Mouse over any item on the left to display further information on the right
11:30 AM - 1:30 PM
ISSA Monthly Luncheon: Hosted by Armis, Securing the Tsunami of Unmanaged and IoT DevicesISSA Monthly Luncheon: Hosted by Armis, Securing the Tsunami of Unmanaged and IoT Devices
11:30 AM - 1:30 PM
Hale Koa Hotel
RSVP requested
Members $0 / Non-Members $0
Presentation: Securing the Tsunami of Unmanaged and IoT Devices
Speaker: Misha Seltzer Chief Solution Architect at Armis Security
Topic:
Today, enterprises are experiencing a huge digital transformation with the explosion of connected devices - bigger than the number of PC and mobile devices combined. These new devices include everything from smart TVs, security cameras, digital assistant (like the Amazon Echo), printers, HVAC systems, medical devices, manufacturing devices and more. It's a tsunami of unmanaged devices that the enterprise is not prepared to address for a security perspective.
These unmanaged devices, often referred to as the Internet of Things (IoT) or the Enterprise of Things, are helping companies become more productive. But they're also placing them at risk, because these new devices are designed to connect, have no security, and have little or no way to probably upgrade or manage them. As they can't be protected by legacy security solutions, they have become the new attack landscape, with the FBI and DHS issuing multiple warnings. This session will explore the new threat landscape, providing several examples of attacks on these devices, and discuss new considerations of security architectures with a 'Zero Trust' philosophy to fill the gaps left by traditional security architectures.
Bio: Misha Seltzer is the Chief Solution Architect at Armis Security. Prior to Armis Misha spent 8 years working as a software engineer for Google. And Misha served as a software engineer in the Israel Defense Forces.
Lunch Menu:
Appetizer: Hale Koa Salad with Tarragon Dressing
Main Course: Poached Atlantic Salmon, Green Peppercorn Ginger Sauce, Sliced Baked Potato with Parsley Butter and Fresh Seasonal Vegetables
Dessert: Classic Creme Brulee
11:30 AM - 1:30 PM
ISSA Monthly Luncheon:Hosted by Optiv; A Good Information Security Risk Management ProgramISSA Monthly Luncheon:Hosted by Optiv; A Good Information Security Risk Management Program
11:30 AM - 1:30 PM
Hale Koa Hotel
RSVP requested
Members $ / Non-Members $
Presentation:A Good Information Security Risk Management Program
Speaker:Bob Justus Optiv's Managing Executive Director, Office of the CISO group.
Topic:"Bob will be sharing "what good is", specifically, best practices for a successful Information Security Risk Management Program today.
He will cover the current critical success factors required to build a solid foundation for your strategic information security program, and what some of the common oversights we face, and how to overcome them.
This will be a very candid, interactive roundtable discussion with a highly seasoned industry professional.
Bio:Bob Justus Optiv's Managing Executive Director, Office of the CISO group.
Lunch Menu:
Appetizer: Hale Koa Salad with Tarragon Dressing
Main Course: 48 Hour Brined Pork Loin, Crusted with Buba Arare, Apple Cider Gastrique, and Fresh Seasonal Vegetables
Dessert: Dutch Apple Pie with Vanilla Ice Cream
11:30 AM - 1:30 PM
ISSA Monthly Luncheon:Hosted By ServiceNow; Techniques for Improved Security Detection and RemediationISSA Monthly Luncheon:Hosted By ServiceNow; Techniques for Improved Security Detection and Remediation
11:30 AM - 1:30 PM
Hale Koa Hotel
RSVP requested
Members $0 / Non-Members $0
Presentation:Techniques for Improved Security Detection and Remediation
Speaker:
Topic:
Service Now will lead a discussion focused on a strategy for integrated security & risk management in support of more effective security detection & remediation. Leveraging concepts such as cyber fusion centers, integrated risk management, and security orchestration automation and response, we will explore opportunities to more effectively find and prioritize critical threats, automate investigation and remediation, and bridge teams for better collaboration and accountability.
Bio:
Lunch Menu:
Appetizer: Hale Koa Salad with Tarragon Dressing
Main Course: Smoked Soy Marinated Chicken, on Fettuccine Pasta, Fresh Julienned Vegetables and Mirin Cream Sauce
Dessert: Refreshing Signature Sorbets
11:30 AM - 1:30 PM
ISSA Monthly Luncheon:Hosted by IBM; Cognitive SecurityISSA Monthly Luncheon:Hosted by IBM; Cognitive Security
11:30 AM - 1:30 PM
Hale Koa Hotel
RSVP requested
Members $0 / Non-Members $0
Presentation:Cognitive Security
Speaker: Bob Kalka, CRISC, is Vice President of the IBM Security Business Unit
Topic:Cognitive computing, artificial intelligence, and augmented intelligence have become highly popular terms in cybersecurity, yet the reality of what is being delivered ranges from sophisticated techniques to trivial features. This session will describe the philosophical basis for cognitive computing in cybersecurity, the three most popular approaches, and several live examples. A discussion of attacks on cognitive systems will also be offered.
Bio: Bob Kalka, CRISC, is Vice President of the IBM Security Business Unit. He has been intimately involved for the past two decades in developing IBM's overall strategy for its comprehensive security-related investments, and currently leads IBM's global technical professionals and vertical industry programs.
Bob has been involved in the information security industry for 25 of his 29 years with IBM. He has held a number of leadership positions in product management, sales, business development, marketing management and product development. He is a frequent international speaker on the relationship of business with Information Technology, risk management, cloud computing and cognitive security, and has had numerous papers and articles published on these topics. He also holds a United States Patent related to secure distributed computing software.
Bob received a Master of Business Administration (MBA) degree in Organizational Change and Development from Syracuse University, and a Bachelor of Science degree in Computer Science from the Rochester Institute of Technology. Bob also holds a certificate in strategic marketing planning from the Indiana University Graduate School of Business.
Bob is Certified in Risk and Information Systems Control (CRISC) by ISACA.
He is an active member of the Industry Advisory Boards for the Darwin Deason Institute for Cybersecurity in the Lyle School of Engineering at Southern Methodist University in Dallas, Texas; the Department of Computing Security at the Rochester Institute of Technology in Rochester, New York; and the Committee on Cybersecurity for Executive Education at the Muma College of Business at the University of South Florida in Tampa, Florida.
Bob is also a highly active musician in Austin, Texas, where he fronts several groups, spanning jazz, rock, funk, blues and worship styles.
Lunch Menu:
Appetizer: Hale Koa Salad with Tarragon Dressing
Main Course: Baked Mahi Mahi Filet, Tomato Chive Beurre Blanc, Garlic Mashed Potatoes and Fresh Seasonal Vegetables
Dessert: Mango Bar with Lime Cream
11:30 AM - 1:30 PM
ISSA Monthly Luncheon:ISSA Monthly Luncheon:
11:30 AM - 1:30 PM
Hale Koa Hotel
RSVP requested
Members $ / Non-Members $
Presentation:
Speaker:
Topic:
Bio:
Lunch Menu:
Appetizer: Hale Koa Salad with Tarragon Dressing
Main Course: Asian Braised Pork, Soy Mirin Sauce, Scallion Rice and Fresh Seasonal Vegetables
Dessert: Vanilla Ice Cream Taco with Fruit Salsa
11:30 AM - 1:30 PM
ISSA Monthly Luncheon:Hosted by CheckPoint: Digital Transformation and Cloud SecurityISSA Monthly Luncheon:Hosted by CheckPoint: Digital Transformation and Cloud Security
11:30 AM - 1:30 PM
Hale Koa Hotel
RSVP requested
Members $0 / Non-Members $0
Presentation:Digital Transformation and Cloud Security
Speaker: Rodrique Boutros, Head of Cloud Security Architects, CheckPoint
Topic:
Bio: Rodrique Boutros, Head of Cloud Security Architects, Americas at Check Point Software Technologies, has more than seventeen years of industry experience in networking and network security. He's currently responsible for leading Check Point's team of data center virtualization and cloud security solution architects for the Americas. In his prior role, Rodrique served as the Americas MSP Security Engineering Manager at Check Point where he was responsible for leading a team supporting architecture design, implementation and management of infrastructure for the large MSP/Telco providers and their customer base. Rodrique has also held previous network and security related positions at Check Point, Dell SecureWorks, VeriSign MSS and New England based local exchange carriers.
Lunch Menu:
Appetizer: Hale Koa Salad with Tarragon Dressing
Main Course: Grilled Mediterranean Chicken, Tomato Jam and Extra VirginOlive Oil, Fresh Seasonal Vegetables, and Roasted Potatoes
Dessert: Almond Fudge Ice Cream Cake
11:30 AM - 1:30 PM
ISSA Monthly Luncheon: Hosted by Cisco/Duo; Zero Trust Architecture: An Approach to SecurityISSA Monthly Luncheon: Hosted by Cisco/Duo; Zero Trust Architecture: An Approach to Security
11:30 AM - 1:30 PM
Hale Koa Hotel
RSVP requested
Members $0 / Non-Members $0
Presentation:Zero Trust Architecture: An Approach to Security
Speaker: Ali Cheikh, Cisco/Duo, Security Solutions Engineer
Topic:A zero-trust security model states that organizations should not trust anything inside or outside of their network perimeters and should instead verify anything and everything that tries to connect to applications and systems before granting them access. How can Duo Security help you understand and start your Zero Trust journey.
Bio:Ali Cheikh, Cisco/Duo, Security Solutions Engineer
Lunch Menu:
Appetizer: Hale Koa Salad with Tarragon Dressing
Main Course: Grilled Skirt Steak with Dijon Shitaki Mushroom Sauce, Paired with Crab Cake, Local Style Udon Noodles and Sauteed Zucchini with Tomatoes
Dessert: Vanilla Ice Cream Taco with Fruit Salsa
11:30 AM - 1:30 PM
ISSA Monthly Luncheon:Hosted by BitGlass/Hi Tech Hui, Top CASB Use CasesISSA Monthly Luncheon:Hosted by BitGlass/Hi Tech Hui, Top CASB Use Cases
11:30 AM - 1:30 PM
Hale Koa Hotel
RSVP requested
Members $ 0/ Non-Members $ 0
Presentation:Top CASB Use Cases
Speaker: Jacob Serpa, Sr. Product Marketing Manager at Bitglass, Inc.
Topic:Cloud access security brokers (CASBs) have become the go-to solutions for CISOs and security architects looking to protect data in applications like Office 365, Box, G Suite, and AWS. Still, there remains the question of what challenges CASBs solve. Where do next-gen firewalls and secure web gateways fall short? IT leaders often ask: what are the top CASB use cases?
We'll explore the most common CASB use cases from real-time data loss prevention to threat protection. Learn how leading organizations are leveraging CASB technology to achieve compliance, mitigate zero-day threats, improve visibility over high-risk data outflows, and secure data stored in these new cloud platforms.
Bio:Jacob Serpa is a cybersecurity expert working as a Sr. Product Marketing Manager at Bitglass in Silicon Valley. He is passionate about helping others to protect their personal information and earned his MBA at San Jose State university where he was top of his class.
Lunch Menu:
Appetizer: Hale Koa Salad with Tarragon Dressing
Main Course: Broiled New York Steak, Cabernet Peppercorn Sauce, Frizzled Onions, Roasted Garlic Mashed Potatoes and Grilled Marinated Squash and Peppers
Dessert: Vanilla Ice Cream Taco with Fruit Salsa
11:30 AM - 1:30 PM
ISSA Monthly Luncheon:Hosted by CrowdStrike; Survival of the Fastest - The 1/10/60 ChallengeISSA Monthly Luncheon:Hosted by CrowdStrike; Survival of the Fastest - The 1/10/60 Challenge
11:30 AM - 1:30 PM
Hale Koa Hotel
RSVP requested
Members $ 0 / Non-Members $0
Presentation:Survival of the Fastest - The 1/10/60 Challenge
Speaker:Wes Bateman Security Engineer
Topic:CrowdStrike actively tracks over 100 adversarial groups. CrowdStrike's 2019 Global Threat Report drew data from CrowdStrike Threat Intelligence, Falcon OverWatch managed hunting, and CrowdStrike Services incident response teams to ascertain the average "breakout" time for adversaries. This is the time between when an intruder gains initial access within a target organization and when that intruder is able to move laterally beyond that initial beachhead. These metrics can be used by defenders to assess their ability to identify and respond to attacks. This is the origin of the 1/10/60 rule. This talk will discuss these breakout times, dive deeper into various adversaries that were prolific in 2019, and present guidance pursuing 1/10/60.
Bio:Wes came to CrowdStrike in 2015 from Cisco Systems where he was a Consulting Security Engineer. Wes, came to Cisco as part of the Sourcefire acquisition and served as one of two global leads for the Cisco Next Generation Intrusion Prevention System (NGIPS) Technical Advisory Group and was a presenter at multiple Cisco Tech Days and Cisco Live. He resides in Mesa, Arizona. Prior to joining Sourcefire, Wes was an information security practitioner with extensive practical experience in the financial, utility, government, education, manufacturing, technology, and non-profit verticals. This included roles at Arizona Public Service and the Arizona Department of Transportation.
Wes has been primarily focused on network security monitoring, incident response, digital forensics, endpoint detection and response (EDR), and penetration testing.
Experienced as both an attacker and a defender of digital assets, he is regularly engaged to uncover and exploit flaws, document the exploitation process, and create remediation plans for the networks and applications of his clients. He has served as a trusted advisor to government agencies and nuclear power generation plants to investigate security incidents and perform digital forensics. Wes has a track record of successfully communicating extremely technical information to audiences of varying backgrounds and has provided expert witness testimony in both civil and criminal proceedings related to digital forensics, including testimony for the US Nuclear Regulatory Commission.
Lunch Menu:
Appetizer: Hale Koa Salad with Tarragon Dressing
Main Course: Grilled Skirt Steak with Shitake Mushroom Sauce, Paired with Crab Cake, Served on Local Style Fried Udon Noodles and Sauteed Zucchini with Tomatoes
Dessert: Mud Pie
11:30 AM - 1:30 PM
ISSA Monthly Luncheon:Hosted by Foresite and Thousand EyesISSA Monthly Luncheon:Hosted by Foresite and Thousand Eyes
11:30 AM - 1:30 PM
Hale Koa Hotel
RSVP requested
Members $ / Non-Members $
Presentation Foresite - Using your current solutions to detect threats
Thousand Eyes - Securing Your Digital Experience
Speaker: Foresite - John Wolf, Vice President of Security Services
Thousand Eyes - Fernando Gaudy , Regional Manager
Topic: Foresite - Many organizations have IT and Security controls/solutions in place to protect their environment from various issues. We will discuss some of the varieties of controls/solutions and how they can also be used to assist in detecting malicious activity.
Thousand Eyes - The Internet is fundamentally built on a chain of trust that is not hard to break. Fundamental aspects of Internet communication, including BGP and DNS, are susceptible to exploitation. BGP routes can be hijacked and DNS caches poisoned. Without visibility into Internet routing, alongside network and app-level data, enterprises are blind to significant security vulnerabilities.
Bio: Foresite - John Wolf - With over 14 years in the industry, Mr. Wolf has worked with Fortune 10 to small businesses to better protect themselves from malicious actors. Years of consulting services that include incident response, threat intelligence, vulnerability and penetration testing, and security advisory services provides a rounded mindset in how Information Technology and Security can work together to help an organization in the ever changing security landscape
Thousand Eyes - Fernando Gaudy - Over 25 years in the industry, Mr. Gaudy has experience with a wide variety of IT disciplines, including Security, networking, Cloud, applications, SaaS, etc. He has been supporting Hawaii for many of those years. His diverse experience allows him to help bring a practical view of security to work with each of the stake holders and provide benefits for all.
Lunch Menu:
Appetizer: Hale Koa Salad with Tarragon Dressing
Main Course: Chicken Marsala, Boneless Chicken Breast with Mushrooms, Shallot, Marsala Wine Sauce on a bed of Asparagus Risotto
Dessert: Refreshing Signature Sorbets
11:30 AM - 1:30 PM
ISSA Monthly Luncheon: Hosted by ExtraHop;Enterprise IoT Discovery, Advanced Threat Detection & ResponseISSA Monthly Luncheon: Hosted by ExtraHop;Enterprise IoT Discovery, Advanced Threat Detection & Response
11:30 AM - 1:30 PM
Hale Koa Hotel
RSVP requested
Members $0 / Non-Members $0
Presentation:
Enterprise IoT discovery, behavioral profiling and advanced threat detection & response
Speaker:
Trish Gundy, Senior Security Engineer at ExtraHop.
Monique Egan, ExtraHop Regional Director, Hawaii.
Topic:Enterprise IoT discovery, behavioral profiling and advanced threat detection & response
Enterprise IoT, those connected devices you increasingly find on your organization's network like printers, VoIP phones, smart boards and TVs inside your network, are growing at a massive rate and is expected to reach USD 58 billion by 2023. If you're in healthcare you medical IoT. These devices represent an uncontrolled risk that the majority of organizations don't have visibility into.
The next generation of IoT is becoming more than a group of devices, and has morphed into mission critical enterprise-wide services that leverage edge-computing and modern hybrid architectures. This new paradigm requires high levels of uptime and most importantly improved security measures.
During this session we will discuss the security challenges of enterprise IoT devices on your network.
Bio: Trish Gundy, Senior Security Engineer at ExtraHop. Trish focuses on working with partners and analysts to level up their security teams using Reveal(x) for unprecedented visibility at scale to understand the context of enterprise assets and gain definitive insights using automated investigation within a few clicks to get to immediate answers.
Security forensics and protocol analysis has been Trish's focus throughout her career. With over 25 years of experience working with customers, sales teams, and product teams, Trish provides a real-world, hands-on perspective to the security challenges that face many organizations. Trish worked as a security analyst for one of the worlds most recognized beverage manufacturers. Working in technology resellers and manufacturers, her roles range from network engineer, security analyst, technical instructor, manager of consulting services, forensics consultant and security engineer.
Monique Egan, ExtraHop Regional Director, Hawaii. Monique has 25 years as a thought leader helping organizations drive innovation and new strategies into their IT, Network and Security teams to be more effective in what they do with existing and future software and consulting services. She understands the pressure to do more with less and strives to assist her customers and partners achieve their business and technological goals on time and within their budget.
Lunch Menu:
Appetizer: Hale Koa Salad with Tarragon Dressing
Main Course: Poached Atlantic Salmon with Green Peppercorns Ginger Sauce, Seasonal Vegetables and Sliced Baked Potato with Parsley Butter
Dessert: Tropical Sundae
11:30 AM - 1:30 PM
ISSA Monthly Luncheon:ISSA Monthly Luncheon:
11:30 AM - 1:30 PM
Hale Koa Hotel
RSVP requested
Members $ / Non-Members $
Presentation:
Speaker:
Topic:
Bio:
Lunch Menu:
Appetizer: Hale Koa Salad with Tarragon Dressing
Main Course: Duo of Mahi Mahi "Dynamite" & Marinated Herb Grilled Chicken Macadamina Nut Romesco Sauce, Whole Grain Rice Pilaf and Fresh Seasonal Vegetables
Dessert: Dutch Apple Pie with Vanilla Ice Cream