---
- Juris Doctorate
Gonzaga University School of Law - Bachelor of Arts, Information and Computer Sciences
University of Hawaii at Manoa - Bachelor of Arts, English
University of Central Florida
- Assistant Professor, University of Hawaii - West O'ahu
August 2017 - Present - Principal Consultant, Spartix
July 2017 - Present - Attorney, Miranda LLLC
June 2017 - Present - Director of Information Security, Hawaiian Telcom
Sr. Manager, Product Management
Sr. Manager, Managed Services
April 2011 - July 2017 - Program Manager, Referentia Systems, Inc.
Security Analyst
November 2010 - February 2015 - Computer Network Security Analyst, Northrop Grumman
Software Developer
November 2005 - November 2010 - Programmer Analyst, Verizon Federal Network Systems
February 2005 - November 2005 - Software Project Lead, 21st Century Systems, Inc.
May 2004 - February 2005 - Legislative Attorney, Hawaii State Senate
December 1997 - July 2003 - Attorney At Law
February 1998 - December 2000
- ISA 320 - Fundamentals of Secure Software Programming
- ISA 340 - Introduction to Digital Forensics
- CENT/ITS 410 - IT Project Management
- APSC 486 - Senior Project (Capstone for CENT, IT and ISA)
Enhancing Cybersecurity Awareness Training: A Comprehensive Phishing Exercise Approach
Vol. 14 No. 2 2018
International Management Review
Email communications is a critical service in nearly every aspect of business and personal activities. A person’s email address is the online identity most relied upon for reliable and accountable communications. Banking, health and recreational activities conducted online in most cases depend on a person possessing and actively maintaining an email address. Unfortunately, email inherently possesses security shortcomings that enable malicious actors to commit fraud through phishing emails. Technology solutions do not entirely solve this issue, and the users themselves require training on how to identify and respond to suspected phishing emails. A structured and comprehensive phishing exercise training program can (1) reduce the probability of a cybersecurity compromise originating from fraudulent emails and (2) improve the overall cybersecurity posture.
Train staff to spot phishing by sending it dummy emails
Jul 11, 2017
Honolulu Star Advertiser
The recent worldwide ransomware attacks put a spotlight on two key cybersecurity issues.
Vigilance is prime defense against influx of fake news
Jun 13, 2017
Honolulu Star Advertiser
References to fake news have certainly increased over the last two years. What is fake news?
Software updates are vital, as global cyberattack proves
May 19, 2017
Honolulu Star Advertiser
More than four years ago, on April 23, 2013, the Honolulu Star-Advertiser published the Tech View column “Aggressive, elusive hackers hold computers for ransom,” written by Beau Monday, who held my current position at Hawaiian Telcom.
Parents should teach children responsible user of social media
Apr 18, 2017
Honolulu Star Advertiser
A recent survey by Fluent identified YouTube, Instagram, Snapchat and Facebook as the most popular networks used by adults age 18 to 24.
Take time to ensure tax data is secure before filing returns
Mar 21, 2017
Honolulu Star Advertiser
Whether you prepare your own filings or use a professional tax preparer, there are cybersecurity actions that you should consider.
Observe employees’ actions to eliminate insider threats
Feb 21, 2017
Honolulu Star Advertiser
Recent political news has highlighted how unauthorized leaks of sensitive information can cause economic harm to a company, embarrass an individual to the point of requiring a resignation, and threaten national security.
Government playing a role in adoption of cybersecurity
Jan 24, 2017
Honolulu Star Advertiser
Software development is currently unregulated, which has upsides and downsides. But there are indications that this may be about to change.
Cybersecurity headlined tech news in 2016
Dec 27, 2016
Honolulu Star Advertiser
There was a lot of bad news relating to cybersecurity this year. We had the largest breach ever, involving more than a billion Yahoo user accounts, and the largest distributed denial of service attack, which disrupted business operations nationwide.
Devices controlled by voices always recording their users
Nov 29, 2016
Honolulu Star Advertiser
Seamless always-on voice control of our devices is the consistent indicator of a technologically advanced culture in TV shows and movies.
Take steps to lessen effect of denial-of-service attacks
Nov 1, 2016
Honolulu Star Advertiser
The distributed denial of service (DDoS) attack on Oct. 21 prevented access to major websites and services, including Twitter, Netflix, Reddit, CNN, sites based in Europe and hundreds more.
Range of cybersecurity tips will help keep devices safe
Oct 4, 2016
Honolulu Star Advertiser
October is National Cybersecurity Awareness Month. The purpose of this annual campaign is to raise awareness about cybersecurity. Below are my top five tips.
Caution needs to temper rush to smart machines
Sep 6, 2016
Honolulu Star Advertiser
The simultaneous rise and convergence of key technologies is finally accelerating the development of capabilities we dreamed about decades ago: virtual reality (VR) and artificial intelligence (AI).
Tight Apple security system keeps malware off iPhones
Aug 9, 2016
Honolulu Star Advertiser
On July 27 Apple CEO Tim Cook announced that Apple recently sold the billionth iPhone. It is a staggering achievement. The first iPhone was sold in 2007, and it took only nine years to sell 1 billion.
When traveling far afield, guard smartphone closely
Jul 12, 2016
Honolulu Star Advertiser
With summer in full swing, many of us are traveling to the mainland and foreign destinations for vacations and business. Along with our toothbrushes, clothes and other traveling essentials, we are bringing our internet-enabled mobile devices such as smartphones and laptops.
Airtight encryption makes cybersecurity a challenge
Jun 14, 2016
Honolulu Star Advertiser
If I were to choose a word that encapsulates the focus of the cybersecurity industry for the last two years, it would be “encryption.” However, the boon in increased encryption has created new challenges for enterprises.
Passwords are not gone yet, so vigilance is still essential
May 17, 2016
Honolulu Star Advertiser
Bill Gates predicted the death of the password in 2004, and others have wished for its demise over the years. However, only now are we starting to see passwords being incrementally replaced in the technology we use.
Institutions must increase dedication to cybersecurity
Apr 19, 2016
Honolulu Star Advertiser
A recent study analyzing cybersecurity education at top American universities found that none of the top 10 computer science programs requires cybersecurity as a course for graduation. This means that thousands of computer experts who will be building our future technology might have no formal cybersecurity training.
Strong encryption protects customers, builds business
Mar 22, 2016
Honolulu Star Advertiser
The ongoing legal battle between the FBI and Apple has highlighted an information security capability that experts have advocated for years to be implemented in their enterprises: data encryption. Encryption protects readable data by converting it into data that cannot be understood without authorization or a special key.
Insurance helps companies offset data breach expenses
Feb 23, 2016
Honolulu Star Advertiser
As data breaches become more common, we tend to pay less attention when we hear about hackers stealing millions of records containing sensitive personal and financial information. It’s becoming just another news story.
Cyberthreat analysis crucial — maybe too crucial to share
Jan 26, 2016
Honolulu Star Advertiser
Last year there was a lot of hype around the term “cybersecurity intelligence” from information security service providers and consultants. Behind this buzz were substantive government actions that were intended to increase the sharing of intelligence on cyberthreats between the private industry and federal agencies.
- GIAC Certified Intrusion Analyst (GCIA)
- GIAC Systems and Network Auditor (GSNA)
- GIAC Certified Forensic Analyst (GCFA)
- GIAC Reverse Engineering Malware (GREM)
- Hawaii State Bar Association
- Registered Patent Attorney - U.S. Patent and Trademark Office
- Curriculum Committee Member
Fall 2017 - Present