This session discusses the ways enterprises might want to think about migration to IPv6. Some vulnerabilities may be the same as IPv4 while other will be different. Vulnerabilities may be introduced by additional complexity, for example, transition mechanisms or dual-stacking.When many enterprises think about security, a number of areas are involved. These include:
- Audits/Compliance
- Threat detection
- Risk analysis
- Root cause determination
- Encryption
- Privacy
- Confidentiality
- Penetration testing
Presented by Nalini Elkins.