Events

Mouse over any item on the left to display further information on the right

  • Friday, March 15, 2013

    • ISSA Monthly Luncheon: Behavior Analysis as a Cyber Security Predicative Model
      Friday, March 15, 2013

      ISSA Monthly Luncheon: Behavior Analysis as a Cyber Security Predicative Model

      11:30 AM - 1:30 PM

      Hale Koa Hotel

      RSVP Required!
      by 11-AM Wed., March 13, 2013
      Cost: $25 for ISSA members & students, $30 for non-members

      Presentation:
      Behavior analysis as a predicative modeling tool against malicious cyber events

      Speaker:
      Donovan Williams
      PhD Candidate, Capella University

      Topic:
      The leaders of our country and industry have no desire to know that thirty days ago their information enterprise was breached, drained, and compromised. The complexity and speed that advanced information technology has brought to us has additionally included a downside with advance persistent threats conducting innovative malicious cyber events to our networks. Thirty days, thirty minutes, even three minutes is not adequate enough warning time against the multiplicity of complex cyberattacks we are facing with our present post-facto reactive cyber defense systems. What we need is a new paradigm that is predictive in nature. This archetype is one that is in front of the attacker and understands the modus-operandi of the invader's malicious behavior before it starts. The result is to develop a predictive modeling tool to meet the attacker outside the firewall before the breach. Comparatively, if the foe is successful in a penetration of the network, for the first time, the defense has an awareness through this new proactive prototype of who, what, when, where, and why to aid in their defensive strategy.

      Biography:
      Donovan Williams is an aspiring PhD Candidate at Capella University where he is conducting cyber research on behavior analysis. He is currently developing his proposed dissertation topic "Behavior analysis as a predicative modeling tool against malicious cyber events" as he moves forward in his studies.

      In addition, Donovan is a 1982 graduate of the U.S. Naval Academy, received his Masters from the University of Auburn-Montgomery and is a certified Project Manager Professional (PMP). A retired Naval Aviator he has several thousand hours in the F-14 and combat time in Libyan and Iraqi conflicts. He currently resides in Aiea Hawaii and is in transition to a new firm as Vice President of Pacific Operations.

      Lunch Menu:
      Appetizer: Hale Koa Salad with Tarragon Dressing
      Main Course: Poached Atlantic Salmon
      with Green Peppercorn Ginger Sauce
      Seasonal Vegetables and Sliced Baked Potato with Parsley Butter
      Dessert: Vanilla Ice Cream Taco with Fruit Salsa

  • Friday, April 19, 2013

    • ISSA Monthly Luncheon: Financial Information Security Risk Management 2013: Vendor Due Diligence
      Friday, April 19, 2013

      ISSA Monthly Luncheon: Financial Information Security Risk Management 2013: Vendor Due Diligence

      11:30 AM - 1:30 PM

      Hale Koa Hotel

      RSVP Required!
      by 11-AM Wed., April 17, 2013
      Cost: $25 for ISSA members & students, $30 for non-members

      Presentation:
      Financial Information Security Risk Management 2013: Vendor Due Diligence

      Speaker:
      Kenneth Newman (CRISC, CISM, PMP, ITIL)
      Senior Vice President, Central Pacific Bank

      Topic:
      Companies, especially those in financial services severely impacted in recent years, continue to explore opportunities to reduce cost and increase revenues. For many, this includes a serious look at both outsourcing and offshoring, as part of major projects. While many institutions already have significant vendor relationships, this trend will increase the level of operational reliance placed on third parties. Often a clear understanding of security risk is not a significant enough discussion topic in these procurement proceedings. This presentation will focus on how to best communicate, engage, and handle risk management from an information security perspective when looking at new, critical vendor engagements.

      Biography:
      Kenneth Newman (CRISC, CISM, PMP, ITIL), Senior Vice President at Central Pacific Bank, has twenty years of progressive experience in technology, security, risk fraud & privacy and a proven year track record delivering solutions in financial services. In prior roles, he has been responsible for various security & risk functions at WaMu, Deutsche Bank, & Citigroup, as well as at other Hawaii financial institutions. He holds an MS in Information Systems and a BS from Columbia University.

      Mr. Newman has managed or served as an SME on many projects where he needed to balance risk and security with compliance requirements to meet business needs. He has coordinated global security software deployments, and conducted due diligence for large-scale projects, as well as outsourcing and M&As.

      Also a frequent trainer and speaker, Mr. Newman has presented at RSA Conference, MIS Training Institute IT Security World, American Banker Identity Theft and Fraud Symposium, Ziff Davis Security Summit, ComputerWorld Mobile and Wireless World, Technology Manager's Forum, Cyber Security in the Financial Services Sector Executive Summit, and Wireless Enterprise Summit, as well as for FBI, ISACA, Infragard, ISSA, PMI, AITP, ACFE, AFCEA, CoC, BBB, HAIP, and HAPA Hawaii and mainland events.

      Lunch Menu:
      Appetizer: Hale Koa Salad with Tarragon Dressing
      Main Course:
      Sautéed Shrimp and Chicken
      Poha Berry Port Wine Glaze Chicken Breast and Herb Marinated Shrimp with Garden Medley Whole Grain Rice Pilaf and Seasonal Vegetables
      Dessert: Refreshing Homemade Sorbets

  • Friday, May 17, 2013

    • ISSA Monthly Luncheon: Social Networking - Spies Among Us
      Friday, May 17, 2013

      ISSA Monthly Luncheon: Social Networking - Spies Among Us

      11:30 AM - 1:30 PM

      Hale Koa Hotel

      RSVP Required!
      by 11-AM Wed., May 15, 2013
      Cost: $25 for ISSA members & students, $30 for non-members

      Presentation:
      Social Networking -  How to Recruit Spies

      Speaker:
      Ira Winkler, CISSP
      President, ISSA International

      Topic:
      As Ira says, "If you tweet what you have for Lunch, you deserve to be robbed.  

      Besides talking about Social Networking Risks, he will also talk a bit about ISSA International.

      Biography:
      Ira Winkler is the Chief Security Strategist for Codenomicon and President of ISSA International. He is a leading security professional and consults to some of the top companies in the world to help them identify their security vulnerabilities and improve their security programs. In addition to being a columnist for ComputerWorld, he has authored several books including "Spies Among Us" and "Zen and the Art of Information Security."

      He began his career at the National Security Agency as an intelligence and computer systems analyst, and later supported U.S. and overseas government, military and intelligence agencies. He has served as president of the Internet Security Advisors Group, chief security strategist at HP Consulting, and director of technology of the National Computer Security Association. Additionally, he was part of the graduate and undergraduate faculties of the Johns Hopkins University and the University of Maryland.

      Lunch Menu:
      Appetizer: Hale Koa Salad with Tarragon Dressing
      Main Course:
      Chicken Marsala
      Boneless Chicken Breast with Mushroom, Shallot, Marsala Wine Sauce on a Bed of Asparagus Risotto
      Dessert: Tiramisu

  • Friday, June 21, 2013

    • ISSA Monthly Luncheon: Mobile Security and the Real World Risks
      Friday, June 21, 2013

      ISSA Monthly Luncheon: Mobile Security and the Real World Risks

      11:30 AM - 1:30 PM

      Hale Koa Hotel

      RSVP Required!
      by 11-AM Wed., June 19, 2013
      Cost: $25 for ISSA members & students, $30 for non-members.
      Cash or check only, payable on day of luncheon.

      Presentation:
      Mobile Security and the Real World Risks

      Speaker:
      Mitchell Wright
      Sr. Field Marketing Manager, Kaspersky Lab

      Topic:
      The explosion in mobile device usage within corporate networks has raised many security concerns ranging from spyware & malware to data exfiltration. With an increasing mobile workforce, smart phones, laptops and tablets are viable for malware authors. Malware is part of our daily life and is platform agnostic.

      Talking Points:
      * Mobile risks at every layer in the three major mobile OS/platforms: Android, iOS and BlackBerry
      * Key threats associated with your mobile and roaming workforce
      * Security measures to prevent corporate data leakage and malware infection on devices

      Biography:
      TBA

      Lunch Menu:
      Appetizer: Hale Koa Salad with Tarragon Dressing
      Main Course:
      Grilled Fresh Island Fish
      with Ginger Sake Buerre Blanc and Roasted Tomato Oil
      Served on Lobster Fried Rice and Stir Fried Asian Vegetables
      Dessert: Chocolate Mousse Cake

  • Friday, July 19, 2013

    • ISSA Monthly Luncheon: The Fifth Domain of Warfare
      Friday, July 19, 2013

      ISSA Monthly Luncheon: The Fifth Domain of Warfare

      11:30 AM - 1:30 PM

      Hale Koa Hotel

      RSVP Required!
      by 11-AM Wed., July 17, 2013
      Cost: $25 for ISSA members & students, $30 for non-members.
      Cash or check only, payable on day of luncheon.

      Presentation:
      The Fifth Domain of Warfare

      Speaker:
      Jason Martin
      President and CEO, Secure DNA

      Topic:
      Traditional warfare has always focused on Land, Sea, Air, and Space; however, there is a fifth domain that is beginning to gain the attention of nation states and global corporations. This is the domain of Cyberspace. This talk will cover some of the emerging threats that are being tracked in this area and show how they impact corporations, individuals, and nation states. Actual attacks detected by Secure DNA against government and private sector interests will be analyzed and threat mitigation strategies discussed.

      Biography:
      Jason Martin is the President and CEO of Secure DNA, a company that provides innovative security products and solutions to companies throughout Asia-Pac and the US Mainland. Customers include Fortune 10, 100, and 500 companies, global government agencies, state and local governments, and private organizations of all sizes. Mr. Martin has over fifteen years of experience in Information Security and is the co-founder of the Shakacon Security Conference (Honolulu, HI). He is on the board of several companies and organizations including serving as the Chairman of the Board for Authy.com, board member for Infragard Hawaii, and he is on the conference board for NoSuchCon (Paris). He is a frequent speaker at security conferences and training events and is the co-author of the Syngress book "Information Security Risk Assessment Toolkit: Practical Assessments through Data Collection and Data Analysis - ISBN-10: 1597497355 ISBN-13: 978-1597497350".

      Lunch Menu:
      Appetizer: Hale Koa Salad with Tarragon Dressing
      Main Course: Slow Roasted Guava Honey Glazed Pork Loin
      with Wild Mushroom Bread Pudding
      and Herb Roasted Garden Vegetables
      Dessert: Refreshing Homemade Sorbets

  • Friday, August 16, 2013

    • ISSA Monthly Luncheon: Understanding the Risks Facing Your Most Critical Assets
      Friday, August 16, 2013

      ISSA Monthly Luncheon: Understanding the Risks Facing Your Most Critical Assets

      11:30 AM - 1:30 PM

      Hale Koa Hotel

      RSVP Required!
      by 11-AM Wed., August 14, 2013.
      Cost: $25 for ISSA members & students, $30 for non-members.
      Cash, check, or credit card, payable on day of luncheon.

      Presentation:
      Understanding the Risks Facing Your Most Critical Assets

      Speaker:
      Core Security

      Topic:
      Most organizations today are faced with an overwhelming amount of vulnerability and security data. Because of current resource and staffing models organizations are not able to efficiently identify the highest priority risks within that data which increases the likelihood of a breach or compromise. To address this problem an organization needs to focus on continuous correlation of vulnerabilities across multiple threat surfaces, identify key exposures, prioritize risk to critical assets, and drive the remediation process efficiency throughout the entirety of the IT organization.

      Please join Core Security as they discuss how to gain a more comprehensive understanding of the risks facing your most critical assets. During this discussion you will learn how Core Security will allow you to:

      * Improve security, optimize budgets and increase efficiency
      * Predict threats without disrupting operations
      * Reveal the operational and mission implications of security exposures
      * Eliminate scan data overload and gain actionable information
      * Identify attack paths to your most critical assets
      * Make the right security decisions to ensure mission continuity

      Biography:
      TBA

      Lunch Menu:
      Appetizer: Hale Koa Salad with Tarragon Dressing
      Main Course:
      Sauteed Herb Seasoned Chicken Breast
      Deglazed with Balsamic Vinegar and Finished with a Touch of Butter
      Served with Fresh Seasonal Vegetables and Roasted Garlic Mashed Potatoes
      Dessert: Vanilla Ice Cream Taco with Fruit Salsa

  • Friday, September 20, 2013

    • ISSA Monthly Luncheon: Business Models and Their Security/Privacy Implications
      Friday, September 20, 2013

      ISSA Monthly Luncheon: Business Models and Their Security/Privacy Implications

      11:30 AM - 1:30 PM

      Hale Koa Hotel

      RSVP Required!
      by 11-AM Wed., September 18, 2013
      Cost: $25 for ISSA members & students, $30 for non-members.
      Cash, check, or credit card, payable on day of luncheon.

      Presentation:
      Business Models and Their Security/Privacy Implications

      Speaker:
      Allen Zhang, CISSP/CIPP/MCSE/CCNA/CCSE
      Manager, Information Protection & Privacy, Hawaii Medical Service Association

      Topic:
      Many creditable businesses including some of the most household known brands have run into security and privacy issues in the last few years. They are comprised by hackers, challenged by consumers, battling with foreign governments, or found to have other skeletons in their closet. Some of them start to lose users and consumers' trust and security/privacy issues gradually become their bottleneck for future expansions. This presentation aims to explore how business model drives security/privacy policy & practices in these businesses, and provide some thoughts on how changes in these policies and practices may help to augment the business model and provide future growth paths.

      Biography:
      Allen Zhang is manager of the Information Protection and Privacy Department at HMSA where he has focused on building practical and sustainable operations to protect HMSA members' confidential information. He has 15 years of experiences in the security and privacy field. He is an active member in ISC2, IAPP, and ISSA.

      Lunch Menu:
      Appetizer: Hale Koa Salad with Tarragon Dressing
      Main Course:
      Roasted Chicken Breast with Tarragon Cream Sauce
      On Herbed Rice Pilaf and Seasonal Vegetables
      Dessert: Tiramisu

  • Wednesday, October 16, 2013

    • Hawaii's 20th Annual ISSA Discover Security Conference (2-Days)
      Wednesday, October 16, 2013

      Hawaii's 20th Annual ISSA Discover Security Conference (2-Days)

      All Day

      Hale Koa Hotel, Honolulu, Hawaii

      DATE AND LOCATION:
      October 16-17, 2013
      Hale Koa Hotel
      Honolulu, Hawaii

      COST (both days are included):
      ISSA Members/ISACA Members/College Students: $40
      Non-Members: $90

      DEADLINE:
      Registrations must be received by (Oct 14th) to ensure a seat. Registrations received after that date will be accepted on a space available basis.

      CANCELLATIONS:
      Cancellations must be received by (Oct 13, 2013). "No-shows" will be charged the full amount ($40 for members; $90 for non-members) if cancellations are not received by Oct 13, 2013.

      REGISTRATION & ADDITIONAL INFORMATION:
      Please use the registration link on the ISSA website Events listing.

      No need to register for both days. Register for the conference under the event listing for 10/16/2013.

      The Attendee Packet will continue to be updated as schedule, speakers, and topics are confirmed.

  • Thursday, October 17, 2013

    • Hawaii's 20th Annual ISSA Discover Security Conference
      Thursday, October 17, 2013

      Hawaii's 20th Annual ISSA Discover Security Conference

      All Day

      Hale Koa Hotel, Honolulu, Hawaii

      Fee allows attendance to both days of conference:
      ISSA Members $TBD
      Non-Members: $TBD

      No need to register for both days. Register for the conference under the event listing for 10/16/2013.

      DATE AND LOCATION:
      October 16-17, 2013
      Hale Koa Hotel
      Honolulu, Hawaii

      FEES:
      Cost of Event (2-days):
      ISSA Members - $TBD
      Non-Members - $TBD

      DEADLINES:
      Registrations must be received by (Oct 14th) to ensure a seat. Registrations received after that date will be accepted on a space available basis.

      CANCELLATIONS:
      Cancellations must be received by (Oct 13, 2013). "No-shows" will be charged the full amount ($TBD for members; $TBD for non-members) if cancellations are not received by Oct 13, 2013.

      REGISTRATION & ADDITIONAL INFORMATION:
      Please use the registration link on the ISSA web site Events Listing

      The DSC brochure will continue to be updated as Speakers and Topics are confirmed.

  • Friday, November 15, 2013

    • ISSA Monthly Luncheon: IT Compliance vs. IT Investigations, The Human Factors
      Friday, November 15, 2013

      ISSA Monthly Luncheon: IT Compliance vs. IT Investigations, The Human Factors

      11:30 AM - 1:30 PM

      Hale Koa Hotel

      RSVP Required!
      by 11-AM Wed., November 13, 2013
      Cost: $25 for ISSA members & students, $30 for non-members.
      Cash, check, or credit card, payable on day of luncheon.

      Presentation:
      IT Compliance vs. IT Investigations, The Human Factors

      Speaker:
      Jay C. Grant
      Director, Professional Services Division, AccessData

      Topic:
      Investigation and accountability are critical in cyber security incidents, not just from an attribution standpoint, but for the good of the collective knowledge, assisting all cyber security professionals in delivering the best approach to current trends.

      Biography:
      Jay C. Grant completed a 20 year Law Enforcement career where he worked varying assignments over the years to include SWAT, Narcotics, Patrol, Traffic (Motors), THI (Traffic Homicide Investigations), and Digital Forensic Investigations. During his career Jay served as an adjunct instructor for both law enforcement academies and college associate degree programs. Jay has served on several task forces local and federal to include Milwaukee HIDTA, Secret Service Electronic Crimes. Jay served as a law enforcement computer forensic investigator from 2005 to 2011 and has conducted digital investigations ranging from missing children to homicide. Jay received 13 meritorious service awards during his career to include a Digital Forensic investigation that lead to arrests in a 72 Million Dollar Marijuana grow house operation.

      Jay has also served in the U.S. Army reserves for 13 years with an Honorable Discharge. Jay has deployed in support of GWOT (Global War on Terror), UN/NATO Missions receiving NATO medals. During his most recent deployment he was assigned to JCSE (Joint Communications Support Element) http://www.jcse.mil/ which provides unique communications and IT support for US SOCOM. While assigned to JCSE, Jay also supported the DJC2 project https://djc2.org/ for deployable command and control centers. Jay has received 6 leadership/ meritorious awards, and holds a US government security clearance.

      Jay participated in the panel "Accounting for the Humans" at the International ISSA conference in Nashville, as well as a security panel at the CISO Forum in Nashville.  He brings a wealth of knowledge in investigations of humans interaction with technology to this presentation.

      Lunch Menu:
      Appetizer: Hale Koa Salad with Tarragon Dressing
      Main Course:
      Broiled New York Steak
      on Roasted Garlic Mashed Potatoes with Cabernet Peppercorn Sauce, Frizzled Onions, Grilled Marinated Squash and Peppers
      Dessert: Vanilla Ice Cream Taco with Fruit Salsa

  • Friday, January 17, 2014

    • ISSA Monthly Luncheon: The "Silver Bullet" that Missed! DoD Defense in Depth
      Friday, January 17, 2014

      ISSA Monthly Luncheon: The "Silver Bullet" that Missed! DoD Defense in Depth

      11:30 AM - 1:30 PM

      Hale Koa Hotel

      RSVP Required!
      by 11-AM Wed., January 15, 2014
      Cost: $25 for ISSA members & students, $30 for non-members.
      Cash, check, or credit card, payable on day of luncheon.

      Presentation:
      The "Silver Bullet" that Missed! DoD Defense in Depth

      Speaker:
      Rich Thompson, CISSP
      Information Assurance Manager
      U.S. Navy Pacific Region

      Topic:
      A security practitioner's view of one of the worlds largest intranets. Due to the time constraints, the discussion will be kept at a very high level. I will give a general review of the defenses in place across the 10 security domains and how they come together to protect the network. In 2010, I thought the DoD was on to something; we were seeing drastic declines in the number of Cyber Security events. We even stopped the pen testers from accomplishing any of their objectives during an exercise in 2010. Defense in Depth, the "silver bullet" was working. Now, four years later, there are obvious signs where the DoD approach needs some changes. I believe getting on with the most basic tenets of Cyber Security will bring about the greatest improvements. But can we get there from here?

      Lunch Menu:
      Appetizer: Hale Koa Salad with Tarragon Dressing
      Main Course:  Broiled New York Steak
      on Roasted Garlic Mashed Potatoes with Cabernet Peppercorn Sauce, Frizzled Onions, Grilled Marinated Squash and Peppers
      Dessert: Vanilla Ice Cream Taco with Fruit Salsa

  • Friday, February 21, 2014

    • ISSA Monthly Luncheon: National Security Awareness Briefings
      Friday, February 21, 2014

      ISSA Monthly Luncheon: National Security Awareness Briefings

      11:30 AM - 1:30 PM

      Hale Koa Hotel

      RSVP Required by 11-AM Wed., February 19, 2014
      Cost: $25 for ISSA members - $30 for non-members
      Cash, check, or credit card, payable on day of luncheon.

      Presentation:
      National Security Awareness Briefings

      Speaker:
      Eric S. Dean
      Special Agent
      Counterintelligence Strategic Partnerships Program
      FBI Honolulu

      Topic:
      Special Agent Dean provides counterintelligence / national security awareness briefings that include a review of recent counterintelligence and espionage investigations and a screening of the FBI video "Game of Pawns".

      Game of Pawns is an FBI produced dramatic account of the Glenn Duffie SHRIVER investigation. SHRIVER, an American college student studying overseas in China, was targeted, recruited, and paid by the PRC Intelligence Services (PRCIS) to penetrate the U.S. Intelligence Community (USIC) on behalf of the PRC government. The SHRIVER case study shown in Game of Pawns demonstrates the ongoing, organized effort by the PRCIS to infiltrate the U.S. Government in order to commit espionage. Importantly, the SHRIVER investigation reveals a relatively new technique employed by the PRCIS in targeting American students for applicant-seeding operations against the USIC. Current FBI investigations indicate the PRCIS continues to actively target American students overseas in China for USIC-focused applicant seeding operations. The SHRIVER case study represents one among many such operations.

      Biography:
      Special Agent Eric Dean is the community liaison between the FBI, business and educational sector. Special Agent Dean has been an FBI agent for 22 years, primarily focused on counterintelligence matters with the exception of some time spent in Pakistan during the 1990's working counterterrorism investigations. He served as Acting Assistant Special Agent in Charge of the FBI Honolulu National Security Branch for more than 2 years and served as Supervisory Special Agent for counterintelligence for 7 years. Prior to joining the FBI he was employed by IBM for six years.

      Lunch Menu:
      Appetizer: Hale Koa Salad with Tarragon Dressing
      Main Course: Mixed Grill
      Korean Style Short Ribs, Grilled Apple-Chicken Sausage, and Herb Crusted Pork Loin, Served with Char Siu Fried Rice and Broiled Roma Tomatoes
      Dessert: Tiramisu

Copyright © 2003-24 ISSA Hawaii Chapter
PO Box 2297 ~ Honolulu, HI 96804
webmaster@issahawaii.org
Our privacy policy
Trouble with this page?
Website Design and Management by Highpoint Web Design, LLC