Hawaii Chapter

Events

Previous

Event Listing -- Monthly Luncheons

Next

Mouse over any item on the left to display further information on the right

  • Friday, March 17, 2017

    • ISSA Monthly Luncheon: Hosted by BitDefender/BPS Replacing AV with Something That Works
      Friday, March 17, 2017

      ISSA Monthly Luncheon: Hosted by BitDefender/BPS Replacing AV with Something That Works

      11:30 AM - 1:30 PM

      Hale Koa Hotel

      RSVP requested

      Cost: $0 Members/$0 Non-members


      Presentation: Replacing your current traditional AV Vendor with Something That Works


      Speaker: Brandon Bautista,  Solutions Engineer, BitDefender


      Topic: Anti-virus has been painful in both customer service innovation and endpoint bandwidth consumption, Bitdefender is going to show an alternative to the heavy antiquated AV solutions of the past. This proven methodology will seamlessly replace your current solution and bring additional layers of security!

      During lunch you will learn:

      · How Bitdefender's security- protects against unknown, advanced and zero-day threats with low false positive rates with a very light footprint and low CPU Usage

      · How BitDefender can replace your current solution with their proven replacement methodology so as not to break your business

      · A hypervisor agnostic solution to secures Citrix and VM Ware environments with an agentless option for the Data Center


      Bio: Bitdefender is a global IT security company specializing in endpoint protection for physical, virtual and mobile environments. More than 500 million users worldwide are protected by Bitdefender innovation, which handles more than 7 billion requests per day in its cloud security infrastructure.  

      Year over year, our technologies win industry awards for best performance, detection and protection. Customers report that Bitdefender technologies deliver on the promise of advanced protection, fast and easy deployment, better operational performance, and superior centralized management. Our technology is hypervisor and OS agnostic, so no matter what technologies you are using in your datacenter, integration will not be an issue.


      Lunch Menu:
      Appetizer: Hale Koa Salad with Tarragon Dressing
      Main Course: Sautéed Fresh Island Fish
      Lemons Beurre Blanc, Lomi Lomi Tomato Relish,
      Herb Roasted Whole Potatoes and Fresh Seasonal Vegetables
      Dessert: Vanilla Ice Cream Taco with Fruit Salsa
       

  • Friday, April 21, 2017

    • ISSA Monthly Luncheon: Hosted by Fidelis/HiTech Hui, The Evolving Threat Landscape, Preparing for Next Gen Technology
      Friday, April 21, 2017

      ISSA Monthly Luncheon: Hosted by Fidelis/HiTech Hui, The Evolving Threat Landscape, Preparing for Next Gen Technology

      11:30 AM - 1:30 PM

      Hale Koa Hotel

      RSVP requested; please be mindful that ISSA Hawaii is under contract with Hale Koa and will have to pay for no-shows.

      Cost: $0 Members/$0 Non-members


      Presentation: Evolution of the Threat Landscape, Preparing for Next Generation technology


      Speaker: Juan Hernandez, HiTech Hui


      Topic: Organizations face an evolving threat scenario that all of us are ill prepared to deal with. Threats that have bypassed the traditional security protection technology can reside undetected on our system. Fidelis Cybersecurity will help cut through all the noise and discuss best practices.


      Bio: Juan Hernandez is a graduated from Devry University in Electronics Engineering Technology and has been in the technology industry for over 15 years. He has lots of hands on experience with customers, which has given him the expertise and a unique perspective on the evolution of Cybersecurity and best practices.


      Lunch Menu:
      Appetizer: Hale Koa Salad with Tarragon Dressing
      Main Course: 48 Hour Brined Pork Loin
      Crusted with Buba Arare, Apple Cider Gastrique
      and Fresh Seasonal Vegetables
      Dessert: Refreshing Signature Sorbets

       

  • Friday, May 19, 2017

    • ISSA Monthly Luncheon: Hosted By FireEye/Mandiant, Real World Security
      Friday, May 19, 2017

      ISSA Monthly Luncheon: Hosted By FireEye/Mandiant, Real World Security

      11:30 AM - 1:30 PM

      Hale Koa Hotel

      RSVP requested

      Cost: $0 Members/$0 Non-members


      Presentation: Cyber/Real World Security


      Speaker: Navid Jam, Information Security Consulting Services Director, Mandiant


      Topic: Despite billions invested in cyber security as well as increased regulations and compliance frameworks, breaches continue to plague companies. Why?

      In this lunch presentation, we will discuss the threats organizations of all sizes face and how to look "under the hood" to assess the "real world security" of your organization.

      Presentation will include

      · Emerging & current threat trends

      · How to effectively asses your security posture

      · Why you cannot take security at face value


      Bio:Navid Jam is an experienced security leader with over 15 years of experience running complex security incident response engagements of all sizes, threat and vulnerability assessments, and enterprise security strategy engagements for a range of organizations, including Fortune 500 companies and the U.S. federal government. Jam is regarded as a trusted advisor to his clients and has a successful track record of helping them minimize their information security risk.


      Lunch Menu:
      Appetizer: Hale Koa Salad with Tarragon Dressing
      Main Course: Cajun Pan Seared Chicken
      With Etouffee Sauce, Creole Rice
      and Fresh Seasonal Vegetables
      Dessert: Mango Bar with Lime Cream
       

  • Friday, June 16, 2017

    • ISSA Monthly Luncheon: Hosted by Log Rhythm, Arming SecOps Warriors
      Friday, June 16, 2017

      ISSA Monthly Luncheon: Hosted by Log Rhythm, Arming SecOps Warriors

      11:30 AM - 1:30 PM

      Hale Koa Hotel

      RSVP requested

      Cost: $0 Members/$0 Non-members


      Presentation: Arming SecOps Warriors: Detect, Respond, Neutralize

      Speaker: Rocky Rosas -   Senior Solutions Consultant - LogRhythm


      Topic: The days of layered, prevention-centric security strategies are behind us. Motivated and well-funded cyber criminals, organizations, and nation states have proven that traditional strategies are futile. Cyber threats are growing, are a daily challenge for our SecOps organizations, and require a new integrated approach to detection and response. Effective Threat Lifecycle Management (TLM) is the key to technology-enabling efficient workflow that optimally aligns SecOps efforts around key performance metrics. Learn how technologies such as Log Management, SIEM, User/Entity Behavioral Analytics, Endpoint and Network Forensics, and Security Automation and Orchestration can be incorporated to provide a single optimally efficient workflow to improve your ability to detect, respond, and neutralize threats.


      Bio:  Rocky Rosas is a Senior Solutions Consultant at LogRhythm, the Security Intelligence Company, and is based in Southern California. Mr. Rosas is a Stanford University graduate in Mathematical and Computational Sciences. He has 30+ years of large-scale enterprise and service provider information technology experience, with the last 11 years focused on data security. As a five year veteran of LogRhythm, Mr. Rosas has been engaged in the requirements analysis and design of a significant number of successful SIEM and Security Intelligence platform deployments. Prior to his current role at LogRhythm, Mr. Rosas was a Product Specialist inside IBM's Security Division focusing on monitoring solutions for database security and usage.


      Lunch Menu:
      Appetizer: Hale Koa Salad with Tarragon Dressing
      Main Course: Poached Atlantic Salmon
      Green Peppercorn Ginger Sauce,
      Sliced Baked Potato with Parsley Butter and Fresh Seasonal Vegetables
      Dessert: Chocolate Haupia Pie
       

  • Friday, July 21, 2017

    • ISSA Monthly Luncheon: Hosted by Gigamon, Software Defined Visibility
      Friday, July 21, 2017

      ISSA Monthly Luncheon: Hosted by Gigamon, Software Defined Visibility

      11:30 AM - 1:30 PM

      Hale Koa Hotel

      RSVP requested

      Cost: $0 Members/$0 Non-members


      Presentation: Software Defined Visibility,  How Next Generation Packet Brokers Make This Possible


      Speaker: Marcus Salvemini


      Topic: When deploying security defenses, Packet Brokers can provide the most advanced engineering capabilities to manipulate the flows and packets before they are ingested by the Security tools,  and need to be included in the overall SDN design.

      Next Generation Packet Brokers have the ability to integrate with SDN controllers through the use of RESTFull API's.

      These Packet Brokers come with a robust Software interface that lends itself to the basic 4 constructs of SDN controlled infrastructures and therefore make it a simple bridge between the Controller and the underlying Packet Broker platforms, allowing the SDN controller to automate many actions taken at the Fabric layer of the Packet Broker, as well as providing manual interaction by the controller and the physical platform when needed.


      Bio:


      Lunch Menu:
      Appetizer: Hale Koa Salad with Tarragon Dressing
      Main Course: Grilled Mediterranean Chicken
      Tomato Jam and Extra Virgin Olive Oil,
      Fresh Seasonal Vegetables, and Roasted Potatoes
      Dessert: Refreshing Signature Sorbets
       

  • Friday, August 18, 2017

    • ISSA Monthly Luncheon: Hosted by Cisco, Ransomware and Umbella openDNS
      Friday, August 18, 2017

      ISSA Monthly Luncheon: Hosted by Cisco, Ransomware and Umbella openDNS

      11:30 AM - 1:30 PM

      Hale Koa Hotel

      RSVP requested

      Cost: $0 Members/$0 Non-members


      Presentation: Ransomware and Umbrella OpenDNS


      Speaker: Austin Bates, Cisco Account Manager SLED | Cloud Security
      Chris Frost, Cisco Consulting Systems Engineer | Cloud Security


      Topic: Join us for a discussion on the ever-evolving Ransomware landscape and how Cisco Umbrella is helping its customers better defend against it. While technology shifts have made things easier for us it has also made things easier for cybercriminals as well. However, there are steps you can take to actively reduce the number of ransomware infections across your organization.

      Key Points:

      · To reduce ransomware infections across your organization

      · Ransomware has evolved and what we know about it today

      · To predict what ransomware might do next

      · You can identify the internet infrastructure used by the attackers to connect, control, and transfer the encryption keys


      Bio:Austin Bates is the Cloud Security Account Manager responsible for all SLED operations on the West Coast. Prior to the acquisition of OpenDNS by Cisco Austin created and ran the Higher Education program within OpenDNS. Austin came to OpenDNS from San Francisco based consulting firm Singer Associates.

      Chris Frost has been working in Cyber Security for 4 years. He joined the Cisco Security business group as a Consulting Systems Engineer via the OpenDNS acquisition. Prior to Cisco and OpenDNS, he started his career at Google where he where he helped launch the Nexus 7 tablet


      Lunch Menu:
      Appetizer: Hale Koa Salad with Tarragon Dressing
      Main Course: Main Course: Asian Braised Pork
      Soy Mirin Sauce, Scallion Rice and Fresh Seasonal Vegetables
      Dessert: Vanilla Ice Cream Taco with Fruit Salsa
       

  • Friday, September 15, 2017

    • ISSA Monthly Luncheon: Hosted by Symantec, Symantec's award-winning annual Internet Security Threat Report
      Friday, September 15, 2017

      ISSA Monthly Luncheon: Hosted by Symantec, Symantec's award-winning annual Internet Security Threat Report

      11:30 AM - 1:30 PM

      Hale Koa Hotel

      RSVP requested

      Cost: $0 Members/$0 Non-members


      Presentation: Symantec's award-winning annual Internet Security Threat Report


      Speaker: Kevin Haley - Director, Symantec Security Response


      Topic: Based on data from Symantec's comprehensive collections of cyber security threat intelligence, this talk will take a wide-ranging look at the threat landscape, including a detailed look at how attackers frequently used very simple tools and tactics to make a big impact. In addition it will address today's sophisticated malware and malicious emails and a look at trends in ransomware, underground market places and attacks on Internet of Things (IoT) devices.


      Bio:Kevin Haley is Director of Product Management for Symantec Security Technology And Response (STAR), where he is responsible for ensuring the security content gathered from Symantec's Global Intelligence Network is actionable for its customers. He is the technical advisor and main spokesperson for Symantec's Annual Internet Security Threat Report. He served as a technical advisor for Anthony E. Zuiker's digital crime thriller, "Cybergeddon" and appeared in the documentary "Most Dangerous Town". He also frequently appears as a security expert for media including The Today Show, NBC Nightly News, Good Morning America, MSNBC, USA Today, New York Times, Forbes, Dow Jones and many others.


      Lunch Menu:
      Appetizer: Hale Koa Salad with Tarragon Dressing
      Main Course: Grilled Skirt Steak with Dijon Shitake Mushroom Sauce
      Paired with Broiled Mahi Mahi Filet
      Local Style Udon Noodles and Sautéed Zucchini with Tomatoes
      Dessert: Classic Dutch Apple Pie with Vanilla Ice Cream
       

  • Friday, November 17, 2017

    • ISSA Monthly Luncheon: FREE ISSA Member Thank You Lunch and Discussion
      Friday, November 17, 2017

      ISSA Monthly Luncheon: FREE ISSA Member Thank You Lunch and Discussion

      11:30 AM - 1:30 PM

      Hale Koa Hotel

      RSVP requested

      Cost: $0 Members/$30 Non-Members


      Presentation: An ISSA Member Thank You and Discussion


      Speaker:  ISSA Board and Members


      Topic: This is a FREE Lunch to thank ISSA Hawaii Members for your support throughout the year.  Also, there will be an open discussion seeking feedback on th erecent Discover Security Conference, Monthly Lunches, and other ISSA Hawaii programs.

      Non-Members are also welcome at the standard $30 Non-Member rate.


      Bio:


      Lunch Menu:
      Appetizer: Hale Koa Salad with Tarragon Dressing
      Main Course: Broiled New York Steak
      Cabernet Peppercorn Sauce, Frizzled Onions, Roasted Garlic Mashed Potatoes and Grilled Marinated Squash and Peppers
      Dessert: Vanilla Ice Cream Taco with Fruit Salsa
       

  • Friday, January 19, 2018

    • ISSA Monthly Luncheon: Detect, Prevent and Recover - Understanding Security in the Cloud Era By Barracuda
      Friday, January 19, 2018

      ISSA Monthly Luncheon: Detect, Prevent and Recover - Understanding Security in the Cloud Era By Barracuda

      11:30 AM - 1:30 PM

      Hale Koa Hotel

      RSVP requested
      Members $25/ Non-Members $30


      Presentation: Detect, Prevent and Recover - Understanding Security in the Cloud Era


      Speaker: Paul Eiler - Barracuda Channel Manager for Southern California, Nevada and Hawaii
      Chad Haskell - Barracuda Systems Engineer - Data Protection, Western Region


      Topic: Detect, Prevent and Recover - Understanding Security in the Cloud Era

      As tech advances, new ways of working / playing online evolve, it opens up new opportunities to hackers. There is now more information in the public cloud than ever before. Most people don't realize that this information can be leveraged in surprising ways to form a target attack on individuals and organizations when least expected. Where users were once static, a firewall and malware filters may have been enough - guarding the perimeter. Today there is no perimeter. People move - so does the data. Wifi gives access everywhere and users mostly have no idea of the risks they are being exposed to when they connect to these ungoverned networks. Simply put, users spend much of their time the other side of your fire wall, and then unwittingly bring the threat back inside your network often avoiding detection.
      Threats are changing daily, new threat vectors are constantly being opened and created. Modern day security is about deploying/managing multiple layers of security solutions, but in today's cloud era how can you effectively detect the current threats they may reside in your environment? Do you have a plan to detect your current threats, including those residing in your organization already? Once those threats are detected, do you have a plan to prevent those threats and in the event of a breech recover quickly? Most importantly, does your current security solutions integrate into platform designed to deal with advanced persistent threats across multiple threat vectors?

      Bio:Paul Eiler - Barracuda Channel Manager for Southern California, Nevada and Hawaii

      Came to Barracuda Networks 3 years ago assuming the role of Channel Manager for Southern California, Nevada and Hawaii. My primary role is working with Barracuda's top partners in the Southwest region who focus on security solutions. I work with these partners to develop sales/technical training programs and go-to-market strategies. I currently hold many Barracuda Product Specialist certifications in multiple areas including Cloud Security, Network Security and Data Protection products and services.

      Chad Haskell - Barracuda Systems Engineer - Data Protection, Western Region


      Started with Yosemite Technologies in '05, which was later acquired by Barracuda in '08. I have held positions in Tech Support, OEM Training, Quality Assurance, Product Management, Partner Enablement and currently Systems Engineering. While I specialize in Data Protection products I also cover Email Security, Web Security, and CloudGen Firewalls. Over two years ago I started helping the cloud team and have participated at shows like AWS Re:invent, Microsoft Inspire. These experiences have helped me to see how various technology is used to solve to solve a great many different problems and better understand the history of threats and how the threat landscape is evolving today and the protection that is needed to ensure business continuity today how to position for the future.


      Lunch Menu:
      Appetizer: Hale Koa Salad with Tarragon Dressing
      Main Course: Grilled Skirt Steak with Dijon Shitaki Mushroom Sauce, Paired with Crab Cake, Local Style Udon Noodles, and Sauted Zucchini with Tomatoes
      Dessert:Vanilla Ice Cream Taco with Fruit Salsa 

  • Friday, February 16, 2018

    • ISSA Monthly Luncheon: Hosted by Wirex, Forensics - From Prevention to Response
      Friday, February 16, 2018

      ISSA Monthly Luncheon: Hosted by Wirex, Forensics - From Prevention to Response

      11:30 AM - 1:30 PM

      Hale Koa Hotel

      RSVP requested

      $0 Members/ $0 Non-Members


      Presentation: Forensics - From Prevention To Response

      Speaker: Tomer Saban, CEO and Co-Founder Wirex


      Topic:Unleash the Power of Your SOC to Handle More Threats in Significantly Less Time


      WireX Systems is a network forensics company that has shifted the paradigm in security investigations. The company was founded in 2010 to deliver cutting-edge security forensics systems for intelligence agencies across the globe. Today, leading enterprises choose WireX Systems as a key component in their forensics infrastructure to accelerate incident response, mitigate data theft and simplify responding to the magnitude of security alerts they must action every day.
      WireX Systems' mission is to deliver the best forensics experience for the enterprise with the greatest amount of context and history to make security investigations easy. It provides a


      Breakthrough for your current forensics limitations,skill set barriers, and manpower shortage


      They Automate all the heavy lifting of data analysis.


      They deliver comprehensive security intelligence in actual human readable form so you can save effort and time when validating alerts and responding to security incidents. By providing instant access to content and behavior aware intelligence, security teams can efficiently reveal the scope and impact of an incident without significant manual work that requires deep expertise. The slow mean time to detect security breaches requires greater history and context to be available during investigations.


      Bio:Tomer Saban, CEO & Co-Founder Wirex Systems

      Tomer Saban is leading the global WireX Systems business, which is on a mission to revolutionize the way cyber security investigations are performed. Tomer has very rich experience in network security that spans from working with intelligence agencies around the world on Lawful interception projects to commercial verticals like Banking, Insurance, Utilities, Pharma, Health Care, Retail and more. Tomer was responsible for formulating the strategy and managing the process leading to a total of $14 million in financing to bring WireX System product into the commercial space.

      - 8200 Entrepreneurship and innovation program
      - Merage institute Innovation program
      - Bsc Computer Science


      Lunch Menu:
      Appetizer: Hale Koa Salad with Tarragon Dressing
      Main Course: 48 Hour Brined Pork Loin, Crusted with Buba Arare, Apple Cider Gastrique and Fresh Seasonal Vegetables
      Dessert: Refreshing Signature Sorbets 

  • Friday, March 16, 2018

    • ISSA Monthly Luncheon: Hosted by Splunk; Building an Analytics Driven Security Operation Center
      Friday, March 16, 2018

      ISSA Monthly Luncheon: Hosted by Splunk; Building an Analytics Driven Security Operation Center

      11:30 AM - 1:30 PM

      Hale Koa Hotel

      RSVP requested
      Members $0, Non-Members $0


      Presentation: Building an Analytics Driven Security Operation Center

      Speaker: Ernie Welch, Sr. Sales Engineer, Splunk Inc.


      Topic:Learn best practices for deploying an analytics-enabled SOC with our security expert. Whether you are interested in building a SOC, enhancing an existing SOC or building out a security practice, this session will explain the people, processes and technology required. The discussion will also cover how Splunk can complement a SIEM that may already be in place in the SOC.

      Bio:Ernie Welch joined Splunk in September 2015. He brings more than 25 years' experience in technology solution sales, from concept to delivery. Ernie was most recently with HP, where he was a senior Universal CMDB engineer focused upon application discovery and dependency mapping, helping customers understand their environments form a business service context.


      Lunch Menu:
      Appetizer: Hale Koa Salad with Tarragon Dressing
      Main Course: Baked Mahi Mahi Filet, Tomato Chive Beure Blanc, Garlic Mashed Potatoes and Fresh Seasonal Vegetables
      Dessert: Mango Bar with Lime Cream 

  • Friday, April 20, 2018

    • ISSA Monthly Luncheon: Hosted by Science Logic/Hybrid IT Infrastructure Monitoring & Management
      Friday, April 20, 2018

      ISSA Monthly Luncheon: Hosted by Science Logic/Hybrid IT Infrastructure Monitoring & Management

      11:30 AM - 1:30 PM

      Hale Koa Hotel

      RSVP requested

      Cost: Members $0/Non-Members $0


      Presentation: Hybrid IT Infrastructure Monitoring & Management

      Speaker: Steve Fry, Account Executive Science Logic Inc

      Kim Miroy, Sr. Sales Engineer, Science Logic, Inc.


      Topic:Hybrid IT Infrastructure Monitoring & Management

      Learn how to monitor your entire Infrastructure (Network, Storage, Compute, Power) both on premise and in the cloud, while still performing traditional data center and network infrastructure monitoring. Doing so can

      . Accelerate cloud adoption and data center consolidation

      · Provide deep visibility for both AWS and Azure

      · Provide a single pane of glass across your multi-cloud and on premise infrastructure environment

      · Reduce labor costs, MTTR, and improve efficiency through automation capabilities

      · Contextualize through Infrastructure Dependency Mapping

      ScienceLogic will be used as an example of how this can be done, since it is the first end-to-end IT infrastructure monitoring company ever to conform to the U.S Department of Defense's rigorous security and interoperability standards.

      Bio:Steve Fry is an Account Executive at Science Logic with over 20 year's experience selling to Enterprise and Government accounts. For the past 10 years he has focused on Application and Network Monitoring. He recently joined ScienceLogic to cover Infrastructure Monitoring in Southern California and Hawaii

      Kim Miroy is a Sr. Sales Engineer who has been with ScienceLogic for nearly 3 years. She brings over 18 years of IT experience having worked as a network engineer prior to going into technology solution sales. She loves helping customers achieve visibility into their IT infrastructure in order to help them be more proactive thus freeing up cycles to spend time working on different projects instead of always being in fire fighting mode


      Lunch Menu:
      Appetizer: Hale Koa Salad with Tarragon Dressing
      Main Course: Red Wine Braised Boneless Short Rib, Matignon of Root Vegetables, Scallion Mashed Potatoes and Fresh Seasonal Vegetables
      Dessert: Classic Creme Brulee 

Copyright © 2003-18 ISSA Hawaii Chapter
PO Box 2297 ~ Honolulu, HI 96804
webmaster@issahawaii.org
Our privacy policy
Trouble with this page?
Website Design and Management by Highpoint Web Design, LLC