Events

Mouse over any item on the left to display further information on the right

  • Friday, January 19, 2018

    • ISSA Monthly Luncheon: Detect, Prevent and Recover - Understanding Security in the Cloud Era By Barracuda
      Friday, January 19, 2018

      ISSA Monthly Luncheon: Detect, Prevent and Recover - Understanding Security in the Cloud Era By Barracuda

      11:30 AM - 1:30 PM

      Hale Koa Hotel

      RSVP requested
      Members $25/ Non-Members $30


      Presentation: Detect, Prevent and Recover - Understanding Security in the Cloud Era


      Speaker: Paul Eiler - Barracuda Channel Manager for Southern California, Nevada and Hawaii
      Chad Haskell - Barracuda Systems Engineer - Data Protection, Western Region


      Topic: Detect, Prevent and Recover - Understanding Security in the Cloud Era

      As tech advances, new ways of working / playing online evolve, it opens up new opportunities to hackers. There is now more information in the public cloud than ever before. Most people don't realize that this information can be leveraged in surprising ways to form a target attack on individuals and organizations when least expected. Where users were once static, a firewall and malware filters may have been enough - guarding the perimeter. Today there is no perimeter. People move - so does the data. Wifi gives access everywhere and users mostly have no idea of the risks they are being exposed to when they connect to these ungoverned networks. Simply put, users spend much of their time the other side of your fire wall, and then unwittingly bring the threat back inside your network often avoiding detection.
      Threats are changing daily, new threat vectors are constantly being opened and created. Modern day security is about deploying/managing multiple layers of security solutions, but in today's cloud era how can you effectively detect the current threats they may reside in your environment? Do you have a plan to detect your current threats, including those residing in your organization already? Once those threats are detected, do you have a plan to prevent those threats and in the event of a breech recover quickly? Most importantly, does your current security solutions integrate into platform designed to deal with advanced persistent threats across multiple threat vectors?

      Bio:Paul Eiler - Barracuda Channel Manager for Southern California, Nevada and Hawaii

      Came to Barracuda Networks 3 years ago assuming the role of Channel Manager for Southern California, Nevada and Hawaii. My primary role is working with Barracuda's top partners in the Southwest region who focus on security solutions. I work with these partners to develop sales/technical training programs and go-to-market strategies. I currently hold many Barracuda Product Specialist certifications in multiple areas including Cloud Security, Network Security and Data Protection products and services.

      Chad Haskell - Barracuda Systems Engineer - Data Protection, Western Region


      Started with Yosemite Technologies in '05, which was later acquired by Barracuda in '08. I have held positions in Tech Support, OEM Training, Quality Assurance, Product Management, Partner Enablement and currently Systems Engineering. While I specialize in Data Protection products I also cover Email Security, Web Security, and CloudGen Firewalls. Over two years ago I started helping the cloud team and have participated at shows like AWS Re:invent, Microsoft Inspire. These experiences have helped me to see how various technology is used to solve to solve a great many different problems and better understand the history of threats and how the threat landscape is evolving today and the protection that is needed to ensure business continuity today how to position for the future.


      Lunch Menu:
      Appetizer: Hale Koa Salad with Tarragon Dressing
      Main Course: Grilled Skirt Steak with Dijon Shitaki Mushroom Sauce, Paired with Crab Cake, Local Style Udon Noodles, and Sauted Zucchini with Tomatoes
      Dessert:Vanilla Ice Cream Taco with Fruit Salsa 

  • Friday, February 16, 2018

    • ISSA Monthly Luncheon: Hosted by Wirex, Forensics - From Prevention to Response
      Friday, February 16, 2018

      ISSA Monthly Luncheon: Hosted by Wirex, Forensics - From Prevention to Response

      11:30 AM - 1:30 PM

      Hale Koa Hotel

      RSVP requested

      $0 Members/ $0 Non-Members


      Presentation: Forensics - From Prevention To Response

      Speaker: Tomer Saban, CEO and Co-Founder Wirex


      Topic:Unleash the Power of Your SOC to Handle More Threats in Significantly Less Time


      WireX Systems is a network forensics company that has shifted the paradigm in security investigations. The company was founded in 2010 to deliver cutting-edge security forensics systems for intelligence agencies across the globe. Today, leading enterprises choose WireX Systems as a key component in their forensics infrastructure to accelerate incident response, mitigate data theft and simplify responding to the magnitude of security alerts they must action every day.
      WireX Systems' mission is to deliver the best forensics experience for the enterprise with the greatest amount of context and history to make security investigations easy. It provides a


      Breakthrough for your current forensics limitations,skill set barriers, and manpower shortage


      They Automate all the heavy lifting of data analysis.


      They deliver comprehensive security intelligence in actual human readable form so you can save effort and time when validating alerts and responding to security incidents. By providing instant access to content and behavior aware intelligence, security teams can efficiently reveal the scope and impact of an incident without significant manual work that requires deep expertise. The slow mean time to detect security breaches requires greater history and context to be available during investigations.


      Bio:Tomer Saban, CEO & Co-Founder Wirex Systems

      Tomer Saban is leading the global WireX Systems business, which is on a mission to revolutionize the way cyber security investigations are performed. Tomer has very rich experience in network security that spans from working with intelligence agencies around the world on Lawful interception projects to commercial verticals like Banking, Insurance, Utilities, Pharma, Health Care, Retail and more. Tomer was responsible for formulating the strategy and managing the process leading to a total of $14 million in financing to bring WireX System product into the commercial space.

      - 8200 Entrepreneurship and innovation program
      - Merage institute Innovation program
      - Bsc Computer Science


      Lunch Menu:
      Appetizer: Hale Koa Salad with Tarragon Dressing
      Main Course: 48 Hour Brined Pork Loin, Crusted with Buba Arare, Apple Cider Gastrique and Fresh Seasonal Vegetables
      Dessert: Refreshing Signature Sorbets 

  • Friday, March 16, 2018

    • ISSA Monthly Luncheon: Hosted by Splunk; Building an Analytics Driven Security Operation Center
      Friday, March 16, 2018

      ISSA Monthly Luncheon: Hosted by Splunk; Building an Analytics Driven Security Operation Center

      11:30 AM - 1:30 PM

      Hale Koa Hotel

      RSVP requested
      Members $0, Non-Members $0


      Presentation: Building an Analytics Driven Security Operation Center

      Speaker: Ernie Welch, Sr. Sales Engineer, Splunk Inc.


      Topic:Learn best practices for deploying an analytics-enabled SOC with our security expert. Whether you are interested in building a SOC, enhancing an existing SOC or building out a security practice, this session will explain the people, processes and technology required. The discussion will also cover how Splunk can complement a SIEM that may already be in place in the SOC.

      Bio:Ernie Welch joined Splunk in September 2015. He brings more than 25 years' experience in technology solution sales, from concept to delivery. Ernie was most recently with HP, where he was a senior Universal CMDB engineer focused upon application discovery and dependency mapping, helping customers understand their environments form a business service context.


      Lunch Menu:
      Appetizer: Hale Koa Salad with Tarragon Dressing
      Main Course: Baked Mahi Mahi Filet, Tomato Chive Beure Blanc, Garlic Mashed Potatoes and Fresh Seasonal Vegetables
      Dessert: Mango Bar with Lime Cream 

  • Friday, April 20, 2018

    • ISSA Monthly Luncheon: Hosted by Science Logic/Hybrid IT Infrastructure Monitoring & Management
      Friday, April 20, 2018

      ISSA Monthly Luncheon: Hosted by Science Logic/Hybrid IT Infrastructure Monitoring & Management

      11:30 AM - 1:30 PM

      Hale Koa Hotel

      RSVP requested

      Cost: Members $0/Non-Members $0


      Presentation: Hybrid IT Infrastructure Monitoring & Management

      Speaker: Steve Fry, Account Executive Science Logic Inc

      Kim Miroy, Sr. Sales Engineer, Science Logic, Inc.


      Topic:Hybrid IT Infrastructure Monitoring & Management

      Learn how to monitor your entire Infrastructure (Network, Storage, Compute, Power) both on premise and in the cloud, while still performing traditional data center and network infrastructure monitoring. Doing so can

      . Accelerate cloud adoption and data center consolidation

      · Provide deep visibility for both AWS and Azure

      · Provide a single pane of glass across your multi-cloud and on premise infrastructure environment

      · Reduce labor costs, MTTR, and improve efficiency through automation capabilities

      · Contextualize through Infrastructure Dependency Mapping

      ScienceLogic will be used as an example of how this can be done, since it is the first end-to-end IT infrastructure monitoring company ever to conform to the U.S Department of Defense's rigorous security and interoperability standards.

      Bio:Steve Fry is an Account Executive at Science Logic with over 20 year's experience selling to Enterprise and Government accounts. For the past 10 years he has focused on Application and Network Monitoring. He recently joined ScienceLogic to cover Infrastructure Monitoring in Southern California and Hawaii

      Kim Miroy is a Sr. Sales Engineer who has been with ScienceLogic for nearly 3 years. She brings over 18 years of IT experience having worked as a network engineer prior to going into technology solution sales. She loves helping customers achieve visibility into their IT infrastructure in order to help them be more proactive thus freeing up cycles to spend time working on different projects instead of always being in fire fighting mode


      Lunch Menu:
      Appetizer: Hale Koa Salad with Tarragon Dressing
      Main Course: Red Wine Braised Boneless Short Rib, Matignon of Root Vegetables, Scallion Mashed Potatoes and Fresh Seasonal Vegetables
      Dessert: Classic Creme Brulee 

  • Friday, May 18, 2018

    • ISSA Monthly Luncheon: Sponsored by RSA/Net Witness; Threat Hunting
      Friday, May 18, 2018

      ISSA Monthly Luncheon: Sponsored by RSA/Net Witness; Threat Hunting

      11:30 AM - 1:30 PM

      Hale Koa Hotel

      RSVP requested

      Cost:
      0$ Members/0$ Non-Members


      Presentation: Threat Hunting

      Speaker: Neil R. Wyler "Grifter", Threat Hunting and Incident Response Specialist, RSA


      Topic:Since its inception, the security industry has been inundated with trendy defense techniques, topics, terms, and products that once implemented will solve all of our security woes. For the last several years one of those terms, threat hunting, has become the darling of defenders and vendors worldwide. But just what is threat hunting? Is it effective? Where do you even begin? This session will answer these questions and more when we discuss real life, immediately applicable, threat hunting techniques and methodologies. We'll also discuss several examples of security failures and data exposure found during threat hunting engagements on the networks of Black Hat and the RSA Conference.

      Bio:Neil R. Wyler is currently a Threat Hunting and Incident Response Specialist with RSA. He has spent over 18 years as a security professional, focusing on vulnerability assessment, penetration testing, physical security, and incident response. He has been a staff member of the Black Hat Security Briefings for over 16 years and a member of the Senior Staff at DEF CON for 18 years. Neil has spoken at numerous security conferences worldwide, including Black Hat, DEF CON, and the RSA Conference. He has been the subject of various online, print, film, and television interviews, and has authored several books on information security. In his free time, Neil keeps himself busy as a member of both the DEF CON, and Black Hat CFP Review Boards, the Black Hat Training Review Board, the founder of DC801, and founder of his local hackerspace, 801 Labs. Follow him on Twitter at @Grifter801.


      Lunch Menu:
      Appetizer: Hale Koa Salad with Tarragon Dressing
      Main Course: Sauteed Herb Seasoned Chicken, Deglazed with Balsamic Vinegar and Finished with Butter, Fresh Seasonal Vegetables and Roasted Garlic Mashed Potatoes                                                                                          Dessert: Calamansi Tart with White Chocolate Mousse 

  • Friday, June 15, 2018

    • ISSA Monthly Luncheon: Hosted by Cisco; Cloud Security
      Friday, June 15, 2018

      ISSA Monthly Luncheon: Hosted by Cisco; Cloud Security

      11:30 AM - 1:30 PM

      Hale Koa Hotel

      RSVP requested
      $0 Members and Non-Members


      Presentation: If you are heading into the clouds, you better know what storms to avoid.

      Speaker: Bill Musson, Consulting System Engineer, Cisco Systems Cloud Security Team


      Topic:Our discussion today is about the cloud and cloud security. We will look at Cloud Access Security Broker (CASB) solutions and implementations, oAuth, API and how all of this works together. With this base we will then look at the dangers of the cloud, specific attacks and what you should be thinking about when you move to a SaaS solution.

      Bio:Bill Musson has extensive experience in cyber security from being in the trenches as the Network Security Officer at CINCPACFLT to Symantec and Splunk supporting customers in the commercial, state and DoD. Bill is well known in Hawaii for training the next generation of cyber professionals and his long history with ISSA Hawaii and has served in every ISSA Hawaii board position multiple times over the last few decades. Bill is a Consulting Solutions Engineer for the Cloud Security Team at Cisco on the Federal team.


      Lunch Menu:
      Appetizer: Hale Koa Salad with Tarragon Dressing
      Main Course: Poached Atlantic Salmon, Green Perpercorn Ginger Sauce, Sliced Baked Potatoe with Parsly Butter and Fresh Seasonal Vegetables
      Dessert: Classic Creme Brulee 

  • Friday, July 20, 2018

    • ISSA Monthly Luncheon: Hosted by BeyondTrust "The Next Attack Vectors: Vulnerabilities + Privileges
      Friday, July 20, 2018

      ISSA Monthly Luncheon: Hosted by BeyondTrust "The Next Attack Vectors: Vulnerabilities + Privileges

      11:30 AM - 1:30 PM

      Hale Koa Hotel

      RSVP requested
      Cost $0 Members/$ 0 Non-Members


      Presentation: The Next Attack Vectors: Vulnerabilities + Privileges

      Speaker: Joe Statz, Security Engineer at Beyond Trust


      Topic:Cyber-attacks continue to increase in sophistication and are occurring in such volume that a daily newsfeed littered with tales of new data breaches is now something we've come to expect. Central to almost each of these tales is an element of privilege abuse and/or misuse that resulted in either the initial exploit, or that was implicated in allowing an initial foothold to metastasize into a security event inflicting widespread damage.


      This session provides a comprehensive view of how privileges, passwords, and vulnerabilities are being leveraged as attack vectors, and how you can take measurable steps to defend against them.


      Bio:Joe Statz, Security Engineer at BeyondTrust has spent 22 years working in IT and more specifically in Security for the last 8. He has worked at BeyondTrust for the past 6 years with hundreds of companies in all verticals. He started out by earning his Bachelor's degree from UCLA (Go Bruins!) and started his career in IT while serving in the USN.


      Lunch Menu:
      Appetizer: Hale Koa Salad with Tarragon Dressing
      Main Course: Smoked Soy Marinated Chicken on Fettuccine Pasta, Fresh Julienne Vegetables and Mirin Cream Sauce
      Dessert: Refreshing Signature Sorbets 

  • Friday, August 17, 2018

    • ISSA Monthly Luncheon: Hosted by Optiv; Identity Access Management Programs
      Friday, August 17, 2018

      ISSA Monthly Luncheon: Hosted by Optiv; Identity Access Management Programs

      11:30 AM - 1:30 PM

      Hale Koa Hotel

      RSVP requested
      Cost:
      0$ Members/0$ Non-members


      Presentation: "What Good Is" in Identity Access Management Programs

      Speaker: Dusty Anderson, Advisor for OPTIV IAM Services


      Topic: "What Good Is" in Identity Access Management Programs

      Dusty's broad based background and experience will give us a unique perspective into Best Practices that she has identified for a successful Identity Program for your organization.

      This discussion will include a look into the essential core components, reference architecture and design, identifying potential hurdles and the 5 must haves for a successful IAM Program.

      Bio:With over 14 years of experience in all facets of Identity Access Programs, Dusty Anderson is a seasoned leader in Optiv's Identity and Access Management Practice.

      Currently an Advisor in Optiv's IAM Advisory Services, Dusty helps organizations optimize their Identity Solutions in all phases of deployment and development-- from architecture and design, implementation, to on-going program modifications/development to maximize efficiency and effectiveness regardless of current state.


      Lunch Menu:
      Appetizer: Hale Koa Salad with Tarragon Dressing
      Main Course: Asian Braised Pork, Soy Mirin Sauce, Scallion Rice and Fresh Seasonal Vegetables
      Dessert: Vanilla Ice Cream Taco with Fruit Salsa 

  • Friday, September 21, 2018

    • ISSA Monthly Luncheon: Hosted by SynAck; The CISO - A Different Approach
      Friday, September 21, 2018

      ISSA Monthly Luncheon: Hosted by SynAck; The CISO - A Different Approach

      11:30 AM - 1:30 PM

      Hale Koa Hotel

      RSVP requested
      Members $0/ Non-Members $0


      Presentation:

      Facebook Kills the CISO Position - Herbalife takes a different Approach Using a Crowd!

      Speaker: Darrell Jones - HerbaLife CISO


      Topic:

      Security is usually a specific team's responsibility with a company, but understaffed and overworked. At Herbalife, Darrell Jones empowered other teams - development, operations, and more - to help with the security mission without burdening any team. Learn how development tools, penetration testing, the world's best ethical hackers and other techniques made Herbalife's security more effective.


      Bio:  Darrell Jones - HerbaLife CISO


      Lunch Menu:
      Appetizer: Hale Koa Salad with Tarragon Dressing
      Main Course: Grilled Black Tiger Shrimp Pasta, Fettuccine Pasta Tossed with Marinara Sauce, Mushrooms, Spinach and Garlic
      Dessert: Tiramisu 

  • Wednesday, October 10, 2018

    • Hawaii's 25th Annual ISSA Discover Security Conference (2-Days)
      Wednesday, October 10, 2018

      Hawaii's 25th Annual ISSA Discover Security Conference (2-Days)

      All Day

      Pomaika'i Ballrooms at Dole Cannery

      Theme:

      Relevant InfoSec Solutions showcases some of the most advanced security solutions in the market today. Learn about how these solutions can address the 2018 information security trends that matter.  Use artifical intelligence and machine learning to boost your cyber defense. Be proactive about preventing ransomware. Appropriately secure the IOT and mitigate the rise of the botnet risk. Augment your cybersecurity professional knowledge and skill shortage. Develop a cybersecurity framework for your organization. Operationalize patching and application testing. Learn how Relevant InfoSec Solutions can help you address you and your organization's most pressing challenges.

      This year's agenda has been expanded to cover a wide gamut of topics on IT Security.   More presenters and more exhibitors.   Please download the attendee packet below for a detailed Agenda.  The Packet can be downloaded by pasting the below link into your browser.

      http://www.issahawaii.org/download.cfm/?ID=31763


      Date and Location:
      October 10-11, 2018
      8:00 am - 5:00 pm (Registration begins at 7 am)
      Pomaika'i Ballrooms at Dole Cannery
      735 Iwilei Rd
      Honolulu, HI 96817

      Cost (both days included):
      ISSA Members/ISACA Members/College Students/DoD Employees: $50
      Non-Members: $100

      HI State and City & County IT Employees, Military IT Members in uniform: $0

      $6 Validated Parking

      Deadline:

      Registrations must be received by October 9 to ensure a seat. Registrations received after that date will be accepted on a space available basis. Registration will close when maximum capacity is reached.

      Cancellations:

      Cancellations must be received by October 9. "No-shows" will be charged the full amount.

      Attendee Packets:

      The Attendee Packet shows most of the Topics and Speakers. It will continue to be updated as more Topics are updated.

      To download, please paste the below link into your Browser.

  • Friday, November 16, 2018

    • ISSA Monthly Luncheon: Hosted by Thycotic/HiTech Hui; Essentials to Least Priviledge
      Friday, November 16, 2018

      ISSA Monthly Luncheon: Hosted by Thycotic/HiTech Hui; Essentials to Least Priviledge

      11:30 AM - 1:30 PM

      Hale Koa Hotel

      RSVP requested
      No Cost


      Presentation: Essentials to Least Priviledge in an Organization

      Speaker:  Joseph Carson, Chief Security Scientist, Thycotic


      Topic:

      Endpoint security is a crowded and complicated business, full of overly complex and overlapping tools.  Thycotic will explain how you can eliminate the risks by implementing one of the most fundamental security strategies--the principle of least privilege.


      We'll also cover keys to successful least privilege adoption using application control, so you can avoid the common pitfalls that cause least privilege strategies to fail.

         · Where to begin a Least Privilege/PAM project

         · Evaluate the right InfoSec tools

         · Limit your exposure to breaches

         · How security teams are solving their End Point pain

      Bio:

      Joseph Carson has over 25 years' experience in enterprise security, is the author of "Privileged Account Management for Dummies" and "Cybersecurity for Dummies", and is a cyber security professional and ethical hacker. Joseph is a cyber security advisor to several governments, critical infrastructure, financial and transportation industries, speaking at conferences globally. Joseph serves as the Chief Security Scientist at Thycotic.


      Lunch Menu:
      Appetizer: Hale Koa Salad with Tarragon Dressing
      Main Course: Cabernet Peppercorn Sauce, Frizzled Onions, Roasted Garlic Mashed Potatoes and Grilled Marinated Squash and Peppers 
      Dessert: Vanilla Ice Cream Taco with Fruit Salsa 

  • Friday, January 18, 2019

    • ISSA Monthly Luncheon:

      11:30 AM - 1:30 PM

      ISSA Monthly Luncheon:
      Friday, January 18, 2019

      ISSA Monthly Luncheon:

      11:30 AM - 1:30 PM

      Hale Koa Hotel

      RSVP requested
      Members $ / Non-Members $


      Presentation:


      Speaker

      Topic:

      Bio:  

      Lunch Menu:
      Appetizer: Hale Koa Salad with Tarragon Dressing
      Main Course: Duo of Mahi Mahi "Dynamite" & Marinated Herb Grilled Chicken, Macadamia Nut Romesco Sauce, Whole Grain Rice Pilaf and Fresh Seasonal Vegetables
      Dessert: Mango Bar with Lime Cream

Copyright © 2003-24 ISSA Hawaii Chapter
PO Box 2297 ~ Honolulu, HI 96804
webmaster@issahawaii.org
Our privacy policy
Trouble with this page?
Website Design and Management by Highpoint Web Design, LLC