Mouse over any item on the left to display further information on the right
11:30 AM - 1:30 PM
ISSA Monthly Luncheon: Hosted by Splunk; Building an Analytics Driven Security Operation CenterISSA Monthly Luncheon: Hosted by Splunk; Building an Analytics Driven Security Operation Center
11:30 AM - 1:30 PM
Hale Koa Hotel
RSVP requested
Members $0, Non-Members $0
Presentation: Building an Analytics Driven Security Operation Center
Speaker: Ernie Welch, Sr. Sales Engineer, Splunk Inc.
Topic:Learn best practices for deploying an analytics-enabled SOC with our security expert. Whether you are interested in building a SOC, enhancing an existing SOC or building out a security practice, this session will explain the people, processes and technology required. The discussion will also cover how Splunk can complement a SIEM that may already be in place in the SOC.
Bio:Ernie Welch joined Splunk in September 2015. He brings more than 25 years' experience in technology solution sales, from concept to delivery. Ernie was most recently with HP, where he was a senior Universal CMDB engineer focused upon application discovery and dependency mapping, helping customers understand their environments form a business service context.
Lunch Menu:
Appetizer: Hale Koa Salad with Tarragon Dressing
Main Course: Baked Mahi Mahi Filet, Tomato Chive Beure Blanc, Garlic Mashed Potatoes and Fresh Seasonal Vegetables
Dessert: Mango Bar with Lime Cream
11:30 AM - 1:30 PM
ISSA Monthly Luncheon: Hosted by Science Logic/Hybrid IT Infrastructure Monitoring & ManagementISSA Monthly Luncheon: Hosted by Science Logic/Hybrid IT Infrastructure Monitoring & Management
11:30 AM - 1:30 PM
Hale Koa Hotel
RSVP requested
Cost: Members $0/Non-Members $0
Presentation: Hybrid IT Infrastructure Monitoring & Management
Speaker: Steve Fry, Account Executive Science Logic Inc
Kim Miroy, Sr. Sales Engineer, Science Logic, Inc.
Topic:Hybrid IT Infrastructure Monitoring & Management
Learn how to monitor your entire Infrastructure (Network, Storage, Compute, Power) both on premise and in the cloud, while still performing traditional data center and network infrastructure monitoring. Doing so can
. Accelerate cloud adoption and data center consolidation
· Provide deep visibility for both AWS and Azure
· Provide a single pane of glass across your multi-cloud and on premise infrastructure environment
· Reduce labor costs, MTTR, and improve efficiency through automation capabilities
· Contextualize through Infrastructure Dependency Mapping
ScienceLogic will be used as an example of how this can be done, since it is the first end-to-end IT infrastructure monitoring company ever to conform to the U.S Department of Defense's rigorous security and interoperability standards.
Bio:Steve Fry is an Account Executive at Science Logic with over 20 year's experience selling to Enterprise and Government accounts. For the past 10 years he has focused on Application and Network Monitoring. He recently joined ScienceLogic to cover Infrastructure Monitoring in Southern California and Hawaii
Kim Miroy is a Sr. Sales Engineer who has been with ScienceLogic for nearly 3 years. She brings over 18 years of IT experience having worked as a network engineer prior to going into technology solution sales. She loves helping customers achieve visibility into their IT infrastructure in order to help them be more proactive thus freeing up cycles to spend time working on different projects instead of always being in fire fighting mode
Lunch Menu:
Appetizer: Hale Koa Salad with Tarragon Dressing
Main Course: Red Wine Braised Boneless Short Rib, Matignon of Root Vegetables, Scallion Mashed Potatoes and Fresh Seasonal Vegetables
Dessert: Classic Creme Brulee
11:30 AM - 1:30 PM
ISSA Monthly Luncheon: Sponsored by RSA/Net Witness; Threat HuntingISSA Monthly Luncheon: Sponsored by RSA/Net Witness; Threat Hunting
11:30 AM - 1:30 PM
Hale Koa Hotel
RSVP requested
Cost:
0$ Members/0$ Non-Members
Presentation: Threat Hunting
Speaker: Neil R. Wyler "Grifter", Threat Hunting and Incident Response Specialist, RSA
Topic:Since its inception, the security industry has been inundated with trendy defense techniques, topics, terms, and products that once implemented will solve all of our security woes. For the last several years one of those terms, threat hunting, has become the darling of defenders and vendors worldwide. But just what is threat hunting? Is it effective? Where do you even begin? This session will answer these questions and more when we discuss real life, immediately applicable, threat hunting techniques and methodologies. We'll also discuss several examples of security failures and data exposure found during threat hunting engagements on the networks of Black Hat and the RSA Conference.
Bio:Neil R. Wyler is currently a Threat Hunting and Incident Response Specialist with RSA. He has spent over 18 years as a security professional, focusing on vulnerability assessment, penetration testing, physical security, and incident response. He has been a staff member of the Black Hat Security Briefings for over 16 years and a member of the Senior Staff at DEF CON for 18 years. Neil has spoken at numerous security conferences worldwide, including Black Hat, DEF CON, and the RSA Conference. He has been the subject of various online, print, film, and television interviews, and has authored several books on information security. In his free time, Neil keeps himself busy as a member of both the DEF CON, and Black Hat CFP Review Boards, the Black Hat Training Review Board, the founder of DC801, and founder of his local hackerspace, 801 Labs. Follow him on Twitter at @Grifter801.
Lunch Menu:
Appetizer: Hale Koa Salad with Tarragon Dressing
Main Course: Sauteed Herb Seasoned Chicken, Deglazed with Balsamic Vinegar and Finished with Butter, Fresh Seasonal Vegetables and Roasted Garlic Mashed Potatoes Dessert: Calamansi Tart with White Chocolate Mousse
11:30 AM - 1:30 PM
ISSA Monthly Luncheon: Hosted by Cisco; Cloud SecurityISSA Monthly Luncheon: Hosted by Cisco; Cloud Security
11:30 AM - 1:30 PM
Hale Koa Hotel
RSVP requested
$0 Members and Non-Members
Presentation: If you are heading into the clouds, you better know what storms to avoid.
Speaker: Bill Musson, Consulting System Engineer, Cisco Systems Cloud Security Team
Topic:Our discussion today is about the cloud and cloud security. We will look at Cloud Access Security Broker (CASB) solutions and implementations, oAuth, API and how all of this works together. With this base we will then look at the dangers of the cloud, specific attacks and what you should be thinking about when you move to a SaaS solution.
Bio:Bill Musson has extensive experience in cyber security from being in the trenches as the Network Security Officer at CINCPACFLT to Symantec and Splunk supporting customers in the commercial, state and DoD. Bill is well known in Hawaii for training the next generation of cyber professionals and his long history with ISSA Hawaii and has served in every ISSA Hawaii board position multiple times over the last few decades. Bill is a Consulting Solutions Engineer for the Cloud Security Team at Cisco on the Federal team.
Lunch Menu:
Appetizer: Hale Koa Salad with Tarragon Dressing
Main Course: Poached Atlantic Salmon, Green Perpercorn Ginger Sauce, Sliced Baked Potatoe with Parsly Butter and Fresh Seasonal Vegetables
Dessert: Classic Creme Brulee
11:30 AM - 1:30 PM
ISSA Monthly Luncheon: Hosted by BeyondTrust "The Next Attack Vectors: Vulnerabilities + PrivilegesISSA Monthly Luncheon: Hosted by BeyondTrust "The Next Attack Vectors: Vulnerabilities + Privileges
11:30 AM - 1:30 PM
Hale Koa Hotel
RSVP requested
Cost $0 Members/$ 0 Non-Members
Presentation: The Next Attack Vectors: Vulnerabilities + Privileges
Speaker: Joe Statz, Security Engineer at Beyond Trust
Topic:Cyber-attacks continue to increase in sophistication and are occurring in such volume that a daily newsfeed littered with tales of new data breaches is now something we've come to expect. Central to almost each of these tales is an element of privilege abuse and/or misuse that resulted in either the initial exploit, or that was implicated in allowing an initial foothold to metastasize into a security event inflicting widespread damage.
This session provides a comprehensive view of how privileges, passwords, and vulnerabilities are being leveraged as attack vectors, and how you can take measurable steps to defend against them.
Bio:Joe Statz, Security Engineer at BeyondTrust has spent 22 years working in IT and more specifically in Security for the last 8. He has worked at BeyondTrust for the past 6 years with hundreds of companies in all verticals. He started out by earning his Bachelor's degree from UCLA (Go Bruins!) and started his career in IT while serving in the USN.
Lunch Menu:
Appetizer: Hale Koa Salad with Tarragon Dressing
Main Course: Smoked Soy Marinated Chicken on Fettuccine Pasta, Fresh Julienne Vegetables and Mirin Cream Sauce
Dessert: Refreshing Signature Sorbets
ISSA Monthly Luncheon: Hosted by Optiv; Identity Access Management Programs
11:30 AM - 1:30 PM
Hale Koa Hotel
RSVP requested
Cost:
0$ Members/0$ Non-members
Presentation: "What Good Is" in Identity Access Management Programs
Speaker: Dusty Anderson, Advisor for OPTIV IAM Services
Topic: "What Good Is" in Identity Access Management Programs
Dusty's broad based background and experience will give us a unique perspective into Best Practices that she has identified for a successful Identity Program for your organization.
This discussion will include a look into the essential core components, reference architecture and design, identifying potential hurdles and the 5 must haves for a successful IAM Program.
Bio:With over 14 years of experience in all facets of Identity Access Programs, Dusty Anderson is a seasoned leader in Optiv's Identity and Access Management Practice.
Currently an Advisor in Optiv's IAM Advisory Services, Dusty helps organizations optimize their Identity Solutions in all phases of deployment and development-- from architecture and design, implementation, to on-going program modifications/development to maximize efficiency and effectiveness regardless of current state.
Lunch Menu:
Appetizer: Hale Koa Salad with Tarragon Dressing
Main Course: Asian Braised Pork, Soy Mirin Sauce, Scallion Rice and Fresh Seasonal Vegetables
Dessert: Vanilla Ice Cream Taco with Fruit Salsa
11:30 AM - 1:30 PM
ISSA Monthly Luncheon: Hosted by SynAck; The CISO - A Different ApproachISSA Monthly Luncheon: Hosted by SynAck; The CISO - A Different Approach
11:30 AM - 1:30 PM
Hale Koa Hotel
RSVP requested
Members $0/ Non-Members $0
Presentation:
Facebook Kills the CISO Position - Herbalife takes a different Approach Using a Crowd!
Speaker: Darrell Jones - HerbaLife CISO
Topic:
Security is usually a specific team's responsibility with a company, but understaffed and overworked. At Herbalife, Darrell Jones empowered other teams - development, operations, and more - to help with the security mission without burdening any team. Learn how development tools, penetration testing, the world's best ethical hackers and other techniques made Herbalife's security more effective.
Bio: Darrell Jones - HerbaLife CISO
Lunch Menu:
Appetizer: Hale Koa Salad with Tarragon Dressing
Main Course: Grilled Black Tiger Shrimp Pasta, Fettuccine Pasta Tossed with Marinara Sauce, Mushrooms, Spinach and Garlic
Dessert: Tiramisu
11:30 AM - 1:30 PM
ISSA Monthly Luncheon: Hosted by Thycotic/HiTech Hui; Essentials to Least PriviledgeISSA Monthly Luncheon: Hosted by Thycotic/HiTech Hui; Essentials to Least Priviledge
11:30 AM - 1:30 PM
Hale Koa Hotel
RSVP requested
No Cost
Presentation: Essentials to Least Priviledge in an Organization
Speaker: Joseph Carson, Chief Security Scientist, Thycotic
Topic:
Endpoint security is a crowded and complicated business, full of overly complex and overlapping tools. Thycotic will explain how you can eliminate the risks by implementing one of the most fundamental security strategies--the principle of least privilege.
We'll also cover keys to successful least privilege adoption using application control, so you can avoid the common pitfalls that cause least privilege strategies to fail.
· Where to begin a Least Privilege/PAM project
· Evaluate the right InfoSec tools
· Limit your exposure to breaches
· How security teams are solving their End Point pain
Bio:
Joseph Carson has over 25 years' experience in enterprise security, is the author of "Privileged Account Management for Dummies" and "Cybersecurity for Dummies", and is a cyber security professional and ethical hacker. Joseph is a cyber security advisor to several governments, critical infrastructure, financial and transportation industries, speaking at conferences globally. Joseph serves as the Chief Security Scientist at Thycotic.
Lunch Menu:
Appetizer: Hale Koa Salad with Tarragon Dressing
Main Course: Cabernet Peppercorn Sauce, Frizzled Onions, Roasted Garlic Mashed Potatoes and Grilled Marinated Squash and Peppers
Dessert: Vanilla Ice Cream Taco with Fruit Salsa
11:30 AM - 1:30 PM
ISSA Monthly Luncheon:ISSA Monthly Luncheon:
11:30 AM - 1:30 PM
Hale Koa Hotel
RSVP requested
Members $ / Non-Members $
Presentation:
Speaker:
Topic:
Bio:
Lunch Menu:
Appetizer: Hale Koa Salad with Tarragon Dressing
Main Course: Duo of Mahi Mahi "Dynamite" & Marinated Herb Grilled Chicken, Macadamia Nut Romesco Sauce, Whole Grain Rice Pilaf and Fresh Seasonal Vegetables
Dessert: Mango Bar with Lime Cream
ISSA Monthly Luncheon: Hosted by Extra Hop, Rise Above the Noise Leveraging NTA
11:30 AM - 1:30 PM
Hale Koa Hotel
RSVP requested
Members $ 0 / Non-Members $0
Presentation: Rise Above the Noise Leveraging Network Traffic Analysis
Speakers: Trish Gundy, Extra Hop Senior Security Engineer
Monique Egan, Extra Hop Regional Director
Topic:
Rise Above the Noise Leveraging Network Traffic Analysis (NTA) creates a fundamentally new way to analyze every digital interaction occurring on the network. Using real-time analytics and advanced machine learning, turn that data into the most comprehensive, objective source of intelligence and investigation for SecOps and IT Ops. We call this wire data analytics.
Bio: Trish Gundy, Senior Security Engineer at ExtraHop. Trish focuses on working with partners and analysts to level up their security teams using Reveal(x) for unprecedented visibility at scale to understand the context of enterprise assets and gain definitive insights using automated investigation within a few clicks to get to immediate answers.
Security forensics and protocol analysis has been Trish's focus throughout her career. With over 25 years of experience working with customers, sales teams, and product teams, Trish provides a real-world, hands-on perspective to the security challenges that face many organizations. Trish worked as a security analyst for one of the worlds most recognized beverage manufacturers. Working in technology resellers and manufacturers, her roles range from network engineer, security analyst, technical instructor, manager of consulting services, forensics consultant and security engineer.
Monique Egan, ExtraHop Regional Director, Hawaii. Monique has 25 years as a thought leader helping organizations drive innovation and new strategies into their IT, Network and Security teams to be more effective in what they do with existing and future software and consulting services. She understands the pressure to do more with less and strives to assist her customers and partners achieve their business and technological goals on time and within their budget.
Lunch Menu:
Appetizer: Hale Koa Salad with Tarragon Dressing
Main Course: Cajun Pan Seared Chicken, with Etouffee Sauce, Creole Rice, and Fresh Seasonal Vegetables
Dessert: Refreshing Signature Sorbets
11:30 AM - 1:30 PM
ISSA Monthly Luncheon: Hosted by Armis, Securing the Tsunami of Unmanaged and IoT DevicesISSA Monthly Luncheon: Hosted by Armis, Securing the Tsunami of Unmanaged and IoT Devices
11:30 AM - 1:30 PM
Hale Koa Hotel
RSVP requested
Members $0 / Non-Members $0
Presentation: Securing the Tsunami of Unmanaged and IoT Devices
Speaker: Misha Seltzer Chief Solution Architect at Armis Security
Topic:
Today, enterprises are experiencing a huge digital transformation with the explosion of connected devices - bigger than the number of PC and mobile devices combined. These new devices include everything from smart TVs, security cameras, digital assistant (like the Amazon Echo), printers, HVAC systems, medical devices, manufacturing devices and more. It's a tsunami of unmanaged devices that the enterprise is not prepared to address for a security perspective.
These unmanaged devices, often referred to as the Internet of Things (IoT) or the Enterprise of Things, are helping companies become more productive. But they're also placing them at risk, because these new devices are designed to connect, have no security, and have little or no way to probably upgrade or manage them. As they can't be protected by legacy security solutions, they have become the new attack landscape, with the FBI and DHS issuing multiple warnings. This session will explore the new threat landscape, providing several examples of attacks on these devices, and discuss new considerations of security architectures with a 'Zero Trust' philosophy to fill the gaps left by traditional security architectures.
Bio: Misha Seltzer is the Chief Solution Architect at Armis Security. Prior to Armis Misha spent 8 years working as a software engineer for Google. And Misha served as a software engineer in the Israel Defense Forces.
Lunch Menu:
Appetizer: Hale Koa Salad with Tarragon Dressing
Main Course: Poached Atlantic Salmon, Green Peppercorn Ginger Sauce, Sliced Baked Potato with Parsley Butter and Fresh Seasonal Vegetables
Dessert: Classic Creme Brulee
11:30 AM - 1:30 PM
ISSA Monthly Luncheon:Hosted by Optiv; A Good Information Security Risk Management ProgramISSA Monthly Luncheon:Hosted by Optiv; A Good Information Security Risk Management Program
11:30 AM - 1:30 PM
Hale Koa Hotel
RSVP requested
Members $ / Non-Members $
Presentation:A Good Information Security Risk Management Program
Speaker:Bob Justus Optiv's Managing Executive Director, Office of the CISO group.
Topic:"Bob will be sharing "what good is", specifically, best practices for a successful Information Security Risk Management Program today.
He will cover the current critical success factors required to build a solid foundation for your strategic information security program, and what some of the common oversights we face, and how to overcome them.
This will be a very candid, interactive roundtable discussion with a highly seasoned industry professional.
Bio:Bob Justus Optiv's Managing Executive Director, Office of the CISO group.
Lunch Menu:
Appetizer: Hale Koa Salad with Tarragon Dressing
Main Course: 48 Hour Brined Pork Loin, Crusted with Buba Arare, Apple Cider Gastrique, and Fresh Seasonal Vegetables
Dessert: Dutch Apple Pie with Vanilla Ice Cream