Events

Mouse over any item on the left to display further information on the right

  • Friday, June 15, 2012

    • ISSA Monthly Luncheon: Defending Business Ecosystems
      Friday, June 15, 2012

      ISSA Monthly Luncheon: Defending Business Ecosystems

      11:30 AM - 1:30 PM

      Hale Koa Hotel

      RSVP Required!
      by 11-AM Wed., June 13, 2012
      Cost: $25 for ISSA members, $30 for non-members

      Presentation:  Organized attacks can effect both large businesses and the smaller businesses they serve. How service providers and their customers can collaborate in 360 degree security solutions.

      Speaker: Beau Monday, CISSP GSEC - Information Security Officeer - Hawaiian Telcom

      Topic: Recent breeches of personal financial information have been widely publicized as having not only caused the normal concerns and inconveniences to consumers, but real material cost to the banks that have guaranteed the fraudulent transactions to maintain customer confidence despite the limits of their responsibilities. Even the largest banks and insurance companies with the most sophisticated security measure are vulnerable if their merchants and subscribers are unaware of the risk of vulnerabilities to their databases, transaction systems and their responsibility for intensified security.

      Who's responsible for security in an end-to-end transaction: examples from the financial services and healthcare industries. Can a small business afford security? Or perhaps the better question is can they afford not to have it? Solutions available for even the smallest business can improve customer confidence.

      BIO:
      Hawaiian Telcom, Information Security Officer

      Hawaiian Telcom's Information Security Officer, Beau Monday is responsible for managing the company's Information Security program.
      Prior to joining Hawaiian Telcom, he spent time doing security work for Wells Fargo bank, T-Mobile USA and AT&T Wireless, among others, during an IT career that has spanned over 2 decades.

      Beau's industry certifications include the CISSP and SANS GSEC. He is also a contributing member of the Cloud Security Alliance, and was one of the first people in the
      world to attain their CCSK certification when it became available in 2010.
      Lunch Menu:
      Appetizer: Hale Koa Salad with Tarragon Dressing
      Main Course: Baked Mahi-Mahi Filet
      with Tomato Chive Beurre Blanc
      on Garlic Mashed Potatoes and Mushroom Zucchini Saute
      Dessert:  Strawberry Cream Cheesecake

  • Friday, July 20, 2012

    • ISSA Monthly Luncheon: State of Hawaii Strategic Plan
      Friday, July 20, 2012

      ISSA Monthly Luncheon: State of Hawaii Strategic Plan

      11:30 AM - 1:30 PM

      Hale Koa Hotel

      Presentation:  Sanjeev "Sonny" Bhagowalia will provide an overview and update on the State of Hawaii's progress in developing it Business and Information Technology/Information Resource Management Strategic Plan.

      Speaker: Sanjeev "Sonny" Bhagowalia

      Topic: In September 2011, the state released the first-ever comprehensive assessment of its IT assets, policies, and procedures in a baseline report, which provided the recommendations and findings for the basis of priorities, architecture and projects that will be included in the Strategic Plan. Bhagowalia will also focus on the importance of cyber security and the vigilance required at all levels to protect personally identifiable information (PII), confidential, and sensitive information.

      BIO: Sanjeev "Sonny" Bhagowalia is the State of Hawaii's first full-time Chief Information Officer. Since taking on the position in July 2011, he has overseen the publishing of the first comprehensive assessment of the state's information technology systems, applications, policies and procedures. He and his team are now developing the State of Hawaii Business Transformation and IT Strategic Plan, which is scheduled for publication in July 2012. The Strategic Plan will provide the roadmap for the State's information technology modernization initiative, a key component of Governor Abercrombie's New Day Plan.

      Lunch Menu:
      Appetizer: Hale Koa Salad with Tarragon Dressing
      Main Course: Grilled Skirt Steak with Shitake Mushroom Sauce Paired with Crab Cake, Served on Local Style Fried Udon Noodles and Sautéed Zucchini with Tomatoes
      Dessert:  Vanilla Ice Cream Taco with Fruit Salsa

  • Friday, August 17, 2012

    • ISSA Monthly Luncheon: Root Cause Analysis in a Complex Multi-Tiered Environment
      Friday, August 17, 2012

      ISSA Monthly Luncheon: Root Cause Analysis in a Complex Multi-Tiered Environment

      11:30 AM - 1:30 PM

      Hale Koa Hotel

      RSVP Required!
      by 11-AM Wed., Aug 15, 2012
      Cost: Lunch is Sponsored by Riverbed

      Presentation:
      Root Cause Analysis in a Complex Multi-Tiered Environment

      Speaker:
      Trish Gundy,  Riverbed's Cascade Systems Engineer

      Topic:
      This presentation and live demonstration will show a way to gain optimal application and network visibility in a multi-tiered environment. 

      ·  Performance analytics and how it helps to reduce MTTI (Mean Time To Innocence)
      ·   Illustrations of optimization and acceleration; improving end user experience
      ·   WireShark on Steroids; the visualization, monitoring, and reporting enhancement of Wireshark, the world's most popular network analyzer

      BIO:
      Trish has a background in computer networking and security, specializing in protocol analysis and performance management. Trish taught protocol analysis for Network General's Sniffer University for over a decade and previously worked with IBM, Network Associates, Crossbeam and TippingPoint.

      Lunch Menu:
      Appetizer: Hale Koa Salad with Tarragon Dressing
      Main Course: Chicken Breast Marinated and Sauteed in Red Wine Sauce
      with Mushrooms, Pearl Onions and AppleGlazed Baby Carrots
      On Rice Pilaf with Parmesan
      Dessert:  Vanilla Ice Cream Taco with Fruit Salsa

  • Friday, September 21, 2012

    • ISSA Monthly Luncheon: The Noble Purpose of IT
      Friday, September 21, 2012

      ISSA Monthly Luncheon: The Noble Purpose of IT

      11:30 AM - 1:30 PM

      Hale Koa Hotel

      RSVP Required!
      by 11-AM Wed., Sep 19, 2012
      Cost: $25 for ISSA members, $30 for non-members

      Presentation: The Noble Purpose of IT

      Speaker: Paola Saibene - Information Technology Officer for the Hawaii State Public Library System, an agency with 52 branches across the state, approximately one million patrons and 600 staff members.

      Topic: As a public service announcement, ISSA is always looking to help the community at large. In September's luncheon, we want to give HSPLS the opportunity to talk about their IT Academy, which started in October 2011. IT Academy is a free service, open to the public, to provide online access to various Microsoft training courses. This service is also available in multiple languages. We'll be discussing the WHY -- the motivation behind this project with Microsoft. We'll also discuss the following: WHO can access this, HOW do people sign up, WHAT courses are available, WHERE are the courses, and WHEN can we access them?

      BIO:
      17 years working in IT, holding additional Master's Degrees in Psychology and Literature, which have been a surprising benefit while navigating in the world of IT. Worked in the private and public sector, learning how to maximize the resources and abilities of both. Convinced that there is a 'Noble Purpose' for IT; deriving meaningful objectives from complex projects and implementations to a front line of workers more interested in benefits realization than in IT engineering.

      Lunch Menu:
      Appetizer: Hale Koa Salad with Tarragon Dressing
      Main Course: Roasted Chicken Breast with Tarragon Cream Sauce
      On Herbed Rice Pilaf and Seasonal Vegetables
      Dessert: Peanut Butter Pie

  • Wednesday, October 10, 2012

    • Hawaii's 19th Annual ISSA Discover Security Conference
      Wednesday, October 10, 2012

      Hawaii's 19th Annual ISSA Discover Security Conference

      All Day

      Hale Koa Hotel, Honolulu, Hawaii

      Fee allows attendance to both days of conference:
      ISSA Members $35
      Non-Members: $70

      No need to register for both days. Register for the conference under the event listing for 10/9/2012.

      DATE AND LOCATION:
      October 10-11, 2012
      Hale Koa Hotel
      Honolulu, Hawaii

      FEES:
      Cost of Event (2-days):
      ISSA Members - $35
      Non-Members - $70

      DEADLINES:
      Registrations must be received by (Oct 9th) to ensure a seat. Registrations received after that date will be accepted on a space available basis.

      CANCELLATIONS:
      Cancellations must be received by (Oct 9, 2012). "No-shows" will be charged the full amount ($35 for members; $70 for non-members) if cancellations are not received by Oct 9, 2012.

      REGISTRATION & ADDITIONAL INFORMATION:
      Please use the registration link on the ISSA web site Events Listing

      The DSC brochure will continue to be updated as Speakers and Topics are confirmed.

  • Friday, November 16, 2012

    • ISSA Monthly Luncheon: Honolulu as the Number 1 Digital City
      Friday, November 16, 2012

      ISSA Monthly Luncheon: Honolulu as the Number 1 Digital City

      11:30 AM - 1:30 PM

      Hale Koa Hotel

      RSVP Required!
      by 11-AM Wed., Nov 14, 2012
      Cost: No charge. Hosted by ACTT Hawaii

      Presentation:
      Honolulu as a the Number 1 Digital City

      Speaker: 
      Gordon J. Bruce
      CIO, City and County of Honolulu, HI

      Topic:
      Please join ISSA as Honolulu's IT Director and Chief Information Officer Gordon Bruce explains how our city progressed from being one of the worst technology cities to taking first place as a Digital City. Honolulu was recently recognized by the Center for Digital Government as the Number 1 Digital City in the Nation (Large City Category) in a survey that examines state government's best practices and policies for use of digital technologies to better serve their citizens and streamline operations.

      Bruce will also expand on where the City is heading, and provide insight into recent award-winning projects in "Open Government," "Transparency," "Big Data" and "Mobile Applications."

      BIO:
      Gordon Bruce, IT Director and CIO at City and County of Honolulu. He has been in his current role for seven years and has more than 40 years of experience in technology. He earned a Master's Degree in International Business from Hawaii Pacific University. He is a published author, and serves on numerous boards, including the State Broadband Task Force, State Office of Information Technology Management Advisory Board and FEMA Technology Transition Working Group.

      Lunch Menu:
      Appetizer: Hale Koa Salad with Tarragon Dressing
      Main Course: Broiled New York Steak
      On Roasted Garlic Mashed Potatoes with Cabernet Peppercorn Sauce, Frizzled Onions, Grilled Marinated Squash and Peppers
      Dessert:  Vanilla Ice Cream Taco with Fruit Salsa

  • Friday, January 18, 2013

    • ISSA Monthly Luncheon: Inside/out Threat Detection
      Friday, January 18, 2013

      ISSA Monthly Luncheon: Inside/out Threat Detection

      11:30 AM - 1:30 PM

      Hale Koa Hotel

      RSVP Required!
      by 11-AM Wed., January 16, 2013
      Cost: $25 for ISSA members - $30 for non-members

      Presentation:
      Inside/Out Threat Detection
      Speaker:
      Anthony K. Giandomenico
      Director of Soluions Marketing Referentia

      Topic:
      How many times have we heard the phrase "It's not a matter of if, but when an attack occurs." I would say quite often over the last few years and now that statement couldn't be more true. With advanced attack technology and lack of protection technology, increased software vulnerabilities, skilled resources from the bad guys and a more or less apathetic attitude by businesses toward the problem, its highly probable that the attacks will continue to be successful in organizations around the globe. Although we are losing the battle of preventing the attacks, with the right architecture, tools, intelligence and methodologies we should be able to more accurately and efficiently detect the attacks and mitigate them once they are in the network. In this talk I hope to shed some light on how to accomplish this through better visualization and control of your network utilizing your current technology and some open source tools. It's your network so own it!
      BIO:
      Anthony K. Giandomenico is Director of Solutions Marketing responsible for creating solutions for customers utilizing Referentia's cyber security technologies and services. Referentia services numerous customers including the Department of Defense, utility companies and diverse commercial businesses. Mr. Giandomenico's core focus is to ensure companies and government agencies are operating securely and optimally. His expertise covers protecting critical infrastructures such as financial institutions, hospitals, and all government agencies. Mr. Giandomenico's experience is expansive covering intrusion detection and firewall technologies, incident response procedures, security and penetration assessments and technology integration.
      Lunch Menu:
      Appetizer: Hale Koa Salad with Tarragon Dressing
      Main Course: Grilled Skirt Steak with Shitake Mushroom Sauce
      Paired with Crab Cake, Served on Local Style Fried Udon Noodles and
      Sautéed Zucchini with Tomatoes
      Dessert: Vanilla Ice Cream Taco with Fruit Salsa

  • Friday, February 15, 2013

    • ISSA Monthly Luncheon: Another Year In Web Security: What did 2012 teach us about surviving 2013?
      Friday, February 15, 2013

      ISSA Monthly Luncheon: Another Year In Web Security: What did 2012 teach us about surviving 2013?

      11:30 AM - 1:30 PM

      Hale Koa Hotel

      RSVP Required!
      by 11-AM Wed., February 13, 2013
      Cost: $25 for ISSA members - $30 for non-members

      Presentation:
      Another Year In Web Security: What did 2012 teach us about surviving 2013?

      Speaker:
      Jeremiah Grossman
      Founder and CTO, WhiteHat Security

      Topic:
      If history repeats itself, and the unexpected always happens, how incapable must Man be of learning from experience. This talk will provide an objective analysis of breaches and web security trends in 2012.

      Year after year we continue to witness some of the world's biggest brands in the headlines for security breaches, with what seems no end in sight. And it's not just the Fortune 500 in the cross-hairs; hacktivists, cyber-criminals, and nation-state sponsored attackers have no problem going after anyone and everyone they choose. Some days it's banks. Other days, retailers. Colleges, restaurant chains, technology companies, television networks, state governments, and so on have also been victimized.

      Here's the problem: While last year we saw the average number of serious vulnerabilities on websites dropped 66%, showing a glimmer that the open doors for hackers are being closed, the fact of the matter is even just one vulnerability is just as detrimental as 100. This understanding calls for a new way of thinking about defense. Effective defensive is NOT software security perfection, but a strategy that significantly raises the costs of our adversaries to compromise a system with each dollar we invest. In this session, Jeremiah Grossman, CTO and Founder of WhiteHat Security will discuss the key security breaches that's took place in 2012, the most important new lessons learned, and what it all means for the future of cyber security. Attendees will walk away with an idea of what 2012 research and events meant for security and what we can expect to see in 2013.

      Biography:
      Jeremiah Grossman, founder and CTO, WhiteHat Security, is a world-renowned Web security expert. A co-founder of the Web Application Security Consortium (WASC), he was named one of InfoWorld's Top 25 CTOs in 2007 and is often quoted in major publications such as SC Magazine, Forbes and USA Today.

      He has authored dozens of articles and whitepapers, is credited with the discovery of many cutting-edge attack and defensive techniques, and is a co-author of "XSS Attacks: Cross Site Scripting Exploits and Defense." Grossman is an influential blogger who offers insight and encourages open dialogue regarding research and vulnerability trends.

      Lunch Menu:
      Appetizer: Hale Koa Salad with Tarragon Dressing
      Main Course: Mixed Grill
      Korean Style Short Ribs, Grilled Apple-Chicken Sausage, and Herb Crusted Pork Loin, Served with Char Siu Fried Rice and Broiled Roma Tomatoes
      Dessert: Tiramisu

  • Friday, March 15, 2013

    • ISSA Monthly Luncheon: Behavior Analysis as a Cyber Security Predicative Model
      Friday, March 15, 2013

      ISSA Monthly Luncheon: Behavior Analysis as a Cyber Security Predicative Model

      11:30 AM - 1:30 PM

      Hale Koa Hotel

      RSVP Required!
      by 11-AM Wed., March 13, 2013
      Cost: $25 for ISSA members & students, $30 for non-members

      Presentation:
      Behavior analysis as a predicative modeling tool against malicious cyber events

      Speaker:
      Donovan Williams
      PhD Candidate, Capella University

      Topic:
      The leaders of our country and industry have no desire to know that thirty days ago their information enterprise was breached, drained, and compromised. The complexity and speed that advanced information technology has brought to us has additionally included a downside with advance persistent threats conducting innovative malicious cyber events to our networks. Thirty days, thirty minutes, even three minutes is not adequate enough warning time against the multiplicity of complex cyberattacks we are facing with our present post-facto reactive cyber defense systems. What we need is a new paradigm that is predictive in nature. This archetype is one that is in front of the attacker and understands the modus-operandi of the invader's malicious behavior before it starts. The result is to develop a predictive modeling tool to meet the attacker outside the firewall before the breach. Comparatively, if the foe is successful in a penetration of the network, for the first time, the defense has an awareness through this new proactive prototype of who, what, when, where, and why to aid in their defensive strategy.

      Biography:
      Donovan Williams is an aspiring PhD Candidate at Capella University where he is conducting cyber research on behavior analysis. He is currently developing his proposed dissertation topic "Behavior analysis as a predicative modeling tool against malicious cyber events" as he moves forward in his studies.

      In addition, Donovan is a 1982 graduate of the U.S. Naval Academy, received his Masters from the University of Auburn-Montgomery and is a certified Project Manager Professional (PMP). A retired Naval Aviator he has several thousand hours in the F-14 and combat time in Libyan and Iraqi conflicts. He currently resides in Aiea Hawaii and is in transition to a new firm as Vice President of Pacific Operations.

      Lunch Menu:
      Appetizer: Hale Koa Salad with Tarragon Dressing
      Main Course: Poached Atlantic Salmon
      with Green Peppercorn Ginger Sauce
      Seasonal Vegetables and Sliced Baked Potato with Parsley Butter
      Dessert: Vanilla Ice Cream Taco with Fruit Salsa

  • Friday, April 19, 2013

    • ISSA Monthly Luncheon: Financial Information Security Risk Management 2013: Vendor Due Diligence
      Friday, April 19, 2013

      ISSA Monthly Luncheon: Financial Information Security Risk Management 2013: Vendor Due Diligence

      11:30 AM - 1:30 PM

      Hale Koa Hotel

      RSVP Required!
      by 11-AM Wed., April 17, 2013
      Cost: $25 for ISSA members & students, $30 for non-members

      Presentation:
      Financial Information Security Risk Management 2013: Vendor Due Diligence

      Speaker:
      Kenneth Newman (CRISC, CISM, PMP, ITIL)
      Senior Vice President, Central Pacific Bank

      Topic:
      Companies, especially those in financial services severely impacted in recent years, continue to explore opportunities to reduce cost and increase revenues. For many, this includes a serious look at both outsourcing and offshoring, as part of major projects. While many institutions already have significant vendor relationships, this trend will increase the level of operational reliance placed on third parties. Often a clear understanding of security risk is not a significant enough discussion topic in these procurement proceedings. This presentation will focus on how to best communicate, engage, and handle risk management from an information security perspective when looking at new, critical vendor engagements.

      Biography:
      Kenneth Newman (CRISC, CISM, PMP, ITIL), Senior Vice President at Central Pacific Bank, has twenty years of progressive experience in technology, security, risk fraud & privacy and a proven year track record delivering solutions in financial services. In prior roles, he has been responsible for various security & risk functions at WaMu, Deutsche Bank, & Citigroup, as well as at other Hawaii financial institutions. He holds an MS in Information Systems and a BS from Columbia University.

      Mr. Newman has managed or served as an SME on many projects where he needed to balance risk and security with compliance requirements to meet business needs. He has coordinated global security software deployments, and conducted due diligence for large-scale projects, as well as outsourcing and M&As.

      Also a frequent trainer and speaker, Mr. Newman has presented at RSA Conference, MIS Training Institute IT Security World, American Banker Identity Theft and Fraud Symposium, Ziff Davis Security Summit, ComputerWorld Mobile and Wireless World, Technology Manager's Forum, Cyber Security in the Financial Services Sector Executive Summit, and Wireless Enterprise Summit, as well as for FBI, ISACA, Infragard, ISSA, PMI, AITP, ACFE, AFCEA, CoC, BBB, HAIP, and HAPA Hawaii and mainland events.

      Lunch Menu:
      Appetizer: Hale Koa Salad with Tarragon Dressing
      Main Course:
      Sautéed Shrimp and Chicken
      Poha Berry Port Wine Glaze Chicken Breast and Herb Marinated Shrimp with Garden Medley Whole Grain Rice Pilaf and Seasonal Vegetables
      Dessert: Refreshing Homemade Sorbets

  • Friday, May 17, 2013

    • ISSA Monthly Luncheon: Social Networking - Spies Among Us
      Friday, May 17, 2013

      ISSA Monthly Luncheon: Social Networking - Spies Among Us

      11:30 AM - 1:30 PM

      Hale Koa Hotel

      RSVP Required!
      by 11-AM Wed., May 15, 2013
      Cost: $25 for ISSA members & students, $30 for non-members

      Presentation:
      Social Networking -  How to Recruit Spies

      Speaker:
      Ira Winkler, CISSP
      President, ISSA International

      Topic:
      As Ira says, "If you tweet what you have for Lunch, you deserve to be robbed.  

      Besides talking about Social Networking Risks, he will also talk a bit about ISSA International.

      Biography:
      Ira Winkler is the Chief Security Strategist for Codenomicon and President of ISSA International. He is a leading security professional and consults to some of the top companies in the world to help them identify their security vulnerabilities and improve their security programs. In addition to being a columnist for ComputerWorld, he has authored several books including "Spies Among Us" and "Zen and the Art of Information Security."

      He began his career at the National Security Agency as an intelligence and computer systems analyst, and later supported U.S. and overseas government, military and intelligence agencies. He has served as president of the Internet Security Advisors Group, chief security strategist at HP Consulting, and director of technology of the National Computer Security Association. Additionally, he was part of the graduate and undergraduate faculties of the Johns Hopkins University and the University of Maryland.

      Lunch Menu:
      Appetizer: Hale Koa Salad with Tarragon Dressing
      Main Course:
      Chicken Marsala
      Boneless Chicken Breast with Mushroom, Shallot, Marsala Wine Sauce on a Bed of Asparagus Risotto
      Dessert: Tiramisu

  • Friday, June 21, 2013

    • ISSA Monthly Luncheon: Mobile Security and the Real World Risks
      Friday, June 21, 2013

      ISSA Monthly Luncheon: Mobile Security and the Real World Risks

      11:30 AM - 1:30 PM

      Hale Koa Hotel

      RSVP Required!
      by 11-AM Wed., June 19, 2013
      Cost: $25 for ISSA members & students, $30 for non-members.
      Cash or check only, payable on day of luncheon.

      Presentation:
      Mobile Security and the Real World Risks

      Speaker:
      Mitchell Wright
      Sr. Field Marketing Manager, Kaspersky Lab

      Topic:
      The explosion in mobile device usage within corporate networks has raised many security concerns ranging from spyware & malware to data exfiltration. With an increasing mobile workforce, smart phones, laptops and tablets are viable for malware authors. Malware is part of our daily life and is platform agnostic.

      Talking Points:
      * Mobile risks at every layer in the three major mobile OS/platforms: Android, iOS and BlackBerry
      * Key threats associated with your mobile and roaming workforce
      * Security measures to prevent corporate data leakage and malware infection on devices

      Biography:
      TBA

      Lunch Menu:
      Appetizer: Hale Koa Salad with Tarragon Dressing
      Main Course:
      Grilled Fresh Island Fish
      with Ginger Sake Buerre Blanc and Roasted Tomato Oil
      Served on Lobster Fried Rice and Stir Fried Asian Vegetables
      Dessert: Chocolate Mousse Cake

Copyright © 2003-24 ISSA Hawaii Chapter
PO Box 2297 ~ Honolulu, HI 96804
webmaster@issahawaii.org
Our privacy policy
Trouble with this page?
Website Design and Management by Highpoint Web Design, LLC