Fortify Cybersecurity Webinar Session 01 – Password Management and Multi-Factor Authentication

Zoom

Password Management and Multi-factor Authentication Password management is a fundamental control in a strong cyber security framework and can be effectively implemented by businesses of all sizes.  Many who operate small or large businesses may not give passwords much attention and mistakenly assume using a password that is easy to remember will make their lives […]

Free

Pau Hana with Cloudflare: The Anatomy of a DDOS Attack.

UH Manoa, IT Conference Room 105 A&B 2500 Campus Road, Honolulu, HI, United States

CyberHawaii and the University of Hawaii invite you to meet with Cloudflare at the University of Hawaii, Manoa Campus, on Wednesday February 28, 2024 from 4-6pm.  Cloudflare will be speaking on The Anatomy of a DDOS Attack. Gartner describes Cloudflare as "a company focused on enhancing Internet performance. The primary problem it addresses is the […]

Time is COMSEC, Protection, and the Threat

Entrepreneurs Sandbox 643 Ilalo St, Honolulu, HI

Jonathan Lee from PACXA will be exploring the dynamic interplay between time and security, dissecting how time serves as the cornerstone of communication security (COMSEC), acts as both protector and threat, and influences the effectiveness of our defense strategies.  "Time equals money" An addage as old as the dawn of structured currency, where the manipulation […]

Free – $20

Girls In Cyber – Workshop

Kamehameha Schools - Midkiff Library 249 Konia Circle, Honolulu, HI, United States

When: Saturday, March 23rd, 7:30 am - 2:00 pm Where: Kamehameha Schools - Midkiff Library Who: Girls grades 4th through 12th - Limited to the first 50 participants. Cost: Free Registration Deadline: 3/13 to get a lunch. 3/21 if space available Empowering Girls in Tech:  Cybersecurity Essentials with Hands On Activities. BYOD Cybersecurity Superheroes - […]

Free

Cyber Insurance Webinar

Zoom

According to the IBM 2023 Cost of a Data Breach Report the average total cost of a data breach reached an all time high of $4.45 million per incident.  Organizations that reported low or no security system complexity experienced an average data breach cost of $3.84 million in 2023.  Cloud environments were frequent targets for […]

Free

Mentorships in Cybersecurity Webinar

Zoom

Cybersecurity is a field that builds upon a professional’s expertise in people, process and/or systems. This is because cyber threats target people’s behaviors, processes that are followed by a business, or features and functions of information systems and technology. Cybersecurity professionals must understand their business from at least one of these perspectives before they can successfully apply security principles in an effective manner. People just entering the cybersecurity profession can begin with an academic understanding of security principles and/or work experience in a field that deals with people, processes or systems (such as HR, finance or Information Technology). Learning about effective cybersecurity controls can be achieved on the job, provided new employees are able to operate as part of an experience Cybersecurity team that can provide support and mentoring to refine the competencies required to successful defend or attack cyber threat actors.

Free

Evidence of Compliance: How to Grow Your Business

Entrepreneurs Sandbox 643 Ilalo St, Honolulu, HI

Healthcare, government, military, construction and energy are just some of the industries that have strong compliance regulations. Hawaii businesses must be able to comply with these in order to grow and be profitable. While there are specific regulations that vary by industry, some cybersecurity requirements are common across sectors because they are based on common […]

Internship and Security Leadership Webinar

Zoom

Learn strategies for building in-house cybersecurity leadership through Federal Internship Programs. This event is present by Cyber Hawaii, Chamber of Commerce Hawaii and Cyber Readiness Institute. Click here to RSVP  

Access Management & Social Engineering

Zoom

Register Here Today’s applications are configured to control access to valuable information by identifying who is requesting access. This identification process allows whoever is responsible for managing the information to make sure that only the right people can get to it. There are various methods for doing this, all of which fall under the category […]