Mouse over any item on the left to display further information on the right
11:30 AM - 1:30 PM
ISSA Monthly Luncheon: Storage Security and Performance based on NetApp ExperiencesISSA Monthly Luncheon: Storage Security and Performance based on NetApp Experiences
11:30 AM - 1:30 PM
Hale Koa Hotel
RSVP Required! by 11-AM Wed., Jan. 13, 2010
Cost: $25 for ISSA members, $30 for non-members
Description..
Topic: Storage Security and Performance based on NetApp Experiences
With all the Data Center consolidation and virtualization going on, centralized storage and SANs are becoming more and more important. But, with all this "networked storage," comes capabilities for security compromises and performance degradation. Based on experiences with Network Appliance Storage, this talk will focus on what some of the security issues are as well what can be done to protect against them. Some experiences with Performance will also be discussed.
BIO
Speaker: Jock Purnell, JPNetworks
Jock has over 20 years of experience in the IT industry, most spent with IBM. He now has his own company, and focuses on Networking, Security, and Virtualization. SANs and Storage have become a natural outgrowth of thes focus areas.
Lunch Menu:
Appetizer: Hale Koa Salad with Tarragon Dressing
Main Course: Not known at this point
Dessert: Not known at this point
11:30 AM - 1:30 PM
ISSA Monthly Luncheon: Topic: Pro's, Con's and Experiences in using Managed Security Providers. An Open DiscussionISSA Monthly Luncheon: Topic: Pro's, Con's and Experiences in using Managed Security Providers. An Open Discussion
11:30 AM - 1:30 PM
Hale Koa Hotel
RSVP Required! by 11-AM Wed., Feb. 17, 2010
Cost: $25 for ISSA members, $30 for non-members
Description..
Topic: Pro's, Con's and Experiences in using Managed Security Providers. An Open Discussion
Many enterprises still wrestle with whether to outsource the management of their security infrastructure. Which way is really less expensive, and which way enables you to best protgect the enterprise and pass any required audits. Various Board Members will provide short insights into the Pro's and Con's, and we'd like to stimulate discussion based on your experiences.
Lunch Menu:
Appetizer: Hale Koa Salad with Tarragon Dressing
Main Course: Not known at this point
Dessert: Not known at this point
11:30 AM - 1:30 PM
ISSA Monthly Luncheon: Topic: Pro's, Con's and Experiences in using Managed Security Providers. An Open DiscussionISSA Monthly Luncheon: Topic: Pro's, Con's and Experiences in using Managed Security Providers. An Open Discussion
11:30 AM - 1:30 PM
Hale Koa Hotel
RSVP Required! by 11-AM Wed., Feb. 17, 2010
Cost: $25 for ISSA members, $30 for non-members
Description..
Topic: Pro's, Con's and Experiences in using Managed Security Providers. An Open Discussion
This month's meeting will be an open discussion about the merits of using Manages Security Providers. Many enterprises still wrestle with whether to outsource the management of their security infrastructure. Which way is really less expensive, and which way enables you to best protect the enterprise and pass any required audits. Various Board Members will provide short insights into the Pro's and Con's, and we'd like to stimulate discussion based on your experiences.
Lunch Menu:
Appetizer: Hale Koa Salad with Tarragon Dressing
Main Course: Not known at this point
Dessert: Not known at this point
ISSA Monthly Luncheon FREE!: IBM's CIO Study on Security and Risk Management
11:30 AM - 1:30 PM
Hale Koa Hotel
RSVP Required! by 11-AM Wed., March 17, 2010
Cost: Free to all attendees, courtesy of IBM!
Description..
Topic: IBM's CIO Study on Security and Risk Management
During 2009, IBM interviewed over 2,500 CIO's globally on various topics. One of these was Security and Risk Management. This presentation will reveal some of the results including what it takes to be a "High Performer."
BIO
Speaker: TBA, IBM
Lunch Menu:
Appetizer: Hale Koa Salad with Tarragon Dressing
Main Course: Not known at this point
Dessert: Not known at this point
11:30 AM - 1:30 PM
ISSA Monthly Luncheon: Ensuring Web Application Security, Performance and AvailabilityISSA Monthly Luncheon: Ensuring Web Application Security, Performance and Availability
11:30 AM - 1:30 PM
Hale Koa Hotel
RSVP Required! by 11-AM Wed., Apr. 14, 2010
Cost: $25 for ISSA members, $30 for non-members
Description..
Topic: Ensuring Web Application Security, Performance and Availabilitty with Application Firewalls/Load Balancers
Web Based Applications have become more and more critical to organizations who generate revenue, provide B2B access to internal resources, or provide a customer interface for general information regarding products or services. In doing so these Applications are developed and deployed in shorter cycles and require additional testing still to find that there are security holes which must be dealt with on an on going basis.
Compliancy requirements such as PCI and HIPPA are driving factors for customers to protect these Applications from unwanted abuse and information theft while still maintaining access for users and reducing the time for delivery of updates and functionality.
Companies like F5 Networks can provide a level of Availability, Performance, AND Security for Applications, and allow better control on developing and deploying critical Applications to their customers today by combining Application Firewalling and Load Balancing in concert.
BIO
Speaker: Steve Momchilovich, Account Executive F5 Nertworks
Steve has been involved in the Networking and Netrwork Security Industry for over 15 years, as an Account Executive/Territory Manager for various companies such as Fore Systems and Teros.
Lunch Menu:
Appetizer: Hale Koa Salad with Tarragon Dressing
Main Course: Roasted Pork Loin
Dessert: Dutch Apple Pie
ISSA Monthly Luncheon: to Backup Your Systems and Data Without Breaking the Bank
11:30 AM - 1:30 PM
Hale Koa Hotel
RSVP Required! by 11-AM Wed., May 19, 2010
Cost: $25 for ISSA members, $30 for non-members
Description..
Topic: to Backup Your Systems and Data Without Breaking the Bank
At this event you'll learn how to get the same cost advantages in backup that you are getting from virtualization, how to make sure you can quickly recover your system and not just your data, and how to take advantage of cloud-based disaster recovery. Presentation will be done from the perspective of UniTrends' BackUp Appliance.
BIO
Stan Elesky, Unitrends, NorthWest Regional Sales Manager
Lunch Menu:
Appetizer: Hale Koa Salad with Tarragon Dressing
Main Course: Mixed Grill
Dessert: Red Velvet Cake
11:30 AM - 1:30 PM
ISSA Monthly Luncheon: Desktop Virtualization and InfrastructureISSA Monthly Luncheon: Desktop Virtualization and Infrastructure
11:30 AM - 1:30 PM
Hale Koa Hotel
RSVP Required! by 11-AM Wed., June 16, 2010
Cost: $25 for ISSA members, $30 for non-members
Description..
Topic : Desktop Virtualization and Infrastructure
Everyone's heard about Server Virtualization, but Desktop Virtualization is becoming much more in vogue now also. Virtualizing Desktops can bring data center-level control, security and efficiency to the desktop environment. Gary will discuss some of the approaches for virtualizing the desktop.
BIO
Gary Stanford, Hewlett Packard
Lunch Menu:
Appetizer: Hale Koa Salad with Tarragon Dressing
Main Course: Cornish Game Hen
Dessert: Tiramisu
11:30 AM - 1:30 PM
ISSA Monthly Luncheon: Juniper's SRX Security Gateways from the Branch to the Data CenterISSA Monthly Luncheon: Juniper's SRX Security Gateways from the Branch to the Data Center
11:30 AM - 1:30 PM
Hale Koa Hotel
RSVP Required! by 11-AM Wed., July 14, 2010
Cost: $25 for ISSA members, $30 for non-members
Description..
Topic: Juniper's SRX Security Gateways from the Branch to the Data Center
Juniper Networks provides an example of how you can secure the enterprise from the Branch to the Data Center. The SRX Series Services Gateways provide the essential capabilities to connect, secure, and manage enterprise and service provider networks, from the smallest sites to the largest headquarters and data centers. By consolidating switching, routing, and security services in a single device, organizations can economically deliver new applications and services, secure connectivity, and quality end-user experiences. This presentation will discuss network architectures for securing the entire Enterprise, including data centers, headquarters, and branch offices.
Speaker: Scott Sneddon, Network Architect - Strategic Alliances, Juniper Networks
BIO
Scott Sneddon, Network Architect - Strategic Alliances, Juniper Networks
Lunch Menu:
Appetizer: Hale Koa Salad with Tarragon Dressing
Main Course: NY Steak
Dessert: Key Lime Pie
11:30 AM - 1:30 PM
ISSA Monthly Luncheon: RFID applications and security concernsISSA Monthly Luncheon: RFID applications and security concerns
11:30 AM - 1:30 PM
Hale Koa Hotel
RSVP Required! by 11-AM Wed., August 18, 2010
Cost: $25 for ISSA members, $30 for non-members
Description..
Topic: RFID applications and security concerns
Radio Frequency Identification systems are being used increasingly in a wide range of applications from payment systems to asset management systems, inventory systems to identification systems. RFID systems encompass a wide range of radio frequencies, transponder technologies, and support infrastructure. The variety of implementations lends itself to a diverse set of applications. RFID technology also introduce new security and privacy issues. Various types of RFID systems will be discussed, examining both the opportunities and the security challenges associated with each.
Speaker: Duane Takamine, CCSI, VCP, VP/CTO Secure Technology Hawaii
BIO
Mr Takamine is the Chief Technology Officer and VP of Secure Technology Hawaii (STHI), Hawaii's Security and Disaster Recovery Experts.
In his role, Duane is responsible to set the technical direction for STHI, to guide the Assessment, Forensics & Consulting team, and to oversee the development STHI's line of advanced security products and services. Duane is in his 18th year at STHI and he is one of the most experienced security/DR engineers in the industry. Duane is responsible for the design, implementation, and overseeing support of many of the network security and disaster recovery solutions at most of Hawaii's top 250 corporations. Duane has a BSEE degree from the University of Hawaii at Manoa and he also holds advanced technical certifications for many products from industry leaders such as VMWare, Checkpoint, IBM, RSA, Microsoft, and many others.
Secure Technology Hawaii has been providing assessments, solutions, consulting, forensics, training, security monitoring, hosting, and managed services to solve corporate security and disaster recovery to address real world security problems in the Islands since 1994. As the Premier local representatives for VMWare, Checkpoint, IBM, RSA Security, Websense, Proofpoint, Motorola, AirTight and many others, STHI combines best of breed products with comprehensive technical services and 365x24x7 support to give local customers assurance that their critical information is well protected and available.
Lunch Menu:
Appetizer: Hale Koa Salad with Tarragon Dressing
Main Course: Chicken Marsala
Dessert: Peanut Butter Pie
ISSA Monthly Luncheon: Backup and Recovery Technologies Put In Plain Words
11:30 AM - 1:30 PM
Hale Koa Hotel
RSVP Required! by 11-AM Wed., September 15, 2010
Cost: $25 for ISSA members, $30 for non-members
Description..
Topic: Backup and Recovery Technologies Put In Plain Words
Computer security has many elements that provide protection to specific areas of our system environments. Unfortunately, one area although seemingly straightforward, Data Protection, can be complex with the different methodologies and/or terminologies used throughout industry.
Mr. Musson will provide an in-depth look at the existing problems with Backup and Recovery, and delve into the different technologies that the industry is using to solve these problems.
Mr. Musson will answer many questions in this vendor neutral presentation to include:
Did you ever wonder how a hardware and software solution differ in implementation and performance?
What does RTO and RPO mean to you and your environment?
What is the difference between File, Block and Bit level deduplication?
How variable length deduplication and fixed length deduplication works?
How does E-mail and File System archiving affect your RTO?
How can we reduce our Backup windows?
Attend this informative presentation and come away with a better understanding of the technologies and terminologies used by today's data protection vendors.
Speaker: William Musson, CISSP
Current President ISSA Hawaii Chapter
Symantec Corporation
BIO
Mr. Musson is a Senior Sales Engineer for Symantec Corporation with over 24 years of Information Security experience and is currently covers the Pacific Rim from Alaska to Bahrain. In his current role, Bill designs and architects solutions to IT problems for the Department of Defense, State of Hawaii and County Government organizations and Hawaii Businesses.
He is a Certified Information System Security Professional (CISSP), and holds a B.S. in Computer Science from Hawaii Pacific University.
Mr. Musson received his CISSP certification in 2000. As a firm believer in the certification, Bill developed study material for CISSP to use during study groups. This material has evolved and is used by Mr. Musson to teach the CISSP Prep training class. Students from all facets of Hawaii organizations from financial, governmental, commercial and military have taken his course on their way to becoming CISSP certified. Symantec has flown Bill to different Symantec Corporate locations to present CISSP Prep with hundreds of Symantec employees to become certified.
Lunch Menu:
Appetizer: Hale Koa Salad with Tarragon Dressing
Main Course: Salmon and friends
Dessert: Vanilla Ice Cream Taco (what?)
Hawaii's 17th Annual ISSA Discover Security Conference
All Day
Hale Koa Hotel, Honolulu, Hawaii
Fee allows attendance to both days of conference:
ISSA Members $35.00
Non-Members: $70.00
No need to register for both days.Your single registration is good for both days.
Avatars in an IT World.
Most of the major security related vendors will be participating, and focusing on IT Security issues in the Virtual and Cloud environments of the current IT landscapes.
DATE AND LOCATION:
October 13-14, 2010
Hale Koa Hotel
Honolulu, Hawaii
FEES:
Cost of Event (2-days):
ISSA Members - $35.00
Non-Members - $70.00
DEADLINES:
Registrations must be received by October 6, 2010 to ensure a seat. Registrations received after that date will be accepted on a space available basis.
CANCELLATIONS:
Cancellations must be received by October 7, 2010. "No-shows" will be charged the full amount ($35 for members; $70 for non-members) if cancellations are not received by October 7, 2010.
REGISTRATION & ADDITIONAL INFORMATION:
Please use the registration link on the ISSA web site Events Listing
The DSC brochure will continue to be updated as Speakers and Topics are confirmed.
11:30 AM - 1:30 PM
ISSA Monthly Luncheon: Holiday Lunch Get TogetherISSA Monthly Luncheon: Holiday Lunch Get Together
11:30 AM - 1:30 PM
Hale Koa Hotel
RSVP Required! by 11:00 AM Wed., November 17, 2010
Cost: Free for ISSA members, $25 for non-members
Description..
Topic: Holiday Lunch!
Our November Lunch will be a Holiday Lunch, with ISSA Members invited to attend for free. Non-Members are also invited for a non-Member fee of $25. There's no planned speaker, but the agenda will include:
- Thank everyone for your support of our DSC Conference and Lunches
- Welcome the 2011-2012 Board of Directors
- Discuss potential topics for next year with input requested
Lunch Menu:
Appetizer: Hale Koa Salad with Tarragon Dressing
Main Course: Chicken Breast in Tarragon Cream Sauce
Dessert: Banana Souffle (what is that?)