BEGIN:VCALENDAR
VERSION:2.0
PRODID:-//CyberHawaii - ECPv6.15.20//NONSGML v1.0//EN
CALSCALE:GREGORIAN
METHOD:PUBLISH
X-WR-CALNAME:CyberHawaii
X-ORIGINAL-URL:https://www.cyberhawaii.org
X-WR-CALDESC:Events for CyberHawaii
REFRESH-INTERVAL;VALUE=DURATION:PT1H
X-Robots-Tag:noindex
X-PUBLISHED-TTL:PT1H
BEGIN:VTIMEZONE
TZID:UTC
BEGIN:STANDARD
TZOFFSETFROM:+0000
TZOFFSETTO:+0000
TZNAME:UTC
DTSTART:20230101T000000
END:STANDARD
END:VTIMEZONE
BEGIN:VTIMEZONE
TZID:Pacific/Honolulu
BEGIN:STANDARD
TZOFFSETFROM:-1000
TZOFFSETTO:-1000
TZNAME:HST
DTSTART:20230101T000000
END:STANDARD
END:VTIMEZONE
BEGIN:VEVENT
DTSTART;TZID=UTC:20240321T180000
DTEND;TZID=UTC:20240321T190000
DTSTAMP:20260420T080317
CREATED:20240305T223037Z
LAST-MODIFIED:20240305T223037Z
UID:1372-1711044000-1711047600@www.cyberhawaii.org
SUMMARY:Time is COMSEC\, Protection\, and the Threat
DESCRIPTION:Jonathan Lee from PACXA will be exploring the dynamic interplay between time and security\, dissecting how time serves as the cornerstone of communication security (COMSEC)\, acts as both protector and threat\, and influences the effectiveness of our defense strategies.  \n“Time equals money” \nAn addage as old as the dawn of structured currency\, where the manipulation of data led to successful breach points resulting in a loss of productivity\, revenue\, and material. Since the beginning of the computing era\, time has ruled the infrastructure\, from the wave length measurements of wireless to the pulse width clocks of early processors. In this presentation\, discover how time\, no matter how trivial\, rules cyber engagements. \nTime is COMSEC\, Protection\, and the Threat is the exploration of the dynamic interplay between time and security\, dissecting how time serves as the cornerstone of communication security (COMSEC)\, acts as both protector and threat\, and influences the effectiveness of our defense strategies. Don’t miss out on this opportunity to gain valuable insights and discover actionable strategies to strengthen your security posture in an ever-evolving landscape! \nSpeaker Bio: \nJonathan Lee is the Information Security Manager at Pacxa\, boasts expertise in Networking\, Information Systems\, and Mobile Technologies\, ensuring organizations stay at the forefront of technological advancements. Beyond his IT prowess\, Jonathan has spent six years honing his skills in lighting and sound production at The Crossroads at Hawaiian Brian’s\, enhancing live productions and musicians’ performances with strategic placement and control of audiovisual systems. \nCommitted to delivering top-notch support\, Jonathan excels in remote assistance and training\, catering to users’ needs anytime\, anywhere. Additionally\, as a member of the Hawaii Army National Guard\, Jonathan brings military discipline and expertise\, having completed Signal Support Specialist training with honors\, embodying the battalion motto “Quality All Ways.” Through his involvement in National Guard Exercise Missions\, Jonathan provides crucial network-server and radio communications support\, ensuring optimal connectivity for commanding officers. \nEvent Registration
URL:https://www.cyberhawaii.org/event/time-is-comsec-protection-and-the-threat/
LOCATION:Entrepreneurs Sandbox\, 643 Ilalo St\, Honolulu\, HI\, 96813
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=UTC:20240228T160000
DTEND;TZID=UTC:20240228T180000
DTSTAMP:20260420T080317
CREATED:20240210T000834Z
LAST-MODIFIED:20240210T000941Z
UID:1342-1709136000-1709143200@www.cyberhawaii.org
SUMMARY:Pau Hana with Cloudflare: The Anatomy of a DDOS Attack.
DESCRIPTION:CyberHawaii and the University of Hawaii invite you to meet with Cloudflare at the University of Hawaii\, Manoa Campus\, on Wednesday February 28\, 2024 from 4-6pm.  Cloudflare will be speaking on The Anatomy of a DDOS Attack. \nGartner describes Cloudflare as “a company focused on enhancing Internet performance. The primary problem it addresses is the need for online application protection and acceleration without the need for additional hardware\, software installation or code alterations. Cloudflare operates an intelligent global network that routes all traffic for Internet properties empowered by it. This mechanism progressively improves with each new site added to the system. The result yields a substantial enhancement in performance along with a notable decrease in spam and attacks. With a headquarters situated in San Francisco\, CA\, Cloudflare also operates from multiple global locations.” \nRegistration is required for the event using the link below. \nhttps://pauhanawithcloudflare.splashthat.com/ \nThere is no charge to attend this event\, but space is limited so be sure to register soon.
URL:https://www.cyberhawaii.org/event/pau-hana-with-cloudflare-the-anatomy-of-a-ddos-attack/
LOCATION:UH Manoa\, IT Conference Room 105 A&B\, 2500 Campus Road\, Honolulu\, HI\, 96708\, United States
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=Pacific/Honolulu:20240206T140000
DTEND;TZID=Pacific/Honolulu:20240206T150000
DTSTAMP:20260420T080317
CREATED:20240117T190938Z
LAST-MODIFIED:20240201T202907Z
UID:1309-1707228000-1707231600@www.cyberhawaii.org
SUMMARY:Fortify Cybersecurity Webinar Session 01 - Password Management and Multi-Factor Authentication
DESCRIPTION:Password Management and Multi-factor Authentication\nPassword management is a fundamental control in a strong cyber security framework and can be effectively implemented by businesses of all sizes.  Many who operate small or large businesses may not give passwords much attention and mistakenly assume using a password that is easy to remember will make their lives easier when they have so many other responsibilities. However\, a simple password is easier for cyber terrorists to crack\, while a longer\, more complicated password that uses a combination of letters\, numbers and symbols takes longer and can be the first line of defense against a cyber-attack. This is just the beginning what is necessary for basic password security. \nConversely\, Multi-factor Authentication (MFA) may seem like a new technology that is out of the reach of most businesses as a security tool.  Given the variety and frequency of cyber threats working to compromise online accounts\, MFA is no longer a luxury.  It provides an additional line of defense that can be implemented in businesses of all sizes.  And it has matured to the point that even small businesses are able to implement it. \nRegister to Join the Webinar \nBy attending this webinar you’ll learn about: \n\nBasic password management rules\nThe importance of Strong Passwords\nThe role of Password Managers\nWhat MFA is and isn’t\nPros and Cons of MFA\nOptions for implementing MFA\n\nFor more information\, you can listen to CyberHawaii CEO Al Ogata’s recent interview on Hawaii Public Radio discussing the seminar. \nPresenters\nJennilyn LaBrunda\, a Cybersecurity Advisor (CSA) with the Cybersecurity and Infrastructure Security Agency (CISA) for the Pacific Islands\, will lead this session. She is responsible for Hawaii\, Guam\, the Commonwealth of the Northern Marianas Islands\, and American Samoa. \nGuam-based LaBrunda is an experienced cybersecurity and information technology professional with over 15 years of experience. She is a Certified Information Systems Security Professional (CISSP) and a graduate from the University of Guam with a double major in technology & e-commerce and computer information systems. \nShe oversaw several comprehensive cybersecurity programs for the Department of Defense to ensure resilient protection of critical systems and data. She spearheaded over a dozen major IT and security initiatives\, which included leading the development of policies and contingency plans\, conducting risk assessments\, implementing security controls\, investigating security breaches\, providing technical support\, and developing training curriculum for the cybersecurity workforce. Her work was recognized with a Meritorious Civilian Service award. \n  \nCharissa Wong has over 20 years of experienc in Information Technology and Security management. She currently serves as the Information Security and Technology Manager for Bowers + Kubota.  Charissa holds a CISSP certification and is the owner of Cyber Kia’i\, a security consulting firm whose mission is to help Hawaii businesses improve their security posture. \nCharissa is an active member in the local cybersecurity community\, which includes serving as the Vice President of ISC2 Hawaii.  She is also a member of the CIO Council and CyberHawaii. \nCharissa is a proud graduate of Kamehameha Schools and the University of Oregon. \n  \nThe session is the first one in the 2024 Fortify Cybersecurity Webinar Series\, sponsored CISA and CyberHawaii.  This series was made possible by a grant from the Hawaii Department of Business\, Economic Development and Tourism.  Other supporters of this series include the State Office of Homeland Security\, the FBI\, Chamber of Commerce Hawai‘i\, the Hawai‘i Defense Alliance and the University of Hawai‘i. \nRegister to Join the Webinar \nAbout CyberHawaii\nCyberHawaii is a nonprofit organization founded in 2016 that is committed to developing and enhancing Hawai‘i’s cybersecurity capabilities through information sharing and analysis. CyberHawaii\, an affiliate of CyberUSA\, seeks to prevent and mitigate cyber risks for residents\, businesses\, government agencies\, and nonprofit organizations. CyberHawaii is also committed to education and workforce development to build cyber readiness and resilience and to providing information on cyber risk and solutions for policy decision-makers. Website: cyberhawaii.org.
URL:https://www.cyberhawaii.org/event/fortify-cybersecurity-webinar-session-01-password-management-and-multi-factor-authentication/
LOCATION:Zoom
END:VEVENT
END:VCALENDAR