F2F Events, Inc.
  • Home
  • About
    • About
    • CPE Credits
    • Session Topics
    • Privacy Policy
      • Scam Warning
    • Code of Conduct
    • Media Kit
  • Get Involved
    • Advisory Council
    • Association Partners
    • Exhibitors
    • Speakers
  • Events
    • Locations
    • Upcoming Events
  • Contact
  • Register

Cutting-edge conferences for over 20 years

Educational Events with Your Local IT Community

View Upcoming Events Register

INTERFACE Dallas 2019 / See You Next Year

IT Infrastructure is constantly changing, bringing more new challenges with it every day. From ransomware and the latest security threats to emerging developments in AI and the need for increased bandwidth and storage, it’s nearly impossible to keep up to date. Our conference is designed to help. We’ve assembled a combination of Best-in-Breed hardware and software solutions, along with local experts and organizations to help educate, advise and connect you to resources that can help you meet your goals.

Covering Information Security, Infrastructure, Cloud, Disaster Recovery, Communications, and more, you’ll find presentations, panel discussions, and exhibitors covering a variety of topics, as well as the latest innovations and best practices.

AT A GLANCE

September 11th, 2019
8:30am – 4:30pm

Irving Convention Center
Grand Ballroom
500 W. Las Colinas Blvd.
Irving, TX 75039

Directions & Parking

KEYNOTE: Top 5 Resiliency Myths and What to Do About Them

  Presented by Luis Tapia • Resiliency Relationship Manager, Fannie Mae and Adjunct Professor, University of North Texas

Seminar Schedule

VIEW FLOORPLAN
  • Theater One
  • Theater Two
  • AM Sessions
  • PM Sessions
  • Keynote
9:00 - 9:50 AM

Leveraging AI to Defend Against Insider Threats in Your Digital Landscape

  Presented by Vanguard Infrastructures & HPE

The single largest vulnerability to a company's intellectual property (IP) is their employee or the trusted insider; the person with the keys to the kingdom. However, recent media and government disclosures have expanded this threat to include machine compromises installed during manufacturing. So, the threat could come from the trusted insider or the machine an unwitting employee is utilizing. Too few companies have a strategy to adequately combat these vulnerabilities, mainly due to a lack of knowledge the events are taking place. Vanguard Infrastructures presents a strategy that marries observed human behaviors, demeanors, actions, etc., with artificial intelligence and machine learning to assist companies by providing data and creating visibility into network events that might be a threat to the company. This presentation's goal is to put more power into the hands of the company to protect their IP, identify potential problem behaviors of trusted employees and machines, and assist the company in ensuring their future.

Moderator:

  • Troy Cooper • Vanguard Infrastructures CEO Co-Founder

Panel Experts:

  • Vijay Richard • Vanguard Infrastructures Exec VP Co-Founder
  • Chris Kaufman • Vanguard Infrastructures Chief AI Strategist
  • Ann Hinkle • Vanguard Infrastructure Chief of Security Services
  • Scott Olsen • HPE Enterprise Architect
Topics: Artificial Intelligence, Information Security
10:00 - 10:50 AM

Prepare for a Secure Automated Multi-cloud World with an Onsite Data Center

  Presented by Juniper Networks & Kudelski Security

In order to have the best success building a data center network that is ready for multi-cloud, it must have three critical components; Automation, Security, and Open Standards. Transformation to a multi-cloud environment is a complex task, as security is critical. This talk will discuss the key areas you need to be aware of when creating your strategies around data center buildouts, upgrades, and migrations in a multi-cloud world.

Topics: Data Center Technology
11:00 - 11:50 AM

The Current Malware Threat Landscape & Enterprise Grade Remediation

  Presented by Malwarebytes

Malware has become one of the biggest threat challenges faced by security and IT teams. Malwarebytes Labs conducts extensive proprietary research and analysis. The findings are periodically published to help security teams better understand the nature and evolution of these threats.

This presentation will cover key findings from our newly released annual report. It will highlight malware category trends and discuss new and emerging threats to be on the watch for. There will also be a discussion of industry best practices and technologies that can help your business to prevent, detect, and remediate these threats.

Attendees will leave with insight into the current malware threat landscape, as well as an understanding of steps they can take to mitigate breaches.

Topics: Information Security
12:00 - 12:45 PM

Time to Get Re-Married: Privacy and Cybersecurity Are Still in Love!

  Presented by Mary N. Chaney, Esq. • CISSP, Attorney, The Cyber Security Law Firm of Texas

Cybersecurity and privacy have been divorced for some time now. With organizations splitting responsibilities, cyber/information security responsibilities lie with the technical teams and privacy generally residing with the legal teams. Unfortunately, this split has been disastrous, mostly for the general public. In this session we will discuss how forward-thinking companies are re-marrying their cybersecurity and privacy programs to create a more holistic plan for data security and privacy. Hopefully, to live happily ever after.

1:00 - 1:50 PM

AI: Demystifying the Dark Arts to Combat Threats  

  Presented by Vanguard Infrastructures & HPE

To combat the latest threats, cyber security vendors have no choice but to use one of the most powerful tools to emerge in decades – Artificial Intelligence. But critics are right in their concerns over the interpretability of AI solutions. How do we learn to trust the magic black boxes when even the experts can't explain the answers produced by AI? What is AI, and how is it different than data science and machine learning? What does it mean when a cyber-security solution is AI-enabled? What are the important things to know about the different AI implementations as they relate to cyber security products? How do I trust the output / results of AI? Join us as we provide an AI primer through the lens of cyber security and dissipate the cloudiness caused by buzzwords.

Moderator:

  • Troy Cooper • Vanguard Infrastructures CEO Co-Founder

Panel Experts:

  • Vijay Richard • Vanguard Infrastructures Exec VP Co-Founder
  • Chris Kauffman • Vanguard Infrastructures Chief AI Strategist
  • Ann Hinkle • Vanguard Infrastructures Chief of Security Services
  • Dan Roessner • Vanguard Infrastructures Facility Security Officer
Topics: Artificial Intelligence, Information Security
2:00 - 2:50 PM

Let’s Sharpen Your Soft Skills!

  Moderated by INTERFACE Advisory Council

You spend your days dealing with outages, attacks, requests and anything else that can keep you behind a monitor all day. However, there is so much needed to advance your IT career. When it comes to "soft skills" of networking and communication, it can be a challenge for an IT professional to find time. How can you improve your standing in your company? What about looking for your next position? There are so many skills needed to excel when it comes to your career. Join us for an interactive discussion that will address these challenges and more. Our local Dallas IT professionals will share their experience on stepping out from behind the monitor and being noticed! Your questions are welcome in this panel discussion.

Panelists:

  • Tambra Draper-Horn • Sr. Applications Security Engineer, Sabre Corporation
  • Craig Broussard • Director, Global Infrastructure, NCH Corporation
  • Susan Smith • Manager, Information Technologt, The Salvation Army of North Texas
  • Sergio Puga • Project Manager, FedEx
Luis TapiaLuis TapiaResiliency Relationship Manager, Fannie Mae and Adjunct Professor, University of North Texas
3:00 - 3:50 PM

Top 5 Resiliency Myths and What to Do About Them

  Presented by Luis Tapia • Resiliency Relationship Manager, Fannie Mae and Adjunct Professor, University of North Texas

It is said that plans are worthless, but planning is everything. If this is true, why is it common for an organization's resiliency posture to plateau in the advancement towards maturity, despite our best planning efforts? What can we do about common resiliency misconceptions that are holding your organization back? This presentation looks at challenges that impede resiliency and what can be done to break through these deep-rooted barriers. It considers both business and technology perspectives and suggests a how to overcome several resiliency myths.

As a kid, Luis Tapia loved watching Godzilla movies. It wasn't the monster that captivated him, but concern about the destruction left behind. For the past 12 years, Mr. Tapia has made meaning contributions in emergency management and business continuity within the private, public, and non-profit sectors. In addition, Mr. Tapia has been an adjunct instructor for two universities, using a blend of theory and practice to teach the next generation of emergency management and business continuity planners. Mr. Tapia has been involved in a wide range of technical, natural, and man-made disasters, helping individuals and organizations coordinate their efforts and overcome the disruptive nature of these events.

Mr. Tapia's educational background includes an MPA from the University of North Texas and MS in Emergency Management from Oklahoma State University. Mr. Tapia lives in Denton, TX.

  • AM Sessions
  • PM Sessions
9:00 - 9:50 AM

The Proliferation of Video in Enterprise Design, and How It will Impact You

  Presented by Star Leaf & Netrix

The presentation will go over the complexities of a successful video/collaboration environment from a technical and physical perspective. We will discuss the technology, psychology of, and successful adoption of Video Conferencing in the workplace. One size does not fit all and equipment must be scaled appropriately. We will also go over the recommended beta/installation program and what that looks like.

Topics: Culture, Infrastructure
10:00 - 10:50 AM

Illuminating Behavioral Patterns to Assist Technology for Insider Threats

  Presented by Vanguard Infrastructures & HPE

Today, intellectual property theft is responsible for the greatest transfer of wealth among the countries of the world and frequently involves utilizing the company Insider. The security of the company is every employees' responsibility. Technological innovations in Machine Learning can identify both the human and machine insider threat. In addition, employees must be educated as to what to look for when looking for the Insider Threat. Sensitizing your employees to scenario indicators, elicitation techniques involving behavioral manipulation, and the other principles can create a security force multiplication that will provide greater protection for your company. Vanguard Infrastructures is presenting information and strategies to incorporate the eyes and ears of your employees in the hunt for the insider.

11:00 - 11:50 AM

Cloud Spend: Why Is My Cloud Spend So Much More Than I Budgeted?

  Presented by SoftwareONE

Overspending in cloud infrastructure is a common challenge. Learn why costs get out of control and methods to help control the spend.

Topics: Infrastructure
12:00 - 12:45 PM

Why Does Ransomware Continue to Evade Our Defenses?

  Presented by Nyotron

Ransomware has long been a menace for organizations and consumers. Global damage cost estimates reach about 10 billion USD per year. After all these years, why does ransomware continue to be so good at being so bad?

In this seminar, we will review the security industry's history of largely ineffective responses to ransomware. We will discuss standard ransomware detection methods with their pros and cons. You will see how ransomware developers use simple techniques to bypass each of those methods. This live session will also highlight some of the latest attacks, including Norsk Hydro and ransomware pretending to donate your Bitcoins to a children's charity.

After examining the bad, we will provide you with a no-nonsense defense strategy for hardening your defenses against ransomware.

Topics: Information Security
1:00 - 1:50 PM

Collaboration Abomination

  Presented by Khlood Elsayed • PMP, CISSP

With the proliferation of "collaboration" tools/gadgets, it's easier for communication to get lost. Needless emails, poorly organized conference calls, and lousy chatter/slack posts may leave you feeling lost and ineffective. Join us for this interactive session to pick up some practical tips to help you successfully collaborate across multiple business units, functional areas, and teams to galvanize their support to deliver the best value to your stakeholders. Maybe come out the other side better looking (who knows). Just join us, alright?

2:00 - 2:50 PM

The Thief is in the House… Understanding and Managing Information Security

  Presented by Mart Nelson • Chief Technology Officer, Avistas

This presentation is oriented toward discussions with Senior Management. We will focus on Business Value issues, where management needs to understand enough about Information Security to be able to make risk, budget and operations decisions. It is useful for all levels of management.

Bring your questions for this open dialogue on all elements of internal Information Security.

Topics: Information Security

Advisory Council

HOW TO BE AN ADVISOR

Advisor-approved content is the foundation upon which INTERFACE was developed. Each conference is guided by an Advisory Council of IT executives and senior managers. Advisor members represent both private and public sector organizations. The council contributes its insight into proposed educational topics and recommends local exhibitors and associations for participation.

EXPAND TO VIEW LIST

Robin Austin
CTO/CISO
Colliers Group

Chris Barnes
IT Director
Howard CPAs

Peter Beasley
Chief Technology Officer
Netwatch Solutions

Rajan Behal
Director, KPMG Cyber
KPMG

Johnny Berry
Solutions Architect
Verizon

Garreth Cada
Manager, Information Technology
City Credit Union

Bob Carver
Manager, Network Security
Verizon

Alan Chuang
Director, Information Technology
Trinity Consultants

Kevin Dunn
CIO
InRoll+

Kim (KJ) Haywood
Sr. Medical Device Security Analyst 
Texas Health Resources

Robert Herron
VP, Information Technology
ProTom International

JP Hill
President
ISC2 Dallas

Geoff Hughes
Program Manager, INFOSEC
Capegemini

Jarrod Johnston
VP, Information Technology
PDX, Inc.

John  Jordan
Security Architect, IT
Texas Instruments

Hamid Khaleghipour
Director, Information Technology
City of Addison

Sean Lenihan
Information Services Manager
Ranger Capital Group

Arnold Maki
Senior Investigator Asset Protection / Corporate Security
AT&T

Dione McBride
Data Protection, Privacy, and Security Professional
PS Innovations

Jomon Nadukkudiy
Sr. IT Architect
Verizon Communications

Mart  Nelson
Chief Technology Officer
Avistas

Gary Petroski
Information Systems Security Officer
National Weather Service

Drew Robertson
VP, Information Technology
Medieval Times

Roberto Ruiz
IT Manager for the Americas
Expeditors International

Jaimin Shah
Information Security Officer
Greystar

Jessie White
Vice President of Information Technology
Hill College

John  Woods
VP,Information Security
PDX-NHIN

Sponsors

HOW TO BE A SPONSOR

Participating exhibitors at INTERFACE achieve a greater return on their investment from this series of IT events than any other face-to-face medium available today. This success is achieved through a time-efficient and cost-effective presence for a pre-qualified audience. This simple formula leads to higher levels of business development opportunity at each event.

GOLD SPONSORS

Vanguard Infrastructures

Vanguard Infrastructures

Vanguard Infrastructures
Vanguard Infrastructures provides customers with targeted solutions for today’s complex, changing cyber threat environment. We help companies prevent, detect, and understand threats to their organizations with powerful ML and AI cybersecurity solutions.
Visit Website

SILVER SPONSORS

Kudelski

Kudelski

Kudelski
Kudelski Security, a division of the Kudelski Group, is an innovative, independent providernof tailored cybersecurity solutions to enterprises and public sector institutions.
Visit Website
Malwarebytes

Malwarebytes

Malwarebytes
Malwarebytes protects workplace productivity. We secure all your endpoints so employees can connect confidently, from anywhere. We combine analytics-driven, multi-layer threat protection and industry-leading incident response to both simplify and strengthen overall cybersecurity. You and your team stay up and running, so you can remain focused on driving your business.
Visit Website
Nyotron, Inc.

Nyotron, Inc.

Nyotron, Inc.
Nyotron pioneers the next generation of EDR with integrated protection called Endpoint Prevention and Response. Our product automatically prevents damage from malware that evades existing security controls and offers granular visibility into the attack. 
Visit Website
SoftwareONE

SoftwareONE

SoftwareONE
SoftwareONE, the leader in software and cloud portfolio management, helps optimize IT spend, on-prem and in the cloud. PyraCloud, coupled with Software Portfolio Management services, ensure the maximum return on our customers' total software investment.
Visit Website
StarLeaf

StarLeaf

StarLeaf
StarLeaf is a global cloud communications/collaboration provider & manufacturer of premium meeting room solutions. StarLeaf focuses on security (ISO-27001 Certified), reliability (99.999% uptime SLA), ease-of-use, & interoperability with other platforms.
Visit Website

BRONZE SPONSORS

Crown Castle Fiber

Crown Castle Fiber

Crown Castle Fiber
Crown Castle owns and operates approximately 40,000 cell towers and 60,000 route miles of fiber supporting smallncells and fiber solutions across every major US market.
Visit Website
FileWave

FileWave

FileWave
For over 20 years, FileWave has assisted business, education, and government customers to take control of their software deployments, providing granular control of all files in any installation, both pre and post-deployment.
Visit Website
ONE IDENTITY

ONE IDENTITY

ONE IDENTITY
One Identity portfolio of identity governance, access management, privileged management and identity as a service solutions, helps organizations optimize identity and access management (IAM).For more info, visit http://www.oneidentity.com.#GetIAMRight
Visit Website

EXHIBITORS & ASSOCIATIONS

ACP North Texas

ACP North Texas

ACP North Texas
ACP is the preeminent national voice of continuity professionals. We provide continuing professional development, knowledge and career opportunities to members while building public understanding around the world of the importance of continuity planning.
Visit Website
Arctic Wolf

Arctic Wolf

Arctic Wolf
Arctic Wolf® is the market leader in security operations, and provides security operations as a concierge service. Our security experts work as an extension of your team to monitor and detect threats, and continually strengthen your security posture.
Visit Website
ARMA Dallas

ARMA Dallas

ARMA Dallas
ARMA International provides education and networking opportunities to information professionals to enable them to use skills and experience to leverage the value of records and knowledge as corporate assets and as contributors to organizational success.
Visit Website
Centre Technologies

Centre Technologies

Centre Technologies
Centre Technologies designs, implements and supports business solutions that make IT work for you. Empower your business with IT project management, managed support, cloud hosting, and cybersecurity assessments and monitoring.
Visit Website
Consolidated Communications

Consolidated Communications

Consolidated Communications
Power up your business with fiber optic solutions like High-Speed Internet, Voice, DataCenter, Managed IT and Cloud Services from Consolidated Communications. “The Front Door to Your Business”
Visit Website
CSA North Texas

CSA North Texas

CSA North Texas
As with any new technology, there are many questions and a need to establish standard protocols. Cloud computing offers significant benefits, including meaningful cost savings, global accessibility and almost infinite scalability.
Visit Website
HPE

HPE

HPE
At Hewlett Packard Enterprise, we aim to be the industry’s leading provider of hybrid IT, built on the secure, next-generation, software-defined infrastructure that will run customers’ data centers today, bridge them to multi-cloud environments tomorrow, and power the emerging intelligent edge that will run campus, branch and Industrial IoT applications for decades to come. All delivered through a world class services capability.
Visit Website
HPE Juniper Networking

HPE Juniper Networking

HPE Juniper Networking
Juniper Networks is now part of HPE. Together, we're building industry-leading, secure, AI-native networks – purpose-built with and for AI. As AI and networking converge, we're driving a bold transformation across enterprises, service providers, and cloud operators.
Visit Website
InfraGard North Texas Members Alliance

InfraGard North Texas Members Alliance

InfraGard North Texas Members Alliance
The InfraGard program is a public/private cooperative effort dedicated to improving our national security. InfraGard consists of Chapters throughout the United States and has thousands of members.
Visit Website
ISACA North Texas

ISACA North Texas

ISACA North Texas
ISACA is a worldwide association of IS governance professionals. The association currently focuses on assurance, security, and governance and provides globally recognized certifications.
Visit Website
ISC2 Dallas Fort Worth

ISC2 Dallas Fort Worth

ISC2 Dallas Fort Worth
The DFW Chapter of (ISC)2 serves the counties of the Dallas-Fort Worth Metroplex. Members include those with security certifications from (ISC)2 as well as other professionals practicing or interested in information, software and communications security.
Visit Website
ISSA North Texas

ISSA North Texas

ISSA North Texas
The primary goal of the Information Systems Security Association, Inc. (ISSA) is to promote management practices that will ensure the confidentiality, integrity and availability of organizational information resources.
Visit Website
Motorola Solutions

Motorola Solutions

Motorola Solutions
Motorola Solutions provides services, software, and video & analytics; backed by secure, resilient land mobile radio communications; enabling customers to be ready in the moments that matter most.
Visit Website
Netrix

Netrix

Netrix
As an expert in digital workplace transformation, Netrix provides best of breed solutions to organizations around the world. Our team focuses on working across technologies to deliver custom, integrated solutions to meet our clients’ business needs.
Visit Website
Okta

Okta

Okta
Okta is the World’s Identity Company. As the leading independent Identity partner, we free everyone to safely use any technology— anywhere, on any device or app. Organizations trust Okta to enable secure access, authentication, and automation. With flexibility and neutrality at the core of our Okta Workforce Identity and Customer Identity Clouds, government, business leaders and developers can focus on innovation and accelerate digital transformation, thanks to customizable solutions and more than 7,000 pre-built integrations.
Visit Website
OWASP Dallas

OWASP Dallas

OWASP Dallas
OWASP Foundation is a professional association of global members and is open to anyone interested in learning more about software security.
Visit Website
PMI Fort Worth

PMI Fort Worth

PMI Fort Worth
The Fort Worth Chapter of PMI uses a friendly and individualized approach to promote the growth of the project management profession and best practices through high-quality educational events and networking opportunities in the communities we serve.
Visit Website
Quest Software

Quest Software

Quest Software
At Quest, we solve complex problems with simple solutions. Our philosophy is focused on great products, great service and being simple to do business with. We deliver technology that eliminates the need to choose between efficiency and effectiveness.
Visit Website
RakworX

RakworX

RakworX
RakworX manufactures high-quality data center infrastructure products which provide security, power distribution, and airflow management wherever data is created, processed, transmitted and stored.
Visit Website
Resilient

Resilient

Resilient
Resilient Intelligent Networks offers “best of breed” technologies providing networking, data security and IT integration solutions that are customized for your business.
Visit Website
Robert Half Technology

Robert Half Technology

Robert Half Technology
Robert Half Technology is a leading provider of technology professionals on a project and full-time basis. We offer a full spectrum of technology staffing solutions to meet our customers' project, contract-to-full-time and full-time IT recruitment needs.
Visit Website
Terralogic DynaQuest

Terralogic DynaQuest

Terralogic DynaQuest
DynaQuest Technologies and Terralogic Solutions have joined together to offer you more options in IT Solutions. In addition to our IT Services and Virtualization expertise, we can now offer like end-to-end Application Solutions, DevOps, UI/UX and more!
Visit Website
TetraVX

TetraVX

TetraVX
TetraVX, a Netrix LLC brand, is a global unified communications and collaboration (UCC) provider that specializes in deploying, integrating, and supporting three industry-leading products whether on-premises, in the cloud, or as a hybrid.
Visit Website
Veritas

Veritas

Veritas
Optimize the protection, performance, and cyber resiliency of all your enterprise data and applications across any cloud, any environment, at any scale.
Visit Website
ZPE Systems

ZPE Systems

ZPE Systems
ZPE Systems helps rethink the way networks are built and managed by providing software-defined, vendor-neutral infrastructure management and networking solutions for data center and branch networks.
Visit Website

Interested in becoming part of our next Dallas event?

CONTACT US FOR INFO

Dallas

Irving Convention Center
Grand Ballroom
500 W. Las Colinas Blvd.
Irving, TX 75039

Directions & Parking

About Us

We produce quality, cutting-edge educational seminars, drawn from case studies and best practice examples from leaders in the field.

800-365-6402
Contact Us

Popular Searches

  • Event Registration
  • Become an Exhibitor
  • Become an Advisor
  • Sponsor an Event
  • Contact Event Coordinator
  • Submit Feedback

Seminar Topics

  • Artificial Intelligence
  • BC / DR
  • Culture
  • Data Center Technology
  • Data Management
  • Data Storage
  • Digital Experience
  • Information Security
  • Infrastructure
  • Strategic Management
  • Unified Communications

2026 Events

  • Portland • March 19th
  • Anchorage • April 22nd
  • Honolulu • May 21st
  • Phoenix • June 18th
  • Wyoming • July 9th
  • Montana • July 29th
  • Boise • August 20th
  • Salt Lake City • September 22nd
  • Spokane • October 15th
  • Omaha • November 5th
  • Seattle • December 3rd
  • Home
  • About
  • Get Involved
  • Events
  • Register
  • © 2026 F2F Events, Inc.