F2F Events, Inc.
  • Home
  • About
    • About
    • CPE Credits
    • Session Topics
    • Privacy Policy
      • Scam Warning
    • Code of Conduct
    • Media Kit
  • Get Involved
    • Advisory Council
    • Association Partners
    • Exhibitors
    • Speakers
  • Events
    • Locations
    • Upcoming Events
  • Contact
  • Register

Cutting-edge conferences for over 20 years

Educational Events with Your Local IT Community

View Upcoming Events Register

INTERFACE Seattle 2019 / See You Next Year

IT Infrastructure is constantly changing, bringing more new challenges with it every day. From ransomware and the latest security threats to emerging developments in AI and the need for increased bandwidth and storage, it’s nearly impossible to keep up to date. Our conference is designed to help. We’ve assembled a combination of Best-in-Breed hardware and software solutions, along with local experts and organizations to help educate, advise and connect you to resources that can help you meet your goals.

Covering Information Security, Infrastructure, Cloud, Disaster Recovery, Communications, and more, you’ll find presentations, panel discussions, and exhibitors covering a variety of topics, as well as the latest innovations and best practices.

AT A GLANCE

December 6th, 2019
8:30am – 4:30pm

Meydenbauer Center
Center Hall AB
11100 NE 6th St
Bellevue, WA 98004

Directions & Parking

KEYNOTE: You Are Never Alone: How to Humanize Tech and Work in Your Organization and in Life

Presented by Dan Gaul • CTO, Digital Trends

Seminar Schedule

VIEW FLOORPLAN
  • Theater One
  • Theater Two
  • Theater Three
  • Theater Four
  • AM Sessions
  • PM Sessions
  • Keynote
9:00 - 9:50 AM

Cyber AI: Fighting Back with Autonomous Response

Presented by Darktrace

The digital enterprise is constantly expanding, with new IoT, cloud, and operational technologies all challenging traditional notions of cyber security. Safeguarding these evolving environments against machine-speed attacks has never been more difficult.Yet the digital battleground now features its most formidable defender in Cyber AI — a self-learning technology that distinguishes friend from foe in order to thwart threats autonomously. With the Cyber AI Platform protecting your entire infrastructure in real time, it doesn’t matter whether the attack originates on a connected device, an industrial system, or in the cloud. Wherever it strikes, the AI fights back in seconds.

In this session, you’ll discover:

  • Why only Autonomous Response can counter today’s machine-speed attacks
  • Where advanced threat-actors exploit vulnerabilities in the cloud and IoT
  • What achieving 100% visibility can reveal about your organization’s risk profile
  • How the Cyber AI Analyst reduces the time spent triaging threats by 92%
Topics: Information Security
10:00 - 10:50 AM

The Current Malware Threat Landscape & Enterprise Grade Remediation

Presented by Malwarebytes

Malware has become one of the biggest threat challenges faced by security and IT teams. Malwarebytes Labs conducts extensive proprietary research and analysis. The findings are periodically published to help security teams better understand the nature and evolution of these threats.

This presentation will cover key findings from our newly released annual report. It will highlight malware category trends and discuss new and emerging threats to be on the watch for. There will also be a discussion of industry best practices and technologies that can help your business to prevent, detect, and remediate these threats.

Attendees will leave with insight into the current malware threat landscape, as well as an understanding of steps they can take to mitigate breaches.

Topics: Information Security
11:00 - 11:50 AM

Hacking Exposed: A Look Inside the Techniques of OceanLotus/APT32

Presented by BlackBerry/Cylance & Structured

Take a journey with us, as we expose the mind of the enemy, revealing some of the latest methods that cybercriminals use to infiltrate modern security defenses, and how you can thwart them. You will learn about the ever-changing threat landscape and how you can prevent and respond to today's most pervasive threats - including ones never seen before. With the best tools, expertise, and powerful AI-based technology, we will uncover the secrets behind today's modern hacking arsenal and provide you with the means to protect your organization.

Topics: Information Security
12:00 - 12:45 PM

Stay Ahead: Embracing New Technology

Presented by Tony North • President, Seattle HDI Chapter

Technology can be a hinderance if not well planned or deployed. With new tools like AI, IoT and Apps, it can be difficult for employees and employers to embrace it. Join the Seattle chapter of HDI, Help Desk Institute, for an interactive session. You will learn about the issues facing us all today while finding recommendations on how to improve adoption of technology in a very simple way.

Topics: Infrastructure
1:00 - 1:50 PM

Achieving a Successful Security Segmentation

Presented by Illumio

You rely on the network to deliver applications. But as IT scales in size, connectivity, and environments outside the network to public cloud, we cannot rely solely on the network to secure applications. The answer is to decouple security segmentation from the network. This allows us to protect applications wherever they run –because they do not live exclusively on our networks anymore, and enforcement must go wherever they do.

During this informative session, we'll discuss:

  • What is security segmentation?
  • Challenges of traditional network segmentation
  • Decoupling segmentation from network architecture
  • Principles of successful security segmentation
  • 5 steps to implement a strategy
Topics: Information Security, Infrastructure
2:00 - 2:50 PM

The Current State of Ransomware and Proactive Ways to Combat It

Presented by Xiologix

In this presentation, we will do a quick review of the current state of ransomware and then jump right into proactive approaches utilizing the latest tools to prevent and combat this growing threat. We will include a discussion of identifying attack vectors, network defenses, storage defenses, asset management, SOC, incident response, and the benefits of each.

Topics: Information Security, Infrastructure
Dan GaulDan GaulCTO, Digital Trends
3:00 - 3:50 PM

You Are Never Alone: How to Humanize Tech and Work in Your Organization and in Life

Presented by Dan Gaul • CTO, Digital Trends

As one of the world’s largest technology curators, Digital Trends’ co-founder Dan Gaul explores what it takes to balance technology inside and outside of the organization while challenging traditional Silicon Valley ideas about what it takes to thrive.

Dan Gaul is the co-founder and Chief Technical Officer (CTO) for Digital Trends, a Portland, Oregon-based publisher of consumer-targeted websites. In his role, Dan is charged with oversight of tech operations for Digital Trends' suite of platforms including: Digital Trends, the popular site for news, information and reviews on personal tech (which reaches over 30 million viewers each month); its Spanish-language companion, DT Español, and The Manual, an aspirational-living site.

Topics: Infrastructure
  • AM Sessions
  • PM Sessions
9:00 - 9:50 AM

Transforming IT Ops and Network Experiences with A.I.

Presented by Juniper & Structured

Today’s networks and IT teams are challenged by the soaring numbers of mobile and IoT devices and apps. Learn how data science, AI and a modern microservices cloud architecture can deliver the agility, scale and reliability that businesses need to succeed. We are transforming user and IT experiences with an AI-Driven Enterprise through proactive automation and relevant insights while ultimately evolving towards a self-driving network. In this session, you’ll learn why three of the Fortune 10 companies, along with thousands of other organizations, are AI-driven wired and wireless networking customers, to deliver new services, assure network performance, and streamline help-desk operations.

Topics: Infrastructure
10:00 - 10:50 AM

Vulnerability Management: Work Smarter Not Harder “The Data Problem”

Presented by Kenna Security

With an exponential increase in the volume and velocity of new vulnerabilities, it is no wonder that today's InfoSec and operations teams find it difficult, if not impossible, to meet the increasing demands of remediation. This doesn't even include internal corporate policies or politics which present significant barriers as well. It is not uncommon to discuss a prospective customer's VM program with them, only to find out that they are using spreadsheets to manage the load. They then hand off their "prioritized" workload to a group of admins who are not bound to the same policies or procedures. The average enterprise today has 100's of thousands to millions of vulnerabilities spread across tens of thousands of assets. A great many of these organizations continue to rely on CVSS scoring as the only benchmark. The latest research shows us that if you base your remediation strategy on fixing CVSS 7 or greater, your efforts will yield the same effectiveness as randomly choosing any set of active vulns in your environment to address. It is about 22% effective in either scenario. The purpose of this presentation is to discuss and explore more effective ways to address such challenges and roadblocks. In particular, how does a practitioner better prioritize and communicate with their various internal colleagues to improve their workflow and posture?

Topics: Strategic Management
11:00 - 11:50 AM

Fighting Cybercrime with Artificial Intelligence

Presented by Fortinet

In this session you will learn how we are using modern A.I. and machine learning to assist in threat research. Additionally we'll discuss the evolution of threat research/methodology and how global collaboration leads to enhanced protection for everyone.

Topics: Artificial Intelligence, Information Security
1:00 - 1:50 PM

Innovation and Evolution: BC/DR for Today’s Multi-Cloud Environments

Presented by Unitrends

We are living in a "Less is More" world. In a landscape that's rapidly changing, IT professionals are managing more work, projects, and risk than ever before. While external threats such as malware and natural disasters cause significant downtime and data loss without proper BCDR implementation, organizations must also be prepared to safeguard from within. Data continues to grow at an exponential rate, and not only on-premises. As cloud-delivered solutions such as IaaS and SaaS are rapidly adopted by an increasing number of organizations, and the workforce itself is becoming increasingly dispersed and mobile, organizations must consider data protection strategies to address gaps in BC/DR outside the traditional data center. Join Adam Marget, Technical Specialist from Unitrends, as we explore the evolving landscape of data protection, cloud's growing role, BC/DR strategies to safeguard local, remote, and cloud-based workloads, and best practices in planning your DR approach.

Topics: Business Continuity / Disaster Recovery
2:00 - 2:50 PM

PCI and Your Organizational Liability

Presented by Structured

Payment card processing is a critical service many companies and organizations offer. But with this service comes the added responsibility to comply with PCI requirements, and the technical, administrative, and physical controls applicable to card processing environments. Failure to comply can result in costly fines. Plus, a breach of card holder information could have disastrous financial and public relations consequences for compromised merchants.

Want to know more? With compelling and engaging content delivered by Rob Wayt, a PCI Qualified Security Assessor (QSA), you will learn the intricacies of these requirements, proper scoping, and how to mitigate risks that merchants have while card processing.

Topics: Information Security
  • AM Sessions
  • PM Sessions
9:00 - 9:50 AM

Administering Responsibly

Presented by One Identity

Managing elevated and shared access credentials is one of the biggest challenges facing complex heterogeneous organizations today. Administrators must be able to access the systems they manage with sufficient rights to do their jobs, but organizations must control that access to ensure security and regulatory compliance. The days of administrators sharing accounts and passwords and operating without auditing are gone (or they should be).

Large enterprises face unique challenges. They too must control the use of elevated privileges, but they need to find ways to enhance authentication for these accounts to meet mandates while still enabling administrators to administer. Even with multifactor authentication to “check out” a privileged account or session, we still need to take steps to mitigate potential account compromises--making sure the admin that authenticated today is still who they say they are. We’ve come to the point where we need to continuously analyze administration by watching normal behavior and comparing it to current behavior – with real-time in-line remediation to add a powerful layer of risk mitigation.

Topics: Infrastructure
10:00 - 10:50 AM

Secure, Fast & Flexible: Improving Performance with Networking Standards

Presented by JT Tech/Extreme Networks

The digital business is here, and networking is fundamental to its success! The modern enterprise demands agility, scalable and resilient connectivity, and inherent network security - but without the complexity of traditional networking. Advances in networking technology - being driven through standards bodies such as the IEEE and IETF - have dramatically simplified the design, build and operation of the network; delivering automation while at the same time improving security and stability.

Learn from Jamie Eubank, Solutions Architect with over 20 years of experience in large scale, mission critical, campus and sporting event architectures. Specializing in Shortest Path Bridging 802.1aq, Wi-Fi technology (CWNE) and Security Architectures (CISSP/CEH) on new standard-based approaches to network design to help you:

  • Deliver new digital technology and applications to your users & customers faster
  • Avoid lengthy maintenance windows for network moves, adds and changes
  • Contain breaches and prevent lateral movements through end to end segmentation
  • Improve the performance and scale of your most demanding applications (video surveillance, video distribution, patient telemetry systems, etc.)
  • Improve stability and simplify troubleshooting
Topics: Unified Communications
1:00 - 1:50 PM

Next Generation Access: Dynamic Segmentation

Presented by Aruba & Structured

In an ever-expanding era of corporate mobility, IoT, BYOD, and more, learn how to manage and control device connectivity in a simple, secure and dynamic way.

Topics: Infrastructure, Strategic Management
2:00 - 2:50 PM

Deep Learning: A Radical New Way to Detect Malware

Presented by Blue Hexagon

The transformative power of deep learning is being applied to every aspect of our lives-- from speech recognition and cancer imaging to autonomous driving cars. Deep learning is the security weapon of the future as attackers evolve their techniques using sophisticated malicious, morphing malware variants created at unprecedented volume and velocity. In fact, deep learning neural networks can learn and intelligently make decisions on malware, even zero days seen for the first time.

In this session, hear about how deep learning has evolved, why advances are possible today, and why it is ideal to address the new threat landscape of automated attacks without having to rely on an army of security analysts. Finally, explore a case study of how a multi-vector, polymorphic variant of the Emotet malware was detected with “deep learning inspection”. Deep dive into how the deep learning models were executed on different phases of the Emotet attack kill chain.

Topics: Information Security
  • AM Sessions
  • PM Sessions
9:00 - 9:50 AM

Securing the Public Cloud

Presented by Check Point

Securing the public cloud requires a different approach than what was required historically. We need to not only utilize a different design and tools but also shift the security focus to the user and not the location of a device.

Topics: Data Storage
10:00 - 10:50 AM

A New Era of Data Protection: Converged DR and Backup

Presented by Zerto

In today's always-on, information-driven organizations, business continuity depends completely on IT infrastructures that are up and running 24/7. Being prepared for any data related disaster is key!

  • The cost and business impact of downtime and data loss can be immense
  • Data loss is not only caused by natural disasters, power outages, hardware failure and user errors, but more and more by software problems and cyber security related disasters
  • Having a plan and process in place will help you mitigate the impact of an outage on your business.

In this presentation we will address the challenges, needs, strategies, and solutions.

Topics: Business Continuity / Disaster Recovery
11:00 - 11:50 AM

Deep Learning: A Radical New Way to Detect Malware

Presented by Blue Hexagon

The transformative power of deep learning is being applied to every aspect of our lives-- from speech recognition and cancer imaging to autonomous driving cars. Deep learning is the security weapon of the future as attackers evolve their techniques using sophisticated malicious, morphing malware variants created at unprecedented volume and velocity. In fact, deep learning neural networks can learn and intelligently make decisions on malware, even zero days seen for the first time.

In this session, hear about how deep learning has evolved, why advances are possible today, and why it is ideal to address the new threat landscape of automated attacks without having to rely on an army of security analysts. Finally, explore a case study of how a multi-vector, polymorphic variant of the Emotet malware was detected with “deep learning inspection”. Deep dive into how the deep learning models were executed on different phases of the Emotet attack kill chain.

Topics: Information Security
1:00 - 1:50 PM

How Can a Diverse Workforce Contribute to the Success of Your Business?

Moderated by INTERFACE Advisory Council

Now, more than ever, the workforce is comprised of a diverse group of talented professionals. With more women in the tech industry than ever before and a broad range of generations bringing different work styles and values to the table, ultimately organizations can benefit from having a diverse group of individuals on their team.

Join our panel discussion as we discuss the tech landscape, workforce diversity and how to hire and retain top talent to obtain the high achieving teams we desire.

Panelists:

Deveeshree Nayak • Instructor, University of Washington Tacoma

Alicia Evans • Metro Market Manager, Robert Half Technology

Topics: Strategic Management
2:00 - 2:50 PM

What I Wish I Knew BEFORE I Moved to the Cloud

Presented by INTERFACE Advisory Council

As more companies have to interact with cloud to drive their business forward, more do so without truly understanding security and the long-term ramifications in doing so. Join our experts for an in-depth discussion. This session will talk about what things we wish we knew before moving to the cloud. Bring your questions for this interactive discussion!

Topics: Data Storage, Infrastructure

Advisory Council

HOW TO BE AN ADVISOR

Advisor-approved content is the foundation upon which INTERFACE was developed. Each conference is guided by an Advisory Council of IT executives and senior managers. Advisor members represent both private and public sector organizations. The council contributes its insight into proposed educational topics and recommends local exhibitors and associations for participation.

EXPAND TO VIEW LIST

Victor Adamson
Manager, Database Administration
Continental Mills

Jeff Baine
Manager, Information Security
Lewis County Public Utilities District

Shannon Boldt
Manager, Information Systems
Point No Point Treaty Council

Diana Brown
Director, Information Technology
Washington Schools Risk Management Pool

Tim Crawford, CETL
Interim Chief Technology Officer
Federal Way Public Schools

Jeff Cummings
Director, Information Technology
G2 Web Services

Alex Di Giacomo
ST Information Security & ORCA CISO
Sound Transit

John Forrister
Director, Networking and Information Security
Tgen

Ian Gorrie
Security Architect
Locked Networks

Dan Gaul
CTO
Digital Trends

Ren Guardiano
Technical Manager, Enterprise Applications
Seattle Childrens Hospital

Don Hendrix
Senior Manager, Technology Security
AT&T

Bob Johnson
Director, Information Services
Turner Construction Group

Lawerence Kane
Sr Leader, IT Infrastructure
Boeing Company

Randall Kintner
Chief Information Officer
LifeSpan BioSciences, Inc.

John McRoberts
Sr. Technical Director
AT&T

Keith Messner
Manager, Information Technology
Pierce Transit

Brian Moore
IT Director
Tacoma-Pierce County Health Department

Ward Naf
Director, Information Technology
Whatcom Community College

Deveeshree Nayak
Cyber Security Professor
University of Washington, Tacoma

Tony North
President
HDI

Erik Peterson
Global Information Security Manager
Crane Co.

Tim Pugil
VP, IT Operations
Harborstone Credit Union

Andrew Rausch
Chief Information Officer
Lydig Construction, Inc.

Ashley Riggs
IT Operations Manager
City of Auburn, Wa

Lionel Roberts
Manager, Information Technology
Emerald Services

Randall Rusher
IT Manager
Meteorcomm

Lisa Sandoval
Director, IT Programs
Seattle Central College

Michael Secright
Chief Information Officer
HFS University of Washington

Skylar Shaw
IT Director
Zetec

Joseph Socoloski
Manager, Information Technology
Pacific NW Diabetes Research Institute

Harald Upegui
Network & IS Systems Administrator
HealthPoint

Justin  White
Vice President
ISSA Puget Sound Chapter

Sponsors

HOW TO BE A SPONSOR

Participating exhibitors at INTERFACE achieve a greater return on their investment from this series of IT events than any other face-to-face medium available today. This success is achieved through a time-efficient and cost-effective presence for a pre-qualified audience. This simple formula leads to higher levels of business development opportunity at each event.

GOLD SPONSORS

Blue Hexagon

Blue Hexagon

Blue Hexagon
Blue Hexagon is a deep learning company that detects malware within a fraction of a second. We are deployed in your perimeter or cloud, and work in real-time, detecting known and unknown malware  in less than a second at greater than 99.5% accuracy.
Visit Website
Structured

Structured

Structured
Structured is an award-winning solution provider delivering secure, cloud-connected digital infrastructure. For 30 years, we’ve helped clients through all phases of digital transformation by securely bridging people, business and technology.
Visit Website

SILVER SPONSORS

Check Point Software

Check Point Software

Check Point Software
Check Point is a leading provider of cyber security solutions to governments and corporate enterprises globally. Its solutions protect customers from 5th generation cyber-attacks with an industry leading catch rate of malware, ransomware and other types of attacks.
Visit Website
Darktrace

Darktrace

Darktrace
Darktrace is a leading cybersecurity AI company and the creator of Autonomous Response technology. It provides a comprehensive cyber defense to over 5,500 organizations, protecting the cloud, email, IoT, traditional networks, endpoints, and industrial systems.
Visit Website
Fortinet

Fortinet

Fortinet
Fortinet empowers its customers with intelligent, seamless protection across the expanding attack surface & the power to take on the ever-increasing performance requirements of the borderless network – today and into the future.
Visit Website
HPE Zerto Software

HPE Zerto Software

HPE Zerto Software
HPE Zerto Software helps you unlock ransomware resilience, disaster recovery, and continuous data protection to radically reduce data loss and downtime.
Visit Website
Illumio

Illumio

Illumio
Illumio, the Zero Trust Segmentation company, stops breaches and ransomware from spreading across the hybrid attack surface. The Illumio ZTS Platform visualizes how workloads and devices are communicating, creates granular segmentation policies which only allow necessary communication, and automatically isolates ransomware and breaches. Assume breach. Minimize impact. Increase resilience.
Visit Website
Intermedia

Intermedia

Intermedia
Intermedia is a Unified Communications provider focused on delivering easy-to-use communication and collaboration solutions to SMBs. 120k+ business customers rely on Intermedia for greater reliability, productivity and J.D. Power-certified 24/7 support.
Visit Website
JT Tech

JT Tech

JT Tech
JT Tech is a Washington State based business that provides a personal level of partnership extending the highest level of a secure IT solution. We help our customers gain a competitive advantage with Network Infrastructure and Security Solutions.
Visit Website
Kenna Security

Kenna Security

Kenna Security
Kenna Security is the enterprise leader in risk-based vulnerability management. The Kenna SaaS Platform enables organizations to work cross-functionally to determine and remediate cyber risks. Kenna serves nearly every major vertical.
Visit Website
Malwarebytes

Malwarebytes

Malwarebytes
Malwarebytes protects workplace productivity. We secure all your endpoints so employees can connect confidently, from anywhere. We combine analytics-driven, multi-layer threat protection and industry-leading incident response to both simplify and strengthen overall cybersecurity. You and your team stay up and running, so you can remain focused on driving your business.
Visit Website
Novacoast

Novacoast

Novacoast
Novacoast is an international cybersecurity company specializing in IT services and software development. With a 28-year history in the industry, Novacoast has built and maintains IT security solutions for some of the world’s largest private and public organizations. Our team is comprised of hundreds of specialists with backgrounds in IT advisory, development and engineering, and managed services. Together, we’re committed to identifying unique ways to improve the productivity and security posture of our customers.
Visit Website
ONE IDENTITY

ONE IDENTITY

ONE IDENTITY
One Identity portfolio of identity governance, access management, privileged management and identity as a service solutions, helps organizations optimize identity and access management (IAM).For more info, visit http://www.oneidentity.com.#GetIAMRight
Visit Website
Unitrends

Unitrends

Unitrends
Unitrends is trusted by IT leaders worldwide who know that in today's digital world protecting their ideas and keeping their business running is non-negotiable. The company’s Connected Continuity Platform protects virtual, physical, + cloud based systems.
Visit Website
Xiologix

Xiologix

Xiologix
Xiologix is a technology solution provider of business driven multi-vendor IT solutions to customers throughout the US and Canada. They offer a wide variety of hardware and software products from the world's leading IT companies.
Visit Website

BRONZE SPONSORS

3R Technology

3R Technology

3R Technology
Providing complete ITAD services since 2003, including state-of-the-art secure data destruction, refurbishment, and e-commerce solutions. Our R2:2013 and NAID AAA certifications guarantee environmental safety and sustainability, while ensuring your data and assets are managed responsibly.
Visit Website
Allstream

Allstream

Allstream
Allstream is a business communications provider in Canada and the United States. Allstream’s customers benefit from access to an expansive network of experts and a team focused on reliability & customer experience. Our services include voice, collaboration, and connectivity solutions.
Visit Website
Corelight, Inc.

Corelight, Inc.

Corelight, Inc.
Corelight makes powerful network security monitoring solutions that transform network traffic into rich logs, extracted files, and security insights for incident responders and threat hunters. Corelight Sensors run on open-source Zeek (formerly called “Bro”) and simplify Zeek deployment and management while expanding its performance and capabilities.
Visit Website
ESET

ESET

ESET
For more than 30 years, ESET® has been developing industry-leading IT security software and services to protect businesses, critical infrastructure, and consumers worldwide.
Visit Website
Infoblox

Infoblox

Infoblox
Infoblox unites networking and security to deliver unmatched performance and protection. Trusted by Fortune 100 companies and emerging innovators, we provide real-time visibility and control over who and what connects to your network, so your organization runs faster and stops threats earlier.
Visit Website
SentinelOne

SentinelOne

SentinelOne
SentinelOne is the future of Endpoint Protection. It unifies prevention, detection and response in a single platform driven by sophisticated machine learning and intelligent automation. It can adapt your defenses against the most advanced cyber-attacks.
Visit Website
SOTI

SOTI

SOTI
SOTI is a proven leader at creating innovative solutions that reduce the cost and complexity of business-critical mobility and the IoT. Thousands of companies around the world depend on us to secure, manage and support their mobile operations.
Visit Website
Sungard Availability Services

Sungard Availability Services

Sungard Availability Services
Sungard Availability Services is a leading provider of critical production & recovery services.With more than 40 years of experience Sungard designs, builds & runs critical IT services that manage complex IT, adapt quickly, build resiliency & availability.
Visit Website
Tools4ever

Tools4ever

Tools4ever
Tools4ever delivers affordable Identity Governance and Administration (IGA) solutions – User Provisioning, Password Management, Single Sign-On (SSO), Self‐Service, Workflow Management – connecting 10 million users to resources.
Visit Website
Trend Micro

Trend Micro

Trend Micro
Trend Micro Incorporated, a global leader in cyber security solutions, helps to make the world safe for exchanging digital information.
Visit Website

EXHIBITORS & ASSOCIATIONS

8x8, Inc.

8x8, Inc.

8x8, Inc.
8×8 is transforming the future of business communications as a leading Experience Communications as a Service (XCaaS) provider. 8×8 XCaaS brings together customer and employee experience to deliver business agility. It’s the only integrated platform for contact center, voice, video, chat, and APIs that addresses today’s dynamic, critical workplace requirements. Unlike competitors, the 8×8 Experience Communications Platform enables company-wide collaboration, unified administration, shared integrations, and cross-platform AI and analytics through the industry’s only 99.999% financially back, platform-wide service level agreement (SLA). Unlike multi-vendor environments, 8×8 XCaaS provides platform-wide reliability, lowers cost, boosts employee productivity and customer engagement, and delivers intelligence through AI-powered experiences and insights.
Visit Website
Arctic Wolf

Arctic Wolf

Arctic Wolf
Arctic Wolf® is the market leader in security operations, and provides security operations as a concierge service. Our security experts work as an extension of your team to monitor and detect threats, and continually strengthen your security posture.
Visit Website
Avigilon

Avigilon

Avigilon
Avigilon strives to be the world’s most trusted business intelligence and Security Solutions Company. With industry leading technology, we're your one-stop-shop for award-winning HD surveillance and access control solutions.
Visit Website
BlackBerry

BlackBerry

BlackBerry
BlackBerry Cybersecurity is a leader in endpoint security, endpoint management, encryption, and embedded systems, protecting enterprises and governments around the world. Our end-to-end approach is deeply rooted in Cylance® AI and machine learning, providing continuous preventative protection, detection, and instant response. We extend protection for your organization against current and future cyberthreats by combining network and endpoint telemetry and by delivering innovative solutions in the areas of cybersecurity, safety, and data privacy.
Visit Website
ByteSpeed

ByteSpeed

ByteSpeed
ByteSpeed has been providing IT Solutions, including custom built hardware, networking solutions, and professional IT services in all 50 states in the US since 1999. https://bytespeed.com/
Visit Website
Cohesity

Cohesity

Cohesity
Cohesity delivers a web-scale platform that simplifies data protection, consolidates file and object services, provides instant access to test/dev copies, spans from the edge to the cloud, and performs in-place searches and analytics.
Visit Website
Comcast Business

Comcast Business

Comcast Business
Comcast Business has the largest IP network in the nation, serving small businesses through large enterprises. Technology offerings include Internet and Ethernet connectivity, voice solutions, and SD-WAN on ActiveCore(SM). Learn more at business.comcast.com/enterprise.
Visit Website
CommScope

CommScope

CommScope
Advancing broadband enterprise and wireless networks to power progress and create lasting connections.
Visit Website
Commvault

Commvault

Commvault
Commvault is a worldwide leader in delivering data readiness. Commvault's backup and recovery software enables you to protect, manage, and use your data, while managing it in a consistent, compliant way.
Visit Website
Cymatic Security

Cymatic Security

Cymatic Security
Cymatic delivers the only user and entity behavior analytics (UEBA) platform that autonomously identifies and verifies a user’s security hygiene pre-endpoint and blocks any threats before they get past the browser. Delivered through a zero-agent snippet that installs in seconds, highly regulated organizations that provide web applications rely on Cymatic for real-time visibility into user and visitor behavior to detect risk, mitigate threats and enforce security hygiene.
Visit Website
ExaGrid

ExaGrid

ExaGrid
ExaGrid offers the only disk-based backup appliance with data deduplication purpose-built for backup that leverages a unique architecture optimized for performance, scalability and price.
Visit Website
Excool

Excool

Excool
Excool manufactures Indirect Adiabatic cooling units for the data center marketplace, featuring free-cooling operation mode and PUE of 1.05 or less in the Pacific Northwest.
Visit Website
ExtraHop

ExtraHop

ExtraHop
ExtraHop delivers enterprise cyber analytics that allow you to quickly investigate threats, ensure the delivery of critical applications, and secure your investment in the cloud.
Visit Website
Extreme Networks

Extreme Networks

Extreme Networks
Extreme Networks, Inc. (EXTR) delivers software-driven networking solutions that help IT departments everywhere deliver the ultimate business outcome: stronger connections with customers, partners and employees.
Visit Website
Fusion Risk Management

Fusion Risk Management

Fusion Risk Management
Fusion Risk Management is a leading industry provider of cloud-based software solutions for business continuity, risk management, IT disaster recovery, and crisis and incident management.
Visit Website
Green House Data

Green House Data

Green House Data
Green House Data is a platform agnostic managed services provider who delivers hybrid solutions to enterprises who need secure IT environments and efficient management of their critical applications and business data. The company is a certified B-Corp.
Visit Website
HPE Aruba Networking

HPE Aruba Networking

HPE Aruba Networking
Deliver the performance and uninterrupted access your business demands with a Zero Trust foundation and AI-automated operations that help you innovate with the least risk.
Visit Website
HPE Juniper Networking

HPE Juniper Networking

HPE Juniper Networking
Juniper Networks is now part of HPE. Together, we're building industry-leading, secure, AI-native networks – purpose-built with and for AI. As AI and networking converge, we're driving a bold transformation across enterprises, service providers, and cloud operators.
Visit Website
IIBA Seattle

IIBA Seattle

IIBA Seattle
As the voice of the business analysis community, IIBA supports the recognition of the profession, and works to maintain standards and certification. The Seattle chapter supports its members through providing a community and educational opportunities.
Visit Website
McKinstry

McKinstry

McKinstry
McKinstry provides integrated technology infrastructure solutions. Using a collaborative, sustainable approach we plan, build and maintain facility systems that are optimized for the life of your building.
Visit Website
Nutanix

Nutanix

Nutanix
Nutanix makes IT infrastructure invisible with an enterprise cloud platform that delivers the agility and economics of the public cloud, without sacrificing the security and control of on-premises infrastructure.
Visit Website
RedSeal

RedSeal

RedSeal
RedSeal’s cyber risk modeling solution unifies public cloud, private cloud and physical network environments into one, interactive model. RedSeal is at the forefront of building Digital Resilience into organizations with robust cyber risk modeling.
Visit Website
Right! Systems

Right! Systems

Right! Systems
Right! Systems, Inc. is an IT management services company that provides business-driven, multi-vendor IT solutions in Network Infrastructure, Virtualization, Storage, Unified Communications, Telepresence, Security, Mobility and Professional Services.
Visit Website
Robert Half Technology

Robert Half Technology

Robert Half Technology
Robert Half Technology is a leading provider of technology professionals on a project and full-time basis. We offer a full spectrum of technology staffing solutions to meet our customers' project, contract-to-full-time and full-time IT recruitment needs.
Visit Website
Rubrik

Rubrik

Rubrik
Rubrik delivers instant application availability for recovery, search, cloud, and development. Hybrid Cloud enterprises benefit from Rubrik’s market-leading Cloud Data Management platform with simplicity, instant data access, app-mobility, policy-driven automation, Ransomware protection, and analytics at scale.
Visit Website
Ruckus Networks

Ruckus Networks

Ruckus Networks
Ruckus Networks is redefining connectivity around the globe. We build secure wired and wireless access networks for organizations that place a premium on connectivity experiences for end-users as well as simplicity and lower-cost-per-connection for IT.
Visit Website
Veeam

Veeam

Veeam
Veeam is the global leader in Intelligent Data Management for the Hyper-Available Enterprise. Veeam Hyper-Availability Platform is the most complete solution to help customers on the journey to automating data management.
Visit Website
WISPS

WISPS

WISPS
This group serves women in the greater Puget Sound area who are looking for networking opportunities and education on cyber security, information security, compliance, and related topics. So far in 2019 we have held one meeting each month, alternating between downtown Seattle and Bellevue / Eastside. 
Visit Website
WorkSafe Technologies

WorkSafe Technologies

WorkSafe Technologies
WorkSafe Technologies is a leading authority in seismic protection. WorkSafe Technologies' ISO-Base seismic isolation technology is the most effective way to protect mission-critical and expensive electronic equipment in the event of an earthquake.
Visit Website
Wowrack

Wowrack

Wowrack
Wowrack is a global cloud service provider; offering various Hosting services including Managed Hosting Solutions, Dedicated Server Solutions, Colocation, Virtualization, Disaster Recovery, Backup services and much more!
Visit Website
ZPE Systems

ZPE Systems

ZPE Systems
ZPE Systems helps rethink the way networks are built and managed by providing software-defined, vendor-neutral infrastructure management and networking solutions for data center and branch networks.
Visit Website

Interested in becoming part of our next Seattle event?

CONTACT US FOR INFO

Seattle

Meydenbauer Center
Center Hall AB
11100 NE 6th St
Bellevue, WA 98004

Directions & Parking

About Us

We produce quality, cutting-edge educational seminars, drawn from case studies and best practice examples from leaders in the field.

800-365-6402
Contact Us

Popular Searches

  • Event Registration
  • Become an Exhibitor
  • Become an Advisor
  • Sponsor an Event
  • Contact Event Coordinator
  • Submit Feedback

Seminar Topics

  • Artificial Intelligence
  • BC / DR
  • Culture
  • Data Center Technology
  • Data Management
  • Data Storage
  • Digital Experience
  • Information Security
  • Infrastructure
  • Strategic Management
  • Unified Communications

2026 Events

  • Portland • March 19th
  • Anchorage • April 22nd
  • Honolulu • May 21st
  • Phoenix • June 18th
  • Wyoming • July 9th
  • Montana • July 29th
  • Boise • August 20th
  • Salt Lake City • September 22nd
  • Spokane • October 15th
  • Omaha • November 5th
  • Seattle • December 3rd
  • Home
  • About
  • Get Involved
  • Events
  • Register
  • © 2026 F2F Events, Inc.