BEGIN:VCALENDAR
VERSION:2.0
PRODID:-//CyberHawaii - ECPv6.16.2//NONSGML v1.0//EN
CALSCALE:GREGORIAN
METHOD:PUBLISH
X-ORIGINAL-URL:https://www.cyberhawaii.org
X-WR-CALDESC:Events for CyberHawaii
REFRESH-INTERVAL;VALUE=DURATION:PT1H
X-Robots-Tag:noindex
X-PUBLISHED-TTL:PT1H
BEGIN:VTIMEZONE
TZID:Pacific/Honolulu
BEGIN:STANDARD
TZOFFSETFROM:-1000
TZOFFSETTO:-1000
TZNAME:HST
DTSTART:20230101T000000
END:STANDARD
END:VTIMEZONE
BEGIN:VTIMEZONE
TZID:UTC
BEGIN:STANDARD
TZOFFSETFROM:+0000
TZOFFSETTO:+0000
TZNAME:UTC
DTSTART:20230101T000000
END:STANDARD
END:VTIMEZONE
BEGIN:VEVENT
DTSTART;TZID=Pacific/Honolulu:20240410T090000
DTEND;TZID=Pacific/Honolulu:20240410T110000
DTSTAMP:20260521T002804
CREATED:20240327T183244Z
LAST-MODIFIED:20240327T185003Z
UID:1412-1712739600-1712746800@www.cyberhawaii.org
SUMMARY:Evidence of Compliance: How to Grow Your Business
DESCRIPTION:Healthcare\, government\, military\, construction and energy are just some of the industries that have strong compliance regulations. Hawaii businesses must be able to comply with these in order to grow and be profitable. While there are specific regulations that vary by industry\, some cybersecurity requirements are common across sectors because they are based on common standards. \nFor industries that require certification of cybersecurity practices\, it is critical for organizations to provide evidence of compliance with the required framework. Whether the framework is NIST SP 800-171 as required by the Department of Defense under the Cybersecurity Maturity Model Certification (CMMC) program\, or other industry certifications and standards such as HIPAA or ISO\, organizations must document their implementation of the different security requirements and controls and be ready to submit their compliance documentation and evidence for third-party review and validation when needed. Subcontractors and suppliers may also be required to demonstrate compliance to an independent assessor or auditor as well\, to meet government or prime contractor mandated terms and conditions. Many small and mid-size businesses struggle with being able to generate\, collect\, organize\, and retain the evidence necessary to adequately demonstrate compliance. \nThis event will focus on addressing requirements related to evidence gathering and third-party assessments. Using the CMMC program and NIST SP 800-171 requirements as an example\, our presenters will explain concepts and best practices related to developing and organizing the evidence needed for successful assessment\, along with the challenges prime contractors face in getting their suppliers and subcontractors to do the same. \nAlthough the CMMC third-party certification program is currently being applied only within the DoD\, the requirement to gather evidence in preparation for assessment can be viewed as a best practice for any business working in a regulated industry. Because evidence gathering and documentation processes can take a while to establish\, they are the kinds of controls that all businesses should establish before they become mandates or risk losing business to competitors. It is also essential for prime contractors to ensure their supply chains are ready for assessment\, and it can be extremely challenging for primes to develop adequate situational awareness of their supplier cybersecurity status. Once more industries and government agencies begin requiring third-party assessment of cyber compliance across the supply chain (as the DoD is currently pursuing)\, small businesses that don’t adequately prepare will miss out on contracting opportunities. Building awareness and initiating evidence-gathering processes in these areas makes a business more resilient\, better prepared for assessment\, and a lower risk from a partnership and subcontractor standpoint. Compliance can also provide a competitive advantage when bidding for new business. \nParking\nAttendees will have to pay by scanning a QR code once they park and the rate is $1/hour. \nClick Here to Register \nA light breakfast will be available from 8:30am.
URL:https://www.cyberhawaii.org/event/evidence-of-compliance-how-to-grow-your-business/
LOCATION:Entrepreneurs Sandbox\, 643 Ilalo St\, Honolulu\, HI\, 96813
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=Pacific/Honolulu:20240402T140000
DTEND;TZID=Pacific/Honolulu:20240402T150000
DTSTAMP:20260521T002804
CREATED:20240321T224635Z
LAST-MODIFIED:20240321T230504Z
UID:1397-1712066400-1712070000@www.cyberhawaii.org
SUMMARY:Mentorships in Cybersecurity Webinar
DESCRIPTION:Mentorships in Cybersecurity\nCybersecurity is a field that builds upon a professional’s expertise in people\, process and/or systems. This is because cyber threats target people’s behaviors\, processes that are followed by a business\, or features and functions of information systems and technology. Cybersecurity professionals must understand their business from at least one of these perspectives before they can successfully apply security principles in an effective manner. \nPeople just entering the cybersecurity profession can begin with an academic understanding of security principles and/or work experience in a field that deals with people\, processes or systems (such as HR\, finance or Information Technology). Learning about effective cybersecurity controls can be achieved on the job\, provided new employees are able to operate as part of an experience Cybersecurity team that can provide support and mentoring to refine the competencies required to successful defend or attack cyber threat actors. \nMentoring of existing employees or internships for potential employees are key success factors for people pursuing a career in cybersecurity. Success in cybersecurity does not require candidates to be programming superstars\, or be the top cloud engineer in the company. It does not necessarily even require a technical degree\, if a candidate is interested in the behavioral analysis side of cybersecurity. What it does require is critical thinking skills\, the ability to spend long hours in front of a computer and the ability to “think” like someone who doesn’t like to follow rules while adhering to strict protocols themselves. \nIn this webinar you’ll hear about the key tenets of mentoring and internships including: \n\nWhat is mentoring and why is it important\, especially in cybersecurity careers?\nThe difference between mentorships and internships\nHow do CISA and other federal agencies support mentoring and internships?\nMentoring and internships in the private sector\nA framework for mentoring\n\nRegister for the Webinar \n\nPresenters\nBruce Mirante\, Cybersecurity State Coordinator CISA Region 9\, joined the U.S. Department of Homeland Security’s Cybersecurity and Infrastructure Security Agency (CISA) in January 2024. Bruce is part of CISA’s Region 9 and serves as the Cybersecurity State Coordinator to the State of Hawaii. In this role\, Bruce builds strategic public and private sector relationships with state\, local\, tribal and private sector critical infrastructure entities\, and serves as a principle point of contact to non-Federal organizations interested in engaging with the Federal government to prepare\, manage and respond to cybersecurity incidents. \nPrior to joining CISA\, Bruce was with Matson Navigation Company serving with their network and information security group. \nBruce has been in Hawaii for the past forty years\, working for the Federal government both as a contractor and a civilian employee. Bruce has also worked as an adjunct professor with the University of Hawaii system and other private colleges on Oahu. \nBruce holds several computer industry certifications with Cisco Systems\, Comptia\, Juniper and Microsoft. \nPeter Dooher is the Senior Vice President of Digital Strategy at Servco Pacific Inc. He is responsible for Servco’s omnichannel initiatives as well as its product management\, data visualization and analytics\, CRM strategy\, technology and application development functions. Prior to joining Servco\, Peter spent most of his career in Retail\, supporting organizations enterprise digital and technology efforts working from a developer up to a CTO. Peter worked at Accenture LLC for over 9 years implementing technology architecture and integration solutions throughout various industries\, from startups to fortune 500 companies across the globe. \n\nThis session is the third in the 2024 Fortify Cybersecurity Webinar Series\, sponsored by CISA and CyberHawaii. This series was made possible by a grant from the Hawaii Department of Business\, Economic Development and Tourism. Other supporters of this series include the State Office of Homeland Security\, the FBI\, Chamber of Commerce Hawai‘i\, the Hawai‘i Defense Alliance and the University of Hawai‘i.
URL:https://www.cyberhawaii.org/event/cisa-cyberhawaii-webinar-mentorships/
LOCATION:Zoom
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=UTC:20240328T120000
DTEND;TZID=UTC:20240328T130000
DTSTAMP:20260521T002804
CREATED:20240315T020615Z
LAST-MODIFIED:20240315T022211Z
UID:1390-1711627200-1711630800@www.cyberhawaii.org
SUMMARY:Cyber Insurance Webinar
DESCRIPTION:According to the IBM 2023 Cost of a Data Breach Report the average total cost of a data breach reached an all time high of $4.45 million per incident.  Organizations that reported low or no security system complexity experienced an average data breach cost of $3.84 million in 2023.  Cloud environments were frequent targets for cyber attackers in 2023. Attackers often gained access to multiple environments\, with 39% of breaches spanning multiple environments and incurring a higher-than-average cost of USD 4.75 million. \nAll this basically means that data breaches are expensive to fix.  And many businesses do not survive them.  In order to protect yourself and your business\, there are certain things you can to improve your chances of surviving a breach. \n\nRisk assessment. Perform a risk assessment to understand your organization and what you’re trying to protect.\nBusiness preparation and continuity. Create policies that describe what you will do to reduce your risk and be able to stay in business.\nIncident response. Create a plan for responding to a cyber-attack.\nEmployee training. Make sure your employees understand how to keep your business safe.\nNetwork and website vulnerability identification and management. Perform penetration testing to identify gaps in your information system security and come up with plans to fix them.\nRegular scanning and testing\, including dark web scanning and ethical hacking. Monitor and test your internal and external environments for signs that you may have been compromised.\nCyber insurance policies. Obtain appropriate cyber insurance to help you to prepare for and recover from a cyber incident.\n\nCyber insurance is a key element of an effective cybersecurity system.  It can help to offset the cost of recovering your business when a data breach occurs.  Because of the high cost to recovery from a data breach and the increased frequency of cyber-attacks\, the question we all have to ask ourselves is:  Can we afford not to have cyber insurance? \nIn this webinar you’ll hear about the key tenets of cyber insurance including: \n\nWhat is cyber insurance?\nWhat does it do?\nWhat do terms like “third party liability” and “first party loss” mean?\nWhen should you consider buying cyber insurance?\nWhat policy options do you have?\nWhat are your obligations under a cyber insurance policy?\n\n  \nRegister for the webinar \nPresenter\nMark A Smith\, Senior Vice President\, CRC Insurance \nMark is a cyber focused insurance wholesaler\, specializing in cyber since its emergence to prominence in 2007.  As head of CRC’s national Cyber Team\, he works closely with many cyber insurers in the development and refinement of cyber policy forms and endorsements.  He is a frequent industry speaker\, writer\, and educator on all things cyber.  He is a graduate of Washington State University and splits his time between Arizona and Wisconsin with his labradoodles Roca and Snickers. \n\nThis webinar was made possible by a grant from the Hawaii Department of Business\, Economic Development and Tourism.  Other supporters include the Chamber of Commerce Hawai‘i\, the Hawai‘i Defense Alliance and the University of Hawai‘i.
URL:https://www.cyberhawaii.org/event/cyber-insurance-webinar/
LOCATION:Zoom
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=UTC:20240323T073000
DTEND;TZID=UTC:20240323T140000
DTSTAMP:20260521T002804
CREATED:20240216T174710Z
LAST-MODIFIED:20240216T191912Z
UID:1347-1711179000-1711202400@www.cyberhawaii.org
SUMMARY:Girls In Cyber - Workshop
DESCRIPTION:When: Saturday\, March 23rd\, 7:30 am – 2:00 pm\nWhere: Kamehameha Schools – Midkiff Library\nWho: Girls grades 4th through 12th – Limited to the first 50 participants.\nCost: Free\nRegistration Deadline: 3/13 to get a lunch. 3/21 if space available \nEmpowering Girls in Tech:  Cybersecurity Essentials with Hands On Activities. BYOD\n\nCybersecurity Superheroes – Social Engineering – why it is important and the consequences.\nCreate Your Secret Code – Password\nSafety – why you need a safe password and how to make one.\nDigital Detectives – Phishing/Vishing – with so many ways of being attacked\, what are the more common ones\, and how to protect yourself?\nGuardians of the Web – Cryptography / Web Design Safety – How to run a safe website and what to beware of if hacked. Why is Cryptography important\, and how is it used?\n\nRegister Here: \n \nSponsors
URL:https://www.cyberhawaii.org/event/girls-in-cyber-workshop/
LOCATION:Kamehameha Schools – Midkiff Library\, 249 Konia Circle\, Honolulu\, HI\, 96817\, United States
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=UTC:20240321T180000
DTEND;TZID=UTC:20240321T190000
DTSTAMP:20260521T002804
CREATED:20240305T223037Z
LAST-MODIFIED:20240305T223037Z
UID:1372-1711044000-1711047600@www.cyberhawaii.org
SUMMARY:Time is COMSEC\, Protection\, and the Threat
DESCRIPTION:Jonathan Lee from PACXA will be exploring the dynamic interplay between time and security\, dissecting how time serves as the cornerstone of communication security (COMSEC)\, acts as both protector and threat\, and influences the effectiveness of our defense strategies.  \n“Time equals money” \nAn addage as old as the dawn of structured currency\, where the manipulation of data led to successful breach points resulting in a loss of productivity\, revenue\, and material. Since the beginning of the computing era\, time has ruled the infrastructure\, from the wave length measurements of wireless to the pulse width clocks of early processors. In this presentation\, discover how time\, no matter how trivial\, rules cyber engagements. \nTime is COMSEC\, Protection\, and the Threat is the exploration of the dynamic interplay between time and security\, dissecting how time serves as the cornerstone of communication security (COMSEC)\, acts as both protector and threat\, and influences the effectiveness of our defense strategies. Don’t miss out on this opportunity to gain valuable insights and discover actionable strategies to strengthen your security posture in an ever-evolving landscape! \nSpeaker Bio: \nJonathan Lee is the Information Security Manager at Pacxa\, boasts expertise in Networking\, Information Systems\, and Mobile Technologies\, ensuring organizations stay at the forefront of technological advancements. Beyond his IT prowess\, Jonathan has spent six years honing his skills in lighting and sound production at The Crossroads at Hawaiian Brian’s\, enhancing live productions and musicians’ performances with strategic placement and control of audiovisual systems. \nCommitted to delivering top-notch support\, Jonathan excels in remote assistance and training\, catering to users’ needs anytime\, anywhere. Additionally\, as a member of the Hawaii Army National Guard\, Jonathan brings military discipline and expertise\, having completed Signal Support Specialist training with honors\, embodying the battalion motto “Quality All Ways.” Through his involvement in National Guard Exercise Missions\, Jonathan provides crucial network-server and radio communications support\, ensuring optimal connectivity for commanding officers. \nEvent Registration
URL:https://www.cyberhawaii.org/event/time-is-comsec-protection-and-the-threat/
LOCATION:Entrepreneurs Sandbox\, 643 Ilalo St\, Honolulu\, HI\, 96813
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=UTC:20240228T160000
DTEND;TZID=UTC:20240228T180000
DTSTAMP:20260521T002804
CREATED:20240210T000834Z
LAST-MODIFIED:20240210T000941Z
UID:1342-1709136000-1709143200@www.cyberhawaii.org
SUMMARY:Pau Hana with Cloudflare: The Anatomy of a DDOS Attack.
DESCRIPTION:CyberHawaii and the University of Hawaii invite you to meet with Cloudflare at the University of Hawaii\, Manoa Campus\, on Wednesday February 28\, 2024 from 4-6pm.  Cloudflare will be speaking on The Anatomy of a DDOS Attack. \nGartner describes Cloudflare as “a company focused on enhancing Internet performance. The primary problem it addresses is the need for online application protection and acceleration without the need for additional hardware\, software installation or code alterations. Cloudflare operates an intelligent global network that routes all traffic for Internet properties empowered by it. This mechanism progressively improves with each new site added to the system. The result yields a substantial enhancement in performance along with a notable decrease in spam and attacks. With a headquarters situated in San Francisco\, CA\, Cloudflare also operates from multiple global locations.” \nRegistration is required for the event using the link below. \nhttps://pauhanawithcloudflare.splashthat.com/ \nThere is no charge to attend this event\, but space is limited so be sure to register soon.
URL:https://www.cyberhawaii.org/event/pau-hana-with-cloudflare-the-anatomy-of-a-ddos-attack/
LOCATION:UH Manoa\, IT Conference Room 105 A&B\, 2500 Campus Road\, Honolulu\, HI\, 96708\, United States
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=Pacific/Honolulu:20240206T140000
DTEND;TZID=Pacific/Honolulu:20240206T150000
DTSTAMP:20260521T002804
CREATED:20240117T190938Z
LAST-MODIFIED:20240201T202907Z
UID:1309-1707228000-1707231600@www.cyberhawaii.org
SUMMARY:Fortify Cybersecurity Webinar Session 01 - Password Management and Multi-Factor Authentication
DESCRIPTION:Password Management and Multi-factor Authentication\nPassword management is a fundamental control in a strong cyber security framework and can be effectively implemented by businesses of all sizes.  Many who operate small or large businesses may not give passwords much attention and mistakenly assume using a password that is easy to remember will make their lives easier when they have so many other responsibilities. However\, a simple password is easier for cyber terrorists to crack\, while a longer\, more complicated password that uses a combination of letters\, numbers and symbols takes longer and can be the first line of defense against a cyber-attack. This is just the beginning what is necessary for basic password security. \nConversely\, Multi-factor Authentication (MFA) may seem like a new technology that is out of the reach of most businesses as a security tool.  Given the variety and frequency of cyber threats working to compromise online accounts\, MFA is no longer a luxury.  It provides an additional line of defense that can be implemented in businesses of all sizes.  And it has matured to the point that even small businesses are able to implement it. \nRegister to Join the Webinar \nBy attending this webinar you’ll learn about: \n\nBasic password management rules\nThe importance of Strong Passwords\nThe role of Password Managers\nWhat MFA is and isn’t\nPros and Cons of MFA\nOptions for implementing MFA\n\nFor more information\, you can listen to CyberHawaii CEO Al Ogata’s recent interview on Hawaii Public Radio discussing the seminar. \nPresenters\nJennilyn LaBrunda\, a Cybersecurity Advisor (CSA) with the Cybersecurity and Infrastructure Security Agency (CISA) for the Pacific Islands\, will lead this session. She is responsible for Hawaii\, Guam\, the Commonwealth of the Northern Marianas Islands\, and American Samoa. \nGuam-based LaBrunda is an experienced cybersecurity and information technology professional with over 15 years of experience. She is a Certified Information Systems Security Professional (CISSP) and a graduate from the University of Guam with a double major in technology & e-commerce and computer information systems. \nShe oversaw several comprehensive cybersecurity programs for the Department of Defense to ensure resilient protection of critical systems and data. She spearheaded over a dozen major IT and security initiatives\, which included leading the development of policies and contingency plans\, conducting risk assessments\, implementing security controls\, investigating security breaches\, providing technical support\, and developing training curriculum for the cybersecurity workforce. Her work was recognized with a Meritorious Civilian Service award. \n  \nCharissa Wong has over 20 years of experienc in Information Technology and Security management. She currently serves as the Information Security and Technology Manager for Bowers + Kubota.  Charissa holds a CISSP certification and is the owner of Cyber Kia’i\, a security consulting firm whose mission is to help Hawaii businesses improve their security posture. \nCharissa is an active member in the local cybersecurity community\, which includes serving as the Vice President of ISC2 Hawaii.  She is also a member of the CIO Council and CyberHawaii. \nCharissa is a proud graduate of Kamehameha Schools and the University of Oregon. \n  \nThe session is the first one in the 2024 Fortify Cybersecurity Webinar Series\, sponsored CISA and CyberHawaii.  This series was made possible by a grant from the Hawaii Department of Business\, Economic Development and Tourism.  Other supporters of this series include the State Office of Homeland Security\, the FBI\, Chamber of Commerce Hawai‘i\, the Hawai‘i Defense Alliance and the University of Hawai‘i. \nRegister to Join the Webinar \nAbout CyberHawaii\nCyberHawaii is a nonprofit organization founded in 2016 that is committed to developing and enhancing Hawai‘i’s cybersecurity capabilities through information sharing and analysis. CyberHawaii\, an affiliate of CyberUSA\, seeks to prevent and mitigate cyber risks for residents\, businesses\, government agencies\, and nonprofit organizations. CyberHawaii is also committed to education and workforce development to build cyber readiness and resilience and to providing information on cyber risk and solutions for policy decision-makers. Website: cyberhawaii.org.
URL:https://www.cyberhawaii.org/event/fortify-cybersecurity-webinar-session-01-password-management-and-multi-factor-authentication/
LOCATION:Zoom
END:VEVENT
END:VCALENDAR