Mouse over any item on the left to display further information on the right
11:30 AM - 1:30 PM
ISSA Monthly Luncheon: Defending Business EcosystemsISSA Monthly Luncheon: Defending Business Ecosystems
11:30 AM - 1:30 PM
Hale Koa Hotel
RSVP Required!
by 11-AM Wed., June 13, 2012
Cost: $25 for ISSA members, $30 for non-members
Presentation: Organized attacks can effect both large businesses and the smaller businesses they serve. How service providers and their customers can collaborate in 360 degree security solutions.
Speaker: Beau Monday, CISSP GSEC - Information Security Officeer - Hawaiian Telcom
Topic: Recent breeches of personal financial information have been widely publicized as having not only caused the normal concerns and inconveniences to consumers, but real material cost to the banks that have guaranteed the fraudulent transactions to maintain customer confidence despite the limits of their responsibilities. Even the largest banks and insurance companies with the most sophisticated security measure are vulnerable if their merchants and subscribers are unaware of the risk of vulnerabilities to their databases, transaction systems and their responsibility for intensified security.
Who's responsible for security in an end-to-end transaction: examples from the financial services and healthcare industries. Can a small business afford security? Or perhaps the better question is can they afford not to have it? Solutions available for even the smallest business can improve customer confidence.
BIO:
Hawaiian Telcom, Information Security Officer
Hawaiian Telcom's Information Security Officer, Beau Monday is responsible for managing the company's Information Security program.
Prior to joining Hawaiian Telcom, he spent time doing security work for Wells Fargo bank, T-Mobile USA and AT&T Wireless, among others, during an IT career that has spanned over 2 decades.
Beau's industry certifications include the CISSP and SANS GSEC. He is also a contributing member of the Cloud Security Alliance, and was one of the first people in the
world to attain their CCSK certification when it became available in 2010.
Lunch Menu:
Appetizer: Hale Koa Salad with Tarragon Dressing
Main Course: Baked Mahi-Mahi Filet
with Tomato Chive Beurre Blanc
on Garlic Mashed Potatoes and Mushroom Zucchini Saute
Dessert: Strawberry Cream Cheesecake
11:30 AM - 1:30 PM
ISSA Monthly Luncheon: State of Hawaii Strategic PlanISSA Monthly Luncheon: State of Hawaii Strategic Plan
11:30 AM - 1:30 PM
Hale Koa Hotel
Presentation: Sanjeev "Sonny" Bhagowalia will provide an overview and update on the State of Hawaii's progress in developing it Business and Information Technology/Information Resource Management Strategic Plan.
Speaker: Sanjeev "Sonny" Bhagowalia
Topic: In September 2011, the state released the first-ever comprehensive assessment of its IT assets, policies, and procedures in a baseline report, which provided the recommendations and findings for the basis of priorities, architecture and projects that will be included in the Strategic Plan. Bhagowalia will also focus on the importance of cyber security and the vigilance required at all levels to protect personally identifiable information (PII), confidential, and sensitive information.
BIO: Sanjeev "Sonny" Bhagowalia is the State of Hawaii's first full-time Chief Information Officer. Since taking on the position in July 2011, he has overseen the publishing of the first comprehensive assessment of the state's information technology systems, applications, policies and procedures. He and his team are now developing the State of Hawaii Business Transformation and IT Strategic Plan, which is scheduled for publication in July 2012. The Strategic Plan will provide the roadmap for the State's information technology modernization initiative, a key component of Governor Abercrombie's New Day Plan.
Lunch Menu:
Appetizer: Hale Koa Salad with Tarragon Dressing
Main Course: Grilled Skirt Steak with Shitake Mushroom Sauce Paired with Crab Cake, Served on Local Style Fried Udon Noodles and Sautéed Zucchini with Tomatoes
Dessert: Vanilla Ice Cream Taco with Fruit Salsa
ISSA Monthly Luncheon: Root Cause Analysis in a Complex Multi-Tiered Environment
11:30 AM - 1:30 PM
Hale Koa Hotel
RSVP Required!
by 11-AM Wed., Aug 15, 2012
Cost: Lunch is Sponsored by Riverbed
Presentation:
Root Cause Analysis in a Complex Multi-Tiered Environment
Speaker:
Trish Gundy, Riverbed's Cascade Systems Engineer
Topic:
This presentation and live demonstration will show a way to gain optimal application and network visibility in a multi-tiered environment.
· Performance analytics and how it helps to reduce MTTI (Mean Time To Innocence)
· Illustrations of optimization and acceleration; improving end user experience
· WireShark on Steroids; the visualization, monitoring, and reporting enhancement of Wireshark, the world's most popular network analyzer
BIO:
Trish has a background in computer networking and security, specializing in protocol analysis and performance management. Trish taught protocol analysis for Network General's Sniffer University for over a decade and previously worked with IBM, Network Associates, Crossbeam and TippingPoint.
Lunch Menu:
Appetizer: Hale Koa Salad with Tarragon Dressing
Main Course: Chicken Breast Marinated and Sauteed in Red Wine Sauce
with Mushrooms, Pearl Onions and AppleGlazed Baby Carrots
On Rice Pilaf with Parmesan
Dessert: Vanilla Ice Cream Taco with Fruit Salsa
11:30 AM - 1:30 PM
ISSA Monthly Luncheon: The Noble Purpose of ITISSA Monthly Luncheon: The Noble Purpose of IT
11:30 AM - 1:30 PM
Hale Koa Hotel
RSVP Required!
by 11-AM Wed., Sep 19, 2012
Cost: $25 for ISSA members, $30 for non-members
Presentation: The Noble Purpose of IT
Speaker: Paola Saibene - Information Technology Officer for the Hawaii State Public Library System, an agency with 52 branches across the state, approximately one million patrons and 600 staff members.
Topic: As a public service announcement, ISSA is always looking to help the community at large. In September's luncheon, we want to give HSPLS the opportunity to talk about their IT Academy, which started in October 2011. IT Academy is a free service, open to the public, to provide online access to various Microsoft training courses. This service is also available in multiple languages. We'll be discussing the WHY -- the motivation behind this project with Microsoft. We'll also discuss the following: WHO can access this, HOW do people sign up, WHAT courses are available, WHERE are the courses, and WHEN can we access them?
BIO: 17 years working in IT, holding additional Master's Degrees in Psychology and Literature, which have been a surprising benefit while navigating in the world of IT. Worked in the private and public sector, learning how to maximize the resources and abilities of both. Convinced that there is a 'Noble Purpose' for IT; deriving meaningful objectives from complex projects and implementations to a front line of workers more interested in benefits realization than in IT engineering.
Lunch Menu:
Appetizer: Hale Koa Salad with Tarragon Dressing
Main Course: Roasted Chicken Breast with Tarragon Cream Sauce
On Herbed Rice Pilaf and Seasonal Vegetables
Dessert: Peanut Butter Pie
Hawaii's 19th Annual ISSA Discover Security Conference
All Day
Hale Koa Hotel, Honolulu, Hawaii
Fee allows attendance to both days of conference:
ISSA Members $35
Non-Members: $70
No need to register for both days. Register for the conference under the event listing for 10/9/2012.
DATE AND LOCATION:
October 10-11, 2012
Hale Koa Hotel
Honolulu, Hawaii
FEES:
Cost of Event (2-days):
ISSA Members - $35
Non-Members - $70
DEADLINES:
Registrations must be received by (Oct 9th) to ensure a seat. Registrations received after that date will be accepted on a space available basis.
CANCELLATIONS:
Cancellations must be received by (Oct 9, 2012). "No-shows" will be charged the full amount ($35 for members; $70 for non-members) if cancellations are not received by Oct 9, 2012.
REGISTRATION & ADDITIONAL INFORMATION:
Please use the registration link on the ISSA web site Events Listing
The DSC brochure will continue to be updated as Speakers and Topics are confirmed.
11:30 AM - 1:30 PM
ISSA Monthly Luncheon: Honolulu as the Number 1 Digital CityISSA Monthly Luncheon: Honolulu as the Number 1 Digital City
11:30 AM - 1:30 PM
Hale Koa Hotel
RSVP Required!
by 11-AM Wed., Nov 14, 2012
Cost: No charge. Hosted by ACTT Hawaii
Presentation:
Honolulu as a the Number 1 Digital City
Speaker:
Gordon J. Bruce
CIO, City and County of Honolulu, HI
Topic:
Please join ISSA as Honolulu's IT Director and Chief Information Officer Gordon Bruce explains how our city progressed from being one of the worst technology cities to taking first place as a Digital City. Honolulu was recently recognized by the Center for Digital Government as the Number 1 Digital City in the Nation (Large City Category) in a survey that examines state government's best practices and policies for use of digital technologies to better serve their citizens and streamline operations.
Bruce will also expand on where the City is heading, and provide insight into recent award-winning projects in "Open Government," "Transparency," "Big Data" and "Mobile Applications."
BIO:
Gordon Bruce, IT Director and CIO at City and County of Honolulu. He has been in his current role for seven years and has more than 40 years of experience in technology. He earned a Master's Degree in International Business from Hawaii Pacific University. He is a published author, and serves on numerous boards, including the State Broadband Task Force, State Office of Information Technology Management Advisory Board and FEMA Technology Transition Working Group.
Lunch Menu:
Appetizer: Hale Koa Salad with Tarragon Dressing
Main Course: Broiled New York Steak
On Roasted Garlic Mashed Potatoes with Cabernet Peppercorn Sauce, Frizzled Onions, Grilled Marinated Squash and Peppers
Dessert: Vanilla Ice Cream Taco with Fruit Salsa
11:30 AM - 1:30 PM
ISSA Monthly Luncheon: Inside/out Threat DetectionISSA Monthly Luncheon: Inside/out Threat Detection
11:30 AM - 1:30 PM
Hale Koa Hotel
RSVP Required!
by 11-AM Wed., January 16, 2013
Cost: $25 for ISSA members - $30 for non-members
Presentation:
Inside/Out Threat Detection
Speaker:
Anthony K. Giandomenico
Director of Soluions Marketing Referentia
Topic:
How many times have we heard the phrase "It's not a matter of if, but when an attack occurs." I would say quite often over the last few years and now that statement couldn't be more true. With advanced attack technology and lack of protection technology, increased software vulnerabilities, skilled resources from the bad guys and a more or less apathetic attitude by businesses toward the problem, its highly probable that the attacks will continue to be successful in organizations around the globe. Although we are losing the battle of preventing the attacks, with the right architecture, tools, intelligence and methodologies we should be able to more accurately and efficiently detect the attacks and mitigate them once they are in the network. In this talk I hope to shed some light on how to accomplish this through better visualization and control of your network utilizing your current technology and some open source tools. It's your network so own it!
BIO:
Anthony K. Giandomenico is Director of Solutions Marketing responsible for creating solutions for customers utilizing Referentia's cyber security technologies and services. Referentia services numerous customers including the Department of Defense, utility companies and diverse commercial businesses. Mr. Giandomenico's core focus is to ensure companies and government agencies are operating securely and optimally. His expertise covers protecting critical infrastructures such as financial institutions, hospitals, and all government agencies. Mr. Giandomenico's experience is expansive covering intrusion detection and firewall technologies, incident response procedures, security and penetration assessments and technology integration.
Lunch Menu:
Appetizer: Hale Koa Salad with Tarragon Dressing
Main Course: Grilled Skirt Steak with Shitake Mushroom Sauce
Paired with Crab Cake, Served on Local Style Fried Udon Noodles and
Sautéed Zucchini with Tomatoes
Dessert: Vanilla Ice Cream Taco with Fruit Salsa
11:30 AM - 1:30 PM
ISSA Monthly Luncheon: Another Year In Web Security: What did 2012 teach us about surviving 2013?ISSA Monthly Luncheon: Another Year In Web Security: What did 2012 teach us about surviving 2013?
11:30 AM - 1:30 PM
Hale Koa Hotel
RSVP Required!
by 11-AM Wed., February 13, 2013
Cost: $25 for ISSA members - $30 for non-members
Presentation:
Another Year In Web Security: What did 2012 teach us about surviving 2013?
Speaker:
Jeremiah Grossman
Founder and CTO, WhiteHat Security
Topic:
If history repeats itself, and the unexpected always happens, how incapable must Man be of learning from experience. This talk will provide an objective analysis of breaches and web security trends in 2012.
Year after year we continue to witness some of the world's biggest brands in the headlines for security breaches, with what seems no end in sight. And it's not just the Fortune 500 in the cross-hairs; hacktivists, cyber-criminals, and nation-state sponsored attackers have no problem going after anyone and everyone they choose. Some days it's banks. Other days, retailers. Colleges, restaurant chains, technology companies, television networks, state governments, and so on have also been victimized.
Here's the problem: While last year we saw the average number of serious vulnerabilities on websites dropped 66%, showing a glimmer that the open doors for hackers are being closed, the fact of the matter is even just one vulnerability is just as detrimental as 100. This understanding calls for a new way of thinking about defense. Effective defensive is NOT software security perfection, but a strategy that significantly raises the costs of our adversaries to compromise a system with each dollar we invest. In this session, Jeremiah Grossman, CTO and Founder of WhiteHat Security will discuss the key security breaches that's took place in 2012, the most important new lessons learned, and what it all means for the future of cyber security. Attendees will walk away with an idea of what 2012 research and events meant for security and what we can expect to see in 2013.
Biography:
Jeremiah Grossman, founder and CTO, WhiteHat Security, is a world-renowned Web security expert. A co-founder of the Web Application Security Consortium (WASC), he was named one of InfoWorld's Top 25 CTOs in 2007 and is often quoted in major publications such as SC Magazine, Forbes and USA Today.
He has authored dozens of articles and whitepapers, is credited with the discovery of many cutting-edge attack and defensive techniques, and is a co-author of "XSS Attacks: Cross Site Scripting Exploits and Defense." Grossman is an influential blogger who offers insight and encourages open dialogue regarding research and vulnerability trends.
Lunch Menu:
Appetizer: Hale Koa Salad with Tarragon Dressing
Main Course: Mixed Grill
Korean Style Short Ribs, Grilled Apple-Chicken Sausage, and Herb Crusted Pork Loin, Served with Char Siu Fried Rice and Broiled Roma Tomatoes
Dessert: Tiramisu
ISSA Monthly Luncheon: Behavior Analysis as a Cyber Security Predicative Model
11:30 AM - 1:30 PM
Hale Koa Hotel
RSVP Required!
by 11-AM Wed., March 13, 2013
Cost: $25 for ISSA members & students, $30 for non-members
Presentation:
Behavior analysis as a predicative modeling tool against malicious cyber events
Speaker:
Donovan Williams
PhD Candidate, Capella University
Topic:
The leaders of our country and industry have no desire to know that thirty days ago their information enterprise was breached, drained, and compromised. The complexity and speed that advanced information technology has brought to us has additionally included a downside with advance persistent threats conducting innovative malicious cyber events to our networks. Thirty days, thirty minutes, even three minutes is not adequate enough warning time against the multiplicity of complex cyberattacks we are facing with our present post-facto reactive cyber defense systems. What we need is a new paradigm that is predictive in nature. This archetype is one that is in front of the attacker and understands the modus-operandi of the invader's malicious behavior before it starts. The result is to develop a predictive modeling tool to meet the attacker outside the firewall before the breach. Comparatively, if the foe is successful in a penetration of the network, for the first time, the defense has an awareness through this new proactive prototype of who, what, when, where, and why to aid in their defensive strategy.
Biography:
Donovan Williams is an aspiring PhD Candidate at Capella University where he is conducting cyber research on behavior analysis. He is currently developing his proposed dissertation topic "Behavior analysis as a predicative modeling tool against malicious cyber events" as he moves forward in his studies.
In addition, Donovan is a 1982 graduate of the U.S. Naval Academy, received his Masters from the University of Auburn-Montgomery and is a certified Project Manager Professional (PMP). A retired Naval Aviator he has several thousand hours in the F-14 and combat time in Libyan and Iraqi conflicts. He currently resides in Aiea Hawaii and is in transition to a new firm as Vice President of Pacific Operations.
Lunch Menu:
Appetizer: Hale Koa Salad with Tarragon Dressing
Main Course: Poached Atlantic Salmon
with Green Peppercorn Ginger Sauce
Seasonal Vegetables and Sliced Baked Potato with Parsley Butter
Dessert: Vanilla Ice Cream Taco with Fruit Salsa
11:30 AM - 1:30 PM
ISSA Monthly Luncheon: Financial Information Security Risk Management 2013: Vendor Due DiligenceISSA Monthly Luncheon: Financial Information Security Risk Management 2013: Vendor Due Diligence
11:30 AM - 1:30 PM
Hale Koa Hotel
RSVP Required!
by 11-AM Wed., April 17, 2013
Cost: $25 for ISSA members & students, $30 for non-members
Presentation:
Financial Information Security Risk Management 2013: Vendor Due Diligence
Speaker:
Kenneth Newman (CRISC, CISM, PMP, ITIL)
Senior Vice President, Central Pacific Bank
Topic:
Companies, especially those in financial services severely impacted in recent years, continue to explore opportunities to reduce cost and increase revenues. For many, this includes a serious look at both outsourcing and offshoring, as part of major projects. While many institutions already have significant vendor relationships, this trend will increase the level of operational reliance placed on third parties. Often a clear understanding of security risk is not a significant enough discussion topic in these procurement proceedings. This presentation will focus on how to best communicate, engage, and handle risk management from an information security perspective when looking at new, critical vendor engagements.
Biography:
Kenneth Newman (CRISC, CISM, PMP, ITIL), Senior Vice President at Central Pacific Bank, has twenty years of progressive experience in technology, security, risk fraud & privacy and a proven year track record delivering solutions in financial services. In prior roles, he has been responsible for various security & risk functions at WaMu, Deutsche Bank, & Citigroup, as well as at other Hawaii financial institutions. He holds an MS in Information Systems and a BS from Columbia University.
Mr. Newman has managed or served as an SME on many projects where he needed to balance risk and security with compliance requirements to meet business needs. He has coordinated global security software deployments, and conducted due diligence for large-scale projects, as well as outsourcing and M&As.
Also a frequent trainer and speaker, Mr. Newman has presented at RSA Conference, MIS Training Institute IT Security World, American Banker Identity Theft and Fraud Symposium, Ziff Davis Security Summit, ComputerWorld Mobile and Wireless World, Technology Manager's Forum, Cyber Security in the Financial Services Sector Executive Summit, and Wireless Enterprise Summit, as well as for FBI, ISACA, Infragard, ISSA, PMI, AITP, ACFE, AFCEA, CoC, BBB, HAIP, and HAPA Hawaii and mainland events.
Lunch Menu:
Appetizer: Hale Koa Salad with Tarragon Dressing
Main Course:
Sautéed Shrimp and Chicken
Poha Berry Port Wine Glaze Chicken Breast and Herb Marinated Shrimp with Garden Medley Whole Grain Rice Pilaf and Seasonal Vegetables
Dessert: Refreshing Homemade Sorbets
11:30 AM - 1:30 PM
ISSA Monthly Luncheon: Social Networking - Spies Among UsISSA Monthly Luncheon: Social Networking - Spies Among Us
11:30 AM - 1:30 PM
Hale Koa Hotel
RSVP Required!
by 11-AM Wed., May 15, 2013
Cost: $25 for ISSA members & students, $30 for non-members
Presentation:
Social Networking - How to Recruit Spies
Speaker:
Ira Winkler, CISSP
President, ISSA International
Topic:
As Ira says, "If you tweet what you have for Lunch, you deserve to be robbed.
Besides talking about Social Networking Risks, he will also talk a bit about ISSA International.
Biography:
Ira Winkler is the Chief Security Strategist for Codenomicon and President of ISSA International. He is a leading security professional and consults to some of the top companies in the world to help them identify their security vulnerabilities and improve their security programs. In addition to being a columnist for ComputerWorld, he has authored several books including "Spies Among Us" and "Zen and the Art of Information Security."
He began his career at the National Security Agency as an intelligence and computer systems analyst, and later supported U.S. and overseas government, military and intelligence agencies. He has served as president of the Internet Security Advisors Group, chief security strategist at HP Consulting, and director of technology of the National Computer Security Association. Additionally, he was part of the graduate and undergraduate faculties of the Johns Hopkins University and the University of Maryland.
Lunch Menu:
Appetizer: Hale Koa Salad with Tarragon Dressing
Main Course:
Chicken Marsala
Boneless Chicken Breast with Mushroom, Shallot, Marsala Wine Sauce on a Bed of Asparagus Risotto
Dessert: Tiramisu
11:30 AM - 1:30 PM
ISSA Monthly Luncheon: Mobile Security and the Real World RisksISSA Monthly Luncheon: Mobile Security and the Real World Risks
11:30 AM - 1:30 PM
Hale Koa Hotel
RSVP Required!
by 11-AM Wed., June 19, 2013
Cost: $25 for ISSA members & students, $30 for non-members.
Cash or check only, payable on day of luncheon.
Presentation:
Mobile Security and the Real World Risks
Speaker:
Mitchell Wright
Sr. Field Marketing Manager, Kaspersky Lab
Topic:
The explosion in mobile device usage within corporate networks has raised many security concerns ranging from spyware & malware to data exfiltration. With an increasing mobile workforce, smart phones, laptops and tablets are viable for malware authors. Malware is part of our daily life and is platform agnostic.
Talking Points:
* Mobile risks at every layer in the three major mobile OS/platforms: Android, iOS and BlackBerry
* Key threats associated with your mobile and roaming workforce
* Security measures to prevent corporate data leakage and malware infection on devices
Biography:
TBA
Lunch Menu:
Appetizer: Hale Koa Salad with Tarragon Dressing
Main Course:
Grilled Fresh Island Fish
with Ginger Sake Buerre Blanc and Roasted Tomato Oil
Served on Lobster Fried Rice and Stir Fried Asian Vegetables
Dessert: Chocolate Mousse Cake