Mouse over any item on the left to display further information on the right
ISSA Monthly Luncheon: Behavior Analysis as a Cyber Security Predicative Model
11:30 AM - 1:30 PM
Hale Koa Hotel
RSVP Required!
by 11-AM Wed., March 13, 2013
Cost: $25 for ISSA members & students, $30 for non-members
Presentation:
Behavior analysis as a predicative modeling tool against malicious cyber events
Speaker:
Donovan Williams
PhD Candidate, Capella University
Topic:
The leaders of our country and industry have no desire to know that thirty days ago their information enterprise was breached, drained, and compromised. The complexity and speed that advanced information technology has brought to us has additionally included a downside with advance persistent threats conducting innovative malicious cyber events to our networks. Thirty days, thirty minutes, even three minutes is not adequate enough warning time against the multiplicity of complex cyberattacks we are facing with our present post-facto reactive cyber defense systems. What we need is a new paradigm that is predictive in nature. This archetype is one that is in front of the attacker and understands the modus-operandi of the invader's malicious behavior before it starts. The result is to develop a predictive modeling tool to meet the attacker outside the firewall before the breach. Comparatively, if the foe is successful in a penetration of the network, for the first time, the defense has an awareness through this new proactive prototype of who, what, when, where, and why to aid in their defensive strategy.
Biography:
Donovan Williams is an aspiring PhD Candidate at Capella University where he is conducting cyber research on behavior analysis. He is currently developing his proposed dissertation topic "Behavior analysis as a predicative modeling tool against malicious cyber events" as he moves forward in his studies.
In addition, Donovan is a 1982 graduate of the U.S. Naval Academy, received his Masters from the University of Auburn-Montgomery and is a certified Project Manager Professional (PMP). A retired Naval Aviator he has several thousand hours in the F-14 and combat time in Libyan and Iraqi conflicts. He currently resides in Aiea Hawaii and is in transition to a new firm as Vice President of Pacific Operations.
Lunch Menu:
Appetizer: Hale Koa Salad with Tarragon Dressing
Main Course: Poached Atlantic Salmon
with Green Peppercorn Ginger Sauce
Seasonal Vegetables and Sliced Baked Potato with Parsley Butter
Dessert: Vanilla Ice Cream Taco with Fruit Salsa
11:30 AM - 1:30 PM
ISSA Monthly Luncheon: Financial Information Security Risk Management 2013: Vendor Due DiligenceISSA Monthly Luncheon: Financial Information Security Risk Management 2013: Vendor Due Diligence
11:30 AM - 1:30 PM
Hale Koa Hotel
RSVP Required!
by 11-AM Wed., April 17, 2013
Cost: $25 for ISSA members & students, $30 for non-members
Presentation:
Financial Information Security Risk Management 2013: Vendor Due Diligence
Speaker:
Kenneth Newman (CRISC, CISM, PMP, ITIL)
Senior Vice President, Central Pacific Bank
Topic:
Companies, especially those in financial services severely impacted in recent years, continue to explore opportunities to reduce cost and increase revenues. For many, this includes a serious look at both outsourcing and offshoring, as part of major projects. While many institutions already have significant vendor relationships, this trend will increase the level of operational reliance placed on third parties. Often a clear understanding of security risk is not a significant enough discussion topic in these procurement proceedings. This presentation will focus on how to best communicate, engage, and handle risk management from an information security perspective when looking at new, critical vendor engagements.
Biography:
Kenneth Newman (CRISC, CISM, PMP, ITIL), Senior Vice President at Central Pacific Bank, has twenty years of progressive experience in technology, security, risk fraud & privacy and a proven year track record delivering solutions in financial services. In prior roles, he has been responsible for various security & risk functions at WaMu, Deutsche Bank, & Citigroup, as well as at other Hawaii financial institutions. He holds an MS in Information Systems and a BS from Columbia University.
Mr. Newman has managed or served as an SME on many projects where he needed to balance risk and security with compliance requirements to meet business needs. He has coordinated global security software deployments, and conducted due diligence for large-scale projects, as well as outsourcing and M&As.
Also a frequent trainer and speaker, Mr. Newman has presented at RSA Conference, MIS Training Institute IT Security World, American Banker Identity Theft and Fraud Symposium, Ziff Davis Security Summit, ComputerWorld Mobile and Wireless World, Technology Manager's Forum, Cyber Security in the Financial Services Sector Executive Summit, and Wireless Enterprise Summit, as well as for FBI, ISACA, Infragard, ISSA, PMI, AITP, ACFE, AFCEA, CoC, BBB, HAIP, and HAPA Hawaii and mainland events.
Lunch Menu:
Appetizer: Hale Koa Salad with Tarragon Dressing
Main Course:
Sautéed Shrimp and Chicken
Poha Berry Port Wine Glaze Chicken Breast and Herb Marinated Shrimp with Garden Medley Whole Grain Rice Pilaf and Seasonal Vegetables
Dessert: Refreshing Homemade Sorbets
11:30 AM - 1:30 PM
ISSA Monthly Luncheon: Social Networking - Spies Among UsISSA Monthly Luncheon: Social Networking - Spies Among Us
11:30 AM - 1:30 PM
Hale Koa Hotel
RSVP Required!
by 11-AM Wed., May 15, 2013
Cost: $25 for ISSA members & students, $30 for non-members
Presentation:
Social Networking - How to Recruit Spies
Speaker:
Ira Winkler, CISSP
President, ISSA International
Topic:
As Ira says, "If you tweet what you have for Lunch, you deserve to be robbed.
Besides talking about Social Networking Risks, he will also talk a bit about ISSA International.
Biography:
Ira Winkler is the Chief Security Strategist for Codenomicon and President of ISSA International. He is a leading security professional and consults to some of the top companies in the world to help them identify their security vulnerabilities and improve their security programs. In addition to being a columnist for ComputerWorld, he has authored several books including "Spies Among Us" and "Zen and the Art of Information Security."
He began his career at the National Security Agency as an intelligence and computer systems analyst, and later supported U.S. and overseas government, military and intelligence agencies. He has served as president of the Internet Security Advisors Group, chief security strategist at HP Consulting, and director of technology of the National Computer Security Association. Additionally, he was part of the graduate and undergraduate faculties of the Johns Hopkins University and the University of Maryland.
Lunch Menu:
Appetizer: Hale Koa Salad with Tarragon Dressing
Main Course:
Chicken Marsala
Boneless Chicken Breast with Mushroom, Shallot, Marsala Wine Sauce on a Bed of Asparagus Risotto
Dessert: Tiramisu
11:30 AM - 1:30 PM
ISSA Monthly Luncheon: Mobile Security and the Real World RisksISSA Monthly Luncheon: Mobile Security and the Real World Risks
11:30 AM - 1:30 PM
Hale Koa Hotel
RSVP Required!
by 11-AM Wed., June 19, 2013
Cost: $25 for ISSA members & students, $30 for non-members.
Cash or check only, payable on day of luncheon.
Presentation:
Mobile Security and the Real World Risks
Speaker:
Mitchell Wright
Sr. Field Marketing Manager, Kaspersky Lab
Topic:
The explosion in mobile device usage within corporate networks has raised many security concerns ranging from spyware & malware to data exfiltration. With an increasing mobile workforce, smart phones, laptops and tablets are viable for malware authors. Malware is part of our daily life and is platform agnostic.
Talking Points:
* Mobile risks at every layer in the three major mobile OS/platforms: Android, iOS and BlackBerry
* Key threats associated with your mobile and roaming workforce
* Security measures to prevent corporate data leakage and malware infection on devices
Biography:
TBA
Lunch Menu:
Appetizer: Hale Koa Salad with Tarragon Dressing
Main Course:
Grilled Fresh Island Fish
with Ginger Sake Buerre Blanc and Roasted Tomato Oil
Served on Lobster Fried Rice and Stir Fried Asian Vegetables
Dessert: Chocolate Mousse Cake
11:30 AM - 1:30 PM
ISSA Monthly Luncheon: The Fifth Domain of WarfareISSA Monthly Luncheon: The Fifth Domain of Warfare
11:30 AM - 1:30 PM
Hale Koa Hotel
RSVP Required!
by 11-AM Wed., July 17, 2013
Cost: $25 for ISSA members & students, $30 for non-members.
Cash or check only, payable on day of luncheon.
Presentation:
The Fifth Domain of Warfare
Speaker:
Jason Martin
President and CEO, Secure DNA
Topic:
Traditional warfare has always focused on Land, Sea, Air, and Space; however, there is a fifth domain that is beginning to gain the attention of nation states and global corporations. This is the domain of Cyberspace. This talk will cover some of the emerging threats that are being tracked in this area and show how they impact corporations, individuals, and nation states. Actual attacks detected by Secure DNA against government and private sector interests will be analyzed and threat mitigation strategies discussed.
Biography:
Jason Martin is the President and CEO of Secure DNA, a company that provides innovative security products and solutions to companies throughout Asia-Pac and the US Mainland. Customers include Fortune 10, 100, and 500 companies, global government agencies, state and local governments, and private organizations of all sizes. Mr. Martin has over fifteen years of experience in Information Security and is the co-founder of the Shakacon Security Conference (Honolulu, HI). He is on the board of several companies and organizations including serving as the Chairman of the Board for Authy.com, board member for Infragard Hawaii, and he is on the conference board for NoSuchCon (Paris). He is a frequent speaker at security conferences and training events and is the co-author of the Syngress book "Information Security Risk Assessment Toolkit: Practical Assessments through Data Collection and Data Analysis - ISBN-10: 1597497355 ISBN-13: 978-1597497350".
Lunch Menu:
Appetizer: Hale Koa Salad with Tarragon Dressing
Main Course: Slow Roasted Guava Honey Glazed Pork Loin
with Wild Mushroom Bread Pudding
and Herb Roasted Garden Vegetables
Dessert: Refreshing Homemade Sorbets
ISSA Monthly Luncheon: Understanding the Risks Facing Your Most Critical Assets
11:30 AM - 1:30 PM
Hale Koa Hotel
RSVP Required!
by 11-AM Wed., August 14, 2013.
Cost: $25 for ISSA members & students, $30 for non-members.
Cash, check, or credit card, payable on day of luncheon.
Presentation:
Understanding the Risks Facing Your Most Critical Assets
Speaker:
Core Security
Topic:
Most organizations today are faced with an overwhelming amount of vulnerability and security data. Because of current resource and staffing models organizations are not able to efficiently identify the highest priority risks within that data which increases the likelihood of a breach or compromise. To address this problem an organization needs to focus on continuous correlation of vulnerabilities across multiple threat surfaces, identify key exposures, prioritize risk to critical assets, and drive the remediation process efficiency throughout the entirety of the IT organization.
Please join Core Security as they discuss how to gain a more comprehensive understanding of the risks facing your most critical assets. During this discussion you will learn how Core Security will allow you to:
* Improve security, optimize budgets and increase efficiency
* Predict threats without disrupting operations
* Reveal the operational and mission implications of security exposures
* Eliminate scan data overload and gain actionable information
* Identify attack paths to your most critical assets
* Make the right security decisions to ensure mission continuity
Biography:
TBA
Lunch Menu:
Appetizer: Hale Koa Salad with Tarragon Dressing
Main Course:
Sauteed Herb Seasoned Chicken Breast
Deglazed with Balsamic Vinegar and Finished with a Touch of Butter
Served with Fresh Seasonal Vegetables and Roasted Garlic Mashed Potatoes
Dessert: Vanilla Ice Cream Taco with Fruit Salsa
ISSA Monthly Luncheon: Business Models and Their Security/Privacy Implications
11:30 AM - 1:30 PM
Hale Koa Hotel
RSVP Required!
by 11-AM Wed., September 18, 2013
Cost: $25 for ISSA members & students, $30 for non-members.
Cash, check, or credit card, payable on day of luncheon.
Presentation:
Business Models and Their Security/Privacy Implications
Speaker:
Allen Zhang, CISSP/CIPP/MCSE/CCNA/CCSE
Manager, Information Protection & Privacy, Hawaii Medical Service Association
Topic:
Many creditable businesses including some of the most household known brands have run into security and privacy issues in the last few years. They are comprised by hackers, challenged by consumers, battling with foreign governments, or found to have other skeletons in their closet. Some of them start to lose users and consumers' trust and security/privacy issues gradually become their bottleneck for future expansions. This presentation aims to explore how business model drives security/privacy policy & practices in these businesses, and provide some thoughts on how changes in these policies and practices may help to augment the business model and provide future growth paths.
Biography:
Allen Zhang is manager of the Information Protection and Privacy Department at HMSA where he has focused on building practical and sustainable operations to protect HMSA members' confidential information. He has 15 years of experiences in the security and privacy field. He is an active member in ISC2, IAPP, and ISSA.
Lunch Menu:
Appetizer: Hale Koa Salad with Tarragon Dressing
Main Course:
Roasted Chicken Breast with Tarragon Cream Sauce
On Herbed Rice Pilaf and Seasonal Vegetables
Dessert: Tiramisu
Hawaii's 20th Annual ISSA Discover Security Conference (2-Days)
All Day
Hale Koa Hotel, Honolulu, Hawaii
DATE AND LOCATION:
October 16-17, 2013
Hale Koa Hotel
Honolulu, Hawaii
COST (both days are included):
ISSA Members/ISACA Members/College Students: $40
Non-Members: $90
DEADLINE:
Registrations must be received by (Oct 14th) to ensure a seat. Registrations received after that date will be accepted on a space available basis.
CANCELLATIONS:
Cancellations must be received by (Oct 13, 2013). "No-shows" will be charged the full amount ($40 for members; $90 for non-members) if cancellations are not received by Oct 13, 2013.
REGISTRATION & ADDITIONAL INFORMATION:
Please use the registration link on the ISSA website Events listing.
No need to register for both days. Register for the conference under the event listing for 10/16/2013.
The Attendee Packet will continue to be updated as schedule, speakers, and topics are confirmed.
Hawaii's 20th Annual ISSA Discover Security Conference
All Day
Hale Koa Hotel, Honolulu, Hawaii
Fee allows attendance to both days of conference:
ISSA Members $TBD
Non-Members: $TBD
No need to register for both days. Register for the conference under the event listing for 10/16/2013.
DATE AND LOCATION:
October 16-17, 2013
Hale Koa Hotel
Honolulu, Hawaii
FEES:
Cost of Event (2-days):
ISSA Members - $TBD
Non-Members - $TBD
DEADLINES:
Registrations must be received by (Oct 14th) to ensure a seat. Registrations received after that date will be accepted on a space available basis.
CANCELLATIONS:
Cancellations must be received by (Oct 13, 2013). "No-shows" will be charged the full amount ($TBD for members; $TBD for non-members) if cancellations are not received by Oct 13, 2013.
REGISTRATION & ADDITIONAL INFORMATION:
Please use the registration link on the ISSA web site Events Listing
The DSC brochure will continue to be updated as Speakers and Topics are confirmed.
ISSA Monthly Luncheon: IT Compliance vs. IT Investigations, The Human Factors
11:30 AM - 1:30 PM
Hale Koa Hotel
RSVP Required!
by 11-AM Wed., November 13, 2013
Cost: $25 for ISSA members & students, $30 for non-members.
Cash, check, or credit card, payable on day of luncheon.
Presentation:
IT Compliance vs. IT Investigations, The Human Factors
Speaker:
Jay C. Grant
Director, Professional Services Division, AccessData
Topic:
Investigation and accountability are critical in cyber security incidents, not just from an attribution standpoint, but for the good of the collective knowledge, assisting all cyber security professionals in delivering the best approach to current trends.
Biography:
Jay C. Grant completed a 20 year Law Enforcement career where he worked varying assignments over the years to include SWAT, Narcotics, Patrol, Traffic (Motors), THI (Traffic Homicide Investigations), and Digital Forensic Investigations. During his career Jay served as an adjunct instructor for both law enforcement academies and college associate degree programs. Jay has served on several task forces local and federal to include Milwaukee HIDTA, Secret Service Electronic Crimes. Jay served as a law enforcement computer forensic investigator from 2005 to 2011 and has conducted digital investigations ranging from missing children to homicide. Jay received 13 meritorious service awards during his career to include a Digital Forensic investigation that lead to arrests in a 72 Million Dollar Marijuana grow house operation.
Jay has also served in the U.S. Army reserves for 13 years with an Honorable Discharge. Jay has deployed in support of GWOT (Global War on Terror), UN/NATO Missions receiving NATO medals. During his most recent deployment he was assigned to JCSE (Joint Communications Support Element) http://www.jcse.mil/ which provides unique communications and IT support for US SOCOM. While assigned to JCSE, Jay also supported the DJC2 project https://djc2.org/ for deployable command and control centers. Jay has received 6 leadership/ meritorious awards, and holds a US government security clearance.
Jay participated in the panel "Accounting for the Humans" at the International ISSA conference in Nashville, as well as a security panel at the CISO Forum in Nashville. He brings a wealth of knowledge in investigations of humans interaction with technology to this presentation.
Lunch Menu:
Appetizer: Hale Koa Salad with Tarragon Dressing
Main Course:
Broiled New York Steak
on Roasted Garlic Mashed Potatoes with Cabernet Peppercorn Sauce, Frizzled Onions, Grilled Marinated Squash and Peppers
Dessert: Vanilla Ice Cream Taco with Fruit Salsa
ISSA Monthly Luncheon: The "Silver Bullet" that Missed! DoD Defense in Depth
11:30 AM - 1:30 PM
Hale Koa Hotel
RSVP Required!
by 11-AM Wed., January 15, 2014
Cost: $25 for ISSA members & students, $30 for non-members.
Cash, check, or credit card, payable on day of luncheon.
Presentation:
The "Silver Bullet" that Missed! DoD Defense in Depth
Speaker:
Rich Thompson, CISSP
Information Assurance Manager
U.S. Navy Pacific Region
Topic:
A security practitioner's view of one of the worlds largest intranets. Due to the time constraints, the discussion will be kept at a very high level. I will give a general review of the defenses in place across the 10 security domains and how they come together to protect the network. In 2010, I thought the DoD was on to something; we were seeing drastic declines in the number of Cyber Security events. We even stopped the pen testers from accomplishing any of their objectives during an exercise in 2010. Defense in Depth, the "silver bullet" was working. Now, four years later, there are obvious signs where the DoD approach needs some changes. I believe getting on with the most basic tenets of Cyber Security will bring about the greatest improvements. But can we get there from here?
Lunch Menu:
Appetizer: Hale Koa Salad with Tarragon Dressing
Main Course: Broiled New York Steak
on Roasted Garlic Mashed Potatoes with Cabernet Peppercorn Sauce, Frizzled Onions, Grilled Marinated Squash and Peppers
Dessert: Vanilla Ice Cream Taco with Fruit Salsa
11:30 AM - 1:30 PM
ISSA Monthly Luncheon: National Security Awareness BriefingsISSA Monthly Luncheon: National Security Awareness Briefings
11:30 AM - 1:30 PM
Hale Koa Hotel
RSVP Required by 11-AM Wed., February 19, 2014
Cost: $25 for ISSA members - $30 for non-members
Cash, check, or credit card, payable on day of luncheon.
Presentation:
National Security Awareness Briefings
Speaker:
Eric S. Dean
Special Agent
Counterintelligence Strategic Partnerships Program
FBI Honolulu
Topic:
Special Agent Dean provides counterintelligence / national security awareness briefings that include a review of recent counterintelligence and espionage investigations and a screening of the FBI video "Game of Pawns".
Game of Pawns is an FBI produced dramatic account of the Glenn Duffie SHRIVER investigation. SHRIVER, an American college student studying overseas in China, was targeted, recruited, and paid by the PRC Intelligence Services (PRCIS) to penetrate the U.S. Intelligence Community (USIC) on behalf of the PRC government. The SHRIVER case study shown in Game of Pawns demonstrates the ongoing, organized effort by the PRCIS to infiltrate the U.S. Government in order to commit espionage. Importantly, the SHRIVER investigation reveals a relatively new technique employed by the PRCIS in targeting American students for applicant-seeding operations against the USIC. Current FBI investigations indicate the PRCIS continues to actively target American students overseas in China for USIC-focused applicant seeding operations. The SHRIVER case study represents one among many such operations.
Biography:
Special Agent Eric Dean is the community liaison between the FBI, business and educational sector. Special Agent Dean has been an FBI agent for 22 years, primarily focused on counterintelligence matters with the exception of some time spent in Pakistan during the 1990's working counterterrorism investigations. He served as Acting Assistant Special Agent in Charge of the FBI Honolulu National Security Branch for more than 2 years and served as Supervisory Special Agent for counterintelligence for 7 years. Prior to joining the FBI he was employed by IBM for six years.
Lunch Menu:
Appetizer: Hale Koa Salad with Tarragon Dressing
Main Course: Mixed Grill
Korean Style Short Ribs, Grilled Apple-Chicken Sausage, and Herb Crusted Pork Loin, Served with Char Siu Fried Rice and Broiled Roma Tomatoes
Dessert: Tiramisu