Hawaii Chapter

Events

Mouse over any item on the left to display further information on the right

  • Friday, September 17, 2010

    • ISSA Monthly Luncheon: Backup and Recovery Technologies Put In Plain Words
      Friday, September 17, 2010

      ISSA Monthly Luncheon: Backup and Recovery Technologies Put In Plain Words

      11:30 AM - 1:30 PM

      Hale Koa Hotel

      RSVP Required! by 11-AM Wed., September 15, 2010
      Cost: $25 for ISSA members, $30 for non-members

      Description..
      Topic: Backup and Recovery Technologies Put In Plain Words

      Computer security has many elements that provide protection to specific areas of our system environments. Unfortunately, one area although seemingly straightforward, Data Protection, can be complex with the different methodologies and/or terminologies used throughout industry.

      Mr. Musson will provide an in-depth look at the existing problems with Backup and Recovery, and delve into the different technologies that the industry is using to solve these problems.

      Mr. Musson will answer many questions in this vendor neutral presentation to include:

      Did you ever wonder how a hardware and software solution differ in implementation and performance?
      What does RTO and RPO mean to you and your environment?
      What is the difference between File, Block and Bit level deduplication?
      How variable length deduplication and fixed length deduplication works?
      How does E-mail and File System archiving affect your RTO?
      How can we reduce our Backup windows?

      Attend this informative presentation and come away with a better understanding of the technologies and terminologies used by today's data protection vendors.

      Speaker: William Musson, CISSP
      Current President ISSA Hawaii Chapter
      Symantec Corporation

      BIO
      Mr. Musson is a Senior Sales Engineer for Symantec Corporation with over 24 years of Information Security experience and is currently covers the Pacific Rim from Alaska to Bahrain. In his current role, Bill designs and architects solutions to IT problems for the Department of Defense, State of Hawaii and County Government organizations and Hawaii Businesses.

      He is a Certified Information System Security Professional (CISSP), and holds a B.S. in Computer Science from Hawaii Pacific University.

      Mr. Musson received his CISSP certification in 2000. As a firm believer in the certification, Bill developed study material for CISSP to use during study groups. This material has evolved and is used by Mr. Musson to teach the CISSP Prep training class. Students from all facets of Hawaii organizations from financial, governmental, commercial and military have taken his course on their way to becoming CISSP certified. Symantec has flown Bill to different Symantec Corporate locations to present CISSP Prep with hundreds of Symantec employees to become certified.

      Lunch Menu:
      Appetizer: Hale Koa Salad with Tarragon Dressing
      Main Course: Salmon and friends
      Dessert: Vanilla Ice Cream Taco (what?)

  • Wednesday, October 13, 2010

    • Hawaii's 17th Annual ISSA Discover Security Conference
      Wednesday, October 13, 2010

      Hawaii's 17th Annual ISSA Discover Security Conference

      All Day

      Hale Koa Hotel, Honolulu, Hawaii

      Fee allows attendance to both days of conference:
      ISSA Members $35.00
      Non-Members: $70.00

      No need to register for both days.Your single registration is good for both days.

      Avatars in an IT World.

      Most of the major security related vendors will be participating, and focusing on IT Security issues in the Virtual and Cloud environments of the current IT landscapes.

      DATE AND LOCATION:
      October 13-14, 2010
      Hale Koa Hotel
      Honolulu, Hawaii

      FEES:
      Cost of Event (2-days):
      ISSA Members - $35.00
      Non-Members - $70.00

      DEADLINES:
      Registrations must be received by October 6, 2010 to ensure a seat. Registrations received after that date will be accepted on a space available basis.

      CANCELLATIONS:
      Cancellations must be received by October 7, 2010. "No-shows" will be charged the full amount ($35 for members; $70 for non-members) if cancellations are not received by October 7, 2010.

      REGISTRATION & ADDITIONAL INFORMATION:
      Please use the registration link on the ISSA web site Events Listing

      The DSC brochure will continue to be updated as Speakers and Topics are confirmed.

  • Friday, November 19, 2010

    • ISSA Monthly Luncheon: Holiday Lunch Get Together
      Friday, November 19, 2010

      ISSA Monthly Luncheon: Holiday Lunch Get Together

      11:30 AM - 1:30 PM

      Hale Koa Hotel

      RSVP Required! by 11:00 AM Wed., November 17, 2010
      Cost: Free for ISSA members, $25 for non-members

      Description..
      Topic: Holiday Lunch!

      Our November Lunch will be a Holiday Lunch, with ISSA Members invited to attend for free. Non-Members are also invited for a non-Member fee of $25. There's no planned speaker, but the agenda will include:

      - Thank everyone for your support of our DSC Conference and Lunches
      - Welcome the 2011-2012 Board of Directors
      - Discuss potential topics for next year with input requested

      Lunch Menu:
      Appetizer: Hale Koa Salad with Tarragon Dressing
      Main Course: Chicken Breast in Tarragon Cream Sauce
      Dessert: Banana Souffle (what is that?)

  • Friday, January 21, 2011

    • ISSA Monthly Luncheon: Next Generation Firewalls
      Friday, January 21, 2011

      ISSA Monthly Luncheon: Next Generation Firewalls

      11:30 AM - 1:30 PM

      Hale Koa Hotel

      RSVP Required!
      by 11-AM Wed., Jan 19, 2011
      Cost: $25 for ISSA members, $30 for non-members

      Presentation: Next Generation Firewalls

      Speaker:  Kelly Brazil, Palo Alto Networks

      Topic: Firewalls are evolving.
      While many have only seen an evolution of their marketing taglines, not their technology, enterprises now require a set of technologies in their network firewall that were previously unheard of. Perhaps most notably, application visibility and control has made its way to the forefront of the requirements list for enterprise firewalls.
      For an enterprise, the difficulty is understanding the different approaches and how they fulfill the organization's requirements. The upside for most organizations is that there are real differences among the choices that enterprises have for firewalls--making the choice critical to get right, and potentially, strategically important to the safe enablement of enterprise-critical applications.
      Kelly will lead a detailed discussion of:
      * Next Generation Firewall ---what does that mean?
      * How application chaos increases risk
      * Applications that circumvent security policies
      * How to gain visibility and control over applications
      * Demonstration

      BIO:
      Kelly Brazil,
      Western Regional Systems Engineer Manager
      Palo Alto Networks

      Lunch Menu:
      Appetizer: Hale Koa Salad with Tarragon Dressing
      Main Course: Grilled Skirt Steak with Shitake Mushroom Sauce Paired with Crab Cake, Served on Local Style Fried Udon Noodles and Sauteed Zucchini with Tomatoes
      Dessert:  Key Lime Pie

  • Friday, February 18, 2011

    • ISSA Monthly Luncheon: Apple in the Enterprise
      Friday, February 18, 2011

      ISSA Monthly Luncheon: Apple in the Enterprise

      11:30 AM - 1:30 PM

      Hale Koa Hotel

      RSVP Required!
      by 11-AM Wed., Feb 16, 2011
      Cost: $25 for ISSA members, $30 for non-members

      Speaker: Jock Purnell

      Topic: Apple in the Enterprise (iPads/iPhones and Macs)

      Description:
      With the interest in deploying Mac's, iPad's, and iPhones in the enterprise increasing, this presentation will examine how to do so responsibly. Obviously, they must be deployed in a secure manner, which includes both Security practices on the devices, as well as the implications of using cloud based storage offerings. Over the years, we've developed ways of deploying PC's both reliably and productively. Some of these same practices can and should be applied to Macs and iPhones/iPads, and there are tools available to do so. Some of the specific topics to be discussed include:

      - Security aspects of Mac's, iPhones, and iPads
      - Tools for managing
      - Ways to distribute images and profiles, and restrict application access
      - Security aspects of Cloud Based storage offerings
      - Integration with Active Directory and Group Policies

      BIO: Jock spent 30 years at IBM as a Senior SE and Global Services Network Consultant/Engineer and now runs his own IT Services company.  Since leaving IBM, he has spent more time using Apple solutions, so is qualified to review how they fit into an enterprise setting.

      Lunch Menu:
      Appetizer: Hale Koa Salad with Tarragon Dressing
      Main Course: Chicken Marsala
      Boneless Chicken Breast with Mushroom, Shallot, Marsala Wine Sauce on a Bed of Asparagus Risotto
      Desert: Refreshing Homemade Sorbets

  • Friday, March 18, 2011

    • ISSA Monthly Luncheon: Application Security in the SDLC - Practical Strategies
      Friday, March 18, 2011

      ISSA Monthly Luncheon: Application Security in the SDLC - Practical Strategies

      11:30 AM - 1:30 PM

      Hale Koa Hotel

      RSVP Required!
      by 11-AM Wed., Mar 16, 2011
      Cost: $25 for ISSA members, $30 for non-members

      Presentation: You've read the articles about the latest data breaches and you've seen the presentations about the latest application attacks. You've been barraged with compliance requirements and you've heard the preaching about building security into the System Development Lifecycle (SDLC). As a method to thwart the bad guys, attain compliance and prevent data breaches, few would argue with the notion of integrating security into the SDLC. Of course, if we all had the benefit of "starting fresh" the task might be relatively easy. Unfortunately, reality is usually quite different and, most often, security professionals are called in to help well after the application is on the path to production. As a result, we are left wondering how we can get from "here" to "there."

      Speaker: Kevin D. Spease. ISSA-Sacramento Valley Chapter President

      Topic: Application Security in the SDLC - Practical Strategies

      BIO:Kevin is a Senior Application Security Analyst at Health Net in Sacramento, California. He is responsible for the evolution and management of web application security in Health Net's Web Center of Excellence. In addition to securing web-based military environmental and logistics applications, he has significant experience securing Air Force strategic and Army tactical weapons systems. Kevin instructs at ITT-Technical Institute in the Information System Security program. He formerly served in the California Army National Guard as a Military Policeman and the US Air Force as a Munitions Systems Craftsman. Kevin earned an MBA from University of Phoenix and holds the CISSP-ISSEP certification.

      Lunch Menu:
      Appetizer: Hale Koa Salad with Tarragon Dressing
      Main Course: Poached Atlantic Salmon
      with Green Peppercorn Ginger Sauce
      Seasonal Vegetables and Sliced Baked Potatoe with Parsley Butter
      Dessert:  Vanilla Ice Cream Taco with Fruit Salsa

  • Friday, April 15, 2011

    • ISSA Monthly Luncheon: TMI - The Risk and Dangers of Social Networking in Corporate America and in Personal life
      Friday, April 15, 2011

      ISSA Monthly Luncheon: TMI - The Risk and Dangers of Social Networking in Corporate America and in Personal life

      11:30 AM - 1:30 PM

      Hale Koa Hotel

      RSVP Required!
      by 11-AM Wed., Apr 13, 2011
      Cost: $25 for ISSA members, $30 for non-members

      Presentation: Social Networking is alive and well, but it is also a dangerous place if you're not careful. Even if we do not give out too much information about ourselves, it is possible to cull enough information from others to create a social network attack, not only on individuals, but companies as well. In this discussion, we explore some of the risks and dangers associated with social networking that can result in identify theft and the implications it has for both consumers and corporations. To prove the point, there will be a live demonstration of how some of these social attacks work. There will also be a summary of preventative measures and recommendations for reducing attack effectiveness.

      Speaker:Chris Duque, retired HPD

      Topic:- The Risk and Dangers of Social Networking in Corporate America and in Personal Life

      BIO:

      Lunch Menu:
      Appetizer: Hale Koa Salad with Tarragon Dressing
      Main Course: Sauteed Shrimp and Chicken
      Poha Berry Port Wine Glaze Chicken Breast and Herb Marinated Shrimp with Garden Medley Whole Grain Rice Pilaf and Seasonal Vegetables
      Dessert:  Tiramisu

  • Friday, May 20, 2011

    • ISSA Monthly Luncheon: Maximizing Security -- Point Solutions vs. Consolidation. Which is better?
      Friday, May 20, 2011

      ISSA Monthly Luncheon: Maximizing Security -- Point Solutions vs. Consolidation. Which is better?

      11:30 AM - 1:30 PM

      Hale Koa Hotel

      RSVP Required!
      by 11-AM Wed., May 18, 2011
      Cost: $25 for ISSA members, $30 for non-members

      Presentation:
      Maximizing Security -- Point solutions vs Consolidation. Which is better?
      Speaker:
      Kostas Sfakiotakis
      Topic:
      Is cobbling together point solutions really the best way to maximize security? As information technology gets more complex, there are varying philosophies on the best way to approach security. Some adopt the approach of using only the best of breed products. Others adopt the approach of using solutions from one vendor to get the best results. Still others use open standards or freeware or Linux based solutions to tackle security on a shoestring budget. There are pros and cons to each of these. Come and share in the discussion about maximizing security at the ISSA Hawaii Chapter Luncheon.
      BIO:
      Kostas is a 15 year veteran in the networking and security space. He has been with Fortinet for 7 years and is currently the Systems Engineering Manager for the Western Region. Kostas currently holds the FCNSA and FCNSP certifications with Fortinet.
      Lunch Menu:
      Appetizer: Hale Koa Salad with Tarragon Dressing
      Main Course: Herb Marinated Grilled Sirloin Steak and Citris Honey Mustrad Glazed Chicken Breast
      Fresh Mashed Potatoes and Herb Roasted Garden Vegetables
      Dessert:  Frozen Banana Souffle

  • Friday, June 17, 2011

    • ISSA Monthly Luncheon: A Closer Look at the Stuxnet Worm
      Friday, June 17, 2011

      ISSA Monthly Luncheon: A Closer Look at the Stuxnet Worm

      11:30 AM - 1:30 PM

      Hale Koa Hotel

      RSVP Required!
      by 11-AM Wed., Jun 15, 2011
      Cost: $25 for ISSA members, $30 for non-members

      Presentation: A Closer Look at the Stuxnet Worm

      Speaker: Mark Ryan Del Moral Talabis, Dwayne Yuen, and James Ochmann - Secure-DNA Consulting

      Topic:  Stuxnet has been described as a guided cyber warhead, a digital missile aimed at taking down the Iranian nuclear program. It is unquestionably the most complex piece of malware ever discovered, setting several historical milestones such as implementing the first programmable logical controller rootkit, exploiting several stolen legitimate digital certificates, or taking advantage of an unprecedented four zero-day Windows vulnerabilities to spread itself in its pursuit of dismantling Iran's uranium enrichment centrifuges. Stuxnet is a look at the future landscape of security and cyber warfare. It is likely that this is only the first of many attacks of its kind.
      Through live demonstrations of actual Stuxnet samples and analysis of decompiled code, we will take an inside look at the inner workings of the Stuxnet worm. Our presentation will walk the audience through the attacker's mindset and design methodology, showing the obstacles which needed to be tackled in order to reach its destination from the eyes of Stuxnet's designers.
      We will walk through Stuxnet's journey from initial infection through a removable drive, its several innovative worm propagation techniques, and after finally reaching its destination, the deployment of its payload onto its long awaited target - all while remaining hidden and keeping itself up to date.


      BIO: Mark Ryan Del Moral Talabis is a Senior Consultant within the Secure DNA Consulting practice. He has over ten years of experience in Information Security, IT Audit, and Applications Development. He has extensive experience in information security risk assessments, vulnerability assessments and penetration testing and has specialized expertise in security data analysis and incident response. He is a (CISSP); (CISA); (CRISC); (GCIH); (GSEC); and a full member of the Honeynet Project.
      James Ochmann is a Consulting Intern with Secure DNA Consulting whose first major project was this Stuxnet presentation. He is a member of the Greyhats. He has a lifelong interest in technology and security and is currently doing research on the Tor anonymous routing network for his masters thesis.
      Dwayne Yuen is a Consulting Intern with Secure DNA Consulting. He is a member of the UH Manoa's Greyhats. He is currently pursuing his Master's in Electrical Engineering at the University of Hawaii, researching a novel algorithm for solving the maximum common subgraph isomorphism problem for his thesis.


      Lunch Menu:
      Appetizer: Hale Koa Salad with Tarragon Dressing
      Main Course: Grilled Fresh Island Fish
      with Ginger Sake Beurre Blanc and Roasted Tomato Oil Server on Lobster Fried Rice and Stir Fried Asian Vegetables
      Dessert:  Key Lime Pie

  • Friday, July 15, 2011

    • ISSA Monthly Luncheon: Hardening against buffer overrun attacks: DEP, ASLR, and Executable Space Protection
      Friday, July 15, 2011

      ISSA Monthly Luncheon: Hardening against buffer overrun attacks: DEP, ASLR, and Executable Space Protection

      11:30 AM - 1:30 PM

      Hale Koa Hotel

      RSVP Required!
      by 11-AM Wed., Jul 13, 2011
      Cost: $25 for ISSA members, $30 for non-members

      Presentation:
      Hardening against buffer overrun attacks:
      DEP, ASLR, and Executable Space Protection
      Speaker:
      Jeremy Shetland, Hawaiian Telcom
      Topic:
      There are many new attacks that appear every day with very exciting names, however when you look under the hood a lot of the attacks are using the same buffer over flow techniques.  Jeremy Shetland will share with us the different types of built-in defense mechanisms for Windows and Linux Systems to ensure you're using the latest anti-buffer overflow technology. 
      BIO:
      Jeremy Shetland is a Senior Security Architect at Hawaiian Telcom and has over 11 years of progressive success across both IT security and network engineering.  He has lead numerous projects focused on perimeter and interior defensive measures for organization within the Hawaiian Islands.   He has extensive experience in security technologies such as firewall, intrusion prevention systems, security event management and end point protection. 
      Lunch Menu:
      Appetizer: Hale Koa Salad with Tarragon Dressing
      Main Course: Roasted Cornish Game Hen with Garlic and Rosemary
      On Mashed Potatoes and Vegetables Glazed with Balsamic Vinegar
      Dessert:  Refreshing Homemade Sorbets

  • Friday, August 19, 2011

    • ISSA Monthly Luncheon: New Technologies in the Fight Against Malware
      Friday, August 19, 2011

      ISSA Monthly Luncheon: New Technologies in the Fight Against Malware

      11:30 AM - 1:30 PM

      Hale Koa Hotel

      RSVP Required!
      by 11-AM Wed., Aug 17, 2011
      Cost: $25 for ISSA members, $30 for non-members

      Presentation: New Technologies in the Fight Against Malware

      Speaker: Bill Musson

      Topic:
      Over the past few years, Malware has been increasing in frequency, variation and
      the escalation of the defence versus the attack has made it much more difficult
      for Anti-Virus vendors to provide defenses based upon traditional methods.

      With the rapid adoption of virtualized environments, Anti-Virus vendors quickly
      understood that signature based Anti-Virus was not going to be enough to protect
      the critical IT systems in their care.

      Bill Musson, a Senior Sales Engineer for Symantec, will be discussing new protection
      technologies for both physical systems and virtual systems that are outside the traditional
      signature based technologies.


      BIO: Mr. Musson is a Senior Sales Engineer for Symantec Corporation with over 24 years of Information Security experience and is currently covers the Pacific Rim from Alaska to Bahrain. In his current role, Bill designs and architects solutions to IT problems for the Department of Defense, State of Hawaii and County Government organizations and Hawaii Businesses.
      He is a Certified Information System Security Professional (CISSP), and holds a B.S. in Computer Science from Hawaii Pacific University.

      BIO:
      Lunch Menu:
      Appetizer: Hale Koa Salad with Tarragon Dressing
      Main Course: Broiled New York Steak
      On Roasted Garlic Mashed Potatoes with Cabernet Peppercorn Sauce, Frizzled Onions, Grilled Marinated Squash and Peppers
      Dessert:  Vanilla Ice Cream Taco with Fruit Salsa

  • Friday, September 16, 2011

    • ISSA Monthly Luncheon: The Human Side of Technology
      Friday, September 16, 2011

      ISSA Monthly Luncheon: The Human Side of Technology

      11:30 AM - 1:30 PM

      Hale Koa Hotel

      RSVP Required!
      by 11-AM Wed., Sep 14, 2011
      Cost: $25 for ISSA members, $30 for non-members

      Presentation: The Human Side of Tech: leveraging reptilian brains and butterflies on your next project.

      Speaker: Peter Kay, CEO, CyberCom, Inc.

      Topic: If you really want to supercharge your next technology upgrade or even improve upon your existing platform, leverage the most important factor, the Human Factor, within your organization.

      Don't miss Hawaii's very own Peter Kay (of "Your Computer Minute") as he shares his secrets of leveraging the Human Factor as discovered over his 27 years in Hawaii spanning 6 tech startups and countless local clients ranging from our largest blue-chip firms to the smallest companies. The two key ideas Peter will discuss are:
      * Leveraging the most primal human desires (in the reptilian brain) to get people to change their behavior overnight and embrace new technology.
      * Transform organizational complexities where even the smallest movement can sometimes bring your entire project to a halt (The Butterfly Effect) into a powerhouse of focused efforts that brings about change faster and more completely than ever thought possible.

      While human interface design is a deeply researched area, human behavior is rarely if ever formally considered in technology projects. Designed for both technical, management, and operational areas of all companies big and small, this presentation will give you insights that few consider and may make the difference between success and failure on your next project.


      BIO:

      Lunch Menu:
      Appetizer: Hale Koa Salad with Tarragon Dressing
      Main Course: Roasted Chicken Breast with Tarragon Cream Sauce
      On Herbed Rice Pilaf and Seasonal Vegetables
      Dessert: Key Lime Pie

Copyright © 2003-20 ISSA Hawaii Chapter
PO Box 2297 ~ Honolulu, HI 96804
webmaster@issahawaii.org
Our privacy policy
Trouble with this page?
Website Design and Management by Highpoint Web Design, LLC