Access Management & Social Engineering

Zoom

Register Here Today’s applications are configured to control access to valuable information by identifying who is requesting access. This identification process allows whoever is responsible for managing the information to make sure that only the right people can get to it. There are various methods for doing this, all of which fall under the category […]

Inter-Generational Learning Project – Kupuna Mentor Pilot

UH Manoa Innovation Center 2800 Woodlawn Drive, Honolulu, HI, United States

As growing numbers of Hawai‘i Baby Boomers retire and leave the workforce, they take with them decades of valuable experience and wisdom that could benefit students in need of mentors. Giving back to the community and growing the next generation of leaders has always been important for people who love Hawaii and call it home. […]

Fortify Cybersecurity Webinar Session 5 – Encryption

Zoom

Encryption – Mandatory today, Obsolete tomorrow?
The risk of data theft requires the use of AES level encryption for valuable data when it's at rest and in transit. Various types of encryptions are available today in both hardware and software forms, and it is important for businesses to know how these work and what options they have for implementing them.

SMB's with heterogeneous technology environments such as Windows end points, cloud based apps/storage and Apple/Google mobile devices face the task of ensuring that their data is encrypted in and between each of these environments. An additional layer of complexity comes in when businesses have network enabled measuring devices that transmit sensitive information via W8-Fi (such as in clinics and with security cameras). Since these do not always allow for configuration, it's important for businesses to be aware of the type of encryption these devices are implementing.

Unite Against Hate: An Update for Hawaii Businesses from the FBI

High Intensity Drug Trafficking Area (HIDTA) 500 Ala Moana Blvd Bldg 5 Suite 200, Honolulu, HI, United States

Today’s America is contentious.  Whether it’s arguments over immigration, the rights of LGBTQ people or what keiki learn in school, the tone and language of arguments often goes beyond what most reasonable people would call civil.  The foundation of our democracy is the ability to debate ideas in a vigorous, but ultimately forgiving manner. Much […]

Fortify Cybersecurity Webinar Session 6 – Secure by Design

Zoom

An initiative that encourages vendors of security and technology products to take accountability for building them in a more secure manner. Click Here to Register Many technology products are introduced to the market even though they may have missing pieces or flaws that can be exploited by hackers.  This places the burden on companies and […]

Fortify Cybersecurity Webinar Session 7: Convergence of Physical & Cyber Security

Zoom

Click to Register Our next webinar in the Fortify Cybersecurity Education series which covers the topic of improving security by integrating the physical security and cybersecurity functions. While we study and plan for threats within very clear boundaries and domains, most threat actors don’t bother to follow any rules.  To steal our money or information […]

2024 U.S. Coast Guard Cybersecurity Seminar

Homer A.Maxey International Trade Resource Center 521 Ala Moana Blvd, Honolulu, United States

An opportunity to network and collaborate with public and private sector professionals as well as members from CG Cyber, CISA, FBI, HSI, OHS, the USSS who are scheduled to present briefs. We will finish off the event with a Cyber Scenario discussion and Q&A Forum. We promise an informative and insightful afternoon.

Fortify Cybersecurity Webinar Session 8: Mobile Device & Remote Access Management

Zoom

Register Here Today One of the changes brought on by the COVID-19 pandemic was the widespread acceptance of work being done on a remote or mobile basis.  The trend towards remote work has led to efficiencies for many businesses and a more flexible working environment for employees.  Working outside of a company’s traditional information systems […]