BEGIN:VCALENDAR
VERSION:2.0
PRODID:-//CyberHawaii - ECPv6.15.19//NONSGML v1.0//EN
CALSCALE:GREGORIAN
METHOD:PUBLISH
X-WR-CALNAME:CyberHawaii
X-ORIGINAL-URL:https://www.cyberhawaii.org
X-WR-CALDESC:Events for CyberHawaii
REFRESH-INTERVAL;VALUE=DURATION:PT1H
X-Robots-Tag:noindex
X-PUBLISHED-TTL:PT1H
BEGIN:VTIMEZONE
TZID:Pacific/Honolulu
BEGIN:STANDARD
TZOFFSETFROM:-1000
TZOFFSETTO:-1000
TZNAME:HST
DTSTART:20230101T000000
END:STANDARD
END:VTIMEZONE
BEGIN:VTIMEZONE
TZID:UTC
BEGIN:STANDARD
TZOFFSETFROM:+0000
TZOFFSETTO:+0000
TZNAME:UTC
DTSTART:20230101T000000
END:STANDARD
END:VTIMEZONE
BEGIN:VEVENT
DTSTART;TZID=Pacific/Honolulu:20241023T103000
DTEND;TZID=Pacific/Honolulu:20241023T114500
DTSTAMP:20260408T115244
CREATED:20241008T160630Z
LAST-MODIFIED:20241008T172227Z
UID:1733-1729679400-1729683900@www.cyberhawaii.org
SUMMARY:TechNet Indo-Pacific on October 23 related to workforce development
DESCRIPTION:2024 AFCEA TechNet Indo-Pacific Registration & Details \n \n  \nTechNet Indo-Pacific’s Event spans over a few days\, October 22 – 24. \nThe breakout session featuring this panel will take place in Room 303AB on October 23 at 10:30 am – 11:45 am. \nThis panel will explore the complexities of cyber workforce development within the Indo-Pacific Area of Responsibility (AOR). \nConsidering the region’s unique geographic and economic challenges\, we will discuss how these factors impact both companies and potential candidates\, including highly cleared transitioning military personnel. The panel will feature experts who have developed successful workforce programs\, proposal and capture specialists familiar with Indo-Pacific AOR challenges\, and workforce development and cyber experts who can address broader regional trends. Attendees will gain insight into strategies for building impactful talent pipelines\, from RFP to contract win\, using strategic workforce development approaches that yield net-positive returns on recruiting and retaining the cyber workforce in this dynamic and challenging environment. \n2024 TechNet Indo-Pacific Event \n 
URL:https://www.cyberhawaii.org/event/technet-indopacific-on-october-23-related-to-workforce-development/
LOCATION:Hawai’i Convention Center\, 1801 Kalākaua Avenue\, Honolulu\, HI\, 96815\, United States
ORGANIZER;CN="TechNet Indo-Pacific":MAILTO:hawaiiregistration@spargoinc.com
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=Pacific/Honolulu:20241023T070000
DTEND;TZID=Pacific/Honolulu:20241023T080000
DTSTAMP:20260408T115244
CREATED:20241009T174448Z
LAST-MODIFIED:20241009T175040Z
UID:1776-1729666800-1729670400@www.cyberhawaii.org
SUMMARY:Wednesday SMB Webinars: Must Know Principles and Game-Changing Guidelines
DESCRIPTION:SMBs Webinar Series for Cybersecurity Awareness Month \nThe Cybersecurity and Infrastructure Security Agency (CISA) in partnership with the IT SCC (Sector Coordinating Council) invite you to participate in a webinar discussion series focused on SMBs (Small and Medium sized Businesses) for cybersecurity awareness month! For 2024 we are centering the conversation around Artificial Intelligence and its influence throughout the sectors. The discussions throughout this series will discuss different aspects of AI\, understanding how it could affect your environment\, what the research community is developing and seeing\, and what to expect moving forward when discussing AI safety. \nRegistration\nTo learn more and register for each event\, please follow the links below. Webinars are held on Wednesdays in October this second session will take place on October 23 from 7am-8am Hawaii time. \nWeek 3 – Oct 23: AI Unlocked: Must Know Principles and Game-Changing Guidelines  Oct 23 Registration \nWeek 4 – Oct 30: Resource Vault: Strengthen Your SMB’s Critical Infrastructure\nOct 30 Registration \n  \nWho Should Attend?\nSmall and medium sized businesses working in and adjacent to critical infrastructure environments. While the focus of the content will be centered around small and medium businesses there are prominent discussions happening that will provide value to businesses of any size. Discussions around safety effect all sized businesses and citizens due to the interconnectivity of IT environments. This effort stems from the IT sector and will maintain that origin within the discussions but due to the vastness of the sector\, we encourage all 16 critical infrastructure sectors to attend and receive the value from attending. \nWe look forward to your participation! \nCybersecurity and Infrastructure Security Agency \nOct 23 Registration
URL:https://www.cyberhawaii.org/event/wednesday-smb-webinars-must-know-principles-and-game-changing-guidelines/
LOCATION:Zoom
ATTACH;FMTTYPE=image/jpeg:https://www.cyberhawaii.org/wp-content/uploads/2024/10/CISA-1.jpg
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=Pacific/Honolulu:20241016T070000
DTEND;TZID=Pacific/Honolulu:20241016T080000
DTSTAMP:20260408T115244
CREATED:20241009T160550Z
LAST-MODIFIED:20241009T174103Z
UID:1762-1729062000-1729065600@www.cyberhawaii.org
SUMMARY:Wednesday SMB Webinars: Building A Strong Baseline for Critical Infrastructure
DESCRIPTION:SMBs Webinar Series for Cybersecurity Awareness Month \nThe Cybersecurity and Infrastructure Security Agency (CISA) in partnership with the IT SCC (Sector Coordinating Council) invite you to participate in a webinar discussion series focused on SMBs (Small and Medium sized Businesses) for cybersecurity awareness month! For 2024 we are centering the conversation around Artificial Intelligence and its influence throughout the sectors. The discussions throughout this series will discuss different aspects of AI\, understanding how it could affect your environment\, what the research community is developing and seeing\, and what to expect moving forward when discussing AI safety. \nRegistration\nTo learn more and register for each event\, please follow the links below. Webinars are held on Wednesdays in October this second session will take place on October 16 from 7am-8am Hawaii time. \nWeek 2 – Oct 16: AI Foundations: Building a Strong Baseline for Critical Infrastructure Oct 16 Registration \nWeek 3 – Oct 23: AI Unlocked: Must Know Principles and Game-Changing Guidelines  Oct 23 Registration \nWeek 4 – Oct 30: Resource Vault: Strengthen Your SMB’s Critical Infrastructure\nOct 30 Registration \n  \nWho Should Attend?\nSmall and medium sized businesses working in and adjacent to critical infrastructure environments. While the focus of the content will be centered around small and medium businesses there are prominent discussions happening that will provide value to businesses of any size. Discussions around safety effect all sized businesses and citizens due to the interconnectivity of IT environments. This effort stems from the IT sector and will maintain that origin within the discussions but due to the vastness of the sector\, we encourage all 16 critical infrastructure sectors to attend and receive the value from attending. \nWe look forward to your participation! \nCybersecurity and Infrastructure Security Agency \nOct 16 Registration
URL:https://www.cyberhawaii.org/event/small-and-medium-businesses-webinar-series-oct-16-23-and-30/
LOCATION:Zoom
ATTACH;FMTTYPE=image/jpeg:https://www.cyberhawaii.org/wp-content/uploads/2024/10/CISA-1.jpg
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=Pacific/Honolulu:20241015T140000
DTEND;TZID=Pacific/Honolulu:20241015T150000
DTSTAMP:20260408T115244
CREATED:20241009T163050Z
LAST-MODIFIED:20241009T175831Z
UID:1764-1729000800-1729004400@www.cyberhawaii.org
SUMMARY:Fortify Cybersecurity Webinar Session 9: Incident Response
DESCRIPTION:Click to Register \nDespite our best efforts to prepare\, emergencies do happen and their effects can be devastating.  Having strong cybersecurity controls in place does make us more secure\, but they do not guarantee that mistakes won’t be made during everyday business operations.  This is often how ransomware gets embedded or how threat actors are able to trick key employees into revealing sensitive information.  \nHaving an incident response plan is critical to being able to survive disasters. Incident response plan covers things like the assets you’re trying to protect\, the most common threats your business faces\, how your information systems are configured\, how you would bring them back up following an attack or natural disaster and who you would notify.  \nIn this webinar you’ll hear from experts from CISA and the State of Hawaii Office of Homeland Security about the importance of having an incident response plan that covers cybersecurity incidents.   \nIn this webinar you’ll learn:  \n\nWhy having an incident response plan is critical \n\n\nThe elements of an incident response plan \n\n\nAn approach for creating an incident response plan \n\n\nThe State of Hawaii’s strategy for responding to cyber threats \n\n\nThe State of Hawaii’s draft incident response plan template \n\nPresenters:\n \nJennilyn LaBrunda.  Jennilyn is a Cybersecurity Advisor with the Cybersecurity and Infrastructure Security Agency. She is responsible for Hawaii\, Guam\, the Commonwealth of the Northern Marianas Islands\, and American Samoa.  \nShe is based in Guam and is an experienced cybersecurity and information technology professional with over 15 years of experience. She is a Certified Information Systems Security Professional and a graduate from the University of Guam with a double major in technology & e-commerce and computer information systems.  \n  \n  \nJimmie Collins.  Jimmie is currently serving as the Senior Planner at the Hawaii State Office of Homeland Security. Her initial focus was on supporting COVID-19 response\, recovery\, and long-term resilience planning. She develops\, oversees\, coordinates\, directs\, implements and leads a comprehensive and integrated Homeland Security program for the State of Hawaii\, in partnership with organizational federal\, state\, county and private sector stakeholders that enhances the overall safety and security of the state of Hawaii.  \n  \nClick Here to Register
URL:https://www.cyberhawaii.org/event/fortify-cybersecurity-webinar-session-9-incident-response/
LOCATION:Zoom
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=Pacific/Honolulu:20241009T070000
DTEND;TZID=Pacific/Honolulu:20241009T080000
DTSTAMP:20260408T115244
CREATED:20241008T163220Z
LAST-MODIFIED:20241009T180411Z
UID:1744-1728457200-1728460800@www.cyberhawaii.org
SUMMARY:Wednesday SMB Webinars:  State of Critical Infrastructure
DESCRIPTION:Small and Medium Businesses Webinar Series – Oct 9\, 16\, 23\, and 30\n\nCybersecurity Awareness Month \nThe Cybersecurity and Infrastructure Security Agency (CISA) in partnership with the IT SCC (Sector Coordinating Council) invite you to participate in a webinar discussion series focused on SMBs (Small and Medium sized Businesses) for cybersecurity awareness month! For 2024 we are centering the conversation around Artificial Intelligence and its influence throughout the sectors. The discussions throughout this series will discuss different aspects of AI\, understanding how it could affect your environment\, what the research community is developing and seeing\, and what to expect moving forward when discussing AI safety. \nRegistration\nTo learn more and register for each event\, please follow the links below. Webinars are held on Wednesdays starting on 10/09/2024 – 10/30/2024 from 7am-8am Hawaii time. \nWeek 1 – Oct 9: State of Critical Infrastructure  Oct 9 Registration \nWeek 2 – Oct 16: AI Foundations: Building a Strong Baseline for Critical Infrastructure  Oct 16 Registration \nWeek 3 – Oct 23: AI Unlocked: Must Know Principles and Game-Changing Guidelines  Oct 23 Registration \nWeek 4 – Oct 30: Resource Vault: Strengthen Your SMB’s Critical Infrastructure\nOct 30 Registration \n  \nWho Should Attend?\nSmall and medium sized businesses working in and adjacent to critical infrastructure environments. While the focus of the content will be centered around small and medium businesses there are prominent discussions happening that will provide value to businesses of any size. Discussions around safety effect all sized businesses and citizens due to the interconnectivity of IT environments. This effort stems from the IT sector and will maintain that origin within the discussions but due to the vastness of the sector\, we encourage all 16 critical infrastructure sectors to attend and receive the value from attending. \nWe look forward to your participation! \nCybersecurity and Infrastructure Security Agency \n 
URL:https://www.cyberhawaii.org/event/webinars-from-cisa-for-smbs-during-cybersecurity-awareness-month/
LOCATION:Zoom
ATTACH;FMTTYPE=image/jpeg:https://www.cyberhawaii.org/wp-content/uploads/2024/10/CISA-1.jpg
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=Pacific/Honolulu:20240917T140000
DTEND;TZID=Pacific/Honolulu:20240917T150000
DTSTAMP:20260408T115244
CREATED:20240906T160630Z
LAST-MODIFIED:20240906T161355Z
UID:1717-1726581600-1726585200@www.cyberhawaii.org
SUMMARY:Fortify Cybersecurity Webinar Session 8:  Mobile Device & Remote Access Management
DESCRIPTION:Register Here Today\n\nOne of the changes brought on by the COVID-19 pandemic was the widespread acceptance of work being done on a remote or mobile basis.  The trend towards remote work has led to efficiencies for many businesses and a more flexible working environment for employees.  Working outside of a company’s traditional information systems network\, however\, with its network security controls\, has opened up a number of new risks for organizations.\n\nThis presentation addresses the critical issue of mobile device security in an era where smartphones and tablets are central to both personal and professional life. We’ll explore the growing threats to these devices and provide actionable strategies to protect sensitive data. Key topics include strong authentication\, app security\, data protection\, network safety\, device management\, and phishing awareness. Through a combination of current statistics and practical strategies\, attendees will gain a clear understanding of mobile security risks and leave with a concrete set of best practices that can be easily implemented.\n\nWe’ll also discuss the factors involved with managing remote access and what businesses need to look out for whenever employees\, vendors or other entities connect through a company’s firewall.  Access control\, authentication\, multi-factor authentication\, network controls\, VPN\, endpoint security and Zero Trust are some of the topics that will be addressed during this portion of the presentation.\n\nPresenters\n Jennilyn La Brunda\, Cybersecurity Advisor\, CISA\nJennilyn is responsible for Hawaii\, Guam\, the Commonwealth of the Northern Marianas Islands\, and American Samoa.  She is based in Guam and is an experienced cybersecurity and information technology professional with over 15 years of experience. She is a Certified Information Systems Security Professional and a graduate from the University of Guam with a double major in technology & e-commerce and computer information systems.\n\n Al Ogata\, President & CEO\, CyberHawaii\nAl has over forty years of experience in the information security and solution development fields.  Prior to joining CyberHawaii he was the Chief Operating\, Technology and Compliance Officer at the Hawaii Health Information Exchange.  Prior to this he was at HMSA for 18 years\, last serving as the organization’s Chief Information Security Officer (CISO)\, HIPAA Privacy and Security Officer and executive in charge of Business Continuity and Emergency Response.  Prior to joining HMSA he worked in Silicon Valley for over 20 years at a variety of organizations ranging from two person startups to established companies like Hewlett-Packard and Wyse Technology.  Al graduated with a degree in Engineering from the University of California at Berkeley.\n\n\nRegister Here
URL:https://www.cyberhawaii.org/event/fortify-cybersecurity-webinar-session-8-mobile-device-remote-access-management/
LOCATION:Zoom
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=Pacific/Honolulu:20240827T120000
DTEND;TZID=Pacific/Honolulu:20240827T160000
DTSTAMP:20260408T115244
CREATED:20240821T210703Z
LAST-MODIFIED:20240822T004210Z
UID:1708-1724760000-1724774400@www.cyberhawaii.org
SUMMARY:2024 U.S. Coast Guard Cybersecurity Seminar
DESCRIPTION:Click to Register     Password: USCGCyber2024!! \nYou are invited to attend the 2024 U.S. Coast Guard (USCG) Cybersecurity Seminar! Join us for an afternoon of engaging briefs and scenario discussions focused on the latest trends and challenges in cybersecurity. This in-person event will take place on Tuesday\, August 27\, 2024 from 12:00 noon – 4:00 p.m. at the Homer A.Maxey International Trade Resource Center. Don’t miss this opportunity to network and collaborate with public and private sector professionals as well as members from CG Cyber\, CISA\, FBI\, HSI\, OHS\, the USSS who are scheduled to present briefs. We will finish off the event with a Cyber Scenario discussion and Q&A Forum. We promise an informative and insightful afternoon. \nThere are only 60 in person seats available.  Please note that if you have been selected as a Speaker\, are part of the EST/ note taking team\, or have been told explicitly that there is no need to register\, then please DO NOT register.  The registration link for those attending in-person. \n2024 Cybersecurity Seminar Registration: If you are attending in-person\, please click on the following link and use the password to navigate to the registration site\, view the agenda\, and read the FAQs: \nClick to Register \nPassword: USCGCyber2024!! \n  \nFor more information or questions:  2024cyberseminar@gmail.com
URL:https://www.cyberhawaii.org/event/2024-uscg-cybersecurity-seminar/
LOCATION:Homer A.Maxey International Trade Resource Center\, 521 Ala Moana Blvd\, Honolulu\, 96813\, United States
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=Pacific/Honolulu:20240806T140000
DTEND;TZID=Pacific/Honolulu:20240806T150000
DTSTAMP:20260408T115244
CREATED:20240729T182030Z
LAST-MODIFIED:20240729T182749Z
UID:1688-1722952800-1722956400@www.cyberhawaii.org
SUMMARY:Fortify Cybersecurity Webinar Session 7: Convergence of Physical & Cyber Security
DESCRIPTION:Click to Register\nOur next webinar in the Fortify Cybersecurity Education series which covers the topic of improving security by integrating the physical security and cybersecurity functions. \n\n\n\n\n\nWhile we study and plan for threats within very clear boundaries and domains\, most threat actors don’t bother to follow any rules.  To steal our money or information they will employ any technique that is effective\, whether it’s an online tool\, physical threats or violence\, or just old fashioned flim-flam techniques.To protect ourselves and our businesses\, we need to be prepared for threats that cross the boundary between the digital and physical worlds.  To do this we must understand how physical security meshes with cybersecurity.  This convergence of techniques is the subject of this webinar. \nAccording to CISA\, “Convergence is formal collaboration between previously disjointed security functions. Organizations with converged cybersecurity and physical security functions are more resilient and better prepared to identify\, prevent\, mitigate\, and respond to threats. Convergence also encourages information sharing and developing unified security policies across security divisions.” \nIn this webinar you’ll learn: \n• How to create a holistic security strategy\n• The risks of silo’d security\n• The benefits of convergence \nPresenter \n\n\n\nGen Tamura currently serves as a Protective Security Advisor (PSA) for the Cybersecurity and Infrastructure Security Agency\, Honolulu District\, which includes Hawaii\, Guam\, the Commonwealth of the Northern Marianas islands\, and American Samoa. As a PSA\, Mr. Tamura provides subject matter expertise in critical infrastructure protection and vulnerability mitigation and facilitates local field activities in coordination with other Department of Homeland Security offices. He also advises and assists state\, local\, territorial\, and private sector officials and critical infrastructure facility owners and operators. \nPrior to serving as a PSA\, Mr. Tamura was a Preparedness Analyst and Planning Specialist with the Federal Emergency Management Agency (FEMA) Region IX\, Pacific Area Office. His duties included National Preparedness\, the Threat and Hazard Identification and Risk Assessment (THIRA) and Stakeholder Preparedness Review (SPR). He is an experienced emergency manager with over twenty-seven years’ experience as well as responding to incidents and working in response\, recovery\, and mitigation divisions in FEMA and local government. \n\n\nClick to Register
URL:https://www.cyberhawaii.org/event/fortify-cybersecurity-webinar-session-7-convergence-of-physical-cyber-security/
LOCATION:Zoom
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=Pacific/Honolulu:20240716T140000
DTEND;TZID=Pacific/Honolulu:20240716T150000
DTSTAMP:20260408T115244
CREATED:20240709T212605Z
LAST-MODIFIED:20240719T215424Z
UID:1634-1721138400-1721142000@www.cyberhawaii.org
SUMMARY:Fortify Cybersecurity Webinar Session 6 - Secure by Design
DESCRIPTION:An initiative that encourages vendors of security and technology products to take accountability for building them in a more secure manner.\nClick Here to Register \nMany technology products are introduced to the market even though they may have missing pieces or flaws that can be exploited by hackers.  This places the burden on companies and consumers to dedicate additional resources for addressing these flaws and to subsequently bear the risk of them being exploited.  In more mature industries\, the inclusion of security and safety principles in the design process has grown over time as manufacturers have realized that building more reliable products results in higher consumer satisfaction and less push back from regulators. \nTo encourage this maturation\, CISA has come up with a voluntary program for software vendors called Secure by Design.  Products designed with Secure by Design principles prioritize the security of customers as a core business requirement\, rather than merely treating it as a technical feature. During the design phase of a product’s development lifecycle\, companies should implement Secure by Design principles to significantly decrease the number of exploitable flaws before introducing them to the market for widespread use or consumption. Out-of-the-box\, products should be secure with additional security features such as multi-factor authentication (MFA)\, logging\, and single sign-on (SSO) available at no extra cost. \nIn this webinar you’ll learn \n• What Secure by Design is and why it is important\n• How Secure by Design principles keep you safer\n• What Customers and Manufactures can do now \nPresenter: \n \nWilliam J. Hicks \nWilliam J. Hicks is CISA Region 9’s Cyber Outreach Support Specialist located in Oakland\, CA. William holds a CompTIA Security+ certification and graduated from the Federal Cyber Defense Skilling Academy (FCDSA). William has a background in Protective Security and Risk Management and has earned a Certified Protection Professional (CPP) from ASIS.  Currently\, William is studying for a second bachelor’s in computer science with a focus on Secure Software Development. \nClick Here to Register
URL:https://www.cyberhawaii.org/event/fortify-cybersecurity-webinar-session-6-secure-by-design/
LOCATION:Zoom
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=Pacific/Honolulu:20240627T090000
DTEND;TZID=Pacific/Honolulu:20240627T120000
DTSTAMP:20260408T115244
CREATED:20240514T163833Z
LAST-MODIFIED:20240529T182118Z
UID:1516-1719478800-1719489600@www.cyberhawaii.org
SUMMARY:2nd Annual Hawaii Cybersecurity Conference – Day 2 of 2
DESCRIPTION:The 2nd Annual Hawaii Cybersecurity Conference is an information sharing event intended to help Hawaii’s varied communities be better informed and better prepared against online criminals.  \nThis conference will bring together Hawaii based organizations as well as individual consumers and students to learn from a variety of federal and state agencies about how to better prepare against cyber threat actors. \nHawaii Lieutenant Governor Sylvia Luke will open the conference.  Experts from federal and state agencies will provide critical information that Hawaii businesses need to stay safe.  Agencies confirmed to attend are: \n\nU.S. Secret Service\nFederal Bureau of Investigation (FBI)\nCybersecurity & Infrastructure Security Agency (CISA)\nState of Hawaii\, Office of Homeland Security\nUnited States Intelligence Service (USIC)\nHomeland Security Investigations (HIS)\nU.S. Coast Guard (USCG)\nNaval Criminal Investigative Service (NCIS)\n\nLogistics\nThe conference is in person only.  No online/virtual attendance is supported.  This event is not open to the media.  There is no charge to attend the conference.  This conference is organized by CyberHawaii with support and speakers provided by the FBI Honolulu Office\, the Hawaii State Office of Homeland Security and other federal and state agencies. \nThe Hawaii Cybersecurity Conference is a two-day event that will be held at the University of Hawaii’s Manoa and West Oahu campuses. \nPrerequisites:  This session will focus on the technical aspects of malicious behaviors.  An understanding of information technology\, information security and/or cybersecurity is required.  Experience working as a security professional is recommended. \n  \nClick Here to Register
URL:https://www.cyberhawaii.org/event/2nd-annual-hawaii-cybersecurity-conference-day-2-of-2/
LOCATION:University of Hawaii West Oahu Campus\, 91-1001 Farrington Hwy\, Kapolei\, HI\, Hawaii\, 96707\, United States
CATEGORIES:conference
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=Pacific/Honolulu:20240626T090000
DTEND;TZID=Pacific/Honolulu:20240626T160000
DTSTAMP:20260408T115244
CREATED:20240408T231506Z
LAST-MODIFIED:20240529T181927Z
UID:1445-1719392400-1719417600@www.cyberhawaii.org
SUMMARY:2nd Annual Hawaii Cybersecurity Conference - Day 1 of 2
DESCRIPTION:The 2nd Annual Hawaii Cybersecurity Conference is an information sharing event intended to help Hawaii’s varied communities be better informed and better prepared against online criminals. \nThis conference will bring together Hawaii based organizations as well as individual consumers and students to learn from a variety of federal and state agencies about how to better prepare against cyber threat actors. \nHawaii Lieutenant Governor Sylvia Luke will open the conference.  Experts from federal and state agencies will provide critical information that Hawaii businesses need to stay safe.  Agencies confirmed to attend are: \n\nU.S. Secret Service\nFederal Bureau of Investigation (FBI)\nCybersecurity & Infrastructure Security Agency (CISA)\nState of Hawaii\, Office of Homeland Security\nUnited States Intelligence Service (USIC)\nHomeland Security Investigations (HIS)\nU.S. Coast Guard (USCG)\nNaval Criminal Investigative Service (NCIS)\n\nLogistics\nThe conference is in person only.  No online/virtual attendance is supported.  This event is not open to the media.  There is no charge to attend the conference.  This conference is organized by CyberHawaii with support and speakers provided by the FBI Honolulu Office\, the Hawaii State Office of Homeland Security and other federal and state agencies. \nThe Hawaii Cybersecurity Conference is a two-day event that will be held at the University of Hawaii’s Manoa and West Oahu campuses. \nPrerequisites:  None.  Topics will be general in nature and cover things that businesses and consumers should be aware of regarding general cybersecurity threats and mitigations. \n  \nClick Here to Register
URL:https://www.cyberhawaii.org/event/2nd-annual-hawaii-cybersecurity-conference/
LOCATION:University of Hawaii\, Manoa Campus\, Campus Center\, 2465 Campus Road\, Room 208\, Honolulu\, HI\, 96822\, United States
CATEGORIES:conference
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=Pacific/Honolulu:20240614T120000
DTEND;TZID=Pacific/Honolulu:20240614T130000
DTSTAMP:20260408T115244
CREATED:20240327T184725Z
LAST-MODIFIED:20240529T182833Z
UID:1420-1718366400-1718370000@www.cyberhawaii.org
SUMMARY:Unite Against Hate:  An Update for Hawaii Businesses from the FBI
DESCRIPTION:Today’s America is contentious.  Whether it’s arguments over immigration\, the rights of LGBTQ people or what keiki learn in school\, the tone and language of arguments often goes beyond what most reasonable people would call civil.  The foundation of our democracy is the ability to debate ideas in a vigorous\, but ultimately forgiving manner. \nMuch debate today takes place online.  Whether in social media\, chat groups\, media reports or blogs\, ideas are expressed and debated in an often vigorous and aggressive manner.  The very anonymity of the internet can often encourage hateful or inappropriate speech that might not be used in an in-person debate.  The power of the internet to encourage hateful speech and misinformation must not be underestimated. \nHawaii businesses need to be prepared to deal with this type of speech.  Policies and processes must be in place to deal with situations where employees are subjected to hateful speech\, and also where employees themselves are the instigators of this type of speech.  Given that hate speech can be protected by the first amendment\, policies must account for the point that the speech becomes criminal. \nCrafting effective policies that govern hate speech and hate crimes in a business environment takes collaboration between professionals in Human Resources\, Legal Services and Security. \nTo learn more about how to better prepare for this type of situation\, please join us and learn more about: \n\nWhat is the Federal Civil Rights Program?\nWhat Constitutes a Hate Crime Wherein the FBI Gets Involved?\nFree Speech vs. True Threats\nPublic Reporting\n\nTarget Audience \nThe information presented will be useful to: \n\nHuman Resource management and analysts\nLegal Service professionals\nSecurity and Cybersecurity management\nBusiness owners\n\nPresenters \nAll presenters are from the FBI Honolulu field office. \nParking \nParking costs $5.  If a purchase is made at one of the stores at Restaurant Row\, parking can be validated and may be free. \n  \nClick Here to Register In-person or Virtually.
URL:https://www.cyberhawaii.org/event/unite-against-hate-an-update-for-hawaii-businesses-from-the-fbi/
LOCATION:High Intensity Drug Trafficking Area (HIDTA)\, 500 Ala Moana Blvd Bldg 5 Suite 200\, Honolulu\, HI\, 96813\, United States
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=Pacific/Honolulu:20240604T140000
DTEND;TZID=Pacific/Honolulu:20240604T150000
DTSTAMP:20260408T115244
CREATED:20240525T164803Z
LAST-MODIFIED:20240607T183215Z
UID:1586-1717509600-1717513200@www.cyberhawaii.org
SUMMARY:Fortify Cybersecurity Webinar Session 5 - Encryption
DESCRIPTION:Encryption – Mandatory today\, Obsolete tomorrow?\nClick Here to Register \nThe risk of data theft requires the use of AES level encryption for valuable data when it’s at rest and in transit. Various types of encryptions are available today in both hardware and software forms\, and it is important for businesses to know how these work and what options they have for implementing them. \nSMB’s with heterogeneous technology environments such as Windows end points\, cloud based apps/storage and Apple/Google mobile devices face the task of ensuring that their data is encrypted in and between each of these environments. An additional layer of complexity comes in when businesses have network enabled measuring devices that transmit sensitive information via W8-Fi (such as in clinics and with security cameras). Since these do not always allow for configuration\, it’s important for businesses to be aware of the type of encryption these devices are implementing. \nAnd things are even more complicated with the advent of Quantum Computing which threatens to make the current form of encryption ineffective or obsolete. \nIn this webinar you’ll learn \n• What data encryption is\n• How modern data encryption works\n• Some types of encryption are better than others\n• When encryption is bad for you (i.e.\, ransomware)\n• Should you lose sleep over Quantum Computing?\n• How to use encryption to protect your information and business \nPresenter: \n \nFaaiuaso L. Lilo Jr. \nFaaiuaso (aka J.R.) is the CISA Region 9 first Cybersecurity Law Enforcement Liaison\, which is a Cybersecurity Advisor co-located with FBI partners. J.R. retired from active-duty in the Air Force as Master Sergeant (E-7) after 23 years of service. He worked as an Exploitation Analyst and Cyber Intelligence Analyst for the NSA-Texas. His career in the military was in Network Intelligence Analysis\, Computer System Operations\, and Radio Communications. J.R. holds a Master’s in Cybersecurity and Bachelor’s in Information Technology.
URL:https://www.cyberhawaii.org/event/fortify-cybersecurity-webinar-session-5-encryption-presented-by-cisa-cyberhawaii/
LOCATION:Zoom
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=Pacific/Honolulu:20240530T090000
DTEND;TZID=Pacific/Honolulu:20240530T110000
DTSTAMP:20260408T115244
CREATED:20240510T081845Z
LAST-MODIFIED:20240511T022104Z
UID:1501-1717059600-1717066800@www.cyberhawaii.org
SUMMARY:Inter-Generational Learning Project - Kupuna Mentor Pilot
DESCRIPTION:As growing numbers of Hawai‘i Baby Boomers retire and leave the workforce\, they take with them decades of valuable experience and wisdom that could benefit students in need of mentors. Giving back to the community and growing the next generation of leaders has always been important for people who love Hawaii and call it home. \nSchools throughout Hawaii are working to educate our keiki in a variety of topics including those that encourage them to consider careers in science\, technology\, engineering and mathematics (STEM). Hawaii\, as well as the rest of the country\, is projected to face a shortage of workers in these fields in the years to come and each of us must do our parts to help close this gap. \nIf you’ve enjoyed a rewarding career as an engineer\, scientist or IT professional and are ready to share your wealth of knowledge with others\, consider becoming a STEM mentor to Hawai‘i youth. An information session is scheduled at UH Manoa Innovation Center ~ Board Room\, 2800 Woodlawn Drive\, Honolulu\, on Thursday\, May 30\, 2024\, from 9 am to 11 am. \nRegister Here Today
URL:https://www.cyberhawaii.org/event/inter-generational-learning-project-kupuna-mentor-pilot/
LOCATION:UH Manoa Innovation Center\, 2800 Woodlawn Drive\, Honolulu\, HI\, 96822\, United States
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=Pacific/Honolulu:20240507T140000
DTEND;TZID=Pacific/Honolulu:20240507T150000
DTSTAMP:20260408T115244
CREATED:20240424T172828Z
LAST-MODIFIED:20240424T184529Z
UID:1468-1715090400-1715094000@www.cyberhawaii.org
SUMMARY:Access Management & Social Engineering
DESCRIPTION:Register Here \nToday’s applications are configured to control access to valuable information by identifying who is requesting access. This identification process allows whoever is responsible for managing the information to make sure that only the right people can get to it. There are various methods for doing this\, all of which fall under the category of Access Management. Access management consists of methods for identifying users\, establishing that they are authorized to access the information and then managing any credentials that are issued. These processes make it possible to manage large groups of users and very valuable information. Security professionals make a living designing strong access management controls. And hackers make a living figuring out how to break them. \nThreat actors employ a variety of techniques to acquire user accesses they are not entitled to. Once acquired they strive to escalate the assigned privileges in order to increase the value of their illegal access. The most valuable accounts to acquire are administrator accounts that come with elevated privileges to do things that normal users can’t do. Directly accessing databases\, creating new accounts and moving laterally from server to server in a network are examples of activities that hackers work on achieving within both large and small organizations. \nOne of the most effective techniques hackers apply is convincing legitimate users to willingly give up information they use to gain access to systems and information they’re authorized to use. These techniques have been around for hundreds of years and fall into the category of Social Engineering. Being able to manipulate other people to do what they want is a core competency of the best hackers or scammers\, whether used in person or online. \nIn this webinar\, attendees will learn: \n\nWhat Access Management is.\nAccess Management techniques and their strengths and weaknesses\nSocial Engineering techniques\nSocial Engineering scams\nHow to protect yourself and your business.\n\n  \nPresenters:\n \nBruce Mirante\, Cybersecurity State Coordinator CISA Region 9\, joined the U.S. Department of Homeland Security’s Cybersecurity and Infrastructure Security Agency (CISA) in January 2024. Bruce is part of CISA’s Region 9 and serves as the Cybersecurity State Coordinator to the State of Hawaii. In this role\, Bruce builds strategic public and private sector relationships with state\, local\, tribal and private sector critical infrastructure entities\, and serves as a principle point of contact to non-Federal organizations interested in engaging with the Federal government to prepare\, manage and respond to cybersecurity incidents. \nPrior to joining CISA\, Bruce was with Matson Navigation Company serving with their network and information security group. \nBruce has been in Hawaii for the past forty years\, working for the Federal government both as a contractor and a civilian employee. Bruce has also worked as an adjunct professor with the University of Hawaii system and other private colleges on Oahu. \nBruce holds several computer industry certifications with Cisco Systems\, Comptia\, Juniper and Microsoft. \n  \n\nJasmine Lewis\, FBI Special Agent \nSA Jasmine Lewis is a Special Agent with the Federal Bureau of Investigation. She has worked for the FBI for over 5 years. SA Lewis works for the FBI Honolulu division Cyber Squad\, focusing on cyber-criminal investigations. \n  \nRegister for the Webinar \nSpecial Note:  Due to the nature of some of the material\, this webinar will not be recorded and the presentations will not be posted to the CyberHawaii website.  Attendees must be present to hear the material. \n————————————– \nThis session is the Fourth in the 2024 Fortify Cybersecurity Webinar Series\, sponsored by CISA and CyberHawaii. This series was made possible by a grant from the Hawaii Department of Business\, Economic Development and Tourism. Other supporters of this series include the State Office of Homeland Security\, the FBI\, Chamber of Commerce Hawai‘i\, the Hawai‘i Defense Alliance and the University of Hawai‘i.
URL:https://www.cyberhawaii.org/event/access-management-social-engineering/
LOCATION:Zoom
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=Pacific/Honolulu:20240430T100000
DTEND;TZID=Pacific/Honolulu:20240430T110000
DTSTAMP:20260408T115244
CREATED:20240419T183753Z
LAST-MODIFIED:20240419T184345Z
UID:1462-1714471200-1714474800@www.cyberhawaii.org
SUMMARY:Internship and Security Leadership Webinar
DESCRIPTION:Learn strategies for building in-house cybersecurity leadership through Federal Internship Programs. This event is present by Cyber Hawaii\, Chamber of Commerce Hawaii and Cyber Readiness Institute. \nClick here to RSVP \n \n 
URL:https://www.cyberhawaii.org/event/internship-and-security-leadership-webinar/
LOCATION:Zoom
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=Pacific/Honolulu:20240410T090000
DTEND;TZID=Pacific/Honolulu:20240410T110000
DTSTAMP:20260408T115244
CREATED:20240327T183244Z
LAST-MODIFIED:20240327T185003Z
UID:1412-1712739600-1712746800@www.cyberhawaii.org
SUMMARY:Evidence of Compliance: How to Grow Your Business
DESCRIPTION:Healthcare\, government\, military\, construction and energy are just some of the industries that have strong compliance regulations. Hawaii businesses must be able to comply with these in order to grow and be profitable. While there are specific regulations that vary by industry\, some cybersecurity requirements are common across sectors because they are based on common standards. \nFor industries that require certification of cybersecurity practices\, it is critical for organizations to provide evidence of compliance with the required framework. Whether the framework is NIST SP 800-171 as required by the Department of Defense under the Cybersecurity Maturity Model Certification (CMMC) program\, or other industry certifications and standards such as HIPAA or ISO\, organizations must document their implementation of the different security requirements and controls and be ready to submit their compliance documentation and evidence for third-party review and validation when needed. Subcontractors and suppliers may also be required to demonstrate compliance to an independent assessor or auditor as well\, to meet government or prime contractor mandated terms and conditions. Many small and mid-size businesses struggle with being able to generate\, collect\, organize\, and retain the evidence necessary to adequately demonstrate compliance. \nThis event will focus on addressing requirements related to evidence gathering and third-party assessments. Using the CMMC program and NIST SP 800-171 requirements as an example\, our presenters will explain concepts and best practices related to developing and organizing the evidence needed for successful assessment\, along with the challenges prime contractors face in getting their suppliers and subcontractors to do the same. \nAlthough the CMMC third-party certification program is currently being applied only within the DoD\, the requirement to gather evidence in preparation for assessment can be viewed as a best practice for any business working in a regulated industry. Because evidence gathering and documentation processes can take a while to establish\, they are the kinds of controls that all businesses should establish before they become mandates or risk losing business to competitors. It is also essential for prime contractors to ensure their supply chains are ready for assessment\, and it can be extremely challenging for primes to develop adequate situational awareness of their supplier cybersecurity status. Once more industries and government agencies begin requiring third-party assessment of cyber compliance across the supply chain (as the DoD is currently pursuing)\, small businesses that don’t adequately prepare will miss out on contracting opportunities. Building awareness and initiating evidence-gathering processes in these areas makes a business more resilient\, better prepared for assessment\, and a lower risk from a partnership and subcontractor standpoint. Compliance can also provide a competitive advantage when bidding for new business. \nParking\nAttendees will have to pay by scanning a QR code once they park and the rate is $1/hour. \nClick Here to Register \nA light breakfast will be available from 8:30am.
URL:https://www.cyberhawaii.org/event/evidence-of-compliance-how-to-grow-your-business/
LOCATION:Entrepreneurs Sandbox\, 643 Ilalo St\, Honolulu\, HI\, 96813
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=Pacific/Honolulu:20240402T140000
DTEND;TZID=Pacific/Honolulu:20240402T150000
DTSTAMP:20260408T115244
CREATED:20240321T224635Z
LAST-MODIFIED:20240321T230504Z
UID:1397-1712066400-1712070000@www.cyberhawaii.org
SUMMARY:Mentorships in Cybersecurity Webinar
DESCRIPTION:Mentorships in Cybersecurity\nCybersecurity is a field that builds upon a professional’s expertise in people\, process and/or systems. This is because cyber threats target people’s behaviors\, processes that are followed by a business\, or features and functions of information systems and technology. Cybersecurity professionals must understand their business from at least one of these perspectives before they can successfully apply security principles in an effective manner. \nPeople just entering the cybersecurity profession can begin with an academic understanding of security principles and/or work experience in a field that deals with people\, processes or systems (such as HR\, finance or Information Technology). Learning about effective cybersecurity controls can be achieved on the job\, provided new employees are able to operate as part of an experience Cybersecurity team that can provide support and mentoring to refine the competencies required to successful defend or attack cyber threat actors. \nMentoring of existing employees or internships for potential employees are key success factors for people pursuing a career in cybersecurity. Success in cybersecurity does not require candidates to be programming superstars\, or be the top cloud engineer in the company. It does not necessarily even require a technical degree\, if a candidate is interested in the behavioral analysis side of cybersecurity. What it does require is critical thinking skills\, the ability to spend long hours in front of a computer and the ability to “think” like someone who doesn’t like to follow rules while adhering to strict protocols themselves. \nIn this webinar you’ll hear about the key tenets of mentoring and internships including: \n\nWhat is mentoring and why is it important\, especially in cybersecurity careers?\nThe difference between mentorships and internships\nHow do CISA and other federal agencies support mentoring and internships?\nMentoring and internships in the private sector\nA framework for mentoring\n\nRegister for the Webinar \n\nPresenters\nBruce Mirante\, Cybersecurity State Coordinator CISA Region 9\, joined the U.S. Department of Homeland Security’s Cybersecurity and Infrastructure Security Agency (CISA) in January 2024. Bruce is part of CISA’s Region 9 and serves as the Cybersecurity State Coordinator to the State of Hawaii. In this role\, Bruce builds strategic public and private sector relationships with state\, local\, tribal and private sector critical infrastructure entities\, and serves as a principle point of contact to non-Federal organizations interested in engaging with the Federal government to prepare\, manage and respond to cybersecurity incidents. \nPrior to joining CISA\, Bruce was with Matson Navigation Company serving with their network and information security group. \nBruce has been in Hawaii for the past forty years\, working for the Federal government both as a contractor and a civilian employee. Bruce has also worked as an adjunct professor with the University of Hawaii system and other private colleges on Oahu. \nBruce holds several computer industry certifications with Cisco Systems\, Comptia\, Juniper and Microsoft. \nPeter Dooher is the Senior Vice President of Digital Strategy at Servco Pacific Inc. He is responsible for Servco’s omnichannel initiatives as well as its product management\, data visualization and analytics\, CRM strategy\, technology and application development functions. Prior to joining Servco\, Peter spent most of his career in Retail\, supporting organizations enterprise digital and technology efforts working from a developer up to a CTO. Peter worked at Accenture LLC for over 9 years implementing technology architecture and integration solutions throughout various industries\, from startups to fortune 500 companies across the globe. \n\nThis session is the third in the 2024 Fortify Cybersecurity Webinar Series\, sponsored by CISA and CyberHawaii. This series was made possible by a grant from the Hawaii Department of Business\, Economic Development and Tourism. Other supporters of this series include the State Office of Homeland Security\, the FBI\, Chamber of Commerce Hawai‘i\, the Hawai‘i Defense Alliance and the University of Hawai‘i.
URL:https://www.cyberhawaii.org/event/cisa-cyberhawaii-webinar-mentorships/
LOCATION:Zoom
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=UTC:20240328T120000
DTEND;TZID=UTC:20240328T130000
DTSTAMP:20260408T115244
CREATED:20240315T020615Z
LAST-MODIFIED:20240315T022211Z
UID:1390-1711627200-1711630800@www.cyberhawaii.org
SUMMARY:Cyber Insurance Webinar
DESCRIPTION:According to the IBM 2023 Cost of a Data Breach Report the average total cost of a data breach reached an all time high of $4.45 million per incident.  Organizations that reported low or no security system complexity experienced an average data breach cost of $3.84 million in 2023.  Cloud environments were frequent targets for cyber attackers in 2023. Attackers often gained access to multiple environments\, with 39% of breaches spanning multiple environments and incurring a higher-than-average cost of USD 4.75 million. \nAll this basically means that data breaches are expensive to fix.  And many businesses do not survive them.  In order to protect yourself and your business\, there are certain things you can to improve your chances of surviving a breach. \n\nRisk assessment. Perform a risk assessment to understand your organization and what you’re trying to protect.\nBusiness preparation and continuity. Create policies that describe what you will do to reduce your risk and be able to stay in business.\nIncident response. Create a plan for responding to a cyber-attack.\nEmployee training. Make sure your employees understand how to keep your business safe.\nNetwork and website vulnerability identification and management. Perform penetration testing to identify gaps in your information system security and come up with plans to fix them.\nRegular scanning and testing\, including dark web scanning and ethical hacking. Monitor and test your internal and external environments for signs that you may have been compromised.\nCyber insurance policies. Obtain appropriate cyber insurance to help you to prepare for and recover from a cyber incident.\n\nCyber insurance is a key element of an effective cybersecurity system.  It can help to offset the cost of recovering your business when a data breach occurs.  Because of the high cost to recovery from a data breach and the increased frequency of cyber-attacks\, the question we all have to ask ourselves is:  Can we afford not to have cyber insurance? \nIn this webinar you’ll hear about the key tenets of cyber insurance including: \n\nWhat is cyber insurance?\nWhat does it do?\nWhat do terms like “third party liability” and “first party loss” mean?\nWhen should you consider buying cyber insurance?\nWhat policy options do you have?\nWhat are your obligations under a cyber insurance policy?\n\n  \nRegister for the webinar \nPresenter\nMark A Smith\, Senior Vice President\, CRC Insurance \nMark is a cyber focused insurance wholesaler\, specializing in cyber since its emergence to prominence in 2007.  As head of CRC’s national Cyber Team\, he works closely with many cyber insurers in the development and refinement of cyber policy forms and endorsements.  He is a frequent industry speaker\, writer\, and educator on all things cyber.  He is a graduate of Washington State University and splits his time between Arizona and Wisconsin with his labradoodles Roca and Snickers. \n\nThis webinar was made possible by a grant from the Hawaii Department of Business\, Economic Development and Tourism.  Other supporters include the Chamber of Commerce Hawai‘i\, the Hawai‘i Defense Alliance and the University of Hawai‘i.
URL:https://www.cyberhawaii.org/event/cyber-insurance-webinar/
LOCATION:Zoom
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=UTC:20240323T073000
DTEND;TZID=UTC:20240323T140000
DTSTAMP:20260408T115244
CREATED:20240216T174710Z
LAST-MODIFIED:20240216T191912Z
UID:1347-1711179000-1711202400@www.cyberhawaii.org
SUMMARY:Girls In Cyber - Workshop
DESCRIPTION:When: Saturday\, March 23rd\, 7:30 am – 2:00 pm\nWhere: Kamehameha Schools – Midkiff Library\nWho: Girls grades 4th through 12th – Limited to the first 50 participants.\nCost: Free\nRegistration Deadline: 3/13 to get a lunch. 3/21 if space available \nEmpowering Girls in Tech:  Cybersecurity Essentials with Hands On Activities. BYOD\n\nCybersecurity Superheroes – Social Engineering – why it is important and the consequences.\nCreate Your Secret Code – Password\nSafety – why you need a safe password and how to make one.\nDigital Detectives – Phishing/Vishing – with so many ways of being attacked\, what are the more common ones\, and how to protect yourself?\nGuardians of the Web – Cryptography / Web Design Safety – How to run a safe website and what to beware of if hacked. Why is Cryptography important\, and how is it used?\n\nRegister Here: \n \nSponsors
URL:https://www.cyberhawaii.org/event/girls-in-cyber-workshop/
LOCATION:Kamehameha Schools – Midkiff Library\, 249 Konia Circle\, Honolulu\, HI\, 96817\, United States
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=UTC:20240321T180000
DTEND;TZID=UTC:20240321T190000
DTSTAMP:20260408T115244
CREATED:20240305T223037Z
LAST-MODIFIED:20240305T223037Z
UID:1372-1711044000-1711047600@www.cyberhawaii.org
SUMMARY:Time is COMSEC\, Protection\, and the Threat
DESCRIPTION:Jonathan Lee from PACXA will be exploring the dynamic interplay between time and security\, dissecting how time serves as the cornerstone of communication security (COMSEC)\, acts as both protector and threat\, and influences the effectiveness of our defense strategies.  \n“Time equals money” \nAn addage as old as the dawn of structured currency\, where the manipulation of data led to successful breach points resulting in a loss of productivity\, revenue\, and material. Since the beginning of the computing era\, time has ruled the infrastructure\, from the wave length measurements of wireless to the pulse width clocks of early processors. In this presentation\, discover how time\, no matter how trivial\, rules cyber engagements. \nTime is COMSEC\, Protection\, and the Threat is the exploration of the dynamic interplay between time and security\, dissecting how time serves as the cornerstone of communication security (COMSEC)\, acts as both protector and threat\, and influences the effectiveness of our defense strategies. Don’t miss out on this opportunity to gain valuable insights and discover actionable strategies to strengthen your security posture in an ever-evolving landscape! \nSpeaker Bio: \nJonathan Lee is the Information Security Manager at Pacxa\, boasts expertise in Networking\, Information Systems\, and Mobile Technologies\, ensuring organizations stay at the forefront of technological advancements. Beyond his IT prowess\, Jonathan has spent six years honing his skills in lighting and sound production at The Crossroads at Hawaiian Brian’s\, enhancing live productions and musicians’ performances with strategic placement and control of audiovisual systems. \nCommitted to delivering top-notch support\, Jonathan excels in remote assistance and training\, catering to users’ needs anytime\, anywhere. Additionally\, as a member of the Hawaii Army National Guard\, Jonathan brings military discipline and expertise\, having completed Signal Support Specialist training with honors\, embodying the battalion motto “Quality All Ways.” Through his involvement in National Guard Exercise Missions\, Jonathan provides crucial network-server and radio communications support\, ensuring optimal connectivity for commanding officers. \nEvent Registration
URL:https://www.cyberhawaii.org/event/time-is-comsec-protection-and-the-threat/
LOCATION:Entrepreneurs Sandbox\, 643 Ilalo St\, Honolulu\, HI\, 96813
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=UTC:20240228T160000
DTEND;TZID=UTC:20240228T180000
DTSTAMP:20260408T115244
CREATED:20240210T000834Z
LAST-MODIFIED:20240210T000941Z
UID:1342-1709136000-1709143200@www.cyberhawaii.org
SUMMARY:Pau Hana with Cloudflare: The Anatomy of a DDOS Attack.
DESCRIPTION:CyberHawaii and the University of Hawaii invite you to meet with Cloudflare at the University of Hawaii\, Manoa Campus\, on Wednesday February 28\, 2024 from 4-6pm.  Cloudflare will be speaking on The Anatomy of a DDOS Attack. \nGartner describes Cloudflare as “a company focused on enhancing Internet performance. The primary problem it addresses is the need for online application protection and acceleration without the need for additional hardware\, software installation or code alterations. Cloudflare operates an intelligent global network that routes all traffic for Internet properties empowered by it. This mechanism progressively improves with each new site added to the system. The result yields a substantial enhancement in performance along with a notable decrease in spam and attacks. With a headquarters situated in San Francisco\, CA\, Cloudflare also operates from multiple global locations.” \nRegistration is required for the event using the link below. \nhttps://pauhanawithcloudflare.splashthat.com/ \nThere is no charge to attend this event\, but space is limited so be sure to register soon.
URL:https://www.cyberhawaii.org/event/pau-hana-with-cloudflare-the-anatomy-of-a-ddos-attack/
LOCATION:UH Manoa\, IT Conference Room 105 A&B\, 2500 Campus Road\, Honolulu\, HI\, 96708\, United States
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=Pacific/Honolulu:20240206T140000
DTEND;TZID=Pacific/Honolulu:20240206T150000
DTSTAMP:20260408T115244
CREATED:20240117T190938Z
LAST-MODIFIED:20240201T202907Z
UID:1309-1707228000-1707231600@www.cyberhawaii.org
SUMMARY:Fortify Cybersecurity Webinar Session 01 - Password Management and Multi-Factor Authentication
DESCRIPTION:Password Management and Multi-factor Authentication\nPassword management is a fundamental control in a strong cyber security framework and can be effectively implemented by businesses of all sizes.  Many who operate small or large businesses may not give passwords much attention and mistakenly assume using a password that is easy to remember will make their lives easier when they have so many other responsibilities. However\, a simple password is easier for cyber terrorists to crack\, while a longer\, more complicated password that uses a combination of letters\, numbers and symbols takes longer and can be the first line of defense against a cyber-attack. This is just the beginning what is necessary for basic password security. \nConversely\, Multi-factor Authentication (MFA) may seem like a new technology that is out of the reach of most businesses as a security tool.  Given the variety and frequency of cyber threats working to compromise online accounts\, MFA is no longer a luxury.  It provides an additional line of defense that can be implemented in businesses of all sizes.  And it has matured to the point that even small businesses are able to implement it. \nRegister to Join the Webinar \nBy attending this webinar you’ll learn about: \n\nBasic password management rules\nThe importance of Strong Passwords\nThe role of Password Managers\nWhat MFA is and isn’t\nPros and Cons of MFA\nOptions for implementing MFA\n\nFor more information\, you can listen to CyberHawaii CEO Al Ogata’s recent interview on Hawaii Public Radio discussing the seminar. \nPresenters\nJennilyn LaBrunda\, a Cybersecurity Advisor (CSA) with the Cybersecurity and Infrastructure Security Agency (CISA) for the Pacific Islands\, will lead this session. She is responsible for Hawaii\, Guam\, the Commonwealth of the Northern Marianas Islands\, and American Samoa. \nGuam-based LaBrunda is an experienced cybersecurity and information technology professional with over 15 years of experience. She is a Certified Information Systems Security Professional (CISSP) and a graduate from the University of Guam with a double major in technology & e-commerce and computer information systems. \nShe oversaw several comprehensive cybersecurity programs for the Department of Defense to ensure resilient protection of critical systems and data. She spearheaded over a dozen major IT and security initiatives\, which included leading the development of policies and contingency plans\, conducting risk assessments\, implementing security controls\, investigating security breaches\, providing technical support\, and developing training curriculum for the cybersecurity workforce. Her work was recognized with a Meritorious Civilian Service award. \n  \nCharissa Wong has over 20 years of experienc in Information Technology and Security management. She currently serves as the Information Security and Technology Manager for Bowers + Kubota.  Charissa holds a CISSP certification and is the owner of Cyber Kia’i\, a security consulting firm whose mission is to help Hawaii businesses improve their security posture. \nCharissa is an active member in the local cybersecurity community\, which includes serving as the Vice President of ISC2 Hawaii.  She is also a member of the CIO Council and CyberHawaii. \nCharissa is a proud graduate of Kamehameha Schools and the University of Oregon. \n  \nThe session is the first one in the 2024 Fortify Cybersecurity Webinar Series\, sponsored CISA and CyberHawaii.  This series was made possible by a grant from the Hawaii Department of Business\, Economic Development and Tourism.  Other supporters of this series include the State Office of Homeland Security\, the FBI\, Chamber of Commerce Hawai‘i\, the Hawai‘i Defense Alliance and the University of Hawai‘i. \nRegister to Join the Webinar \nAbout CyberHawaii\nCyberHawaii is a nonprofit organization founded in 2016 that is committed to developing and enhancing Hawai‘i’s cybersecurity capabilities through information sharing and analysis. CyberHawaii\, an affiliate of CyberUSA\, seeks to prevent and mitigate cyber risks for residents\, businesses\, government agencies\, and nonprofit organizations. CyberHawaii is also committed to education and workforce development to build cyber readiness and resilience and to providing information on cyber risk and solutions for policy decision-makers. Website: cyberhawaii.org.
URL:https://www.cyberhawaii.org/event/fortify-cybersecurity-webinar-session-01-password-management-and-multi-factor-authentication/
LOCATION:Zoom
END:VEVENT
END:VCALENDAR