place on June 6, 2012. On that date, many of the large content providers permanently enabled IPv6 on their primary websites. Content providers such as Facebook, Google, Yahoo, Akamai, and Limelight Networks promised to turn on IPv6 and leave it turned on. Internet service providers such as Time Warner Cable (now Charter Communications), Comcast, AT&T, Free Telecom, Internode, KDDI, and XS4ALL also promised to enable IPv6 service for over 1% of their subscribers. Network equipment companies such as Cisco, Juniper, and D-Link promised to have IPv6-enabled devices for providers and subscribers and rapidly troubleshoot any problems encountered.

World IPv6 Launch was preceded by World IPv6 Day. World IPv6 Day was on June 8, 2011, and was a single 24-hour trial where content providers tried to ascertain the percentage of Internet users who may have trouble connecting to their sites using IPv6. They accomplished this by enabling IPv6 for their primary web domains (e.g., www.google.com and www.yahoo.com). There was concern about problems end-users might experience when their devices were presented with a choice of Internet protocols and there was much preparing to avoid these issues. Though there was some fear among the IT community over World IPv6 day, it ended up being a bit more like an uneventful Y2K. This gave confidence to the content providers that IPv6 was not going to adversely impact their end-users experience.

The concern about “IPv6 Brokenness” lead to the development of Happy Eyeballs (RFC 6555) which makes TCP/IP stacks in hosts more aggressive about making simultaneous IPv4 and IPv6 connections and then choosing IPv6 if they are connecting equivalently fast. Prior to Happy Eyeballs, TCP/IP stacks would attempt to connect to dual-protocol destinations using IPv6 first then fall back to trying IPv4 if IPv6 didn’t connect.  This broken IPv6 connectivity led an extremely small population of end-users to believe the site they were trying to reach was down because of the potentially long duration for their web browsers and OSs to eventually connect with IPv4. Content providers worried that such a conclusion might cause damage to their brands and they hesitated to unilaterally enable IPv6 for their primary web domains.

These connection optimization methods are now implemented into virtually all mobile device operating systems and most web browsers. As a result, when end-users are connected to a network that offers them the opportunity to use either IPv4 or IPv6, they are assured that they will be able to reliably connect. As a result, most mobile device users are using IPv6 and they don’t even realize it. That is ideal, because we, in the IT community, don’t want to have to explain to our family members what an IPv6 address is while trying to enjoy a leisurely summer barbeque.

Now 6 years later, there is life after World IPv6 Launch, and we have witnessed the sustained growth of IPv6 adoption across the Internet. There are many sites that collect and display statistics and offer their observations about IPv6 as well as provide comparisons to IPv4. However, the key location for information about World IPv6 Launch success is the World IPv6 Launch Measurements site itself. This ISOC-supported site collects measurements from a variety of sources and then produces graphs of the percentage of subscribers or users an organization has who are actively using IPv6. Statistics are collected from the ISPs who participated in World IPv6 Launch six years ago as well as data from Akamai, APNIC, Facebook, and Google. Akamai also has their own IPv6 Adoption Visualization site that shows IPv6 usage for countries or specific networks.

Our friend and Infoblox IPv6 COE colleague Tom Coffeen (@ipv6tom) has also put together two articles about the valuable websites showing IPv6 adoption (Part 1Part 2) and providing guidance for organizations looking to deploy IPv6.

Another useful report that synthesizes all of the effort put forth toward deploying IPv6 and measurements of the resulting increases in IPv6 deployment on the Internet is the HexaBuild IPv6 Adoption Report. This report and its accompanying infographic show many graphs and statistics of IPv6 adoption showing significant progress in deploying IPv6 by mobile carriers, broadband Internet providers, backbone ISPs, and large content providers. This report also discusses how many commercial enterprises have yet to put forth any real effort toward IPv6 implementation on their Internet perimeter or interior networks.

Examples of some of the successful IPv6 deployments since World IPv6 Launch can be seen in the World IPv6 Launch graphs for Comcast and T-Mobile.

These simple graphs perhaps conceal the tremendous amount of hard work by many individuals to reach these levels of IPv6 traffic. These service providers had a massive amount of equipment to upgrade and configure to establish a robust IPv6-enabled backbone network and Internet peering. These companies also had to upgrade their subscriber access networks. In the case of Comcast this required the upgrading of many CMTSs, while in the case of T-Mobile it required upgrades to their 4G wireless access systems. These companies also needed to help their subscribers upgrade their CPE devices. For Comcast this meant getting their subscribers to move to DOCSIS 3.0/3.1 modems and upgrade their home routers, set-top-boxes, etc. For T-Mobile, that meant getting their subscribers to use smartphones with dual-protocol operating systems (like Apple iOS and Android) while also comprehensively testing the IPv6 capabilities of the phones. Congratulations to Comcast and T-Mobile for their outstanding achievements!

The graph that is shown the most to demonstrate the tremendous adoption of IPv6 is the Google IPv6 Statistics page. Google has a global perspective of the whole Internet using both IPv4 and IPv6. They are well-positioned to observe IPv6 adoption around the globe. The graph below shows significant progress in IPv6 global adoption in the 6 most recent years since World IPv6 Launch back in 2012.

Now we might ask ourselves what comes next for IPv6? It sure seems like there has been a tremendous amount of success among the service providers, content providers, and mobile device manufacturers and mobile app developers. It is difficult to see how T-Mobile can make any more progress unless they start to proactively eliminate all their subscribers clam-shell Symbian OS “burner phones” used by luddites, privacy wonks, or malfeasant characters.

We can expect that the world’s networks will progress along the adoption curve and IPv6 will become the majority of overall Internet traffic. If your organization has yet to start to plan for implementing IPv6, there is no time like the present! There is still quite a bit of work to do, especially when it comes to enterprise networks. Most of those organizations do not have IPv6 enabled internally across their internal networks and out to their access networks. Therefore, their end-users likely have IPv6 Internet connectivity on their personal mobile devices and at their homes, but not at work. For enterprises, the priority is to enable dual-protocol Internet connectivity for their end-users by enabling it on their wired and wireless access networks. Enterprises can follow well-established guidance for deploying IPv6 across their environments.

We can expect that in the coming years more environments will progress to only using IPv6 and won’t need to use IPv4 (other than to connect to legacy Internet devices). For example, content providers could run IPv6-only entirely in their data centers and expose only a single IPv4 Virtual IP (VIP) on the Internet-side of their application load balancer to preserve reachability for legacy IPv4 users. Some of the first organizations that might make the leap to IPv6-only could be T-MobileLinkedInFacebookCisco, and Microsoft. Each of these companies has spoken publicly about their plans to go IPv6-only and have already done so in portions of their networks.

In a couple of years, we may witness the cross-over point where IPv6 Internet traffic outweighs legacy IPv4 traffic. IPv6 traffic has been shown to be growing exponentially and is starting to have an effect on flattening out IPv4 growth. In a couple of years from now, we will see a point where IPv6 traffic volumes overtake IPv4 traffic volumes just like what LinkedIn experienced last year when they announced they crossed that tipping point.

Perhaps the bigger question is, in another 6 years, will we still be talking about the need to adopt IPv6. By then IPv6 may virtually replace all IPv4 and be, simply, referred to as the Internet Protocol?

This post originally appeared on Infoblox IPv6 COE Community blog:

https://community.infoblox.com/t5/IPv6-CoE-Blog/Celebrating-the-Sixth-Year-Anniversary-of-World-IPv6-Launch/ba-p/13556

*do you think this site is sort of, …well, ugly? That’s okay. Contact conferencedirector@isc2-eastbay-chapter.org and say “I want to make your conference pages more beautiful.”

(ISC)2 East Bay Chapter