Events

Mouse over any item on the left to display further information on the right

  • Friday, November 16, 2012

    • ISSA Monthly Luncheon: Honolulu as the Number 1 Digital City
      Friday, November 16, 2012

      ISSA Monthly Luncheon: Honolulu as the Number 1 Digital City

      11:30 AM - 1:30 PM

      Hale Koa Hotel

      RSVP Required!
      by 11-AM Wed., Nov 14, 2012
      Cost: No charge. Hosted by ACTT Hawaii

      Presentation:
      Honolulu as a the Number 1 Digital City

      Speaker: 
      Gordon J. Bruce
      CIO, City and County of Honolulu, HI

      Topic:
      Please join ISSA as Honolulu's IT Director and Chief Information Officer Gordon Bruce explains how our city progressed from being one of the worst technology cities to taking first place as a Digital City. Honolulu was recently recognized by the Center for Digital Government as the Number 1 Digital City in the Nation (Large City Category) in a survey that examines state government's best practices and policies for use of digital technologies to better serve their citizens and streamline operations.

      Bruce will also expand on where the City is heading, and provide insight into recent award-winning projects in "Open Government," "Transparency," "Big Data" and "Mobile Applications."

      BIO:
      Gordon Bruce, IT Director and CIO at City and County of Honolulu. He has been in his current role for seven years and has more than 40 years of experience in technology. He earned a Master's Degree in International Business from Hawaii Pacific University. He is a published author, and serves on numerous boards, including the State Broadband Task Force, State Office of Information Technology Management Advisory Board and FEMA Technology Transition Working Group.

      Lunch Menu:
      Appetizer: Hale Koa Salad with Tarragon Dressing
      Main Course: Broiled New York Steak
      On Roasted Garlic Mashed Potatoes with Cabernet Peppercorn Sauce, Frizzled Onions, Grilled Marinated Squash and Peppers
      Dessert:  Vanilla Ice Cream Taco with Fruit Salsa

  • Friday, January 18, 2013

    • ISSA Monthly Luncheon: Inside/out Threat Detection
      Friday, January 18, 2013

      ISSA Monthly Luncheon: Inside/out Threat Detection

      11:30 AM - 1:30 PM

      Hale Koa Hotel

      RSVP Required!
      by 11-AM Wed., January 16, 2013
      Cost: $25 for ISSA members - $30 for non-members

      Presentation:
      Inside/Out Threat Detection
      Speaker:
      Anthony K. Giandomenico
      Director of Soluions Marketing Referentia

      Topic:
      How many times have we heard the phrase "It's not a matter of if, but when an attack occurs." I would say quite often over the last few years and now that statement couldn't be more true. With advanced attack technology and lack of protection technology, increased software vulnerabilities, skilled resources from the bad guys and a more or less apathetic attitude by businesses toward the problem, its highly probable that the attacks will continue to be successful in organizations around the globe. Although we are losing the battle of preventing the attacks, with the right architecture, tools, intelligence and methodologies we should be able to more accurately and efficiently detect the attacks and mitigate them once they are in the network. In this talk I hope to shed some light on how to accomplish this through better visualization and control of your network utilizing your current technology and some open source tools. It's your network so own it!
      BIO:
      Anthony K. Giandomenico is Director of Solutions Marketing responsible for creating solutions for customers utilizing Referentia's cyber security technologies and services. Referentia services numerous customers including the Department of Defense, utility companies and diverse commercial businesses. Mr. Giandomenico's core focus is to ensure companies and government agencies are operating securely and optimally. His expertise covers protecting critical infrastructures such as financial institutions, hospitals, and all government agencies. Mr. Giandomenico's experience is expansive covering intrusion detection and firewall technologies, incident response procedures, security and penetration assessments and technology integration.
      Lunch Menu:
      Appetizer: Hale Koa Salad with Tarragon Dressing
      Main Course: Grilled Skirt Steak with Shitake Mushroom Sauce
      Paired with Crab Cake, Served on Local Style Fried Udon Noodles and
      Sautéed Zucchini with Tomatoes
      Dessert: Vanilla Ice Cream Taco with Fruit Salsa

  • Friday, February 15, 2013

    • ISSA Monthly Luncheon: Another Year In Web Security: What did 2012 teach us about surviving 2013?
      Friday, February 15, 2013

      ISSA Monthly Luncheon: Another Year In Web Security: What did 2012 teach us about surviving 2013?

      11:30 AM - 1:30 PM

      Hale Koa Hotel

      RSVP Required!
      by 11-AM Wed., February 13, 2013
      Cost: $25 for ISSA members - $30 for non-members

      Presentation:
      Another Year In Web Security: What did 2012 teach us about surviving 2013?

      Speaker:
      Jeremiah Grossman
      Founder and CTO, WhiteHat Security

      Topic:
      If history repeats itself, and the unexpected always happens, how incapable must Man be of learning from experience. This talk will provide an objective analysis of breaches and web security trends in 2012.

      Year after year we continue to witness some of the world's biggest brands in the headlines for security breaches, with what seems no end in sight. And it's not just the Fortune 500 in the cross-hairs; hacktivists, cyber-criminals, and nation-state sponsored attackers have no problem going after anyone and everyone they choose. Some days it's banks. Other days, retailers. Colleges, restaurant chains, technology companies, television networks, state governments, and so on have also been victimized.

      Here's the problem: While last year we saw the average number of serious vulnerabilities on websites dropped 66%, showing a glimmer that the open doors for hackers are being closed, the fact of the matter is even just one vulnerability is just as detrimental as 100. This understanding calls for a new way of thinking about defense. Effective defensive is NOT software security perfection, but a strategy that significantly raises the costs of our adversaries to compromise a system with each dollar we invest. In this session, Jeremiah Grossman, CTO and Founder of WhiteHat Security will discuss the key security breaches that's took place in 2012, the most important new lessons learned, and what it all means for the future of cyber security. Attendees will walk away with an idea of what 2012 research and events meant for security and what we can expect to see in 2013.

      Biography:
      Jeremiah Grossman, founder and CTO, WhiteHat Security, is a world-renowned Web security expert. A co-founder of the Web Application Security Consortium (WASC), he was named one of InfoWorld's Top 25 CTOs in 2007 and is often quoted in major publications such as SC Magazine, Forbes and USA Today.

      He has authored dozens of articles and whitepapers, is credited with the discovery of many cutting-edge attack and defensive techniques, and is a co-author of "XSS Attacks: Cross Site Scripting Exploits and Defense." Grossman is an influential blogger who offers insight and encourages open dialogue regarding research and vulnerability trends.

      Lunch Menu:
      Appetizer: Hale Koa Salad with Tarragon Dressing
      Main Course: Mixed Grill
      Korean Style Short Ribs, Grilled Apple-Chicken Sausage, and Herb Crusted Pork Loin, Served with Char Siu Fried Rice and Broiled Roma Tomatoes
      Dessert: Tiramisu

  • Friday, March 15, 2013

    • ISSA Monthly Luncheon: Behavior Analysis as a Cyber Security Predicative Model
      Friday, March 15, 2013

      ISSA Monthly Luncheon: Behavior Analysis as a Cyber Security Predicative Model

      11:30 AM - 1:30 PM

      Hale Koa Hotel

      RSVP Required!
      by 11-AM Wed., March 13, 2013
      Cost: $25 for ISSA members & students, $30 for non-members

      Presentation:
      Behavior analysis as a predicative modeling tool against malicious cyber events

      Speaker:
      Donovan Williams
      PhD Candidate, Capella University

      Topic:
      The leaders of our country and industry have no desire to know that thirty days ago their information enterprise was breached, drained, and compromised. The complexity and speed that advanced information technology has brought to us has additionally included a downside with advance persistent threats conducting innovative malicious cyber events to our networks. Thirty days, thirty minutes, even three minutes is not adequate enough warning time against the multiplicity of complex cyberattacks we are facing with our present post-facto reactive cyber defense systems. What we need is a new paradigm that is predictive in nature. This archetype is one that is in front of the attacker and understands the modus-operandi of the invader's malicious behavior before it starts. The result is to develop a predictive modeling tool to meet the attacker outside the firewall before the breach. Comparatively, if the foe is successful in a penetration of the network, for the first time, the defense has an awareness through this new proactive prototype of who, what, when, where, and why to aid in their defensive strategy.

      Biography:
      Donovan Williams is an aspiring PhD Candidate at Capella University where he is conducting cyber research on behavior analysis. He is currently developing his proposed dissertation topic "Behavior analysis as a predicative modeling tool against malicious cyber events" as he moves forward in his studies.

      In addition, Donovan is a 1982 graduate of the U.S. Naval Academy, received his Masters from the University of Auburn-Montgomery and is a certified Project Manager Professional (PMP). A retired Naval Aviator he has several thousand hours in the F-14 and combat time in Libyan and Iraqi conflicts. He currently resides in Aiea Hawaii and is in transition to a new firm as Vice President of Pacific Operations.

      Lunch Menu:
      Appetizer: Hale Koa Salad with Tarragon Dressing
      Main Course: Poached Atlantic Salmon
      with Green Peppercorn Ginger Sauce
      Seasonal Vegetables and Sliced Baked Potato with Parsley Butter
      Dessert: Vanilla Ice Cream Taco with Fruit Salsa

  • Friday, April 19, 2013

    • ISSA Monthly Luncheon: Financial Information Security Risk Management 2013: Vendor Due Diligence
      Friday, April 19, 2013

      ISSA Monthly Luncheon: Financial Information Security Risk Management 2013: Vendor Due Diligence

      11:30 AM - 1:30 PM

      Hale Koa Hotel

      RSVP Required!
      by 11-AM Wed., April 17, 2013
      Cost: $25 for ISSA members & students, $30 for non-members

      Presentation:
      Financial Information Security Risk Management 2013: Vendor Due Diligence

      Speaker:
      Kenneth Newman (CRISC, CISM, PMP, ITIL)
      Senior Vice President, Central Pacific Bank

      Topic:
      Companies, especially those in financial services severely impacted in recent years, continue to explore opportunities to reduce cost and increase revenues. For many, this includes a serious look at both outsourcing and offshoring, as part of major projects. While many institutions already have significant vendor relationships, this trend will increase the level of operational reliance placed on third parties. Often a clear understanding of security risk is not a significant enough discussion topic in these procurement proceedings. This presentation will focus on how to best communicate, engage, and handle risk management from an information security perspective when looking at new, critical vendor engagements.

      Biography:
      Kenneth Newman (CRISC, CISM, PMP, ITIL), Senior Vice President at Central Pacific Bank, has twenty years of progressive experience in technology, security, risk fraud & privacy and a proven year track record delivering solutions in financial services. In prior roles, he has been responsible for various security & risk functions at WaMu, Deutsche Bank, & Citigroup, as well as at other Hawaii financial institutions. He holds an MS in Information Systems and a BS from Columbia University.

      Mr. Newman has managed or served as an SME on many projects where he needed to balance risk and security with compliance requirements to meet business needs. He has coordinated global security software deployments, and conducted due diligence for large-scale projects, as well as outsourcing and M&As.

      Also a frequent trainer and speaker, Mr. Newman has presented at RSA Conference, MIS Training Institute IT Security World, American Banker Identity Theft and Fraud Symposium, Ziff Davis Security Summit, ComputerWorld Mobile and Wireless World, Technology Manager's Forum, Cyber Security in the Financial Services Sector Executive Summit, and Wireless Enterprise Summit, as well as for FBI, ISACA, Infragard, ISSA, PMI, AITP, ACFE, AFCEA, CoC, BBB, HAIP, and HAPA Hawaii and mainland events.

      Lunch Menu:
      Appetizer: Hale Koa Salad with Tarragon Dressing
      Main Course:
      Sautéed Shrimp and Chicken
      Poha Berry Port Wine Glaze Chicken Breast and Herb Marinated Shrimp with Garden Medley Whole Grain Rice Pilaf and Seasonal Vegetables
      Dessert: Refreshing Homemade Sorbets

  • Friday, May 17, 2013

    • ISSA Monthly Luncheon: Social Networking - Spies Among Us
      Friday, May 17, 2013

      ISSA Monthly Luncheon: Social Networking - Spies Among Us

      11:30 AM - 1:30 PM

      Hale Koa Hotel

      RSVP Required!
      by 11-AM Wed., May 15, 2013
      Cost: $25 for ISSA members & students, $30 for non-members

      Presentation:
      Social Networking -  How to Recruit Spies

      Speaker:
      Ira Winkler, CISSP
      President, ISSA International

      Topic:
      As Ira says, "If you tweet what you have for Lunch, you deserve to be robbed.  

      Besides talking about Social Networking Risks, he will also talk a bit about ISSA International.

      Biography:
      Ira Winkler is the Chief Security Strategist for Codenomicon and President of ISSA International. He is a leading security professional and consults to some of the top companies in the world to help them identify their security vulnerabilities and improve their security programs. In addition to being a columnist for ComputerWorld, he has authored several books including "Spies Among Us" and "Zen and the Art of Information Security."

      He began his career at the National Security Agency as an intelligence and computer systems analyst, and later supported U.S. and overseas government, military and intelligence agencies. He has served as president of the Internet Security Advisors Group, chief security strategist at HP Consulting, and director of technology of the National Computer Security Association. Additionally, he was part of the graduate and undergraduate faculties of the Johns Hopkins University and the University of Maryland.

      Lunch Menu:
      Appetizer: Hale Koa Salad with Tarragon Dressing
      Main Course:
      Chicken Marsala
      Boneless Chicken Breast with Mushroom, Shallot, Marsala Wine Sauce on a Bed of Asparagus Risotto
      Dessert: Tiramisu

  • Friday, June 21, 2013

    • ISSA Monthly Luncheon: Mobile Security and the Real World Risks
      Friday, June 21, 2013

      ISSA Monthly Luncheon: Mobile Security and the Real World Risks

      11:30 AM - 1:30 PM

      Hale Koa Hotel

      RSVP Required!
      by 11-AM Wed., June 19, 2013
      Cost: $25 for ISSA members & students, $30 for non-members.
      Cash or check only, payable on day of luncheon.

      Presentation:
      Mobile Security and the Real World Risks

      Speaker:
      Mitchell Wright
      Sr. Field Marketing Manager, Kaspersky Lab

      Topic:
      The explosion in mobile device usage within corporate networks has raised many security concerns ranging from spyware & malware to data exfiltration. With an increasing mobile workforce, smart phones, laptops and tablets are viable for malware authors. Malware is part of our daily life and is platform agnostic.

      Talking Points:
      * Mobile risks at every layer in the three major mobile OS/platforms: Android, iOS and BlackBerry
      * Key threats associated with your mobile and roaming workforce
      * Security measures to prevent corporate data leakage and malware infection on devices

      Biography:
      TBA

      Lunch Menu:
      Appetizer: Hale Koa Salad with Tarragon Dressing
      Main Course:
      Grilled Fresh Island Fish
      with Ginger Sake Buerre Blanc and Roasted Tomato Oil
      Served on Lobster Fried Rice and Stir Fried Asian Vegetables
      Dessert: Chocolate Mousse Cake

  • Friday, July 19, 2013

    • ISSA Monthly Luncheon: The Fifth Domain of Warfare
      Friday, July 19, 2013

      ISSA Monthly Luncheon: The Fifth Domain of Warfare

      11:30 AM - 1:30 PM

      Hale Koa Hotel

      RSVP Required!
      by 11-AM Wed., July 17, 2013
      Cost: $25 for ISSA members & students, $30 for non-members.
      Cash or check only, payable on day of luncheon.

      Presentation:
      The Fifth Domain of Warfare

      Speaker:
      Jason Martin
      President and CEO, Secure DNA

      Topic:
      Traditional warfare has always focused on Land, Sea, Air, and Space; however, there is a fifth domain that is beginning to gain the attention of nation states and global corporations. This is the domain of Cyberspace. This talk will cover some of the emerging threats that are being tracked in this area and show how they impact corporations, individuals, and nation states. Actual attacks detected by Secure DNA against government and private sector interests will be analyzed and threat mitigation strategies discussed.

      Biography:
      Jason Martin is the President and CEO of Secure DNA, a company that provides innovative security products and solutions to companies throughout Asia-Pac and the US Mainland. Customers include Fortune 10, 100, and 500 companies, global government agencies, state and local governments, and private organizations of all sizes. Mr. Martin has over fifteen years of experience in Information Security and is the co-founder of the Shakacon Security Conference (Honolulu, HI). He is on the board of several companies and organizations including serving as the Chairman of the Board for Authy.com, board member for Infragard Hawaii, and he is on the conference board for NoSuchCon (Paris). He is a frequent speaker at security conferences and training events and is the co-author of the Syngress book "Information Security Risk Assessment Toolkit: Practical Assessments through Data Collection and Data Analysis - ISBN-10: 1597497355 ISBN-13: 978-1597497350".

      Lunch Menu:
      Appetizer: Hale Koa Salad with Tarragon Dressing
      Main Course: Slow Roasted Guava Honey Glazed Pork Loin
      with Wild Mushroom Bread Pudding
      and Herb Roasted Garden Vegetables
      Dessert: Refreshing Homemade Sorbets

  • Friday, August 16, 2013

    • ISSA Monthly Luncheon: Understanding the Risks Facing Your Most Critical Assets
      Friday, August 16, 2013

      ISSA Monthly Luncheon: Understanding the Risks Facing Your Most Critical Assets

      11:30 AM - 1:30 PM

      Hale Koa Hotel

      RSVP Required!
      by 11-AM Wed., August 14, 2013.
      Cost: $25 for ISSA members & students, $30 for non-members.
      Cash, check, or credit card, payable on day of luncheon.

      Presentation:
      Understanding the Risks Facing Your Most Critical Assets

      Speaker:
      Core Security

      Topic:
      Most organizations today are faced with an overwhelming amount of vulnerability and security data. Because of current resource and staffing models organizations are not able to efficiently identify the highest priority risks within that data which increases the likelihood of a breach or compromise. To address this problem an organization needs to focus on continuous correlation of vulnerabilities across multiple threat surfaces, identify key exposures, prioritize risk to critical assets, and drive the remediation process efficiency throughout the entirety of the IT organization.

      Please join Core Security as they discuss how to gain a more comprehensive understanding of the risks facing your most critical assets. During this discussion you will learn how Core Security will allow you to:

      * Improve security, optimize budgets and increase efficiency
      * Predict threats without disrupting operations
      * Reveal the operational and mission implications of security exposures
      * Eliminate scan data overload and gain actionable information
      * Identify attack paths to your most critical assets
      * Make the right security decisions to ensure mission continuity

      Biography:
      TBA

      Lunch Menu:
      Appetizer: Hale Koa Salad with Tarragon Dressing
      Main Course:
      Sauteed Herb Seasoned Chicken Breast
      Deglazed with Balsamic Vinegar and Finished with a Touch of Butter
      Served with Fresh Seasonal Vegetables and Roasted Garlic Mashed Potatoes
      Dessert: Vanilla Ice Cream Taco with Fruit Salsa

  • Friday, September 20, 2013

    • ISSA Monthly Luncheon: Business Models and Their Security/Privacy Implications
      Friday, September 20, 2013

      ISSA Monthly Luncheon: Business Models and Their Security/Privacy Implications

      11:30 AM - 1:30 PM

      Hale Koa Hotel

      RSVP Required!
      by 11-AM Wed., September 18, 2013
      Cost: $25 for ISSA members & students, $30 for non-members.
      Cash, check, or credit card, payable on day of luncheon.

      Presentation:
      Business Models and Their Security/Privacy Implications

      Speaker:
      Allen Zhang, CISSP/CIPP/MCSE/CCNA/CCSE
      Manager, Information Protection & Privacy, Hawaii Medical Service Association

      Topic:
      Many creditable businesses including some of the most household known brands have run into security and privacy issues in the last few years. They are comprised by hackers, challenged by consumers, battling with foreign governments, or found to have other skeletons in their closet. Some of them start to lose users and consumers' trust and security/privacy issues gradually become their bottleneck for future expansions. This presentation aims to explore how business model drives security/privacy policy & practices in these businesses, and provide some thoughts on how changes in these policies and practices may help to augment the business model and provide future growth paths.

      Biography:
      Allen Zhang is manager of the Information Protection and Privacy Department at HMSA where he has focused on building practical and sustainable operations to protect HMSA members' confidential information. He has 15 years of experiences in the security and privacy field. He is an active member in ISC2, IAPP, and ISSA.

      Lunch Menu:
      Appetizer: Hale Koa Salad with Tarragon Dressing
      Main Course:
      Roasted Chicken Breast with Tarragon Cream Sauce
      On Herbed Rice Pilaf and Seasonal Vegetables
      Dessert: Tiramisu

  • Wednesday, October 16, 2013

    • Hawaii's 20th Annual ISSA Discover Security Conference (2-Days)
      Wednesday, October 16, 2013

      Hawaii's 20th Annual ISSA Discover Security Conference (2-Days)

      All Day

      Hale Koa Hotel, Honolulu, Hawaii

      DATE AND LOCATION:
      October 16-17, 2013
      Hale Koa Hotel
      Honolulu, Hawaii

      COST (both days are included):
      ISSA Members/ISACA Members/College Students: $40
      Non-Members: $90

      DEADLINE:
      Registrations must be received by (Oct 14th) to ensure a seat. Registrations received after that date will be accepted on a space available basis.

      CANCELLATIONS:
      Cancellations must be received by (Oct 13, 2013). "No-shows" will be charged the full amount ($40 for members; $90 for non-members) if cancellations are not received by Oct 13, 2013.

      REGISTRATION & ADDITIONAL INFORMATION:
      Please use the registration link on the ISSA website Events listing.

      No need to register for both days. Register for the conference under the event listing for 10/16/2013.

      The Attendee Packet will continue to be updated as schedule, speakers, and topics are confirmed.

  • Thursday, October 17, 2013

    • Hawaii's 20th Annual ISSA Discover Security Conference
      Thursday, October 17, 2013

      Hawaii's 20th Annual ISSA Discover Security Conference

      All Day

      Hale Koa Hotel, Honolulu, Hawaii

      Fee allows attendance to both days of conference:
      ISSA Members $TBD
      Non-Members: $TBD

      No need to register for both days. Register for the conference under the event listing for 10/16/2013.

      DATE AND LOCATION:
      October 16-17, 2013
      Hale Koa Hotel
      Honolulu, Hawaii

      FEES:
      Cost of Event (2-days):
      ISSA Members - $TBD
      Non-Members - $TBD

      DEADLINES:
      Registrations must be received by (Oct 14th) to ensure a seat. Registrations received after that date will be accepted on a space available basis.

      CANCELLATIONS:
      Cancellations must be received by (Oct 13, 2013). "No-shows" will be charged the full amount ($TBD for members; $TBD for non-members) if cancellations are not received by Oct 13, 2013.

      REGISTRATION & ADDITIONAL INFORMATION:
      Please use the registration link on the ISSA web site Events Listing

      The DSC brochure will continue to be updated as Speakers and Topics are confirmed.

Copyright © 2003-24 ISSA Hawaii Chapter
PO Box 2297 ~ Honolulu, HI 96804
webmaster@issahawaii.org
Our privacy policy
Trouble with this page?
Website Design and Management by Highpoint Web Design, LLC