F2F Events, Inc.
  • Home
  • About
    • About
    • CPE Credits
    • Session Topics
    • Privacy Policy
      • Scam Warning
    • Code of Conduct
    • Media Kit
  • Get Involved
    • Advisory Council
    • Association Partners
    • Exhibitors
    • Speakers
  • Events
    • Locations
    • Upcoming Events
  • Contact
  • Register

Cutting-edge conferences for over 20 years

Educational Events with Your Local IT Community

View Upcoming Events Register

INTERFACE Montana 2019 / See You Next Year

IT Infrastructure is constantly changing, bringing more new challenges with it every day. From ransomware and the latest security threats to emerging developments in AI and the need for increased bandwidth and storage, it’s nearly impossible to keep up to date. Our conference is designed to help. We’ve assembled a combination of Best-in-Breed hardware and software solutions, along with local experts and organizations to help educate, advise and connect you to resources that can help you meet your goals.

Covering Information Security, Infrastructure, Cloud, Disaster Recovery, Communications, and more, you’ll find presentations, panel discussions, and exhibitors covering a variety of topics, as well as the latest innovations and best practices.

AT A GLANCE

July 30th, 2019
8:30am – 4:30pm

Montana State University
Strand Union Building
751 W. Grant Street
Bozeman, MT 59715

Directions & Parking

KEYNOTE: The Whole Is Greater Than the Sum of Its Parts

  Presented by Tim Bottenfield • CIO for the State of Montana

Seminar Schedule

VIEW FLOORPLAN
  • Theater One
  • Theater Two
  • AM Sessions
  • PM Sessions
  • Keynote
9:00 - 9:50 AM

The Current Malware Threat Landscape & Enterprise Grade Remediation

  Presented by Malwarebytes

Malware has become one of the biggest threat challenges faced by security and IT teams. Malwarebytes Labs conducts extensive proprietary research and analysis. The findings are periodically published to help security teams better understand the nature and evolution of these threats.

This presentation will cover key findings from our newly released annual report. It will highlight malware category trends and discuss new and emerging threats to be on the watch for. There will also be a discussion of industry best practices and technologies that can help your business to prevent, detect, and remediate these threats.

Attendees will leave with insight into the current malware threat landscape, as well as an understanding of steps they can take to mitigate breaches.

Topics: Information Security
10:00 - 10:50 AM

Mitigating Cybercrime in your Enterprise

  Presented by Fortinet

The attack surface that enterprises much protect is expanding dramatically. How do you maintain visibility and security of your traffic from IoT to the cloud. We'll explore the threat vectors that cyber criminals use to penetrate your defenses and the security tools you can use to defend against those attacks.

Topics: Information Security
11:00 - 11:50 AM

Adapting to Fight Back: How Cyber AI Neutralizes Never-Before-Seen Threats

  Presented by Darktrace

In a world that is increasingly digital, cyber-attack has become the most significant risk confronting today's businesses, smart cities, and critical infrastructure. Online crime cost the world more than half a trillion dollars last year, while recent attacks have managed to influence the U.S. presidential election and disrupt the Ukrainian power supply. This troubling state of affairs is the product of several fundamental weaknesses with the traditional approach to cyber defense, which relies on predefining what threats look like at a time when criminals launch never-before-seen attacks daily. Moreover, these attacks increasingly strike at machine-speed, preventing security professionals from responding before their damage is done.

Topics: Information Security
12:10 - 12:45 PM

The Power Grid and NERC Critical Infrastructure Protection

  Presented by Allen Kent • NERC CIP Reliability Specialist for the NAES Corporation

This presentation will cover the elements of the power industry, the development of the NERC standards, and an overview of the CIP physical and cybersecurity requirements that currently apply to Bulk Electric System Facilities. The presentation will also highlight differences faced by Operations Technology (OT) and Information Technology (IT) groups as well as the challenges of auditable compliance over normal IT operations.

Topics: Infrastructure
1:00 - 1:50 PM

If You Don’t Protect the Key, Don’t Encrypt the Data

  Presented by nCipher Security

For over 2000 years, governments, armies, businesses and lovers have been encrypting messages. For the same amount of time, the keys used to perform the encryption have been the weakest link in the chain. After 2000 years, technology has advanced such that the keys can be protected but many companies don’t understand how important it really is. Mr. Beutlich will explain in an entertaining (and sometimes graphic) fashion why protecting the encryption key is more important than the encryption itself.

Topics: Information Security
2:00 - 2:50 PM

Fileless Attacks: A Look into Several Techniques Used by APT32

  Presented by BlackBerry Cylance & Structured Communications

Fileless attacks have grown in popularity resulting in the decline of more traditional executable malware. While fileless attacks are not executable files, the vast majority actually come from a file; weaponized documents. Come see this session to get a deep understanding of several techniques being used today by APT32/OceanLotus to attack their victims. You will learn how to replicate their techniques to better test your defenses.

Topics: Information Security
Tim BottenfieldTim BottenfieldCIO for the State of Montana
3:00 - 3:50 PM

The Whole Is Greater Than the Sum of Its Parts

  Presented by Tim Bottenfield • CIO for the State of Montana

Join our keynote in a discussion about the status of the State IT in Montana, and his three E's for an effective and efficient enterprise (Engagement, Empathy and Empowerment).

Tim Bottenfield serves as CIO of the State of Montana. He joined the Department of Administration in July of 2018 after serving nearly seven years with the Department of Revenue. He came to Montana from Auburn University in Auburn, Alabama, where he worked for 25 years, primarily as IT manager in the School of Forestry and Wildlife Sciences. He has 10 years of experience in operating a computer and networking services consulting business. He earned a Bachelor of Science degree in Forest Management in 1983 and a Master of Science degree in Forest Biometrics in 1986, both from Michigan Technological University in Houghton, Michigan.

In his first year as State CIO, Tim has focused on building relationships across the enterprise. His ongoing initiatives are in the areas of fiscal responsibility, optimization of shared services and support, cybersecurity, unified digital government and promoting a service first driven organization.

Tim was born in Pennsylvania and grew up in Michigan. He resides in Essex, Montana with his wife, Gigi. Their three sons and daughter-in-law are electrical engineers having attended the University of Pittsburgh, Auburn University and Georgia Tech. Tim enjoys hiking and all that the mountains of Montana offer recreationally.

  • AM Sessions
  • PM Sessions
9:00 - 9:50 AM

How to Solve the Toughest Challenges in Cloud Security

  Presented by Sophos & Pine Cove Consulting

In an ever-changing, auto-scaling environment, continuous visibility of your public cloud infrastructure is vital. Join Pine Cove Consulting and Sophos Security as we discuss how you can use the power of AI and automation to simplify compliance, governance and security monitoring in the cloud.

Visibility is the foundation on which all public cloud security policies and activities are built. We will discuss how to monitor multiple cloud provider environments including Amazon Web Services (AWS) accounts, Microsoft Azure subscriptions, Google Cloud Platform (GCP) projects, Kubernetes clusters, and development code repositories. With superior visibility, layered with compliance and DevSecOps policies controls and alerts, teams can take control and build on their cloud security strategy with confidence.

Join us to learn how building a complete picture of architecture, including a full inventory and real-time network topology visualization including hosts, networks, user accounts, storage services, containers, and serverless functions, can help you improve your cloud security challenges.

Topics: Information Security
10:00 - 10:50 AM

Master the Edge: How to Achieve Context-Aware, Secure Access in a Mobile Era

  Presented by Aruba, a HPE Company & Structured Communication

Are you juggling disparate security platforms and struggling to make sense of the data? Do you need to share information and insights across teams but lack a cohesive way to do that? If so, attend this session. Learn how to deploy an open, multi-vendor Enterprise security framework that gives security and IT teams an integrated way to gain visibility, control and advanced threat defense. See how security prioritization and machine learning helps organizations leverage existing third-party solutions to better protect investments and implement proactive risk controls.

Topics: Information Security
11:00 - 11:50 AM

Easy Information Gathering

  Presented by High Point Networks

The first step of a Penetration test is often called Reconnaissance or Information Gathering. During this step, Penetration testers attempt to gather as much information as they can about a target environment by using publicly available information. Unfortunately, this step is often ignored or not completed thoroughly.

In this presentation, we will discuss how an attacker may conduct reconnaissance against a target, and what specific information they might be interested in gathering. We will cover specific tools including theHarvester, Shodan, Recon-ng and more.

Topics: Information Security
12:10 - 12:45 PM

Check Point Software

  Presented by Check Point Software

The growth of and use of public clouds has been unprecedented, with no signs of abating. Today, the use of public clouds for enterprise datacenters is mainstream. And for good reason; the advantages are significant and the gained agility undisputable. However, the number of services and options being offered by the public cloud providers today can be daunting. The breadth and depth of services and choice is increasing daily.

With these choices come consequences; it is a 'one strike and you're out' environment. Just one misconfiguration can potentially put your entire organization at risk…or worse. It is this combination of seemingly endless choice along with the ease of access and use that creates the potential for catastrophe. Moreover, just imagine trying to find out if any of your S3 buckets are exposed or misconfigured when you have thousands of them. It's like finding a needle in a stack of needles.

While most everyone will agree the public cloud environments being offered today are extremely comprehensive and very powerful, in unskilled hands, one fat-finger can have dire consequences. And, as you expand your use and implement ephemeral cloud-native services such as Amazon Lambda functions and other cloud-native platform components (RSDA, Redshift, ELF, ALB, ECS) new challenges will arise when conducting threat-detection and attribution.

In this session you will learn why Gartner says, "Through 2022, at least 95% of cloud security failures will be the customer's fault."

Topics: Information Security, Infrastructure
1:00 - 1:50 PM

Controlling Application & Systems Access with Microsegmentation

  Presented by IVOXY Consulting

Being able to control access to systems & applications based on identity has been an ideal for many, many years. It's only been recently that we've gotten the ability to control access to/from any system and/or any application. Microsegmentation technology can be deployed without downtime & without service interruption (well, if you do it right!). Anyone who has been through a pen test knows that our on-prem & cloud datacenters are largely wide-open: There's nothing to stop malware from a PC or infected server from spreading.

Join IVOXY Consulting to learn how microsegmentation works & how your datacenter can benefit from one of the hottest trends in information security today.

Topics: Information Security
2:00 - 2:50 PM

Building a Security Program with the CIS Control

  Presented by CompuNet

Developing an effective security program is a complex undertaking. Let's jumpstart the process! We'll discuss leveraging the Center for Information Security's Critical Security Control framework to identify and prioritize security controls based on efficacy and business impact. After a brief overview of the CIS CSC, we'll discuss the ongoing measurement and reporting necessary to organize a diverse set of tools into a well-managed information security program. We'll also demonstrate and share freely available tools to help organizations perform internal assessments and leverage benchmark configuration guides.

Topics: Information Security

Advisory Council

HOW TO BE AN ADVISOR

Advisor-approved content is the foundation upon which INTERFACE was developed. Each conference is guided by an Advisory Council of IT executives and senior managers. Advisor members represent both private and public sector organizations. The council contributes its insight into proposed educational topics and recommends local exhibitors and associations for participation.

EXPAND TO VIEW LIST

Ron Baldwin
Chief Information Officer
State of Montana

Erika Billiet
Director, Information Technology
City of Kalispell

Mike Bousliman
Chief Information Officer
Montana DOT

Rick Carl
Chief Information Officer
Pacific Steel and Recyclilng

James Cox
Director, Information Technology
Tamarack Management, Inc.

Seth Decker
Chief Information Officer
Bank of Bridger

Misty Denny
Chief Information Officer
Rocky Boy Health Board

Jason Emery
Director of Technology
Missoula County

Jerry Hall
Director of IT
1st Liberty Federal Credit Union

Russ Hendrickson
Sr Information Systems Manager
Missoula County Public Schools

Greg Hess
Manager, Network Services
Montana State University

Chris Hunt
Director, Information Technology
Madison County

Adrian Irish
Information Security Officer
University Of Montana

Margaret Kauska
Chief Security Officer
Mt Department of Revenue

Shane Kolwyck
Director, Information Technology
Torgerson’s LLC

Brad Kowalski
Sr Director, Information Technology
Marcus Daly Memorial Hospital

Jerry Kozak
Manager, Information Technology
Montana Board of Crime Control

Chad Lorenc
President
ISC2

Peter Martinson
Supervisor,  Facilities Services IT
Montana State University

Andy Metroka
Director, IT Architecture
MT State Fund

Jason Murphine
Manager, Information Technology
Billings Clinic

Michele OBrien
Director of IT
Easter Seals

Josh Pallister
Sr Security Specialist
MT State Fund

Rico Patacini
Manager, Infrastructure
Town Pump, Inc.

Lynne Pizzini
Chief Information Security Officer
State of Montana

Jeff Prather
Principal
Beartooth Data Solutions

Jerry Rapp
CIO
Town Pump

Jason Schaller
Information Security Officer
Glacier Bank

Mark Simon
SVP, System Chief Information Officer
Benefis

Jody Troupe
Bureau Chief
MT Department of Administration

Don Warner
Director, Information Technology
Miles Community College

Pat Weichel
IT Director
Century Companies, Inc

Brett Weisz
Associate Chief Information Officer
Montana State University, Billings

Tom Yampradit
Manager, IT Operations
First Interstate Bank

Sponsors

HOW TO BE A SPONSOR

Participating exhibitors at INTERFACE achieve a greater return on their investment from this series of IT events than any other face-to-face medium available today. This success is achieved through a time-efficient and cost-effective presence for a pre-qualified audience. This simple formula leads to higher levels of business development opportunity at each event.

GOLD SPONSORS

Structured

Structured

Structured
Structured is an award-winning solution provider delivering secure, cloud-connected digital infrastructure. For 30 years, we’ve helped clients through all phases of digital transformation by securely bridging people, business and technology.
Visit Website

SILVER SPONSORS

Check Point Software

Check Point Software

Check Point Software
Check Point is a leading provider of cyber security solutions to governments and corporate enterprises globally. Its solutions protect customers from 5th generation cyber-attacks with an industry leading catch rate of malware, ransomware and other types of attacks.
Visit Website
CompuNet

CompuNet

CompuNet
CompuNet is a leading U.S. information technology partner, headquartered in Boise, Idaho. The firm specializes in consultation, design and implementation services specifically tailored to solve business problems. With a best-in-class engineering staff and approach, CompuNet focuses on building lasting relationships that prioritize client satisfaction over sales through every step of the journey.
Visit Website
Darktrace

Darktrace

Darktrace
Darktrace is a leading cybersecurity AI company and the creator of Autonomous Response technology. It provides a comprehensive cyber defense to over 5,500 organizations, protecting the cloud, email, IoT, traditional networks, endpoints, and industrial systems.
Visit Website
Fortinet

Fortinet

Fortinet
Fortinet helps organizations across the public and private sectors protect the systems, data, and services that keep businesses and communities running. From government agencies and schools to enterprises and service providers, leaders rely on Fortinet to secure critical infrastructure, ensure operational continuity, and defend against evolving cyber threats. Our Security Fabric platform unifies networking and security to deliver the visibility, control, and efficiency organizations need to operate confidently, whether virtual, in the cloud, or on-premises.
Visit Website
High Point Networks

High Point Networks

High Point Networks
High Point Networks is a leading provider of information technology solutions in both SMB and enterprise-level markets, servicing customers from coast to coast.
Visit Website
IVOXY Consulting

IVOXY Consulting

IVOXY Consulting
Since 2006 IVOXY has been delivering right-sized IT solutions & services throughout the Greater Pacific Northwest. We partner with customers throughout all phases of deploying innovative data availability technologies spanning virtualization, networking, storage, automation, security, data protection, cloud, and beyond.
Visit Website
Malwarebytes

Malwarebytes

Malwarebytes
Malwarebytes protects workplace productivity. We secure all your endpoints so employees can connect confidently, from anywhere. We combine analytics-driven, multi-layer threat protection and industry-leading incident response to both simplify and strengthen overall cybersecurity. You and your team stay up and running, so you can remain focused on driving your business.
Visit Website
nCipher Security

nCipher Security

nCipher Security
nCipher Security, a leader in the hardware security module (HSM) market, empowers world-leading organizations by delivering trust, integrity and control to their business critical information and applications, IoT, blockchain and digital payments.
Visit Website
Pine Cove Consulting

Pine Cove Consulting

Pine Cove Consulting
Pine Cove Consulting has serviced educational institutions, government agencies, and businesses across the Rocky Mountain Region since 1993. Pine Cove is a Sophos Platinum Partner and offers a suite of cybersecurity products to protect your organization.
Visit Website

BRONZE SPONSORS

Cerium Networks

Cerium Networks

Cerium Networks
Cerium is a recognized innovator and leading provider of a full suite of collaboration, contact center, networking, data center, and security solutions. We help medium to large businesses in the Northwest plan for and then realize the positive impact of technology on their business operations, strategies, and user experiences.
Visit Website
Cisco

Cisco

Cisco
Cisco is the worldwide leader in IT that helps companies seize the opportunities of tomorrow by proving that amazing things can happen when you connect the previously unconnected. Cisco delivers intelligent cybersecurity for the real world.
Visit Website
HPE Zerto Software

HPE Zerto Software

HPE Zerto Software
HPE Zerto Software helps you unlock ransomware resilience, disaster recovery, and continuous data protection to radically reduce data loss and downtime.
Visit Website
IGEL Technology

IGEL Technology

IGEL Technology
IGEL provides next-gen edge OS endpoint security, optimization, and control solutions for cloud workspaces and virtual desktops.
Visit Website
ValorC3

ValorC3

ValorC3
ValorC3 is a modern data center, cloud and connectivity partner that delivers agile, scalable IT solutions tailored to the relentless mid-market enterprise. Valor meets clients where they’re at and gets them where they need to grow, helping them navigate the rapidly changing digital landscape with flexible, high-density data centers, extensive infrastructure expansion capabilities, low latency networks, strong partnerships and decades of industry expertise.
Visit Website

EXHIBITORS & ASSOCIATIONS

Advanced Systems Group

Advanced Systems Group

Advanced Systems Group
Leveraging nearly four decades of experience, Advanced Systems Group (ASG) delivers IT solutions and services that help pro?actively manage increasingly complex environments. We provide enterprise technology solutions backed by a proven, highly consultative methodology. We're here to improve the lives of IT people, because we are IT people.
Visit Website
Arctic Wolf

Arctic Wolf

Arctic Wolf
Arctic Wolf® is the market leader in security operations, and provides security operations as a concierge service. Our security experts work as an extension of your team to monitor and detect threats, and continually strengthen your security posture.
Visit Website
BlackBerry

BlackBerry

BlackBerry
BlackBerry Cybersecurity is a leader in endpoint security, endpoint management, encryption, and embedded systems, protecting enterprises and governments around the world. Our end-to-end approach is deeply rooted in Cylance® AI and machine learning, providing continuous preventative protection, detection, and instant response. We extend protection for your organization against current and future cyberthreats by combining network and endpoint telemetry and by delivering innovative solutions in the areas of cybersecurity, safety, and data privacy.
Visit Website
ByteSpeed

ByteSpeed

ByteSpeed
ByteSpeed has been providing IT Solutions, including custom built hardware, networking solutions, and professional IT services in all 50 states in the US since 1999. https://bytespeed.com/
Visit Website
Citrix

Citrix

Citrix
Citrix Systems is the global leader and the most trusted name in application delivery infrastructure. More than 200,000 organizations worldwide rely on Citrix to deliver applications with the best performance, highest security and lowest cost.
Visit Website
HPE Aruba Networking

HPE Aruba Networking

HPE Aruba Networking
Deliver the performance and uninterrupted access your business demands with a Zero Trust foundation and AI-automated operations that help you innovate with the least risk.
Visit Website
iland Cloud

iland Cloud

iland Cloud
iland is an industry-leading provider of secure application and data protection cloud services built on proven VMware technology. With nine data centers on four continents, analysts recognize iland as a global leader in disaster recovery.
Visit Website
Infoblox

Infoblox

Infoblox
Infoblox unites networking and security to deliver unmatched performance and protection. Trusted by Fortune 100 companies and emerging innovators, we provide real-time visibility and control over who and what connects to your network, so your organization runs faster and stops threats earlier.
Visit Website
NetApp

NetApp

NetApp
NetApp – Our team is data driven. You have a vision for digital transformation. We help you make it all possible.
Visit Website
Spectrum Business

Spectrum Business

Spectrum Business
Spectrum Business® delivers a complete portfolio of secure connectivity solutions for small and mid-market businesses and caters to the unique needs of large businesses, communications service providers and government entities. Our industry-leading experts align our products to the needs of each customer, drawing from our full suite of services including internet solutions over hybrid fiber-coax and 100% fiber, video and voice solutions including phone and mobile, as well as unified communications and managed services tailored for our mid-market and large enterprise customers.
Visit Website

Interested in becoming part of our next Montana event?

CONTACT US FOR INFO

Montana

Montana State University
Strand Union Building
751 W. Grant Street
Bozeman, MT 59715

Directions & Parking

About Us

We produce quality, cutting-edge educational seminars, drawn from case studies and best practice examples from leaders in the field.

800-365-6402
Contact Us

Popular Searches

  • Event Registration
  • Become an Exhibitor
  • Become an Advisor
  • Sponsor an Event
  • Contact Event Coordinator
  • Submit Feedback

Seminar Topics

  • Artificial Intelligence
  • BC / DR
  • Culture
  • Data Center Technology
  • Data Management
  • Data Storage
  • Digital Experience
  • Information Security
  • Infrastructure
  • Strategic Management
  • Unified Communications

2026 Events

  • Portland • March 19th
  • Anchorage • April 22nd
  • Honolulu • May 21st
  • Phoenix • June 18th
  • Wyoming • July 9th
  • Montana • July 29th
  • Boise • August 20th
  • Salt Lake City • September 22nd
  • Spokane • October 15th
  • Omaha • November 5th
  • Seattle • December 3rd
  • Home
  • About
  • Get Involved
  • Events
  • Register
  • © 2026 F2F Events, Inc.