Events

Mouse over any item on the left to display further information on the right

  • Wednesday, October 14, 2015

    • Hawaii's 22nd Annual ISSA Discover Security Conference (2-Days)
      Wednesday, October 14, 2015

      Hawaii's 22nd Annual ISSA Discover Security Conference (2-Days)

      All Day

      Hale Koa Hotel, Honolulu, Hawaii


      Theme:
      Cyber Resiliency: The Power to Recover

      The Cyber threat has evolved from hackers causing mischief to nation states and organized crime using offensive cyber operations as political and economic advantages. Cyber resiliency is becoming both a critical business issue and an imperative social issue. Cyber resiliency accepts that we cannot achieve perfect security or absolute continuity. Focus is on balancing resiliency with productivity. Developing better systems architecture and software, focusing on data, and becoming more cyber-aware enables productivity no matter you are or what device you are using.

      Date and Location:
      October 14-15, 2015
      8:00 am - 5:00 pm (Registration begins at 7:15 am)
      Hale Koa Hotel
      Honolulu, Hawaii

      Cost (both days are included):
      ISSA Members/ISACA Members/College Students: $40
      Non-Members: $90

      Deadline:
      Registrations must be received by October 12 to ensure a seat. Registrations received after that date will be accepted on a space available basis.

      Cancellations:
      Cancellations must be received by October 12. "No-shows" will be charged the full amount.

      Attendee Packets:
      The Attendee Packet will continue to be updated as schedule, speakers, and topics are confirmed.

  • Friday, November 20, 2015

    • ISSA Monthly Luncheon: Application Performance Management (FREE, hosted courtesy of Dynatrace)
      Friday, November 20, 2015

      ISSA Monthly Luncheon: Application Performance Management (FREE, hosted courtesy of Dynatrace)

      11:30 AM - 1:30 PM

      Hale Koa Hotel

      RSVP Required!
      by 11-AM Wed., November 18, 2015

      Cost: FREE (Hosted courtesy of Dynatrace)


      Presentation:
      Application Performance Management


      Speaker:
      Bassem Said
      Dynatrace


      Topic:
      Every digital moment and every touch point is vital to your business. Revenue, loyalty and brand image hinge on application performance. Dynatrace delivers the application insights needed to achieve digital success. Learn how Dynatrace helps optimize digital moments for over 7,500 organizations by enabling our customers to:

      * proactively spot and solve application performance issues before users are impacted

      * speed new applications and enhancements to market with DevOps functionality

      * pinpoint root-causes and optimize critical applications

      * know their customers - every click, every swipe, everywhere, every time


      Lunch Menu:
      Appetizer: Hale Koa Salad with Tarragon Dressing
      Main Course: Broiled New York Steak on Roasted Garlic Mashed Potatoes with Cabernet Peppercorn Sauce, Frizzled Onions, Grilled Marinated Squash and Peppers
      Dessert: Vanilla Ice Cream Taco with Fruit Salsa
       

  • Friday, January 15, 2016

    • ISSA Monthly Luncheon: SOPHOS - Security Made Simple (FREE -- hosted courtesy of Sophos)
      Friday, January 15, 2016

      ISSA Monthly Luncheon: SOPHOS - Security Made Simple (FREE -- hosted courtesy of Sophos)

      11:30 AM - 1:30 PM

      Hale Koa Hotel

      RSVP Required!
      by 11-AM Wed., January 13, 2016

      Cost: FREE (Hosted courtesy of Sophos)

      Topic: SOPHOS - Security Made Simple

      With the expanding complexities of a network, coordinating a proper security strategy has become extremely tough. Understanding the adjustments in business operations like virtualization, BYOD and mobility just makes it tougher. SOPHOS is attacking these issues and making security simple!

      Please join us for an in depth conversation on how the different layers of security in your organization can now be integrated and allow for a much stronger security strategy than ever before. We will discuss how Sophos tackles the everyday challenges around vulnerabilities and malware and how our unique Security Heartbeat technology brings together endpoint and networks security layers for a synchronized strategy.

      Sophos has been featured many times on national TV, including the Today Show. Check it out at the link below.

      http://www.today.com/video/protect-yourself-from-hackers-who-can-hold-your-personal-info-hostage-565211715904


      Speakers:

      Dee Bhatia - Territory Executive

      David Wayne Peckler - Sr. Systems Engineer


      Bio:

      Dee Bhatia is an experienced channel professional with over 12 years of experience in the high tech and network security industries. He currently holds the position of Territory Executive with Sophos Inc. and focuses on helping customers and service providers through the complexities of everyday IT security challenges. Dee has worked with several network security leaders and is widely acknowledged by channel and industry representatives as knowledgeable and an expert in the field of network security. Dee holds a Master's in Business Administration from the University of Phoenix and a Bachelor of Science in Biology from California State University, Hayward.

      Joining Dee Bhatia will be David Wayne Peckler, Sr. Systems Engineer with Sophos Inc. David Wayne (aka DWP) has an extremely technical background in IT and network security spanning over 2 decades. He has held several positions with major security organizations and understands how to build out a complete security strategy. If you have a technical question, he has the answer.


      Lunch Menu:

      Appetizer: Hale Koa Salad with Tarragon Dressing

      Main Course: Grilled Skirt Steak with Dijon Shitaki Mushroom Sauce Paired with Crab Cake, Served on Local Style Fried Udon Noodles and Sauteed Zucchini with Tomatoes

      Dessert: Vanilla Ice Cream Taco with Fruit Salsa
       

  • Friday, February 19, 2016

    • ISSA Monthly Luncheon: Most Common Questions in a Client Data Audit (FREE -- hosted courtesy of DIGITAL GUARDIAN)
      Friday, February 19, 2016

      ISSA Monthly Luncheon: Most Common Questions in a Client Data Audit (FREE -- hosted courtesy of DIGITAL GUARDIAN)

      11:30 AM - 1:30 PM

      Hale Koa Hotel

      RSVP Required!
      by 11-AM Wed., February 17, 2016

      Cost: FREE -- hosted courtesy of DIGITAL GUARDIAN

      Presentation: Most Common Questions in a Client Data Audit


      Speaker: Michael Avdeev, Director of Technical Strategy, Business Development, Digital Guardian


      Topic: Are you ready for your next security audit? This luncheon will help you gauge your readiness and identify areas you need to improve.


      Sophisticated cybercriminals have identified third party suppliers and service providers as a lucrative back door to steal sensitive corporate information. Consequently, many companies are facing increasing pressure to meet stringent data protection audits from their largest clients.


      Based on our experience with a range of customers who have had to meet stringent partner data protection security audits, we've identified the most common data protection audit questions.


      Key Attendee Takeaways:

      • The 12 most common questions in a client data protection audit
      • What the client is really looking for with each question
      • Guidance on your "audit readiness"

      Bio: Michael Avdeev has over 18 years of experience in information and network security in the fortune 500 companies, specializing in data protection, governance, compliance, system engineering and architecture. Prior to joining Digital Guardian, Michael was global solution architect at Intel Security Group advising enterprise customers on data protection challenges and security. Also, Michael has held management roles at various organization responsible for providing overall strategic security guidance, ensuring adherence to compliance regulations and system architecture. Michael holds a BS, Computer Science degree from CSU, Hayward. In his spare time Michael enjoys active lifestyle and participating in competitive sporting events.


      Lunch Menu:
      Appetizer: Hale Koa Salad with Tarragon Dressing
      Main Course: Asian Braised Pork with Soy Mirin Sauce, Scallion Rice and Fresh Seasonal Vegetables
      Dessert: Strawberry Cheesecake

  • Friday, March 18, 2016

    • ISSA Monthly Luncheon: Is Your Security Program Ready For a Future of "Continuous Compromises?" (FREE -- Hosted courtesy of Skybox Security)
      Friday, March 18, 2016

      ISSA Monthly Luncheon: Is Your Security Program Ready For a Future of "Continuous Compromises?" (FREE -- Hosted courtesy of Skybox Security)

      11:30 AM - 1:30 PM

      Hale Koa Hotel

      RSVP Required!
      by 11-AM Wed., March 16, 2016

      Cost: FREE - Hosted courtesy of Skybox Security

       

      Presentation: Is Your Security Program Ready For a Future of "Continuous Compromises?"


      Speaker: Michael Bruchanski, Director of Product Marketing, Skybox Security


      Topic: Is your security program ready for a future of "continuous compromises?" New Advanced threats continue to emerge and evolve, while security professionals are struggling to maintain control over expanding devices and infrastructure. The security trends build a concerning picture for security professionals - harder to detect attacks, slower response time, more security tools to manage, more data to analyze.

      In this session we will discuss how to prepare to tackle the security issues of 2016. Learn how to take security to the next level by addressing pressing challenges with innovative solutions. See what tools and methods security professionals are using to manage their network complexity and how they plan to tackle it in the future.


      Bio: Michael Bruchanski is the Director of Product Marketing at Skybox Security with extensive experience in analytics. Prior to Skybox Security, Bruchanski was an engineer at The Boeing Company, and held numerous technical roles at Analytical Graphics, including sales engineer, business development, and product marketing. Bruchanski earned a Masters of Science in Computer Engineering from Villanova University and a Bachelor of Science in Aerospace Engineering from Embry-Riddle Aeronautical University.


      Lunch Menu:
      Appetizer: Hale Koa Salad with Tarragon Dressing
      Main Course: Poached Atlantic Salmon with Green Peppercorn Sauce, Sliced Baked Potato with Parsly Butter and Fresh Seasonal Vegetables
      Dessert: Vanilla Ice Cream Taco with Fruit Salsa

  • Friday, April 15, 2016

    • ISSA Monthly Luncheon: "Securing SaaS: What you don't know can hurt you"
      Friday, April 15, 2016

      ISSA Monthly Luncheon: "Securing SaaS: What you don't know can hurt you"

      11:30 AM - 1:30 PM

      Hale Koa Hotel

      RSVP requested

      Cost: $25 Members/$30 Non-members

       

      Presentation: "Securing SaaS: What you don't know can hurt you"


      Speaker: Michael Sanders, Principal Security Engineer, Imperva


      Topic: Effective cloud security is about reconciling the conflicting needs of the business and IT. Employees want immediate and unrestricted access to cloud services like Office365, while IT must ensure that critical corporate data is both secure and compliant. We will discuss specific data vulnerabilities associated with Office365 adoption and newly discovered vulnerabilities in cloud file sharing services. We will also discuss why device identification is such an important component and what Microsoft provides out-of-the-box for Office365 security.


      Bio: Michael Sanders is a Principal Security Engineer at Imperva, specializing in data security. He is a subject matter expert in perimeter security, application layer protection, and data breach prevention. His broad background spans multiple disciplines including: project management, systems integration, incident response, business continuity, cryptography, telecommunications, and access control. Michael is a CISSP that holds a multitude of vendor and industry certifications. He has given talks at various chapter and regional conferences for SecureWorld, ISSA, and OWASP.


      Lunch Menu:
      Appetizer: Hale Koa Salad with Tarragon Dressing
      Main Course: Duo of Mahi Mahi "Dynamite" and Marinated Herb Grilled Chicken with Macadamia Nut Romesco Sauce, Whole Grain Rice Pilaf and Fresh Seasonal Vegetables
      Dessert: Refreshing Signature Sorbets
       

  • Friday, May 20, 2016

    • ISSA Monthly Luncheon: "The Evolving Landscape of Next Gen Malware"
      Friday, May 20, 2016

      ISSA Monthly Luncheon: "The Evolving Landscape of Next Gen Malware"

      11:30 AM - 1:30 PM

      Hale Koa Hotel

      RSVP requested

      Cost: $25 Members/$30 Non-members


      Presentation: "The Evolving Landscape of Next Gen Malware"


      Speaker: James Stroud, Director of Sales Engineering for North America, Intel Security


      Topic: This session will cover a few Next Gen Malware attacks that are being seen today, will break down those attacks into their various components using a cyber kill chain and how they map to various security solutions.


      Bio:
      James Stroud is the Director of Sales Engineering for North America at Intel Security, covering the Government, Healthcare & Education verticals. In his current position, James leverages an extensive amount of contacts and experience to help focus vertical specific goals and projects around the ever changing security landscape. James is a go-to speaker at Intel's Executive Briefing Center out at the corporate headquarters in California, and leverages his experience to help create the content used there. James has been with Intel Security for over 15 years, and uses that network of contacts to help his customers, ranging from Product Managers to members in the office of the CTO.

      Mr. Stroud is a well-respected member in the Security field across these verticals, with a strong background in mapping business needs across several regulations and security practices, including HIPAA, GLBA, Sarbanes Oxley, ITIL and NIST, to name a few.

      Prior to joining McAfee, Inc. in 2001, Mr. Stroud was a Global Security Consultant for Ericsson. During his time there, his travels took him across 70 countries and 5 continents delivering security focused audits, training and installations to help secure Ericsson's global network in various country offices.

      In addition, James spent many years as a security consultant for many companies in the Fortune 100. This experience helped James better see the big picture, and identify with a customer's needs when it comes to the overall security landscape in any environment.


      Lunch Menu:
      Appetizer: Hale Koa Salad with Tarragon Dressing
      Main Course: Chicken Marsala with Mushrooms, Shallots, Marsala Wine Sauce on an Asparagus Risotto Cake and Fresh Seasonal Vegetables
      Dessert: Tiramisu

  • Friday, June 17, 2016

    • ISSA Monthly Luncheon: How to Defeat Ransomware
      Friday, June 17, 2016

      ISSA Monthly Luncheon: How to Defeat Ransomware

      11:30 AM - 1:30 PM

      Hale Koa Hotel

      RSVP requested

      Cost: $25 Members/$30 Non-members


      Presentation: How to Defeat Ransomware


      Speaker: Keith Tarantino, Trend Micro


      Topic: Trend Micro presents the latest information on methods being used by cybercriminals including how to effectively protect your organization from ransomware and the more insidious crypto-ransomware.


      Bio: Keith Tarantino has nearly 20 years' experience in the computer industry, with the last 10 focused on cybersecurity and IT governance. He has significant enterprise-level experience in multiple industries working in both technical and management positions. He holds an Executive Juris Doctor from Concord Law School, a Master of Science in Information Technology from CSU Fullerton and the CISSP Certification.


      Lunch Menu:
      Appetizer: Hale Koa Salad with Tarragon Dressing
      Main Course: Herb Marinated Grilled Striploin and Citrus Honey Mustard Glazed Chicken with Mashed Poiaioes and Fresh Seasonal Vegetables
      Dessert: Calamansi Tart with White Chocolate Mousse

  • Friday, July 15, 2016

    • ISSA Monthly Luncheon Hosted by Cisco: How to Provide Cloud Visibility and Protect Against Insider Threat - FREE
      Friday, July 15, 2016

      ISSA Monthly Luncheon Hosted by Cisco: How to Provide Cloud Visibility and Protect Against Insider Threat - FREE

      11:30 AM - 1:30 PM

      Hale Koa Hotel

      RSVP requested

      Cost: $0 Members/$0 Non-members

      ----------------------------------------------------------

      Presentation: Cisco's Cyber Threat Defense Solutions - How to Provide Cloud Visibility and Protect Against Insider Threat


      Speaker: Alex Mershon, Cisco Security Consulting Engineer


      Topic: While the current threat landscape is full of sophisticated and well-resourced adversaries, one of the most dangerous is the insider because they already have access to the sensitive data on your network.

      According to a report from Forrester Research, nearly half of technology decision makers who experienced a data breach in the year studied reported that an internal incident was the source of their compromise.

      Since firewalls and perimeter defenses are largely incapable of addressing insider threats, organizations must turn to internal network monitoring and analytics to identify threats based on their behavior.

      Join us as Cisco's Security team presents on "Cloud Visibility and How to Protect Against Insider Threat" to learn what to look for to protect your organization from this challenging attack type. The presentation will cover topics including:

      * Insider threat prevalence
      * Major signs of insider threat activity
      * How to detect these signs
      * How to identify an insider threat before they impact your organization
      * Cloud visibility and protection


      Bio: Alex Mershon recently relocated to Honolulu, Hawaii to become part of Cisco's local security sales team. He brings over 20 years of experience in IT and security industry with a wealth of experience. He initially enlisted in the Air Force and worked for a US Intelligence agency. He has most recently been with Cisco for the past 7 years supporting US DoD, Intel and now the Hawaii/Pacific Rim region.


      Lunch Menu:
      Appetizer: Hale Koa Salad with Tarragon Dressing
      Main Course: Grilled Black Tiger Shrimp Pasta, Fettuccine Pasta Tossed with Marinara Sauce, Mushrooms, Spinach and Garlic
      Dessert: Refreshing Signature Sorbets

  • Friday, August 19, 2016

    • ISSA Monthly Luncheon Hosted By Optiv: Building a Third Party Risk Program FREE
      Friday, August 19, 2016

      ISSA Monthly Luncheon Hosted By Optiv: Building a Third Party Risk Program FREE

      11:30 AM - 1:30 PM

      Hale Koa Hotel

      RSVP requested

      Cost: $0 Members/
      $0 Non-members


      Presentation: Building a Third Party Risk Program


      Speaker: James Christiansen, Vice President, Information Risk Management, Optiv


      Topic: The sheer volume and cost of onsite security risk assessments of third parties is daunting. With the board and regulators pushing for results, how can you extend your security practices to your third parties? This session details how to establish a third party IT risk management program using firsthand experience. The speaker will discuss what works, what doesn't, and how to change the paradigm.


      Bio: James Christiansen is a seasoned business leader with deep technical expertise and is recognized as a global thought leader. As the vice president of information risk management and member of the Office of the CISO at Optiv, Christiansen helps chief experience officers (CXOs) make executive decisions based on the balance of risk and cost. He is responsible for developing and delivering a comprehensive suite of strategic services and solutions to help CXO executives change their security strategies through innovation. Prior to his tenure at Optiv, Christiansen was chief information risk officer for Evantix and chief security officer for Experian Americas. He joined Experian after serving as chief information security officer for General Motors where his responsibilities included worldwide implementation of security plans for the largest financial (GMAC) and the largest manufacturing corporation in the world. Christiansen previously served as senior vice president and division head of information security for Visa International, where he was responsible for the company's worldwide information security program. Christiansen also conducted security strategy work with numerous health care organizations and served as the CISO and chief privacy officer of San Diego Health Connect. He co-authored and co-chaired the ANSI study on the financial impacts of breaches on health care, and co-founded the PHI Protection Network. Christiansen is a sought after expert speaker in the industry. He has served as featured speaker and moderator at the PPN Forum for the past three years, and has spoken at prestigious events such as the Business Round Table, Research Board, American Bar Association, American Banker, the RSA Conference, BankInfoSecurity, ISSA and MIS Training Institute. He has been featured in The New York Times and in the past year quoted in USA Today, The Wall Street Journal, Bloomberg and Healthcare.IT and appeared on the Dark Reading radio show. Christiansen is a patent inventor and has received three innovation awards in cyber security, GRC and cloud computing. He is the author of the "Internet Survival Series" and contributing author of "CISO Essentials" as well as numerous industry papers. Christiansen earned his master's degree in business administration in international management and his bachelor's degree in business management from Westminster College.


      Lunch Menu:
      Appetizer: Hale Koa Salad with Tarragon Dressing
      Main Course: Sauteed Herb Seasoned Chicken, Deglazed with Balsamic Vinegar and Finished with Butter, Fresh Seasonal Vegetables and Roasted Garlic Mashed Potatoes
      Dessert: Vanilla Ice Cream Taco with Fruit Salsa
       

  • Friday, September 16, 2016

    • ISSA Monthly Luncheon: ISECOM's Hacker High School Program
      Friday, September 16, 2016

      ISSA Monthly Luncheon: ISECOM's Hacker High School Program

      11:30 AM - 1:30 PM

      Hale Koa Hotel

      RSVP requested

      Cost: $25 Members/$30 Non-members


      Presentation: ISECOM's Hacker High School Program


      Speaker: Bob Monroe, Institute for Security and Open Methodologies Hawaii


      Topic: ISECOM's Hacker High School program is designed to teach high school students how to be cyber security professionals in a very innovative way. We all know we need more Security Professionals in the future and ISECOM's program is designed to provide High Schoolers with a much more in-depth program than normal. We teach open source and not commercial tools. We teach the command prompt instead of some fancy GUI interface. We expect students to make mistakes and learn from those errors. We also expect our participants to adhere to local and international laws regarding the digital realm. Criminal behavior is not acceptable nor tolerated at Hacker High School.

      There is no law written where hacking is a crime. The media will tell you otherwise but we at the Institute for Security and Open Methodology know for a fact that hacking is not illegal. Computer crime is illegal. Unauthorized access is criminal behavior. Stealing data and credentials is breaking the law. Taking things that do not belong to you is wrong but hacking itself is not a crime. The sole purpose of Hacker High School is to teach high school students how to be cyber security professionals.

      There is no law written where hacking is a crime. The media will tell you otherwise but we at the Institute for Security and Open Methodology know for a fact that hacking is not illegal. Computer crime is illegal. Unauthorized access is criminal behavior. Stealing data and credentials is breaking the law. Taking things that do not belong to you is wrong but hacking itself is not a crime. The sole purpose of Hacker High School is to teach high school students how to be cyber security professionals.


      Bio: Bob Monroe grew up in Southern California before he joined the U.S. Army in 1985. One of Bob's first military assignments introduced him to the world of hacking. His prankster ways ended abruptly in 1996 when he was almost caught hacking by an eighty-two year old librarian. This incident led to a renewed interest in cyber security, as a good guy. Since then, he has written several articles for publication and maintains a passion for digital security. Bob holds a Master of Science in Information Assurance from Norwich University. Bob's specialty is public teaching and security awareness training. Along with work for the U.S. Army, he has provided security classes for the Veterans Administration, Military District of Washington, Commandant of the Marine Corp and staff, as well as countless others across the world. He holds a U.S. Patent for airport security automation technology that combines radar and thermal imaging to protect aircraft movement areas and the surrounding airspace. Bob works with ISECOM as an editor and writer. He also works as an editor/writer and English interpreter for Hackin9 and Eforensic Magazines. Both publications are produced in Europe with an international clientele. In his spare time, Bob makes children's toys in his small woodshop. He still has all eight fingers, too.


      Lunch Menu:
      Appetizer: Hale Koa Salad with Tarragon Dressing
      Main Course: Smoked Soy Marinated Chicken on Fettuccine Pasta, Fresh Julienne Vegetables and Mirin Cream Sauce
      Dessert: Classic Creme Brulee

  • Wednesday, October 12, 2016

    • Hawaii's 23rd Annual ISSA Discover Security Conference (2-Days)
      Wednesday, October 12, 2016

      Hawaii's 23rd Annual ISSA Discover Security Conference (2-Days)

      All Day

      Pomaika'i Ballrooms at Dole Cannery

      Theme:
      From Intrusion Detection to Recovery: How Will Executives be Measured In the Future?

       

      This year's agenda has been expanded to cover a wide gamut of topics on IT Security.   More presenters and more exhibitors.   Please download the attendee packet below for a detailed Agenda.


      Date and Location:
      October 12-13, 2016
      8:00 am - 5:00 pm (Registration begins at 7:15 am)
      Pomaika'i Ballrooms at Dole Cannery
      735 Iwilei Rd
      Honolulu, HI 96817

      Cost (both days are included):
      ISSA Members/ISACA Members/College Students: $50
      Non-Members: $100

      Deadline:

      Registrations must be received by October 10 to ensure a seat. Registrations received after that date will be accepted on a space available basis.

      Cancellations:

      Cancellations must be received by October 10. "No-shows" will be charged the full amount.

      Attendee Packets:

      The Attendee Packet will continue to be updated as schedule, speakers, and topics are confirmed.

Copyright © 2003-24 ISSA Hawaii Chapter
PO Box 2297 ~ Honolulu, HI 96804
webmaster@issahawaii.org
Our privacy policy
Trouble with this page?
Website Design and Management by Highpoint Web Design, LLC