Events

Mouse over any item on the left to display further information on the right

  • Friday, August 19, 2016

    • ISSA Monthly Luncheon Hosted By Optiv: Building a Third Party Risk Program FREE
      Friday, August 19, 2016

      ISSA Monthly Luncheon Hosted By Optiv: Building a Third Party Risk Program FREE

      11:30 AM - 1:30 PM

      Hale Koa Hotel

      RSVP requested

      Cost: $0 Members/
      $0 Non-members


      Presentation: Building a Third Party Risk Program


      Speaker: James Christiansen, Vice President, Information Risk Management, Optiv


      Topic: The sheer volume and cost of onsite security risk assessments of third parties is daunting. With the board and regulators pushing for results, how can you extend your security practices to your third parties? This session details how to establish a third party IT risk management program using firsthand experience. The speaker will discuss what works, what doesn't, and how to change the paradigm.


      Bio: James Christiansen is a seasoned business leader with deep technical expertise and is recognized as a global thought leader. As the vice president of information risk management and member of the Office of the CISO at Optiv, Christiansen helps chief experience officers (CXOs) make executive decisions based on the balance of risk and cost. He is responsible for developing and delivering a comprehensive suite of strategic services and solutions to help CXO executives change their security strategies through innovation. Prior to his tenure at Optiv, Christiansen was chief information risk officer for Evantix and chief security officer for Experian Americas. He joined Experian after serving as chief information security officer for General Motors where his responsibilities included worldwide implementation of security plans for the largest financial (GMAC) and the largest manufacturing corporation in the world. Christiansen previously served as senior vice president and division head of information security for Visa International, where he was responsible for the company's worldwide information security program. Christiansen also conducted security strategy work with numerous health care organizations and served as the CISO and chief privacy officer of San Diego Health Connect. He co-authored and co-chaired the ANSI study on the financial impacts of breaches on health care, and co-founded the PHI Protection Network. Christiansen is a sought after expert speaker in the industry. He has served as featured speaker and moderator at the PPN Forum for the past three years, and has spoken at prestigious events such as the Business Round Table, Research Board, American Bar Association, American Banker, the RSA Conference, BankInfoSecurity, ISSA and MIS Training Institute. He has been featured in The New York Times and in the past year quoted in USA Today, The Wall Street Journal, Bloomberg and Healthcare.IT and appeared on the Dark Reading radio show. Christiansen is a patent inventor and has received three innovation awards in cyber security, GRC and cloud computing. He is the author of the "Internet Survival Series" and contributing author of "CISO Essentials" as well as numerous industry papers. Christiansen earned his master's degree in business administration in international management and his bachelor's degree in business management from Westminster College.


      Lunch Menu:
      Appetizer: Hale Koa Salad with Tarragon Dressing
      Main Course: Sauteed Herb Seasoned Chicken, Deglazed with Balsamic Vinegar and Finished with Butter, Fresh Seasonal Vegetables and Roasted Garlic Mashed Potatoes
      Dessert: Vanilla Ice Cream Taco with Fruit Salsa
       

  • Friday, September 16, 2016

    • ISSA Monthly Luncheon: ISECOM's Hacker High School Program
      Friday, September 16, 2016

      ISSA Monthly Luncheon: ISECOM's Hacker High School Program

      11:30 AM - 1:30 PM

      Hale Koa Hotel

      RSVP requested

      Cost: $25 Members/$30 Non-members


      Presentation: ISECOM's Hacker High School Program


      Speaker: Bob Monroe, Institute for Security and Open Methodologies Hawaii


      Topic: ISECOM's Hacker High School program is designed to teach high school students how to be cyber security professionals in a very innovative way. We all know we need more Security Professionals in the future and ISECOM's program is designed to provide High Schoolers with a much more in-depth program than normal. We teach open source and not commercial tools. We teach the command prompt instead of some fancy GUI interface. We expect students to make mistakes and learn from those errors. We also expect our participants to adhere to local and international laws regarding the digital realm. Criminal behavior is not acceptable nor tolerated at Hacker High School.

      There is no law written where hacking is a crime. The media will tell you otherwise but we at the Institute for Security and Open Methodology know for a fact that hacking is not illegal. Computer crime is illegal. Unauthorized access is criminal behavior. Stealing data and credentials is breaking the law. Taking things that do not belong to you is wrong but hacking itself is not a crime. The sole purpose of Hacker High School is to teach high school students how to be cyber security professionals.

      There is no law written where hacking is a crime. The media will tell you otherwise but we at the Institute for Security and Open Methodology know for a fact that hacking is not illegal. Computer crime is illegal. Unauthorized access is criminal behavior. Stealing data and credentials is breaking the law. Taking things that do not belong to you is wrong but hacking itself is not a crime. The sole purpose of Hacker High School is to teach high school students how to be cyber security professionals.


      Bio: Bob Monroe grew up in Southern California before he joined the U.S. Army in 1985. One of Bob's first military assignments introduced him to the world of hacking. His prankster ways ended abruptly in 1996 when he was almost caught hacking by an eighty-two year old librarian. This incident led to a renewed interest in cyber security, as a good guy. Since then, he has written several articles for publication and maintains a passion for digital security. Bob holds a Master of Science in Information Assurance from Norwich University. Bob's specialty is public teaching and security awareness training. Along with work for the U.S. Army, he has provided security classes for the Veterans Administration, Military District of Washington, Commandant of the Marine Corp and staff, as well as countless others across the world. He holds a U.S. Patent for airport security automation technology that combines radar and thermal imaging to protect aircraft movement areas and the surrounding airspace. Bob works with ISECOM as an editor and writer. He also works as an editor/writer and English interpreter for Hackin9 and Eforensic Magazines. Both publications are produced in Europe with an international clientele. In his spare time, Bob makes children's toys in his small woodshop. He still has all eight fingers, too.


      Lunch Menu:
      Appetizer: Hale Koa Salad with Tarragon Dressing
      Main Course: Smoked Soy Marinated Chicken on Fettuccine Pasta, Fresh Julienne Vegetables and Mirin Cream Sauce
      Dessert: Classic Creme Brulee

  • Wednesday, October 12, 2016

    • Hawaii's 23rd Annual ISSA Discover Security Conference (2-Days)
      Wednesday, October 12, 2016

      Hawaii's 23rd Annual ISSA Discover Security Conference (2-Days)

      All Day

      Pomaika'i Ballrooms at Dole Cannery

      Theme:
      From Intrusion Detection to Recovery: How Will Executives be Measured In the Future?

       

      This year's agenda has been expanded to cover a wide gamut of topics on IT Security.   More presenters and more exhibitors.   Please download the attendee packet below for a detailed Agenda.


      Date and Location:
      October 12-13, 2016
      8:00 am - 5:00 pm (Registration begins at 7:15 am)
      Pomaika'i Ballrooms at Dole Cannery
      735 Iwilei Rd
      Honolulu, HI 96817

      Cost (both days are included):
      ISSA Members/ISACA Members/College Students: $50
      Non-Members: $100

      Deadline:

      Registrations must be received by October 10 to ensure a seat. Registrations received after that date will be accepted on a space available basis.

      Cancellations:

      Cancellations must be received by October 10. "No-shows" will be charged the full amount.

      Attendee Packets:

      The Attendee Packet will continue to be updated as schedule, speakers, and topics are confirmed.

  • Friday, November 18, 2016

    • ISSA Monthly Luncheon Hosted by BitSight Getting Started - Managing Third Party Cyber Risk (FREE)
      Friday, November 18, 2016

      ISSA Monthly Luncheon Hosted by BitSight Getting Started - Managing Third Party Cyber Risk (FREE)

      11:30 AM - 1:30 PM

      Hale Koa Hotel

      RSVP requested

      Cost: FREE - Hosted by BitSight


      Presentation: Getting Started - Managing Third Party Cyber Risk


      Speaker: Joe Lauducci


      Topic: Vendor risk management has become a major issue for businesses following major breaches traced back to third party vendors, suppliers and business partners. Among breaches that were tracked by Verizon for the most recent Data Breach Investigations report, they found that 70 percent of breaches had negative downstream effects on third parties. Despite this growing threat, Gartner has estimated that only ten percent of organizations have a vendor risk management program in place. Gartner estimates that this will grow to 40% by 2018.

      The threat of sharing data outside of a company's networks is bound to grow as businesses continue to outsource important business functions. As companies recognize the need for more formal operations to mitigate the cyber threats posed by vendors, there emerges a crucial question: where do I start?

      In this session you will learn:

      • Different approaches for incorporating BitSight Security Ratings into vendor risk management (VRM) programs, whether your program is just getting started or is well underway
      • Why continuous monitoring of vendor security performance is both critical and achievable, through the use of data-driven, evidence-based security ratings
      • "Best practices" for third party risk vendor management
      • How to get started with your next generation vendor risk management program

      Bio: Joe Lauducci is Regional Sales Manager with BitSight Technologies, the Cambridge, Mass.-based risk management company leading the way in the security ratings market. Working in technology sales since 2001, Joe specialized in cybersecurity for the last 10 years. Prior to his role at BitSight, Joe led sales efforts on the East and West Coasts for Sophos, Prolexic, and Akamai to help protect the infrastructure, data and availability of the world's most prominent financial institutions and Global 2000 companies. He earned a Bachelor of Science degree from the State University of New York at Cortland, and volunteers for financial literacy programs for underserved youth in Southern California.


      Lunch Menu:
      Appetizer: Hale Koa Salad with Tarragon Dressing
      Main Course: Broiled New York Steak, Cabernet Peppercorn Sauce, Frizzled Onions, Roasted Garlic Mashed Potatoes and Grilled Marinated Squash and Peppers
      Dessert: Vanilla Ice Cream Taco with Fruit Salsa

  • Friday, January 20, 2017

    • ISSA Monthly Luncheon: Hosted by IBM, CyberSecurity 2020: Can Cognitive Change the Odds?
      Friday, January 20, 2017

      ISSA Monthly Luncheon: Hosted by IBM, CyberSecurity 2020: Can Cognitive Change the Odds?

      11:30 AM - 1:30 PM

      Hale Koa Hotel

      RSVP requested

      Cost: Free


      Presentation: CyberSecurity 2020: Can Cognitive Change the Odds?

      Speaker: Diana Kelley, IBM Global Executive Security Adviser


      Topic: Cybercrime and financial fraud are increasingly played as a sophisticated team sport by organized criminals. What will it take to battle them in 2020? How can organizations take action now to prepare? To help answer this question, IBM Security and the IBM Institute for Business Value recently conducted a research study on cognitive security in the marketplace to understand the cybersecurity challenges companies are facing today and planning for tomorrow. The study surveyed over 700 security professionals across 18 industries and 35 countries. In this talk, attendees will hear insights from study co-author, Diana Kelley, from this study including: the changing security priority landscape, why speed and complexity are the biggest cybersecurity challenges; and organizational readiness characteristics and prerequisites to adopt cognitive security. Attendees will leave with an understanding of the quantitative and qualitative benefits of cognitive and a strategic roadmap to help them plan for the next evolution of security.

      Bio: IBM Global Executive Security Adviser


      Lunch Menu:
      Appetizer: Hale Koa Salad with Tarragon Dressing
      Main Course: Herb Marinated Grilled Striploin and
      Citrus Honey Mustard Glazed Chicken
      Mashed Potatoes and Fresh Seasonal Vegetables
      Dessert:Vanilla Ice Cream Taco with Fruit Salsa 

  • Friday, February 17, 2017

    • ISSA Monthly Luncheon: Hosted by TIG, The Silent Witness in Smart City Solutions
      Friday, February 17, 2017

      ISSA Monthly Luncheon: Hosted by TIG, The Silent Witness in Smart City Solutions

      11:30 AM - 1:30 PM

      Hale Koa Hotel

      RSVP requested

      Cost: $0 Members/$0 Non-members


      Presentation:  The Silent Witness in Smart City Solutions


      Speaker: Retired Police Chief and Synnex Public Safety Manager Mike Gambrell


      Topic: Across the country, local organizations such as schools (K-12, Higher Ed), private facilities and securities, and regulated industry businesses are working with police to incorporate public safety into the mix of issues addressed in a comprehensive community development partnership. When community developers and planners talk about public safety, we often use words like "underpinning" and 'foundation". Addressing and preventing crime is a necessary precursor to community-wide revitalization in the public and private sectors. It is difficult to attract businesses, residents, and other investors to communities that have significant crime or perceived as being unsafe. Public Safety officials address the public safety component of Smart City solutions to enhance the quality of life by using technology to improve the efficiency of services for the benefit of citizens and visitors to their assigned jurisdiction. The backbone of this strategy are the wide array of cameras and associated mobility solutions deployed that have become known as the Silent Witness in Smart City Solutions. Attendees will hear insights from a retired Police Chief and current Public Safety Subject Matter Expert, Mike Gambrell, relative to the public safety component of smart city solutions. Attendees will leave with an understanding of innovative solutions and partnerships utilized by cities that are designed to deliver more and/or better services efficiently and cost-effectively integrating public and private entities for a smart city solution founded on public safety technology.


      Bio: Mike Gambrell, a thirty year retired law enforcement veteran, served throughout a municipal agency in various roles as officer, detective, and in supervisory positions within all Divisions including Operations, Support, and Administration. Promoted through the ranks, he recently retired following his service in the role of Police Chief. He has been the recipient of four different external officers of the year awards through the years. Possessing an undergraduate and graduate degrees in Criminal Justice, he is also a graduate of the prestigious F.B.I. National Academy in 2007. Utilizing and sharing his vast knowledge, he is leading the new SYNNEX initiative in the Public Safety Sector serving in the role of Public Safety Program Manager. The knowledge and assistance provided will assist customers in bridging any gap between the technology practitioner and public safety practitioners. Working collectively with the team and marketing program, Mike finds it invigorating to share the vision of this new initiative with the house of experts lodged in the GovSolv platform through our partners to Public Safety professionals across the nation.


      Lunch Menu:
      Appetizer: Hale Koa Salad with Tarragon Dressing
      Main Course: Red Wine Braised Boneless Short Rib
      Matignon of Root Vegetables, Scallion Mashed Potatoes
      and Fresh Seasonal Vegetables
      Dessert: Classic Créme Brulee
       

  • Friday, March 17, 2017

    • ISSA Monthly Luncheon: Hosted by BitDefender/BPS Replacing AV with Something That Works
      Friday, March 17, 2017

      ISSA Monthly Luncheon: Hosted by BitDefender/BPS Replacing AV with Something That Works

      11:30 AM - 1:30 PM

      Hale Koa Hotel

      RSVP requested

      Cost: $0 Members/$0 Non-members


      Presentation: Replacing your current traditional AV Vendor with Something That Works


      Speaker: Brandon Bautista,  Solutions Engineer, BitDefender


      Topic: Anti-virus has been painful in both customer service innovation and endpoint bandwidth consumption, Bitdefender is going to show an alternative to the heavy antiquated AV solutions of the past. This proven methodology will seamlessly replace your current solution and bring additional layers of security!

      During lunch you will learn:

      · How Bitdefender's security- protects against unknown, advanced and zero-day threats with low false positive rates with a very light footprint and low CPU Usage

      · How BitDefender can replace your current solution with their proven replacement methodology so as not to break your business

      · A hypervisor agnostic solution to secures Citrix and VM Ware environments with an agentless option for the Data Center


      Bio: Bitdefender is a global IT security company specializing in endpoint protection for physical, virtual and mobile environments. More than 500 million users worldwide are protected by Bitdefender innovation, which handles more than 7 billion requests per day in its cloud security infrastructure.  

      Year over year, our technologies win industry awards for best performance, detection and protection. Customers report that Bitdefender technologies deliver on the promise of advanced protection, fast and easy deployment, better operational performance, and superior centralized management. Our technology is hypervisor and OS agnostic, so no matter what technologies you are using in your datacenter, integration will not be an issue.


      Lunch Menu:
      Appetizer: Hale Koa Salad with Tarragon Dressing
      Main Course: Sautéed Fresh Island Fish
      Lemons Beurre Blanc, Lomi Lomi Tomato Relish,
      Herb Roasted Whole Potatoes and Fresh Seasonal Vegetables
      Dessert: Vanilla Ice Cream Taco with Fruit Salsa
       

  • Friday, April 21, 2017

    • ISSA Monthly Luncheon: Hosted by Fidelis/HiTech Hui, The Evolving Threat Landscape, Preparing for Next Gen Technology
      Friday, April 21, 2017

      ISSA Monthly Luncheon: Hosted by Fidelis/HiTech Hui, The Evolving Threat Landscape, Preparing for Next Gen Technology

      11:30 AM - 1:30 PM

      Hale Koa Hotel

      RSVP requested; please be mindful that ISSA Hawaii is under contract with Hale Koa and will have to pay for no-shows.

      Cost: $0 Members/$0 Non-members


      Presentation: Evolution of the Threat Landscape, Preparing for Next Generation technology


      Speaker: Juan Hernandez, HiTech Hui


      Topic: Organizations face an evolving threat scenario that all of us are ill prepared to deal with. Threats that have bypassed the traditional security protection technology can reside undetected on our system. Fidelis Cybersecurity will help cut through all the noise and discuss best practices.


      Bio: Juan Hernandez is a graduated from Devry University in Electronics Engineering Technology and has been in the technology industry for over 15 years. He has lots of hands on experience with customers, which has given him the expertise and a unique perspective on the evolution of Cybersecurity and best practices.


      Lunch Menu:
      Appetizer: Hale Koa Salad with Tarragon Dressing
      Main Course: 48 Hour Brined Pork Loin
      Crusted with Buba Arare, Apple Cider Gastrique
      and Fresh Seasonal Vegetables
      Dessert: Refreshing Signature Sorbets

       

  • Friday, May 19, 2017

    • ISSA Monthly Luncheon: Hosted By FireEye/Mandiant, Real World Security
      Friday, May 19, 2017

      ISSA Monthly Luncheon: Hosted By FireEye/Mandiant, Real World Security

      11:30 AM - 1:30 PM

      Hale Koa Hotel

      RSVP requested

      Cost: $0 Members/$0 Non-members


      Presentation: Cyber/Real World Security


      Speaker: Navid Jam, Information Security Consulting Services Director, Mandiant


      Topic: Despite billions invested in cyber security as well as increased regulations and compliance frameworks, breaches continue to plague companies. Why?

      In this lunch presentation, we will discuss the threats organizations of all sizes face and how to look "under the hood" to assess the "real world security" of your organization.

      Presentation will include

      · Emerging & current threat trends

      · How to effectively asses your security posture

      · Why you cannot take security at face value


      Bio:Navid Jam is an experienced security leader with over 15 years of experience running complex security incident response engagements of all sizes, threat and vulnerability assessments, and enterprise security strategy engagements for a range of organizations, including Fortune 500 companies and the U.S. federal government. Jam is regarded as a trusted advisor to his clients and has a successful track record of helping them minimize their information security risk.


      Lunch Menu:
      Appetizer: Hale Koa Salad with Tarragon Dressing
      Main Course: Cajun Pan Seared Chicken
      With Etouffee Sauce, Creole Rice
      and Fresh Seasonal Vegetables
      Dessert: Mango Bar with Lime Cream
       

  • Friday, June 16, 2017

    • ISSA Monthly Luncheon: Hosted by Log Rhythm, Arming SecOps Warriors
      Friday, June 16, 2017

      ISSA Monthly Luncheon: Hosted by Log Rhythm, Arming SecOps Warriors

      11:30 AM - 1:30 PM

      Hale Koa Hotel

      RSVP requested

      Cost: $0 Members/$0 Non-members


      Presentation: Arming SecOps Warriors: Detect, Respond, Neutralize

      Speaker: Rocky Rosas -   Senior Solutions Consultant - LogRhythm


      Topic: The days of layered, prevention-centric security strategies are behind us. Motivated and well-funded cyber criminals, organizations, and nation states have proven that traditional strategies are futile. Cyber threats are growing, are a daily challenge for our SecOps organizations, and require a new integrated approach to detection and response. Effective Threat Lifecycle Management (TLM) is the key to technology-enabling efficient workflow that optimally aligns SecOps efforts around key performance metrics. Learn how technologies such as Log Management, SIEM, User/Entity Behavioral Analytics, Endpoint and Network Forensics, and Security Automation and Orchestration can be incorporated to provide a single optimally efficient workflow to improve your ability to detect, respond, and neutralize threats.


      Bio:  Rocky Rosas is a Senior Solutions Consultant at LogRhythm, the Security Intelligence Company, and is based in Southern California. Mr. Rosas is a Stanford University graduate in Mathematical and Computational Sciences. He has 30+ years of large-scale enterprise and service provider information technology experience, with the last 11 years focused on data security. As a five year veteran of LogRhythm, Mr. Rosas has been engaged in the requirements analysis and design of a significant number of successful SIEM and Security Intelligence platform deployments. Prior to his current role at LogRhythm, Mr. Rosas was a Product Specialist inside IBM's Security Division focusing on monitoring solutions for database security and usage.


      Lunch Menu:
      Appetizer: Hale Koa Salad with Tarragon Dressing
      Main Course: Poached Atlantic Salmon
      Green Peppercorn Ginger Sauce,
      Sliced Baked Potato with Parsley Butter and Fresh Seasonal Vegetables
      Dessert: Chocolate Haupia Pie
       

  • Friday, July 21, 2017

    • ISSA Monthly Luncheon: Hosted by Gigamon, Software Defined Visibility
      Friday, July 21, 2017

      ISSA Monthly Luncheon: Hosted by Gigamon, Software Defined Visibility

      11:30 AM - 1:30 PM

      Hale Koa Hotel

      RSVP requested

      Cost: $0 Members/$0 Non-members


      Presentation: Software Defined Visibility,  How Next Generation Packet Brokers Make This Possible


      Speaker: Marcus Salvemini


      Topic: When deploying security defenses, Packet Brokers can provide the most advanced engineering capabilities to manipulate the flows and packets before they are ingested by the Security tools,  and need to be included in the overall SDN design.

      Next Generation Packet Brokers have the ability to integrate with SDN controllers through the use of RESTFull API's.

      These Packet Brokers come with a robust Software interface that lends itself to the basic 4 constructs of SDN controlled infrastructures and therefore make it a simple bridge between the Controller and the underlying Packet Broker platforms, allowing the SDN controller to automate many actions taken at the Fabric layer of the Packet Broker, as well as providing manual interaction by the controller and the physical platform when needed.


      Bio:


      Lunch Menu:
      Appetizer: Hale Koa Salad with Tarragon Dressing
      Main Course: Grilled Mediterranean Chicken
      Tomato Jam and Extra Virgin Olive Oil,
      Fresh Seasonal Vegetables, and Roasted Potatoes
      Dessert: Refreshing Signature Sorbets
       

  • Friday, August 18, 2017

    • ISSA Monthly Luncheon: Hosted by Cisco, Ransomware and Umbella openDNS
      Friday, August 18, 2017

      ISSA Monthly Luncheon: Hosted by Cisco, Ransomware and Umbella openDNS

      11:30 AM - 1:30 PM

      Hale Koa Hotel

      RSVP requested

      Cost: $0 Members/$0 Non-members


      Presentation: Ransomware and Umbrella OpenDNS


      Speaker: Austin Bates, Cisco Account Manager SLED | Cloud Security
      Chris Frost, Cisco Consulting Systems Engineer | Cloud Security


      Topic: Join us for a discussion on the ever-evolving Ransomware landscape and how Cisco Umbrella is helping its customers better defend against it. While technology shifts have made things easier for us it has also made things easier for cybercriminals as well. However, there are steps you can take to actively reduce the number of ransomware infections across your organization.

      Key Points:

      · To reduce ransomware infections across your organization

      · Ransomware has evolved and what we know about it today

      · To predict what ransomware might do next

      · You can identify the internet infrastructure used by the attackers to connect, control, and transfer the encryption keys


      Bio:Austin Bates is the Cloud Security Account Manager responsible for all SLED operations on the West Coast. Prior to the acquisition of OpenDNS by Cisco Austin created and ran the Higher Education program within OpenDNS. Austin came to OpenDNS from San Francisco based consulting firm Singer Associates.

      Chris Frost has been working in Cyber Security for 4 years. He joined the Cisco Security business group as a Consulting Systems Engineer via the OpenDNS acquisition. Prior to Cisco and OpenDNS, he started his career at Google where he where he helped launch the Nexus 7 tablet


      Lunch Menu:
      Appetizer: Hale Koa Salad with Tarragon Dressing
      Main Course: Main Course: Asian Braised Pork
      Soy Mirin Sauce, Scallion Rice and Fresh Seasonal Vegetables
      Dessert: Vanilla Ice Cream Taco with Fruit Salsa
       

Copyright © 2003-24 ISSA Hawaii Chapter
PO Box 2297 ~ Honolulu, HI 96804
webmaster@issahawaii.org
Our privacy policy
Trouble with this page?
Website Design and Management by Highpoint Web Design, LLC