F2F Events, Inc.
  • Home
  • About
    • About
    • CPE Credits
    • Session Topics
    • Privacy Policy
      • Scam Warning
    • Code of Conduct
    • Media Kit
  • Get Involved
    • Advisory Council
    • Association Partners
    • Exhibitors
    • Speakers
  • Events
    • Locations
    • Upcoming Events
  • Contact
  • Register

Cutting-edge conferences for over 20 years

Educational Events with Your Local IT Community

View Upcoming Events Register

INTERFACE Phoenix 2019 / See You Next Year

IT Infrastructure is constantly changing, bringing more new challenges with it every day. From ransomware and the latest security threats to emerging developments in AI and the need for increased bandwidth and storage, it’s nearly impossible to keep up to date. Our conference is designed to help. We’ve assembled a combination of Best-in-Breed hardware and software solutions, along with local experts and organizations to help educate, advise and connect you to resources that can help you meet your goals.

Covering Information Security, Infrastructure, Cloud, Disaster Recovery, Communications, and more, you’ll find presentations, panel discussions, and exhibitors covering a variety of topics, as well as the latest innovations and best practices.

AT A GLANCE

June 13th, 2019
8:30am – 4:30pm

Westin Kierland Resort
Kierland Grand Ballroom 2-4
6902 E. Greenway Parkway
Scottsdale, AZ 85245

Directions & Parking

KEYNOTE: Changing the Perception from the “IT Person” to a Technology Leader

  Presented by Monty Low • Director of IT, Arizona Coyotes

Seminar Schedule

VIEW FLOORPLAN
  • Theater One
  • Theater Two
  • Theater Three
  • AM Sessions
  • PM Sessions
  • Keynote
9:00 - 9:50 AM

Welcome to the New Age of Converged Secondary and Primary Storage

  Presented by StorageCraft

Managing storage continues to be complex, and often expensive. Something needs to change, and it certainly won't be a dramatic increase in staffing. Fortunately, object storage is the answer. By eliminating the use of legacy RAID, object storage, can be the foundation for a scale-out converged storage solution that solves both data protection and primary storage challenges. Want to recover a multi-TB VM in less than a second? No problem. Want to protect files from ransomware? No problem. Need an enterprise file serving, archiving, or virtual server storage solution? No Problem. Attend this session to learn how object storage is changing the landscape for IT admin and the technology of the future.

Topics: Data Storage
10:00 - 10:50 AM

Mitigating Cybercrime Through Automated Response and Integration

  Presented by Fortinet

Come join our talk on mitigating cybercrime and learn about best practices to help your company maintain a strong security posture through the digital transformation and beyond. The bad guys are using automated tactics to try to find a foothold in your network. Isn't it time to leverage an integrated security approach to automate your response?

Topics: Information Security
11:00 - 11:50 AM

Adapting to Fight Back: How Cyber AI Neutralizes Never-Before-Seen Threats

  Presented by Darktrace

In a world that is increasingly digital, cyber-attack has become the most significant risk confronting today's businesses, smart cities, and critical infrastructure. Online crime cost the world more than half a trillion dollars last year, while recent attacks have managed to influence the U.S. presidential election and disrupt the Ukrainian power supply. This troubling state of affairs is the product of several fundamental weaknesses with the traditional approach to cyber defense, which relies on predefining what threats look like at a time when criminals launch never-before-seen attacks daily. Moreover, these attacks increasingly strike at machine-speed, preventing security professionals from responding before their damage is done.

Topics: Information Security
12:10 - 12:45 PM

How Do You Lead in the Smart/Safe/Connected City Revolution

  Presented by Steve Surfaro • Chairman, Public Safety Working Group, Security Industry Association

There are millions of devices already deployed in cities, and billions more coming, that can make a city "smarter" by collecting data on traffic, weather, energy, and water usage. Learn how to form a Smart/Safe/Connected City Strike Force, have a positive impact on your business and contain public safety threats.

  • 5G will provide us with unprecedented insights and abilities that will change what we do and how we do it in safe, smart and connected cities.
  • Learn how AI analytics fuel firearms detection, face matching, traffic automation, congestion reduction, and citizen experience.
  • Technologies like LiDAR are reducing outdoor facility security costs by at least 30%

We'll review the International City/County Management Association survey on top priorities and learn how a smart city gets funded.

1:00 - 1:50 PM

How to Control the Uncontrollable: Real Strategies for Securing Remote Access

  Moderated by INTERFACE Advisory Council

Join our panel of experts as they discuss what is working and what is working today and on the horizon for security and remote working.

Moderator:

  • Frank Grimmelman • President and CEO, ACTRA

Panelists:

  • Dan Shuler • Director of IT Security, Phoenix Children's Hospital
  • Mike Manrod • CISO, Grand Canyon University/Grand Canyon Education
  • Anthony Dezilva • CISO, Clever Dome
3:00 - 3:50 PM

Changing the Perception from the “IT Person” to a Technology Leader

  Presented by Monty Low • Director of IT, Arizona Coyotes

Focused discussion about the perception of the IT Department to Executives and how the technology leadership role is evolving into a focal point of every business.

Originally a Canadian hockey nut migrated to the US to pursue my dreams in pro sports and technology. Currently Director of IT at the Arizona Coyotes Hockey Club, leader of the NHL Technology Group and FBI Phoenix Citizens Academy member.

  • AM Sessions
  • PM Sessions
9:00 - 9:50 AM

Evolving Your BC/DR Strategy to Protect Today’s Multi-Cloud Environments

  Presented by Unitrends

We are living in a "Less is More" world. IT Professionals are facing more work, projects, and risks than ever before, while having less time, money, and a shrinking tolerance of downtime. External threats such as malware and natural disasters present significant risk to organizations without the proper BCDR strategies, but they are far from the only causes of data loss. Data continues to grow at an exponential rate and not only on-premises. As organizations are rapidly adopting cloud-based solutions in the form of IaaS, SaaS, and PaaS, they must also consider data protection strategies to address native gaps within these platforms. Join Adam Marget, Technical Solutions Specialist, Unitrends, as we explore the evolving landscape of data protection, cloud's growing role, BC/DR strategies to safeguard all workloads, and best practices in planning your DR approach.

Topics: Business Continuity / Disaster Recovery
10:00 - 10:50 AM

Exploitation of IT Vulnerabilities is Escalating

  Presented by Quest Software

Cybercriminals are savvier than ever. They understand that IT complexities create serious vulnerabilities, and these criminals are continually developing new ways to breach your organization's boundaries. That is why a proactive, unified endpoint management (UEM) strategy should be part of your organization's core business strategy.

Topics: Information Security, Strategic Management
11:00 - 11:50 AM

Addressing Infrastructure Security Across Hybrid Environments

  Presented by Trend Micro

Security requirements do not go away when you move part of your data center workloads to the cloud. Although most security controls can be easily applied to systems in the cloud, the weight of those controls and what constitutes an immediate concern versus a lower priority alert, can be different. We will discuss the need for advanced visibility to differentiate your cloud systems versus your internal data center with central visibility. With the dynamic nature of the cloud, and the flexibility of the modern data center, it is important to apply the same security controls but view the alerts differently depending on their origin.

Topics: Data Center Technology
1:00 - 1:50 PM

Welcome to the New Age of Converged Secondary and Primary Storage

  Presented by StorageCraft

Managing storage continues to be complex, and often expensive. Something needs to change, and it certainly won't be a dramatic increase in staffing. Fortunately, object storage is the answer. By eliminating the use of legacy RAID, object storage, can be the foundation for a scale-out converged storage solution that solves both data protection and primary storage challenges. Want to recover a multi-TB VM in less than a second? No problem. Want to protect files from ransomware? No problem. Need an enterprise file serving, archiving, or virtual server storage solution? No Problem. Attend this session to learn how object storage is changing the landscape for IT admin and the technology of the future.

Topics: Data Storage
2:00 - 2:50 PM

Addressing Infrastructure Security Across Hybrid Environments

  Presented by Trend Micro

Security requirements do not go away when you move part of your data center workloads to the cloud. Although most security controls can be easily applied to systems in the cloud, the weight of those controls and what constitutes an immediate concern versus a lower priority alert, can be different. We will discuss the need for advanced visibility to differentiate your cloud systems versus your internal data center with central visibility. With the dynamic nature of the cloud, and the flexibility of the modern data center, it is important to apply the same security controls but view the alerts differently depending on their origin.

Topics: Data Center Technology
  • AM Sessions
10:00 - 10:50 AM

Cookies and Alphabet Soup: What are the real consequences?

  Presented by cStor

The new era of data privacy regulations is here. With the alphabet soup of regulation names, like GDPR, CCPA, and newer state laws HB or SB, it's more than just cookies consent on a website. There are real consequences around non-compliance. In this session, we'll explore what you need to know about these regulations, if there is real meat around non-compliance with penalties, and the data security controls you need to put in place to keep data private.

11:00 - 11:50 AM

Evolving Your BC/DR Strategy to Protect Today’s Multi-Cloud Environments

  Presented by Unitrends

We are living in a "Less is More" world. IT Professionals are facing more work, projects, and risks than ever before, while having less time, money, and a shrinking tolerance of downtime. External threats such as malware and natural disasters present significant risk to organizations without the proper BCDR strategies, but they are far from the only causes of data loss. Data continues to grow at an exponential rate and not only on-premises. As organizations are rapidly adopting cloud-based solutions in the form of IaaS, SaaS, and PaaS, they must also consider data protection strategies to address native gaps within these platforms. Join Adam Marget, Technical Solutions Specialist, Unitrends, as we explore the evolving landscape of data protection, cloud's growing role, BC/DR strategies to safeguard all workloads, and best practices in planning your DR approach.

Topics: Business Continuity / Disaster Recovery

Advisory Council

HOW TO BE AN ADVISOR

Advisor-approved content is the foundation upon which INTERFACE was developed. Each conference is guided by an Advisory Council of IT executives and senior managers. Advisor members represent both private and public sector organizations. The council contributes its insight into proposed educational topics and recommends local exhibitors and associations for participation.

EXPAND TO VIEW LIST

Bruce Ayling
VP & CTO
Blood Systems

Brad Boynton
Security Engineer
Orion Health

Erik Brewer
Manager, Information Technology
The Flinn Foundation

Jerry Crow
Consultant, IT Security
Crow Consulting

Rafael Cruz
Sr Systems Info Engineer
Charles Schwab & Co Inc.

Lori Cunningham
Deputy CIO, Operations
AZ Dept of Economic Security

Cathleen Davis
Sr. Auditor
City of Scottsdale

Pamela Davis
Cyber Security Threat Intelligence
American Airlines

Gabriel Gabaldon
Chief Technology Officer
PROACTIS Group Limited

Cary Gielniak
Chief Information Officer
City of Maricopa

Rick Gould
Director, IT Services
Arizona State University

Frank Grimmelmann
President & Chief Executive Officer
AZ Cyber Threat Response Alliance

Eric Groen
Chapter President
IIA Phoenix

Leo J. Hauguel
Founder & President
Sonoran Desert Security User Group

John Havener
CIO
TMT

Chris Ichelson
CEO
HTG 360

Scott Kassmir
FSO & Info System Security Officer
AZLabs

Michael Keeling
Partner
Keeling Law Offices, PC

Brad Kidd
Founder and Principal Consultant
Rentmycio

Ilene Klein
Cybersecurity Program Coordinator
City of Phoenix

Morgan Kroeger
Chapter VP
IIA Phoenix

Bill Lawrence
Manager of Database/Unix Services
Grand Canyon University

Michael Leff
Manager, Information Technology
Cutter Aviation

Glenda Lopez
Membership Director
WITI Phoenix

Monty Low
Director, Information Technology
Arizona Coyotes Hockey Club

Tom Magrini
Deputy Chief Information Officer
City of Phoenix

Douglas Michaelson
Information Technology Manager
Modern Industries, Inc.

Randall Mitchell
Director, Information Systems
Phoenix Symphony

Mark Mrotek
Standards Manager
PCI Security Standards Council

Peter Newman
Faculty Chair
DeVry University

Pam Palestini
Enterprise InfoSec Manager
Wells Fargo Bank

Rakesh Pangasa
Dir, Business Innovation Accelerator
Northern Arizona University

Becky Papp
Chapter Director
ChickTech Phoenix

Keith Peck
Director, Technology
AT&T

Bethany Plaza
Chapter Director
WITI Phoenix

Jenny Roberts
Manager, IT Risk & Information Security
American Express

Peter Rybaczyk
Principle System Architect
AT&T

Bob Sanowski
Sr Director Enterprise Technology
Dignity Health

Ron Schott
Executive Emeritus
Arizona Technology Council

John Simons
IT Audit and Compliance Project Manager
Aetna

Randell Smith
Chief Information Security Officer
City of Phoenix

Margie Smith-Marchese
Senior VP
Northern Trust

Greg Smolens
Director, Information Technology
Ace Asphalt

John Stark
Information Security Officer
AZ Dept of Health Services

Keith Stocks
VP, Information Risk Management
Union Bank

Joanne Storbeck
Director, Business Continuity
WageWorks

Isaiah Washington
Director, Information Technology
Glendale Community College

Robert Werhanowicz
Director of Instructional Technology
Buckeye Union High School

Marnie Wilking
CISO
Orion Health

David Williams
Chief Information Officer
Southwest Network

Rebecca Wynn
Head of Information Security (Senior Director)
Matrix Medical Network

Sponsors

HOW TO BE A SPONSOR

Participating exhibitors at INTERFACE achieve a greater return on their investment from this series of IT events than any other face-to-face medium available today. This success is achieved through a time-efficient and cost-effective presence for a pre-qualified audience. This simple formula leads to higher levels of business development opportunity at each event.

GOLD SPONSORS

StorageCraft

StorageCraft

StorageCraft
Arcserve is a global top 5 data protection vendor with best-in-class solutions that manage, protect, and recover all data workloads, from SMB to enterprise and regardless of location or complexity. A 100% channel-centric organization, Arcserve has a presence in over 150 countries, with 19,000 channel partners and 235,000 customers.
Visit Website
Trend Micro

Trend Micro

Trend Micro
Trend Micro Incorporated, a global leader in cyber security solutions, helps to make the world safe for exchanging digital information.
Visit Website
Unitrends

Unitrends

Unitrends
Unitrends is trusted by IT leaders worldwide who know that in today's digital world protecting their ideas and keeping their business running is non-negotiable. The company’s Connected Continuity Platform protects virtual, physical, + cloud based systems.
Visit Website

SILVER SPONSORS

cStor NetApp

cStor NetApp

cStor NetApp
cStor helps companies strategize, create, and implement data center and cloud technology solutions. Our proven capabilities and expertise provides clients with a fresh perspective and the confidence their goals will be met.
Visit Website
Darktrace

Darktrace

Darktrace
Darktrace is a leading cybersecurity AI company and the creator of Autonomous Response technology. It provides a comprehensive cyber defense to over 5,500 organizations, protecting the cloud, email, IoT, traditional networks, endpoints, and industrial systems.
Visit Website
Fortinet

Fortinet

Fortinet
Fortinet empowers its customers with intelligent, seamless protection across the expanding attack surface & the power to take on the ever-increasing performance requirements of the borderless network – today and into the future.
Visit Website
Quest Software

Quest Software

Quest Software
At Quest, we solve complex problems with simple solutions. Our philosophy is focused on great products, great service and being simple to do business with. We deliver technology that eliminates the need to choose between efficiency and effectiveness.
Visit Website

BRONZE SPONSORS

10ZiG Technology

10ZiG Technology

10ZiG Technology
10ZiG Technology is a world-market leader in Thin & Zero Client endpoint devices for VDI. 10ZiG offers Intel and AMD based Dual and Quad Core Thin & Zero Clients for VMware, Citrix, and Microsoft environments. Free demo devices are available at 10ZiG.com.
Visit Website
Cisco

Cisco

Cisco
Cisco is the worldwide leader in IT that helps companies seize the opportunities of tomorrow by proving that amazing things can happen when you connect the previously unconnected. Cisco delivers intelligent cybersecurity for the real world.
Visit Website
DMD Systems Recovery

DMD Systems Recovery

DMD Systems Recovery
For over 20 years, DMD Systems Recovery has provided secure IT asset disposal services. Our Mission is to mitigate the risks associated with the disposition of sensitive data and retired electronics while maximizing the recovery of residual value.
Visit Website
ESET

ESET

ESET
For more than 30 years, ESET® has been developing industry-leading IT security software and services to protect businesses, critical infrastructure, and consumers worldwide.
Visit Website
Intermedia

Intermedia

Intermedia
Intermedia is a Unified Communications provider focused on delivering easy-to-use communication and collaboration solutions to SMBs. 120k+ business customers rely on Intermedia for greater reliability, productivity and J.D. Power-certified 24/7 support.
Visit Website
Proofpoint

Proofpoint

Proofpoint
Proofpoint, Inc. is a leading cybersecurity and compliance company that protects organizations’ greatest assets and biggest risks: their people. With an integrated suite of cloud-based solutions, Proofpoint helps companies around the world stop targeted threats, safeguard their data, and make their users more resilient against cyber attacks. Leading organizations of all sizes, including more than half of the Fortune 1000, rely on Proofpoint for people-centric security and compliance solutions that mitigate their most critical risks across email, the cloud, social media, and the web.
Visit Website
SRP Telecom

SRP Telecom

SRP Telecom
SRP operates one of the largest fiber-optic networks in Arizona, spanning 15 cities and consisting of over 1,800 route miles. SRP Telecom offers the most geographically diverse fiber network in the Phoenix metropolitan area and is paving the way for the future of data centers and digital innovation.
Visit Website
Veeam

Veeam

Veeam
Veeam is the global leader in Intelligent Data Management for the Hyper-Available Enterprise. Veeam Hyper-Availability Platform is the most complete solution to help customers on the journey to automating data management.
Visit Website
Violin Systems

Violin Systems

Violin Systems
Violin Systems provides extreme-performance enterprise storage at the price of traditional primary storage to help customers maximize the value of their business-critical data in ways never thought possible.
Visit Website
Western Digital

Western Digital

Western Digital
Western Digital creates environments for data to thrive, helping customers capture, preserve, access and transform an ever-increasing diversity of data.
Visit Website

EXHIBITORS & ASSOCIATIONS

ACP Central Arizona

ACP Central Arizona

ACP Central Arizona
ACP is a professional organization that provides a forum for the exchange of experiences and information for business continuity leaders throughout a network of local Chapters.
Visit Website
Arctic Wolf

Arctic Wolf

Arctic Wolf
Arctic Wolf® is the market leader in security operations, and provides security operations as a concierge service. Our security experts work as an extension of your team to monitor and detect threats, and continually strengthen your security posture.
Visit Website
ByteSpeed

ByteSpeed

ByteSpeed
ByteSpeed has been providing IT Solutions, including custom built hardware, networking solutions, and professional IT services in all 50 states in the US since 1999. https://bytespeed.com/
Visit Website
Check Point Software

Check Point Software

Check Point Software
Check Point is a leading provider of cyber security solutions to governments and corporate enterprises globally. Its solutions protect customers from 5th generation cyber-attacks with an industry leading catch rate of malware, ransomware and other types of attacks.
Visit Website
Consiliant Technologies

Consiliant Technologies

Consiliant Technologies
Consiliant Technologies is a leading IT services and solutions provider. We architect infrastructure, mobility, security and cloud solutions. We deliver data center services in assessment, design, implementation and project management.
Visit Website
enSilo

enSilo

enSilo
enSilo delivers the first complete endpoint security platform providing pre- and post-infection protection in real-time, defending against modern cyber attacks.
Visit Website
Hitachi Vantara

Hitachi Vantara

Hitachi Vantara
Hitachi Vantara helps enterprises create and derive value from their data. Its solutions include best-in-class data management, IT infrastructure and analytics products, IoT solutions and Smart Spaces technologies for a broad range of industries.
Visit Website
IIA Phoenix

IIA Phoenix

IIA Phoenix
Established in 1941, The Institute of Internal Auditors (IIA) is an international professional association. The IIA is the internal audit profession's global voice, recognized authority, acknowledged leader, chief advocate, and principal educator.
Visit Website
Infoblox

Infoblox

Infoblox
Infoblox unites networking and security to deliver unmatched performance and protection. Trusted by Fortune 100 companies and emerging innovators, we provide real-time visibility and control over who and what connects to your network, so your organization runs faster and stops threats earlier.
Visit Website
InfraGard Arizona ACTRA

InfraGard Arizona ACTRA

InfraGard Arizona ACTRA
Visit Website
ISACA Phoenix

ISACA Phoenix

ISACA Phoenix
The purpose of the ISACA Phoenix Chapter is to promote the education of individuals for the improvement and development of their capabilities relating to the auditing of and/or management consulting in the field of Information Systems audit and control.
Visit Website
Kogni

Kogni

Kogni
Kogni is enterprise data security product. Kogni helps organizations comply with security best practices and industry guidelines spanning federal, state, and international regulations from CCPA, plus GDPR, PCI, PHI, HIPAA, FERPA, SOC 1 & SOC 2, ISO 27001 and others.
Visit Website
Robert Half Technology

Robert Half Technology

Robert Half Technology
Robert Half Technology is a leading provider of technology professionals on a project and full-time basis. We offer a full spectrum of technology staffing solutions to meet our customers' project, contract-to-full-time and full-time IT recruitment needs.
Visit Website
Ruckus Networks

Ruckus Networks

Ruckus Networks
Ruckus Networks is redefining connectivity around the globe. We build secure wired and wireless access networks for organizations that place a premium on connectivity experiences for end-users as well as simplicity and lower-cost-per-connection for IT.
Visit Website
SDSUG

SDSUG

SDSUG
SDSUG is a group of information technology professionals in the Phoenix area dedicated to the security of our digital systems. We meet quarterly to discuss security issues, tech trends, and share our successes and failures so we can learn from each other.
Visit Website
SentinelOne

SentinelOne

SentinelOne
SentinelOne is the future of Endpoint Protection. It unifies prevention, detection and response in a single platform driven by sophisticated machine learning and intelligent automation. It can adapt your defenses against the most advanced cyber-attacks.
Visit Website
Wilson Electronics

Wilson Electronics

Wilson Electronics
Wilson Electronics manufactures cellular boosters to resolve poor coverage at home, at work or in your vehicle. FCC & Carrier approved solution for all US cell phone carriers. Expanding cost effective wireless network coverage to everyone, everywhere.
Visit Website

Interested in becoming part of our next Phoenix event?

CONTACT US FOR INFO

Phoenix

Westin Kierland Resort
Kierland Grand Ballroom 2-4
6902 E. Greenway Parkway
Scottsdale, AZ 85245

Directions & Parking

About Us

We produce quality, cutting-edge educational seminars, drawn from case studies and best practice examples from leaders in the field.

800-365-6402
Contact Us

Popular Searches

  • Event Registration
  • Become an Exhibitor
  • Become an Advisor
  • Sponsor an Event
  • Contact Event Coordinator
  • Submit Feedback

Seminar Topics

  • Artificial Intelligence
  • BC / DR
  • Culture
  • Data Center Technology
  • Data Management
  • Data Storage
  • Digital Experience
  • Information Security
  • Infrastructure
  • Strategic Management
  • Unified Communications

2026 Events

  • Portland • March 19th
  • Anchorage • April 22nd
  • Honolulu • May 21st
  • Phoenix • June 18th
  • Wyoming • July 9th
  • Montana • July 29th
  • Boise • August 20th
  • Salt Lake City • September 22nd
  • Spokane • October 15th
  • Omaha • November 5th
  • Seattle • December 3rd
  • Home
  • About
  • Get Involved
  • Events
  • Register
  • © 2026 F2F Events, Inc.