Events

Mouse over any item on the left to display further information on the right

  • Tuesday, October 15, 2019

    • Hawaii's 26th Annual ISSA Discover Security Conference (2-Days)
      Tuesday, October 15, 2019

      Hawaii's 26th Annual ISSA Discover Security Conference (2-Days)

      All Day

      Pomaika'i Ballrooms at Dole Cannery

      Theme:

      What Keeps You Up At Night

      Maintaining organizational security against cyberthreats last year was a unique challenge. Cybercriminals turned up their execution a notch - targeting specific industry verticals, organizations, and even individuals. Increases in the frequency of ransomware, phishing, and cryptojacking attacks were experienced by businesses of nearly every size, vertical, and locale. Find out how to resolve these issues that are keeping you "up at night"; that is, which aspects of security - from prevention, to attack, to detection, to response - you are most concerned about.

       

      More Details are available by pasting this URL into your Browser

      http://www.issahawaii.org/events.cfm?v=5&t=20191006&c=0&lc=1


      Date and Location:
      October 15-16, 2019
      8:00 am - 5:00 pm (Registration begins at 7 am)
      Pomaika'i Ballrooms at Dole Cannery
      735 Iwilei Rd
      Honolulu, HI 96817

      Cost (both days included):
      ISSA Members/ISACA Members/College Students/DoD Employees: $50
      Non-Members: $100

      HI State and City & County IT Employees, Military IT Members in uniform: $0

      $6 Validated Parking

      Deadline:

      Registrations must be received by October 10 to ensure a seat. Registrations received after that date will be accepted on a space available basis. Registration will close when maximum capacity is reached.

      Cancellations:

      Cancellations must be received by October 10.

      Attendee Packets:

      The Attendee Packet shows most of the Topics and Speakers. It will continue to be updated as more Topics are updated.  It canbe viewed by placing this URL into your Browser:

      http://www.issahawaii.org/events.cfm?v=5&t=20191006&c=0&lc=1

  • Friday, November 15, 2019

    • ISSA Monthly Luncheon:Hosted by BitGlass/Hi Tech Hui, Top CASB Use Cases
      Friday, November 15, 2019

      ISSA Monthly Luncheon:Hosted by BitGlass/Hi Tech Hui, Top CASB Use Cases

      11:30 AM - 1:30 PM

      Hale Koa Hotel

      RSVP requested
      Members $ 0/ Non-Members $ 0


      Presentation:Top CASB Use Cases


      Speaker: Jacob Serpa, Sr. Product Marketing Manager at Bitglass, Inc.

      Topic:Cloud access security brokers (CASBs) have become the go-to solutions for CISOs and security architects looking to protect data in applications like Office 365, Box, G Suite, and AWS. Still, there remains the question of what challenges CASBs solve. Where do next-gen firewalls and secure web gateways fall short? IT leaders often ask: what are the top CASB use cases?

      We'll explore the most common CASB use cases from real-time data loss prevention to threat protection. Learn how leading organizations are leveraging CASB technology to achieve compliance, mitigate zero-day threats, improve visibility over high-risk data outflows, and secure data stored in these new cloud platforms.

      Bio:Jacob Serpa is a cybersecurity expert working as a Sr. Product Marketing Manager at Bitglass in Silicon Valley. He is passionate about helping others to protect their personal information and earned his MBA at San Jose State university where he was top of his class.


      Lunch Menu:
      Appetizer: Hale Koa Salad with Tarragon Dressing
      Main Course: Broiled New York Steak, Cabernet Peppercorn Sauce, Frizzled Onions, Roasted Garlic Mashed Potatoes and Grilled Marinated Squash and Peppers
      Dessert: Vanilla Ice Cream Taco with Fruit Salsa

  • Friday, January 17, 2020

    • ISSA Monthly Luncheon:Hosted by CrowdStrike; Survival of the Fastest - The 1/10/60 Challenge
      Friday, January 17, 2020

      ISSA Monthly Luncheon:Hosted by CrowdStrike; Survival of the Fastest - The 1/10/60 Challenge

      11:30 AM - 1:30 PM

      Hale Koa Hotel

      RSVP requested
      Members $ 0 / Non-Members $0


      Presentation:Survival of the Fastest - The 1/10/60 Challenge


      Speaker:Wes Bateman Security Engineer

      Topic:CrowdStrike actively tracks over 100 adversarial groups. CrowdStrike's 2019 Global Threat Report drew data from CrowdStrike Threat Intelligence, Falcon OverWatch managed hunting, and CrowdStrike Services incident response teams to ascertain the average "breakout" time for adversaries. This is the time between when an intruder gains initial access within a target organization and when that intruder is able to move laterally beyond that initial beachhead. These metrics can be used by defenders to assess their ability to identify and respond to attacks. This is the origin of the 1/10/60 rule. This talk will discuss these breakout times, dive deeper into various adversaries that were prolific in 2019, and present guidance pursuing 1/10/60.

      Bio:Wes came to CrowdStrike in 2015 from Cisco Systems where he was a Consulting Security Engineer. Wes, came to Cisco as part of the Sourcefire acquisition and served as one of two global leads for the Cisco Next Generation Intrusion Prevention System (NGIPS) Technical Advisory Group and was a presenter at multiple Cisco Tech Days and Cisco Live. He resides in Mesa, Arizona. Prior to joining Sourcefire, Wes was an information security practitioner with extensive practical experience in the financial, utility, government, education, manufacturing, technology, and non-profit verticals. This included roles at Arizona Public Service and the Arizona Department of Transportation.

      Wes has been primarily focused on network security monitoring, incident response, digital forensics, endpoint detection and response (EDR), and penetration testing.

      Experienced as both an attacker and a defender of digital assets, he is regularly engaged to uncover and exploit flaws, document the exploitation process, and create remediation plans for the networks and applications of his clients. He has served as a trusted advisor to government agencies and nuclear power generation plants to investigate security incidents and perform digital forensics. Wes has a track record of successfully communicating extremely technical information to audiences of varying backgrounds and has provided expert witness testimony in both civil and criminal proceedings related to digital forensics, including testimony for the US Nuclear Regulatory Commission. 

      Lunch Menu:
      Appetizer: Hale Koa Salad with Tarragon Dressing
      Main Course: Grilled Skirt Steak with Shitake Mushroom Sauce, Paired with Crab Cake, Served on Local Style Fried Udon Noodles and Sauteed Zucchini with Tomatoes
      Dessert: Mud Pie

  • Friday, February 21, 2020

    • ISSA Monthly Luncheon:Hosted by Foresite and Thousand Eyes
      Friday, February 21, 2020

      ISSA Monthly Luncheon:Hosted by Foresite and Thousand Eyes

      11:30 AM - 1:30 PM

      Hale Koa Hotel

      RSVP requested
      Members $ / Non-Members $


      Presentation Foresite - Using your current solutions to detect threats

      Thousand Eyes -  Securing Your Digital Experience


      Speaker:  Foresite - John Wolf, Vice President of Security Services

      Thousand Eyes - Fernando Gaudy , Regional Manager

      Topic: Foresite - Many organizations have IT and Security controls/solutions in place to protect their environment from various issues. We will discuss some of the varieties of controls/solutions and how they can also be used to assist in detecting malicious activity.

       

      Thousand Eyes   -   The Internet is fundamentally built on a chain of trust that is not hard to break. Fundamental aspects of Internet communication, including BGP and DNS, are susceptible to exploitation. BGP routes can be hijacked and DNS caches poisoned. Without visibility into Internet routing, alongside network and app-level data, enterprises are blind to significant security vulnerabilities.

      Bio:  Foresite - John Wolf - With over 14 years in the industry, Mr. Wolf has worked with Fortune 10 to small businesses to better protect themselves from malicious actors. Years of consulting services that include incident response, threat intelligence, vulnerability and penetration testing, and security advisory services provides a rounded mindset in how Information Technology and Security can work together to help an organization in the ever changing security landscape

       

      Thousand Eyes - Fernando Gaudy - Over 25 years in the industry, Mr. Gaudy has experience with a wide variety of IT disciplines, including Security, networking, Cloud, applications, SaaS, etc. He has been supporting Hawaii for many of those years. His diverse experience allows him to help bring a practical view of security to work with each of the stake holders and provide benefits for all.

      Lunch Menu:
      Appetizer: Hale Koa Salad with Tarragon Dressing
      Main Course: Chicken Marsala, Boneless Chicken Breast with  Mushrooms, Shallot, Marsala Wine Sauce on a bed of Asparagus Risotto
      Dessert: Refreshing Signature Sorbets

  • Friday, March 20, 2020

    • ISSA Monthly Luncheon: Hosted by ExtraHop;Enterprise IoT Discovery, Advanced Threat Detection & Response
      Friday, March 20, 2020

      ISSA Monthly Luncheon: Hosted by ExtraHop;Enterprise IoT Discovery, Advanced Threat Detection & Response

      11:30 AM - 1:30 PM

      Hale Koa Hotel

      RSVP requested
      Members $0 / Non-Members $0


      Presentation:

      Enterprise IoT discovery, behavioral profiling and advanced threat detection & response


      Speaker

      Trish Gundy, Senior Security Engineer at ExtraHop.

      Monique Egan, ExtraHop Regional Director, Hawaii.

      Topic:Enterprise IoT discovery, behavioral profiling and advanced threat detection & response

      Enterprise IoT, those connected devices you increasingly find on your organization's network like printers, VoIP phones, smart boards and TVs inside your network, are growing at a massive rate and is expected to reach USD 58 billion by 2023. If you're in healthcare you medical IoT. These devices represent an uncontrolled risk that the majority of organizations don't have visibility into.

      The next generation of IoT is becoming more than a group of devices, and has morphed into mission critical enterprise-wide services that leverage edge-computing and modern hybrid architectures. This new paradigm requires high levels of uptime and most importantly improved security measures.

      During this session we will discuss the security challenges of enterprise IoT devices on your network.

      Bio: Trish Gundy, Senior Security Engineer at ExtraHop. Trish focuses on working with partners and analysts to level up their security teams using Reveal(x) for unprecedented visibility at scale to understand the context of enterprise assets and gain definitive insights using automated investigation within a few clicks to get to immediate answers.
      Security forensics and protocol analysis has been Trish's focus throughout her career. With over 25 years of experience working with customers, sales teams, and product teams, Trish provides a real-world, hands-on perspective to the security challenges that face many organizations. Trish worked as a security analyst for one of the worlds most recognized beverage manufacturers. Working in technology resellers and manufacturers, her roles range from network engineer, security analyst, technical instructor, manager of consulting services, forensics consultant and security engineer.

      Monique Egan, ExtraHop Regional Director, Hawaii. Monique has 25 years as a thought leader helping organizations drive innovation and new strategies into their IT, Network and Security teams to be more effective in what they do with existing and future software and consulting services. She understands the pressure to do more with less and strives to assist her customers and partners achieve their business and technological goals on time and within their budget.

      Lunch Menu:
      Appetizer: Hale Koa Salad with Tarragon Dressing
      Main Course: Poached Atlantic Salmon with Green  Peppercorns Ginger Sauce, Seasonal Vegetables and Sliced Baked Potato with Parsley Butter
      Dessert: Tropical Sundae

  • Friday, April 17, 2020

    • ISSA Monthly Luncheon:

      11:30 AM - 1:30 PM

      ISSA Monthly Luncheon:
      Friday, April 17, 2020

      ISSA Monthly Luncheon:

      11:30 AM - 1:30 PM

      Hale Koa Hotel

      RSVP requested
      Members $ / Non-Members $


      Presentation:


      Speaker

      Topic:

      Bio:  

      Lunch Menu:
      Appetizer: Hale Koa Salad with Tarragon Dressing
      Main Course: Duo of Mahi Mahi "Dynamite" & Marinated Herb  Grilled Chicken Macadamina Nut Romesco Sauce, Whole Grain Rice Pilaf and Fresh Seasonal Vegetables
      Dessert: Dutch Apple Pie with Vanilla Ice Cream

  • Friday, May 15, 2020

    • ISSA Monthly Luncheon:

      11:30 AM - 1:30 PM

      ISSA Monthly Luncheon:
      Friday, May 15, 2020

      ISSA Monthly Luncheon:

      11:30 AM - 1:30 PM

      Hale Koa Hotel

      RSVP requested
      Members $ / Non-Members $


      Presentation:


      Speaker

      Topic:

      Bio:  

      Lunch Menu:
      Appetizer: Hale Koa Salad with Tarragon Dressing
      Main Course: Red Wine Braised Boneless Short Rib,  Matignon of Root Vegetables, Scallion Mashed Potatoes and  Fresh Seasonal Vegetables
      Dessert: Mud Pie

  • Wednesday, May 20, 2020

    • ISSA Webinar: Hosted by Microsoft: Security and the Chip to Cloud
      Wednesday, May 20, 2020

      ISSA Webinar: Hosted by Microsoft: Security and the Chip to Cloud

      12:00 - 1:30 PM

      Hale Koa Hotel

      RSVP requested
      Members $0 / Non-Members $0


      Presentation: Microsoft--Security and the Chip to Cloud Webinar.  


      Speakers: Richard Antonow, Security and Compliance Technical Specialist

      Melanie Wood, Sr. Surface Specialist

      Topic:--Overview of Today's Threats
      --Protecting Identities/Devices/
      Applications/Data with M365 Demo
      --Getting started with Conditional
      Access + MFA
      --Understanding Advanced Threat Protection capabilities (time permitting)
      --Microsoft Surface: Security and the chip to cloud story
      --Q & A

      Bio:  

      *Richard has been with Microsoft for 4 years, primarily focusing on State and Local Government accounts. He is a Technical Specialist in Security and Identity and works with customers to map business problems to Microsoft security foreign enemies. He resides in the Phoenix area. For fun, he runs Tough Mudder and Spartan Obstacle course races!

      *Melanie has been at Microsoft for 6 years and has spent the last 10 years working exclusively with Public Sector customers in the IT/computing agencies across Hawaii, Alaska, Washington, Oregon, California, Utah, Nevada, Idaho, and Montana. The mission at Microsoft is to empower every person and every organization on the planet to achieve more. Digitally transforming and modernizing workplaces with long-term goals of maximizing end-user employee satisfaction, talent attraction, and talent retention -- all while achieving lower total costs of ownership is a big part of empowering people and organizations to achieve more. From roadmap conversations to setting up Microsoft Surface deployment training sessions and on-site professional end-user training on Surface + Windows, the goal is to ensure that our customers have the best experiences of Microsoft. In short, she loves helping government agencies get the best overall value and experience of Windows 10 and M365 on Microsoft Surface.

      To OPT-OUT:   Enter OPT-OUT in the comments section.

       

      Lunch Menu:
      Appetizer: Hale Koa Salad with Tarragon Dressing
      Main Course: Asian Braised Pork, with Soy Mirin Sauce, Scallion Rice, and Fresh Seasonal Vegetables

      Dessert: Tropical Sundae

  • Friday, June 19, 2020

    • ISSA Monthly Luncheon:

      11:30 AM - 1:30 PM

      ISSA Monthly Luncheon:
      Friday, June 19, 2020

      ISSA Monthly Luncheon:

      11:30 AM - 1:30 PM

      Hale Koa Hotel

      RSVP requested
      Members $ / Non-Members $


      Presentation:


      Speaker

      Topic:

      Bio:  

      Lunch Menu:
      Appetizer: Hale Koa Salad with Tarragon Dressing
      Main Course: Poached Atlantic Salmon, Green Peppercorn Ginger Sauce, Sliced Baked Potato with Parsley Butter and Fresh Seasonal Vegetables
      Dessert: Classic Creme Brulee

  • Sunday, June 28, 2020

    • ISSA Webinar: Hosted by Microsoft: Security and the Chip to Cloud
      Sunday, June 28, 2020

      ISSA Webinar: Hosted by Microsoft: Security and the Chip to Cloud

      12:00 - 1:30 PM

      Hale Koa Hotel

      RSVP requested
      Members $0 / Non-Members $0


      Presentation: Microsoft--Security and the Chip to Cloud Webinar.  


      Speakers: Richard Antonow, Security and Compliance Technical Specialist

      Melanie Wood, Sr. Surface Specialist

      Topic:--Overview of Today's Threats
      --Protecting Identities/Devices/
      Applications/Data with M365 Demo
      --Getting started with Conditional
      Access + MFA
      --Understanding Advanced Threat Protection capabilities (time permitting)
      --Microsoft Surface: Security and the chip to cloud story
      --Q & A

      Bio:  

      *Richard has been with Microsoft for 4 years, primarily focusing on State and Local Government accounts. He is a Technical Specialist in Security and Identity and works with customers to map business problems to Microsoft security foreign enemies. He resides in the Phoenix area. For fun, he runs Tough Mudder and Spartan Obstacle course races!

      *Melanie has been at Microsoft for 6 years and has spent the last 10 years working exclusively with Public Sector customers in the IT/computing agencies across Hawaii, Alaska, Washington, Oregon, California, Utah, Nevada, Idaho, and Montana. The mission at Microsoft is to empower every person and every organization on the planet to achieve more. Digitally transforming and modernizing workplaces with long-term goals of maximizing end-user employee satisfaction, talent attraction, and talent retention -- all while achieving lower total costs of ownership is a big part of empowering people and organizations to achieve more. From roadmap conversations to setting up Microsoft Surface deployment training sessions and on-site professional end-user training on Surface + Windows, the goal is to ensure that our customers have the best experiences of Microsoft. In short, she loves helping government agencies get the best overall value and experience of Windows 10 and M365 on Microsoft Surface.

      To OPT-OUT:   Enter OPT-OUT in the comments section.

       

      Lunch Menu:
      Appetizer: Hale Koa Salad with Tarragon Dressing
      Main Course: Asian Braised Pork, with Soy Mirin Sauce, Scallion Rice, and Fresh Seasonal Vegetables

      Dessert: Tropical Sundae

  • Friday, July 17, 2020

    • ISSA Monthly Luncheon:

      11:30 AM - 1:30 PM

      ISSA Monthly Luncheon:
      Friday, July 17, 2020

      ISSA Monthly Luncheon:

      11:30 AM - 1:30 PM

      Hale Koa Hotel

      RSVP requested
      Members $ / Non-Members $


      Presentation:


      Speaker

      Topic:

      Bio:  

      Lunch Menu:
      Appetizer: Hale Koa Salad with Tarragon Dressing
      Main Course: Smoked Soy Marinated Chicken on Fettuccine Pasta, with Julienne Vegetables and Mirin Cream Sauce
      Dessert: Refreshing Signature Sorbets

  • Tuesday, July 28, 2020

    • ISSA Webinar: Hosted by Microsoft: Security and the Chip to Cloud
      Tuesday, July 28, 2020

      ISSA Webinar: Hosted by Microsoft: Security and the Chip to Cloud

      12:00 - 1:30 PM

      Hale Koa Hotel

      RSVP requested
      Members $0 / Non-Members $0


      Presentation: Microsoft--Security and the Chip to Cloud Webinar.  


      Speakers: Richard Antonow, Security and Compliance Technical Specialist

      Melanie Wood, Sr. Surface Specialist

      Topic:--Overview of Today's Threats
      --Protecting Identities/Devices/
      Applications/Data with M365 Demo
      --Getting started with Conditional
      Access + MFA
      --Understanding Advanced Threat Protection capabilities (time permitting)
      --Microsoft Surface: Security and the chip to cloud story
      --Q & A

      Bio:  

      *Richard has been with Microsoft for 4 years, primarily focusing on State and Local Government accounts. He is a Technical Specialist in Security and Identity and works with customers to map business problems to Microsoft security foreign enemies. He resides in the Phoenix area. For fun, he runs Tough Mudder and Spartan Obstacle course races!

      *Melanie has been at Microsoft for 6 years and has spent the last 10 years working exclusively with Public Sector customers in the IT/computing agencies across Hawaii, Alaska, Washington, Oregon, California, Utah, Nevada, Idaho, and Montana. The mission at Microsoft is to empower every person and every organization on the planet to achieve more. Digitally transforming and modernizing workplaces with long-term goals of maximizing end-user employee satisfaction, talent attraction, and talent retention -- all while achieving lower total costs of ownership is a big part of empowering people and organizations to achieve more. From roadmap conversations to setting up Microsoft Surface deployment training sessions and on-site professional end-user training on Surface + Windows, the goal is to ensure that our customers have the best experiences of Microsoft. In short, she loves helping government agencies get the best overall value and experience of Windows 10 and M365 on Microsoft Surface.

      To OPT-OUT:   Enter OPT-OUT in the comments section.

       

      Lunch Menu:
      Appetizer: Hale Koa Salad with Tarragon Dressing
      Main Course: Asian Braised Pork, with Soy Mirin Sauce, Scallion Rice, and Fresh Seasonal Vegetables

      Dessert: Tropical Sundae

Copyright © 2003-24 ISSA Hawaii Chapter
PO Box 2297 ~ Honolulu, HI 96804
webmaster@issahawaii.org
Our privacy policy
Trouble with this page?
Website Design and Management by Highpoint Web Design, LLC