Tag Archive for: cybersecurity

Secure by Demand

In this presentation that took place on August 26, 2025, the presenter was Giovanni Williams, Cybersecurity Advisor for Cybersecurity & Infrastructure Security Agency (CISA). The topic is part of CyberHawaii/CISA Fortify Cybersecurity Education Series.

Explanation: Secure by Demand is supported by Secure by Design and Default.
Goal: Bake in security so it’s ready when demanded, not added later.

Objectives:

• Define Secure by Design, Default, Demand
• Explore lifecycle practices
• Learn top secure defaults
• Discuss adoption and governance

Generative AI 101 for K-12 education audience

In this presentation that took place on July 22, 2025, Matthew Leger, Sr. Research Manager of IDC Worldwide Education and EdTEch Digital Strategies, talks about understanding the benefits, opportunities, and challenges of using Generative AI in the education space and how the adoption of AI in the K12 space can lead students to new possibilities in the near future.

2025 CyberHawaii/CISA Fortify Cybersecurity Education Series – Vulnerability Management

Importance of Human Elements of Cybersecurity
• Technology Alone Cannot Secure Organizations, as Human behavior plays a critical Role.
• Attackers Often Exploit Human Vulnerabilities rather than Technical Flaws
• Understanding and Mitigating Human Risk Can Significantly Reduce Security Incidents

2025 – Introduction to PISCES

PISCES is a 501c(3) non-profit that performs no-cost cyber monitoring for local governments, public utilities and rural healthcare.

The speaker will explain PISCES operations and its value proposition and engage in Q/A with organizations considering participation.

2025 CyberHawaii/CISA Fortify Cybersecurity Education Series – Identity & Access Management – A Zero Trust Journey

Introduction To Identity and Access Management
Definition: Identity and Access and management is the framework of policies, processes, and technologies that ensure the right individuals have the appropriate access to technology resources.

Why it matters:
• Protect Sensitive Data
• Ensure Compliance (HIPPA, GDPR, FISMA, CMMC)
• Reduce the risk of security breaches
• Support Zero Trust Model ( User and Devices should not be trusted by
default)

2025 CyberHawaii/CISA Fortify Cybersecurity Education Series – The Human Element of Cybersecurity

Importance of Human Elements of Cybersecurity
• Technology Alone Cannot Secure Organizations, as Human behavior plays a critical Role.
• Attackers Often Exploit Human Vulnerabilities rather than Technical Flaws
• Understanding and Mitigating Human Risk Can Significantly Reduce Security Incidents

Fortify Cybersecurity Webinar Session 9: CISA & CyberHawaii Incident Response Webinar

Many technology products are introduced to the market even though they may have missing pieces or flaws that can be exploited by hackers.  This places the burden on companies and consumers to dedicate additional resources for addressing these flaws and to subsequently bear the risk of them being exploited.  In more mature industries, the inclusion of security and safety principles in the design process has grown over time as manufacturers have realized that building more reliable products results in higher consumer satisfaction and less push back from regulators.

Fortify Cybersecurity Webinar Session 8: Mobile Device & Remote Access Management Webinar

Many technology products are introduced to the market even though they may have missing pieces or flaws that can be exploited by hackers.  This places the burden on companies and consumers to dedicate additional resources for addressing these flaws and to subsequently bear the risk of them being exploited.  In more mature industries, the inclusion of security and safety principles in the design process has grown over time as manufacturers have realized that building more reliable products results in higher consumer satisfaction and less push back from regulators.

CISA CyberHawaii – Convergence of Physical & Cyber Security

Many technology products are introduced to the market even though they may have missing pieces or flaws that can be exploited by hackers.  This places the burden on companies and consumers to dedicate additional resources for addressing these flaws and to subsequently bear the risk of them being exploited.  In more mature industries, the inclusion of security and safety principles in the design process has grown over time as manufacturers have realized that building more reliable products results in higher consumer satisfaction and less push back from regulators.

CISA CyberHawaii Secure by Design Webinar

Many technology products are introduced to the market even though they may have missing pieces or flaws that can be exploited by hackers.  This places the burden on companies and consumers to dedicate additional resources for addressing these flaws and to subsequently bear the risk of them being exploited.  In more mature industries, the inclusion of security and safety principles in the design process has grown over time as manufacturers have realized that building more reliable products results in higher consumer satisfaction and less push back from regulators.