Hawaii Chapter

Events

Mouse over any item on the left to display further information on the right

  • Friday, February 17, 2012

    • ISSA Monthly Luncheon: Link Layer Visibility ( Free Lunch )
      Friday, February 17, 2012

      ISSA Monthly Luncheon: Link Layer Visibility ( Free Lunch )

      11:30 AM - 1:30 PM

      Hale Koa Hotel

      RSVP Required!
      by 11-AM Wed., Feb 15, 2012
      Cost: $0 - FREE

      Presentation: Maintaining "Link Layer Visibility" in Network Monitoring

      Speaker: Tony Zirnoon, CISSP

      Topic: Most network monitoring tools do not have access to the real physical and link layer of the network, since they are using techniqies such as spanned ports, aggregators and/or netflow. These techniques can introduce aggregation and do not address the issue of losing Link Layer Visibility!

      So there you are, you've just bought an analytic tool and you want to get more coverage, say to a few other local network segments - after you realize it's not running at capacity, and you buy an aggregator to place between your network segments and your tool. Guess what... You've lost Link Layer Visibility... You've lost critical information about the nature of the data you're trying to monitor.

      You don't know which network segment your tool is looking at, or what your tool does when looking at multiple different network segments, tool results are not correct and you start losing packets because there are now collisions introduced at the ingress, again by the aggregator, in fact - it's worse than that. Sessions are now mixed together and your tool may not be able to differentiate between one session and another - from packets arriving on one port and packets arriving on a different port.

      There's nothing wrong with adding an aggregator, that's fine, but next time you're in need - take a look at the VSS line of products which preserve Link Layer Visibility, through advanced features such as Port & Time stamping, High data burst buffers, Microburst detection & Session aware load balancing. Multiply that with the industry's only true Mesh deployment architecture, as opposed to the far less reliable Hub & Spoke approach - and not only do you benefit from seeing multiple network segments with the same, or with multiple different tools, but you also get much more resilient monitoring with a network wide view that self-learns, self-heals and never loses a packet!

      What's the upshot to this discussion - I'm glad you asked! Only by preserving Link Layer Visibility can you guarantee you'll be able to find and process the packet that will lead to getting the network back up again. Using an aggregator that doesn't preserve Link Layer Visibility will help to conceal the problem, hide the packet at issue and keep your network down longer / impeding a resolution.

      Add in an 80% reduction in Capex by introducing the Network Intelligence Optimization layer, a 50% reduction in Opex - as tools can be concentrated and you're looking in good shape to invest in more tools or facilities that will allow you to offer a differentiation to your end customer - and that's a good thing, so's a promotion because the Network's always up

      BIO: Tony Zirnoon, CISSP is the Global Director of Security Strategy & Enterprise Marketing at VSS Monitoring where he's focused on solidifying the company's presence and momentum in the emerging network security and intelligence optimization segment through a comprehensive strategy, joint solutions with technology alliance partners, evangelism and building thought leadership. Tony has more than 15 years IT experience at Fortune 500 companies, bringing a customer-focused perspective as well as delivery of consulting solutions in various industry verticals, and has led numerous information and data security risk assessments, and developments in IT security architecture, security and privacy design and implementations. He has also been regularly involved in helping clients identify and manage their compliance with various state and federal regulations (Sarbanes-Oxley, HIPAA, GLBA, FFIEC, ITAR, PCI, etc). Tony graduated from the CSU, Sacramento with a Bachelor of Science in Computer Science, and holds the CISSP and CCSA, PCI-QSA certifications. He is an active member of the ISC2, IAPP, InfraGard, OWASP and Silicon Valley chapter of ISSA. Linkedin: http://www.linkedin.com/in/zirnoon Twitter: @SecurEvangelist


      Lunch Menu:
      Appetizer: Hale Koa Salad with Tarragon Dressing
      Main Course: Herb Marinated Grilled Sirloin Steak and Citris Honey Mustrad Glazed Chicken Breast
      Fresh Mashed Potatoes and Herb Roasted Garden Vegetables
      Dessert:  Red Velvet Cake

  • Friday, March 16, 2012

    • ISSA Monthly Luncheon: Hardening the Database, Security Connected, and Chip Level Security.
      Friday, March 16, 2012

      ISSA Monthly Luncheon: Hardening the Database, Security Connected, and Chip Level Security.

      11:30 AM - 1:30 PM

      Hale Koa Hotel

      RSVP Required!
      by 11-AM Wed., Mar 14, 2012
      Cost: Hosted Lunch by Intel/McAfee

      Presentation: Hardening the Database, Security Connected, and Chip Level Security

      Speaker: Steve Poeppe, Solutions Engineer - McAfee/Intel

      Topic: Former Deputy CISO of the State of Idaho, will be sharing some of his thoughts on recent trends in the industry, and the direction that McAfee is taking regarding hardening the database, security connected, and chip level security. Don't miss it!

      BIO: McAfee/Intel, Solutions Engineer - 1 Yr Focused on Endpoint, Mobile, Network IPS, Web Gateway, Encryption, Vulnerability Assessment (MVM), Change Control, Whitelisting, Chip Integration, SIEM and Database Security.

      State of Idaho, Deputy CISO - 4 Yrs: Responsible for Security Policy/compliance, forensics, monitoring, and Technology acquisition/RFP during the statewide technology consolidation of Endpoint, Network IPS, Web Gateway, Email Gateway, Vulnerability Assessment, and Encryption.

      Hewlett Packard, IT Security Operations - 1 Yr: Participated on a global team to manage privileged access on several thousand servers. Managed project to deploy privileged access tracking software to the HP global community.

      Superior Courts AZ, SSO - 8 yrs: Responsible for systems and network security, forensics, policy, etc.

      Lunch Menu:
      Appetizer: Hale Koa Salad with Tarragon Dressing
      Main Course: Poached Atlantic Salmon
      with Green Peppercorn Ginger Sauce
      Seasonal Vegetables and Sliced Baked Potatoe with Parsley Butter
      Dessert:  Vanilla Ice Cream Taco with Fruit Salsa

  • Friday, April 20, 2012

    • ISSA Monthly Luncheon: The Rise of Hacktivism
      Friday, April 20, 2012

      ISSA Monthly Luncheon: The Rise of Hacktivism

      11:30 AM - 1:30 PM

      Hale Koa Hotel

      RSVP Required!
      by 11-AM Wed., Apr 18, 2012
      Cost: No Cost - Sponsored by HP Enterprise Security Products Group

      Presentation: The Rise of Hacktivism

      Sponsored by: HP Enterprise Security Products Group

      Based on market-leading products from ArcSight, Fortify, and TippingPoint, the HP Enterprise Security Products Group uniquely enables enterprises to take a proactive approach that integrates security correlation, deep application security analysis, and network-level defense mechanisms, all backed by our best-of -breed range of information security services.

      Speaker: Jerry Fraizer, CEH - HP Enterprise Security TippingPoint Solutions Architect

      Topic: The speaker will be sharing information related to the groups that are making headlines and causing the alarming, exponential rise of information security related loss to organizations of all sizes. The speaker will cover notable events, firsthand accounts, and the tools and tactics that Hacktivist groups leverage to carry out attacks. In addition the speaker will cover various tools and techniques that can be leveraged by a security professional to prevent, and mitigate the impact of these types of attacks.

      Bio: Jerry Fraizer has worked in the information technology industry for over 14 years in various information security and network engineering roles. Jerry has spent the majority of his career as hands on engineer and architect working on large high transaction networks in PCI-DSS and SOX compliant organizations including a division of Ticketmaster and The City of Irvine, California. Jerry is TippingPoint Security Expert #2058, a Certified Ethical Hacker, holds a Cisco CCNP in Routing & Switching, and holds a Cisco CCNP in Security.

      Lunch Menu:
      Appetizer: Hale Koa Salad with Tarragon Dressing
      Main Course: Sauteed Shrimp and Chicken
      Poha Berry Port Wine Glaze Chicken Breast and Herb Marinated Shrimp with Garden Medley Whole Grain Rice Pilaf and Seasonal Vegetables
      Dessert:  Refreshing Homemade Sorbets

  • Friday, May 18, 2012

    • ISSA Monthly Luncheon: Web Application Firewalls - Protecting Your Web Sites and Data
      Friday, May 18, 2012

      ISSA Monthly Luncheon: Web Application Firewalls - Protecting Your Web Sites and Data

      11:30 AM - 1:30 PM

      Hale Koa Hotel

      RSVP Required!
      by 11-AM Wed., May 16, 2012
      Cost: $25 for ISSA members, $30 for non-members

      Speaker: Jock Purnell, Owner/Consultant at JPNI and President of ISSA Hawaii

      Topic: Web Application Firewalls - Protecting Your Web Sites and Data

      Description: Last month you heard about various ways to hack your web sites, and saw how easy it is to do. This month's topic will cover some ways to protect against these attacks using Web Application Firewalls. Traditional Firewalls can block access but they don't check what's in the actual payload. For that, you need something that is Layer 7, Application Aware. Web App Firewalls fit this requirement, and can check and block such compromises as SQL Injections, Cross Site Scripting and so on. Another problem is in keeping CONFIDENTIAL data (social security numbers, account #'s, etc) from being inadvertently dispersed. One way of protecting your web site is to write perfect code, but this is not always possible. Hence, the need for a Firewall that is application aware. So, come and hear how to protect your web sites, and more importantly, the data behind them.

      BIO: Jock has 35 years of IT experience as an IBM Senior SE and Consultant with his own IT services based company. His last twenty years have been spent primarily in the Networking and Security areas, and he has worked with most of the medium and large sized organizations in Hawaii.

      Lunch Menu:
      Appetizer: Hale Koa Salad with Tarragon Dressing
      Main Course: Chicken Marsala
      Boneless Chicken Breast with Mushroom, Shallot, Marsala Wine Sauce on a Bed of Asparagus Risotto
      Desert: Macadamia Nut Cream Pie

  • Friday, June 15, 2012

    • ISSA Monthly Luncheon: Defending Business Ecosystems
      Friday, June 15, 2012

      ISSA Monthly Luncheon: Defending Business Ecosystems

      11:30 AM - 1:30 PM

      Hale Koa Hotel

      RSVP Required!
      by 11-AM Wed., June 13, 2012
      Cost: $25 for ISSA members, $30 for non-members

      Presentation:  Organized attacks can effect both large businesses and the smaller businesses they serve. How service providers and their customers can collaborate in 360 degree security solutions.

      Speaker: Beau Monday, CISSP GSEC - Information Security Officeer - Hawaiian Telcom

      Topic: Recent breeches of personal financial information have been widely publicized as having not only caused the normal concerns and inconveniences to consumers, but real material cost to the banks that have guaranteed the fraudulent transactions to maintain customer confidence despite the limits of their responsibilities. Even the largest banks and insurance companies with the most sophisticated security measure are vulnerable if their merchants and subscribers are unaware of the risk of vulnerabilities to their databases, transaction systems and their responsibility for intensified security.

      Who's responsible for security in an end-to-end transaction: examples from the financial services and healthcare industries. Can a small business afford security? Or perhaps the better question is can they afford not to have it? Solutions available for even the smallest business can improve customer confidence.

      BIO:
      Hawaiian Telcom, Information Security Officer

      Hawaiian Telcom's Information Security Officer, Beau Monday is responsible for managing the company's Information Security program.
      Prior to joining Hawaiian Telcom, he spent time doing security work for Wells Fargo bank, T-Mobile USA and AT&T Wireless, among others, during an IT career that has spanned over 2 decades.

      Beau's industry certifications include the CISSP and SANS GSEC. He is also a contributing member of the Cloud Security Alliance, and was one of the first people in the
      world to attain their CCSK certification when it became available in 2010.
      Lunch Menu:
      Appetizer: Hale Koa Salad with Tarragon Dressing
      Main Course: Baked Mahi-Mahi Filet
      with Tomato Chive Beurre Blanc
      on Garlic Mashed Potatoes and Mushroom Zucchini Saute
      Dessert:  Strawberry Cream Cheesecake

  • Friday, July 20, 2012

    • ISSA Monthly Luncheon: State of Hawaii Strategic Plan
      Friday, July 20, 2012

      ISSA Monthly Luncheon: State of Hawaii Strategic Plan

      11:30 AM - 1:30 PM

      Hale Koa Hotel

      Presentation:  Sanjeev "Sonny" Bhagowalia will provide an overview and update on the State of Hawaii's progress in developing it Business and Information Technology/Information Resource Management Strategic Plan.

      Speaker: Sanjeev "Sonny" Bhagowalia

      Topic: In September 2011, the state released the first-ever comprehensive assessment of its IT assets, policies, and procedures in a baseline report, which provided the recommendations and findings for the basis of priorities, architecture and projects that will be included in the Strategic Plan. Bhagowalia will also focus on the importance of cyber security and the vigilance required at all levels to protect personally identifiable information (PII), confidential, and sensitive information.

      BIO: Sanjeev "Sonny" Bhagowalia is the State of Hawaii's first full-time Chief Information Officer. Since taking on the position in July 2011, he has overseen the publishing of the first comprehensive assessment of the state's information technology systems, applications, policies and procedures. He and his team are now developing the State of Hawaii Business Transformation and IT Strategic Plan, which is scheduled for publication in July 2012. The Strategic Plan will provide the roadmap for the State's information technology modernization initiative, a key component of Governor Abercrombie's New Day Plan.

      Lunch Menu:
      Appetizer: Hale Koa Salad with Tarragon Dressing
      Main Course: Grilled Skirt Steak with Shitake Mushroom Sauce Paired with Crab Cake, Served on Local Style Fried Udon Noodles and Sautéed Zucchini with Tomatoes
      Dessert:  Vanilla Ice Cream Taco with Fruit Salsa

  • Friday, August 17, 2012

    • ISSA Monthly Luncheon: Root Cause Analysis in a Complex Multi-Tiered Environment
      Friday, August 17, 2012

      ISSA Monthly Luncheon: Root Cause Analysis in a Complex Multi-Tiered Environment

      11:30 AM - 1:30 PM

      Hale Koa Hotel

      RSVP Required!
      by 11-AM Wed., Aug 15, 2012
      Cost: Lunch is Sponsored by Riverbed

      Presentation:
      Root Cause Analysis in a Complex Multi-Tiered Environment

      Speaker:
      Trish Gundy,  Riverbed's Cascade Systems Engineer

      Topic:
      This presentation and live demonstration will show a way to gain optimal application and network visibility in a multi-tiered environment. 

      ·  Performance analytics and how it helps to reduce MTTI (Mean Time To Innocence)
      ·   Illustrations of optimization and acceleration; improving end user experience
      ·   WireShark on Steroids; the visualization, monitoring, and reporting enhancement of Wireshark, the world's most popular network analyzer

      BIO:
      Trish has a background in computer networking and security, specializing in protocol analysis and performance management. Trish taught protocol analysis for Network General's Sniffer University for over a decade and previously worked with IBM, Network Associates, Crossbeam and TippingPoint.

      Lunch Menu:
      Appetizer: Hale Koa Salad with Tarragon Dressing
      Main Course: Chicken Breast Marinated and Sauteed in Red Wine Sauce
      with Mushrooms, Pearl Onions and AppleGlazed Baby Carrots
      On Rice Pilaf with Parmesan
      Dessert:  Vanilla Ice Cream Taco with Fruit Salsa

  • Friday, September 21, 2012

    • ISSA Monthly Luncheon: The Noble Purpose of IT
      Friday, September 21, 2012

      ISSA Monthly Luncheon: The Noble Purpose of IT

      11:30 AM - 1:30 PM

      Hale Koa Hotel

      RSVP Required!
      by 11-AM Wed., Sep 19, 2012
      Cost: $25 for ISSA members, $30 for non-members

      Presentation: The Noble Purpose of IT

      Speaker: Paola Saibene - Information Technology Officer for the Hawaii State Public Library System, an agency with 52 branches across the state, approximately one million patrons and 600 staff members.

      Topic: As a public service announcement, ISSA is always looking to help the community at large. In September's luncheon, we want to give HSPLS the opportunity to talk about their IT Academy, which started in October 2011. IT Academy is a free service, open to the public, to provide online access to various Microsoft training courses. This service is also available in multiple languages. We'll be discussing the WHY -- the motivation behind this project with Microsoft. We'll also discuss the following: WHO can access this, HOW do people sign up, WHAT courses are available, WHERE are the courses, and WHEN can we access them?

      BIO:
      17 years working in IT, holding additional Master's Degrees in Psychology and Literature, which have been a surprising benefit while navigating in the world of IT. Worked in the private and public sector, learning how to maximize the resources and abilities of both. Convinced that there is a 'Noble Purpose' for IT; deriving meaningful objectives from complex projects and implementations to a front line of workers more interested in benefits realization than in IT engineering.

      Lunch Menu:
      Appetizer: Hale Koa Salad with Tarragon Dressing
      Main Course: Roasted Chicken Breast with Tarragon Cream Sauce
      On Herbed Rice Pilaf and Seasonal Vegetables
      Dessert: Peanut Butter Pie

  • Wednesday, October 10, 2012

    • Hawaii's 19th Annual ISSA Discover Security Conference
      Wednesday, October 10, 2012

      Hawaii's 19th Annual ISSA Discover Security Conference

      All Day

      Hale Koa Hotel, Honolulu, Hawaii

      Fee allows attendance to both days of conference:
      ISSA Members $35
      Non-Members: $70

      No need to register for both days. Register for the conference under the event listing for 10/9/2012.

      DATE AND LOCATION:
      October 10-11, 2012
      Hale Koa Hotel
      Honolulu, Hawaii

      FEES:
      Cost of Event (2-days):
      ISSA Members - $35
      Non-Members - $70

      DEADLINES:
      Registrations must be received by (Oct 9th) to ensure a seat. Registrations received after that date will be accepted on a space available basis.

      CANCELLATIONS:
      Cancellations must be received by (Oct 9, 2012). "No-shows" will be charged the full amount ($35 for members; $70 for non-members) if cancellations are not received by Oct 9, 2012.

      REGISTRATION & ADDITIONAL INFORMATION:
      Please use the registration link on the ISSA web site Events Listing

      The DSC brochure will continue to be updated as Speakers and Topics are confirmed.

  • Friday, November 16, 2012

    • ISSA Monthly Luncheon: Honolulu as the Number 1 Digital City
      Friday, November 16, 2012

      ISSA Monthly Luncheon: Honolulu as the Number 1 Digital City

      11:30 AM - 1:30 PM

      Hale Koa Hotel

      RSVP Required!
      by 11-AM Wed., Nov 14, 2012
      Cost: No charge. Hosted by ACTT Hawaii

      Presentation:
      Honolulu as a the Number 1 Digital City

      Speaker: 
      Gordon J. Bruce
      CIO, City and County of Honolulu, HI

      Topic:
      Please join ISSA as Honolulu's IT Director and Chief Information Officer Gordon Bruce explains how our city progressed from being one of the worst technology cities to taking first place as a Digital City. Honolulu was recently recognized by the Center for Digital Government as the Number 1 Digital City in the Nation (Large City Category) in a survey that examines state government's best practices and policies for use of digital technologies to better serve their citizens and streamline operations.

      Bruce will also expand on where the City is heading, and provide insight into recent award-winning projects in "Open Government," "Transparency," "Big Data" and "Mobile Applications."

      BIO:
      Gordon Bruce, IT Director and CIO at City and County of Honolulu. He has been in his current role for seven years and has more than 40 years of experience in technology. He earned a Master's Degree in International Business from Hawaii Pacific University. He is a published author, and serves on numerous boards, including the State Broadband Task Force, State Office of Information Technology Management Advisory Board and FEMA Technology Transition Working Group.

      Lunch Menu:
      Appetizer: Hale Koa Salad with Tarragon Dressing
      Main Course: Broiled New York Steak
      On Roasted Garlic Mashed Potatoes with Cabernet Peppercorn Sauce, Frizzled Onions, Grilled Marinated Squash and Peppers
      Dessert:  Vanilla Ice Cream Taco with Fruit Salsa

  • Friday, January 18, 2013

    • ISSA Monthly Luncheon: Inside/out Threat Detection
      Friday, January 18, 2013

      ISSA Monthly Luncheon: Inside/out Threat Detection

      11:30 AM - 1:30 PM

      Hale Koa Hotel

      RSVP Required!
      by 11-AM Wed., January 16, 2013
      Cost: $25 for ISSA members - $30 for non-members

      Presentation:
      Inside/Out Threat Detection
      Speaker:
      Anthony K. Giandomenico
      Director of Soluions Marketing Referentia

      Topic:
      How many times have we heard the phrase "It's not a matter of if, but when an attack occurs." I would say quite often over the last few years and now that statement couldn't be more true. With advanced attack technology and lack of protection technology, increased software vulnerabilities, skilled resources from the bad guys and a more or less apathetic attitude by businesses toward the problem, its highly probable that the attacks will continue to be successful in organizations around the globe. Although we are losing the battle of preventing the attacks, with the right architecture, tools, intelligence and methodologies we should be able to more accurately and efficiently detect the attacks and mitigate them once they are in the network. In this talk I hope to shed some light on how to accomplish this through better visualization and control of your network utilizing your current technology and some open source tools. It's your network so own it!
      BIO:
      Anthony K. Giandomenico is Director of Solutions Marketing responsible for creating solutions for customers utilizing Referentia's cyber security technologies and services. Referentia services numerous customers including the Department of Defense, utility companies and diverse commercial businesses. Mr. Giandomenico's core focus is to ensure companies and government agencies are operating securely and optimally. His expertise covers protecting critical infrastructures such as financial institutions, hospitals, and all government agencies. Mr. Giandomenico's experience is expansive covering intrusion detection and firewall technologies, incident response procedures, security and penetration assessments and technology integration.
      Lunch Menu:
      Appetizer: Hale Koa Salad with Tarragon Dressing
      Main Course: Grilled Skirt Steak with Shitake Mushroom Sauce
      Paired with Crab Cake, Served on Local Style Fried Udon Noodles and
      Sautéed Zucchini with Tomatoes
      Dessert: Vanilla Ice Cream Taco with Fruit Salsa

  • Friday, February 15, 2013

    • ISSA Monthly Luncheon: Another Year In Web Security: What did 2012 teach us about surviving 2013?
      Friday, February 15, 2013

      ISSA Monthly Luncheon: Another Year In Web Security: What did 2012 teach us about surviving 2013?

      11:30 AM - 1:30 PM

      Hale Koa Hotel

      RSVP Required!
      by 11-AM Wed., February 13, 2013
      Cost: $25 for ISSA members - $30 for non-members

      Presentation:
      Another Year In Web Security: What did 2012 teach us about surviving 2013?

      Speaker:
      Jeremiah Grossman
      Founder and CTO, WhiteHat Security

      Topic:
      If history repeats itself, and the unexpected always happens, how incapable must Man be of learning from experience. This talk will provide an objective analysis of breaches and web security trends in 2012.

      Year after year we continue to witness some of the world's biggest brands in the headlines for security breaches, with what seems no end in sight. And it's not just the Fortune 500 in the cross-hairs; hacktivists, cyber-criminals, and nation-state sponsored attackers have no problem going after anyone and everyone they choose. Some days it's banks. Other days, retailers. Colleges, restaurant chains, technology companies, television networks, state governments, and so on have also been victimized.

      Here's the problem: While last year we saw the average number of serious vulnerabilities on websites dropped 66%, showing a glimmer that the open doors for hackers are being closed, the fact of the matter is even just one vulnerability is just as detrimental as 100. This understanding calls for a new way of thinking about defense. Effective defensive is NOT software security perfection, but a strategy that significantly raises the costs of our adversaries to compromise a system with each dollar we invest. In this session, Jeremiah Grossman, CTO and Founder of WhiteHat Security will discuss the key security breaches that's took place in 2012, the most important new lessons learned, and what it all means for the future of cyber security. Attendees will walk away with an idea of what 2012 research and events meant for security and what we can expect to see in 2013.

      Biography:
      Jeremiah Grossman, founder and CTO, WhiteHat Security, is a world-renowned Web security expert. A co-founder of the Web Application Security Consortium (WASC), he was named one of InfoWorld's Top 25 CTOs in 2007 and is often quoted in major publications such as SC Magazine, Forbes and USA Today.

      He has authored dozens of articles and whitepapers, is credited with the discovery of many cutting-edge attack and defensive techniques, and is a co-author of "XSS Attacks: Cross Site Scripting Exploits and Defense." Grossman is an influential blogger who offers insight and encourages open dialogue regarding research and vulnerability trends.

      Lunch Menu:
      Appetizer: Hale Koa Salad with Tarragon Dressing
      Main Course: Mixed Grill
      Korean Style Short Ribs, Grilled Apple-Chicken Sausage, and Herb Crusted Pork Loin, Served with Char Siu Fried Rice and Broiled Roma Tomatoes
      Dessert: Tiramisu

Copyright © 2003-21 ISSA Hawaii Chapter
PO Box 2297 ~ Honolulu, HI 96804
webmaster@issahawaii.org
Our privacy policy
Trouble with this page?
Website Design and Management by Highpoint Web Design, LLC