F2F Events, Inc.
  • Home
  • About
    • About
    • CPE Credits
    • Session Topics
    • Privacy Policy
      • Scam Warning
    • Code of Conduct
    • Media Kit
  • Get Involved
    • Advisory Council
    • Association Partners
    • Exhibitors
    • Speakers
  • Events
    • Locations
    • Upcoming Events
  • Contact
  • Register

Cutting-edge conferences for over 20 years

Educational Events with Your Local IT Community

View Upcoming Events Register

INTERFACE Portland 2020 / See You Next Year

IT Infrastructure is constantly changing, bringing more new challenges with it every day. From ransomware and the latest security threats to emerging developments in AI and the need for increased bandwidth and storage, it’s nearly impossible to keep up to date. Our conference is designed to help. We’ve assembled a combination of Best-in-Breed hardware and software solutions, along with local experts and organizations to help educate, advise and connect you to resources that can help you meet your goals.

Covering Information Security, Infrastructure, Cloud, Disaster Recovery, Communications, and more, you’ll find presentations, panel discussions, and exhibitors covering a variety of topics, as well as the latest innovations and best practices.

AT A GLANCE

March 10th, 2020
8:30am – 4:30pm

Oregon Convention Center
Portland Ballroom
777 NE Martin Luther King, Jr. Blvd.
Portland, OR 97232

Directions & Parking

Venue Accessibility

Venue Health & Safety

KEYNOTE: I’m From the Feds: We’re Here to Help!

  Presented by Theresa Masse • Cybersecurity Advisor, US Department of Homeland Security

Seminar Schedule

VIEW FLOORPLAN
  • Theater One
  • Theater Two
  • Theater Three
  • Theater Four
  • Sessions
  • Keynote
9:00 - 9:50 AM

In The Trenches: Experiences and Lessons Learned from Ransomware Attacks

  Presented by Dasher Technologies

Global costs due to ransomware are predicted to hit $20 billion in 2021, and in 2019, a business fell victim to a ransomware attack every 14 seconds. Join us as we discuss what happens in the hours, days, and weeks following ransomware attacks, as well as ways to help improve the time to recovery, and prevent getting hit in the first place!

Topics: Business Continuity / Disaster Recovery, Information Security
10:00 - 10:50 AM

Cyber Resilience: Data Protection Strategy in the Age of Ransomware

  Presented by Zerto

Ransomware threats increased by 300% last year, and the industry is expecting it to get worse. Ransomware victims’ greatest pains are downtime and data loss. Current DR and Backup solutions aren’t equipped to help you manage it at the speed of business. Join us for this discussion on how to transform your data protection approach to ensure you can protect your data and resume operations almost instantly when facing a ransomware attack. See you there!

Topics: Business Continuity / Disaster Recovery
11:00 - 11:50 AM

Find Your Balance in the Cloud

  Presented by Quest Software

Feel like you're performing a high-wire balancing act in your role as IT Manager or Infrastructure Admin? Performance monitoring and capacity planning can be a real challenge regardless of your infrastructure design. You've got to decide what compute and storage resources are needed and predict when they'll be needed. You've also got to balance the competing priorities of staying within budget and providing acceptable service levels to users. But these days you're no longer simply managing an on-premises data center, you've also got to figure out which workloads to move to the cloud, how best to get them there and how to manage them in the cloud for the long term.

With all this increased complexity, comes the need for more robust performance monitoring tools to help you manage your hybrid environment and give you the means to resolve issues quickly. Finding the right solution can even help simplify the planning and execution of your cloud migration. Come join Quest to learn more.

Topics: Data Storage, Infrastructure
1:00 - 1:50 PM

Data Protection and Management

  Presented by StorageCraft

Managing storage continues to be complex, and often expensive. Something needs to change, and it certainly won't be a dramatic increase in staffing. Fortunately, object storage is the answer. By eliminating the use of legacy RAID, object storage, can be the foundation for a scale-out converged storage solution that solves both data protection and data storage challenges. Want to recover a multi-TB VM in less than a second? No problem. Want to protect files from ransomware? No problem. Need an enterprise file serving, archiving, or virtual server storage solution? No Problem. Attend this session to learn how object storage is changing the landscape for IT admin and the technology of the future.

Topics: Data Storage
2:00 - 2:50 PM

Simplifying Container Orchestration

  Presented by IVOXY Consulting & NetApp

Public clouds set a high bar for IT expectations of agility, scale, and services. Regardless of location and infrastructure, teams’ consumption experience with public cloud providers is driving their decisions and spending on IT today. Along with the ability to consume services across a choice of public and private clouds, teams must consolidate enterprise workloads without performance impact, deploying from a private cloud platform with service catalogs. Public clouds automate management and lifecycle, and they simplify how users consume IT.

Attend this presentation to learn how to simplify container orchestration and automation across the hybrid multi-cloud.

Topics: Data Storage, Infrastructure
Theresa MasseTheresa MasseCybersecurity Advisor, US Department of Homeland Security
3:00 - 3:50 PM

I’m From the Feds: We’re Here to Help!

  Presented by Theresa Masse • Cybersecurity Advisor, US Department of Homeland Security

You know at some point you will experience a cyber incident, if you haven't already! The extent of the impact may not always be immediately obvious, however being adequately prepared makes the difference between chaos and responding effectively. This presentation provides an overview of federal cyber security services to assist private and public sector entities in improving their cyber monitoring, controls, incident response, awareness, and overall security posture. There are a number of assessments that will help organizations better understand their risks and inform decisions on prioritizing resources and funding. Whether large or small, all organizations are potential targets, and all employees have an important role in information security. Bad actors, whether criminals or nation states, are using more sophisticated techniques and tactics to infiltrate systems. Organizations must be prepared to react quickly and effectively, no entity is an island or immune from a cyber-attack. The federal government is committed to helping through sharing intel in a timely manner and offering relevant programs that can make a significant difference. Cyber resources and assistance can be expensive, however, there are a variety of federal cyber services available and all are free of charge. Take advantage of them!

Ms. Masse is a Cyber Security Advisor in Region X (Alaska, Idaho, Oregon, Washington) for the US Dept. of Homeland Security. Prior to that, she served as the Chief Information Security Officer (CISO) for the Port of Portland for 5+ years. Theresa was the first CISO for the State of Oregon and served in that capacity for 10 years. Previous to that, she worked in the private sector as the Senior Director for Information & Corporate Security at Cummins Inc., an international Fortune 500 company.

Ms. Masse has a Top-Secret security clearance. She is a former member of the executive committee for the State, Local, Tribal and Territorial Government Coordinating Council and was chair of the Cyber Security subcommittee. Theresa also served on the Cyber Security Advisory Board at Mount Hood Community College. She is a past member of the executive committee of the Multi-State-Information Sharing and Analysis Center (MS-ISAC) and currently serves as a co-chair of the mentoring program. Theresa has a Masters degree with a major in Management.

Topics: Information Security
  • Sessions
9:00 - 9:50 AM

The CCPA is Here: What’s Changed and What You Need to Know

  Presented by OneTrust

While the California Consumer Privacy Act (CCPA) is now law, many key amendments and details about the law only passed just before the law’s effective date – meaning privacy and security pros are still working to build CCPA-compliant programs. In this session, we’ll share all the latest news on the CCPA law, including which amendments passed and how that impacts your privacy program. We’ll share a 5-step plan for CCPA compliance and what to expect in the future for the CCPA.

Topics: Information Security
10:00 - 10:50 AM

SD-WAN Edge Transformation for the Cloud-First Enterprise

  Presented by Silver Peak

As cloud adoption and SD-WAN innovation hastens, global enterprises are transforming how they build and secure wide area networks. Leveraging automation, enterprises can deploy, connect and secure hundreds of sites per week, a feat not possible with a traditional device-centric approach.

During this session, we'll discuss how the unification of SD-WAN, WAN optimization, routing and security in a single, centrally orchestrated platform:

  • Delivers superior application performance wherever apps are hosted
  • Increases the quality of experience for end users and for IT
  • Simplifies branch WAN edge architecture
Topics: Data Storage, Infrastructure
11:00 - 11:50 AM

Data Protection for the Cloud Era

  Presented by Druva

While more companies are now leveraging the cloud to increase their level of data protection and management, there are still many wondering “why?” The answer: the cloud actually brings substantial advancements to the data protection and management table that simply aren’t possible without it. The easiest advantage to envision? Unlimited scalability. If a data protection tool is properly designed, the capacity should automatically expand to meet any customer’s needs. The second advantage: the cloud is the simplest way to centralize the storage of all secondary data sources while also providing unlimited compute that can be used to gain additional insight and business value from that data. Finally, the ability to do automated Disaster Recovery (DR) without maintaining a DR facility is unquestionably a major value of the cloud, and simply isn’t possible otherwise.

Topics: Business Continuity / Disaster Recovery, Data Storage, Infrastructure
12:10 - 12:50 PM

Innovation and Evolution: BC/DR for Today’s Multi-Cloud Environments

  Presented by Unitrends

We are living in a “Less is More” world. In a landscape that’s rapidly changing, IT professionals are managing more work, projects, and risk than ever before. While external threats such as malware and natural disasters cause significant downtime and data loss without proper BC/DR implementation, organizations must also be prepared to safeguard from within. Data continues to grow at an exponential rate, and not only on-premises. As cloud-delivered solutions such as IaaS and SaaS are rapidly adopted by an increasing number of organizations, and the workforce itself is becoming increasingly dispersed and mobile, organizations must consider data protection strategies to address gaps in BC/DR outside the traditional data center. Join Adam Marget, Technical Specialist from Unitrends, as we explore the evolving landscape of data protection, cloud’s growing role, BC/DR strategies to safeguard local, remote, and cloud-based workloads, and best practices in planning your DR approach.

Topics: Business Continuity / Disaster Recovery, Data Storage
1:00 - 1:50 PM

Asset Management in the World of IOT

  Presented by Quest Software

IOT is upon us all, like it or not. Gone are the days of just managing Windows Desktops and their respective software. Today we are responsible for managing the life-cycle of many types of devices. Anything from a Raspberry pi, to iPad, and anything in between must be managed and tracked during its life. With the exponential growth of network connected devices we are also seeing growth in the regulations surrounding those devices. Regulations means compliance audits which increases our need to manage and track out IT assets.

Topics: Infrastructure
2:00 - 2:50 PM

The Human Element in Threat Detection: Endpoint Threats in 2020 and Beyond

  Presented by Malwarebytes

From ransomware to Mac threats, attacks are up this year. Join Malwarebytes Lab and your peers for an enlightening hour of discussion and interaction.

Pulling from our analysis of millions of attacks on endpoints each year, we’ll recap 2019 threats and outline emerging trends in 2020. Together we’ll cover:

  • Huge shifts from consumer attacks to organizations
  • Growth in mobile threats
  • Top attacks for PC, Mac, and Android
  • Global threats and detections
  • Top industries impacted
  • Rise in ransomware
  • 2020 cybersecurity prediction
  • Blending automation with human elements to keep endpoints operational
Topics: Information Security
  • Sessions
9:00 - 9:50 AM

Building a Foundation for Defense in Depth: 10 Security Proficiencies

  Presented by Atmosera

Expectations for information security and data protection are increasing, and so is the complexity. The stakes are higher than ever before due to compliance requirements and potential consequences on a company’s reputation. This presentation is designed to demystify the process of developing a strong security framework by getting started with a Defense in Depth approach based on 10 basic proficiencies.

Join this session and gain key strategies to:

  • Evaluate your current information security profile
  • Implement a comprehensive Defense in Depth security framework with technology and people
  • Develop a roadmap to strengthen your organization’s security and compliance

Presenters:
Sean Ventura • CISO, Atmosera
Byron Anderson • InfoSec Engineer, Atmosera

Topics: Information Security
10:00 - 10:50 AM

An Appeal for Cybersecurity Consolidation

  Presented by Fortinet

Come participate in a discussion about the Cybersecurity counterculture of platform consolidation. Learn of the potential benefits like reduction of complexity, and greater visibility and control.

Topics: Culture, Information Security
11:00 - 11:50 AM

Identity Crisis: The Past, Present, and Future of Authentication

  Presented by Structured

This presentation reviews historical methods of verifying identity and integrity, as well as the current challenges we face around authentication and authorization. We will also examine lessons learned to see what the future might hold when it comes to Identity and Access Management (IAM).

Topics: Information Security
12:10 - 12:50 PM

How’s Your Cyber Hygiene?

  Presented by INTERFACE Advisory Council

Every company has become more dependent upon IT departments to run business operations. When it comes to a company’s Cyber profile, has enough thought been put into protecting the company? What is the process for managing social media accounts? Who has access and passwords? Do you have continuity of messaging and processes?

The hygiene of your Cyber profile has effects on many operations of business. Join us for an interactive conversation about the role IT needs to play in protecting intellectual property and more.

Topics: Information Security
1:00 - 1:50 PM

Testing Your Disaster Recovery/Business Continuity Plan – Are You Ready?

  Presented by INTERFACE Advisory Council

A panel of local senior IT Professionals will take questions from the audience to discuss their experiences with testing disaster recovery and business continuity plans. A wide range of topics will be discussed including specific lessons learned, specific tools used, and what methods need to be altered. Bring your questions so that you will be ready to take the plunge and test your plan!

Topics: Business Continuity / Disaster Recovery
2:00 - 2:50 PM

Transforming IT Ops and Network Experiences with AI

  Presented by Juniper Networks

Today’s networks and IT teams are challenged by the soaring numbers of mobile and IoT devices and apps. Learn how data science, AI, and a modern microservices cloud architecture can deliver the agility, scale, and reliability that businesses need to succeed. We are transforming user and IT experiences with an AI-Driven Enterprise through proactive automation and relevant insights while ultimately evolving towards a self-driving network.

In this session, you’ll learn why three of the Fortune 10 companies, along with thousands of other organizations, are AI-driven wired and wireless networking customers, to deliver new services, assure network performance, and streamline help-desk operations.

Topics: Infrastructure
  • Sessions
9:00 - 9:50 AM

Tech Demo: MiCloud Connect, Your Complete Business Communications Solution in the Cloud

  Presented by Mitel & Structured

Are you ready to move communication and collaboration to the cloud with confidence? If so, attend this session to learn how. MiCloud Connect is a full-featured communications and collaboration solution that is easy to deploy and manage. Blend traditional phone system features such as call transferring, extension dialing and more with instant messaging, conferencing, video and screen sharing. This allows you and your team to save time, reduce travel and efficiently collaborate with others. Plus, with the ability to make changes in real time, you can change your call routing or presence on the fly.

Topics: Data Storage, Infrastructure
10:00 - 10:50 AM

Deliver Amazing Branch Experiences

  Presented by Aruba

A software-defined wide area network delivers secure connectivity with enterprise-level performance over disparate WAN links and technologies. SD-Branch extends beyond SD-WAN to support all elements of the branch – WAN, WLAN, wired networks and security to address all your IT network connectivity needs. Attend this session to learn how to achieve simplicity at scale and deliver amazing branch experiences all the way to your workers, customers, patients, guests, students, and more.

Topics: Infrastructure
11:00 - 11:50 AM

Leave Legacy Behind and Drive Better Business Outcomes

  Presented by Nutanix

Flexibility and choice have become the cornerstone of long-term decision making for IT leaders, yet the leading legacy hardware manufacturers of the past 20 years have struggled to match that demand. Companies are all too often pushed to lean on one manufacturer's server, storage, and virtualization products, or commit completely to the public cloud to achieve necessary business agility.

Unshackled by legacy lines of business that have stifled innovation in the datacenter, Nutanix was free to take a different approach. Please join us to learn exactly how they did it, and how their private cloud platform, built from the industry-leading HCI solution, has helped organizations of all sizes deliver positive business outcomes inside data centers - internal or external.

Topics: Infrastructure
1:00 - 1:50 PM

Just Another Day on The Internet: Today’s Threat Landscape

  Presented by Palo Alto Networks

Sometimes, the best offense is a really great defense. This can be especially true in the world of cyber threat hunting and prevention. With all that lurks on the dark side of the internet, it is comforting to know you can improve your defensive posture with actionable intelligence. Join this session to receive a detailed picture of today’s actual threat landscape -- brought to you by a seasoned professional with one of the world’s preeminent global threat intelligence teams, Palo Alto Networks' Unit 42.

Topics: Information Security
2:00 - 2:50 PM

One Company’s Journey to a Modern Data Center

  Presented by Structured

Are you dissatisfied with your current data center strategy and know you need to make a change? If so, you are not alone. Gartner predicts that by 2025, 80% of enterprise on-premises data centers will be shuttered. Get ready for a mountain of migration activity and attend this session. In addition to covering some best practices and important considerations, we will present a case study of one company’s journey to a modern data center environment.

Topics: Data Center Technology

Advisory Council

HOW TO BE AN ADVISOR

Advisor-approved content is the foundation upon which INTERFACE was developed. Each conference is guided by an Advisory Council of IT executives and senior managers. Advisor members represent both private and public sector organizations. The council contributes its insight into proposed educational topics and recommends local exhibitors and associations for participation.

EXPAND TO VIEW LIST

Chris Apgar
CEO/President
Apgar & Associates, LLC

Richard Appleyard, PHD
Deputy CIO
Oregon Secretary of State

Ed Arib
Manager, Information Technology
City of Portland, Public Safety Division

Brian Barnett
Director, Information Technology
Hyphn

Caesar Bernardo
Sr Technical Program Manager
IGNW

Erik Blanchard
Manager, Information Technology
Asset Protection Partnership, Ltd.

Michael Bray
Chief Information Security Officer
The Vancouver Clinic

Jeff Brewer
Business Information Risk Manager
Conduent Inc.

Brad Buckmaster
Manager, Information Technology
Plaid Pantries, Inc.

Bree DeWolf
IT Governance Manager
Papa Murphy’s International

Theresa Fichtner
Vice President of IT
NW Preferred Federal Credit Union

Stephen Fitton
Technical Solutions Manager
Salem Health

Greg Funk
IT Manager
Alta Planning + Design

Juan Gamboa
Manager, Information Technology
Kokusai Semiconductor Equipment Corp

Robert Gibson
IT Manager
Alta Planning + Design

John Hampton
Director of IT
Erickson Information Services

Ed Hawkins
Manager, Infrastructure and Voice Services
Portland Community College

Bob Hestand
Chief Information Officer
Neil Kelly Company

Tim Hoffman
Manager, Information Technology
Cardinal Services

Joe Holstein
Manager, Infrastructure
Multnomah Athletic Club

Bill Hopkins
Manager, Information Technology
City of Keizer

Don Hornschuch
Senior IT Manager
Qorvo

Jeff Hower
Director, IT Infrastructure & Operations
Oregon Institute of Technology

Syed Hussain
Chief Information Officer
Oregon Lottery

Kevin Kays
Manager, Information Technology
Pamplin Communications

Muneer Koborsi
Senior Manager, IT & Risk Management
EPSON Portland Inc.

Travis Luckey
Chief Information Officer
Oregon DEQ

Amy McLaughlin
Director of IT, Student Health Services
Oregon State University

Ty Melero
Sr Manager, IT Operations
The Vancouver Clinic

Larry Miller
Chief Information Officer
Exterior Wood, Inc

Todd Milliren
IT Director
Lektro, Inc

Vincent Mohr
Director of Information Technology
De La Salle North Catholic High School

Ken Moody
Vice President & Manager, IT
Norris Beggs & Simpson

Jake Niesen
Director of Engineering – Supply
Nike

Smart Ocholi
Chief, Technical Resources Branch
Engineering Division US Army Corps of Engineers

Christopher Paidhrin
Chief Information Security Officer
City of Portland

Shane Perry
Information Security and Risk Officer
OR Public Employees Retirement System

Jason Pompel
Sr. Project Manager
The Standard

Josh Renoe
Director, Information Technology
The Management Group

Mark Roller
Senior Manager, IT
NW Energy Efficiency Alliance (NEEA)

Jerzy Rub
Director, Cyber External Risk
Intel Corporation

Linda Rudawitz
Director, Information Technology
Warner Pacific University

Greg Sanker
Chief Information Officer
Oregon Department of Administrative Services

Mark Thomasson
Manager, Security
DAT Solutions

Sean Ventura
Chief Information Security Officer
Atmosera

Marie VerMeer
Director, Global IS Operations
Columbia Sportswear Company

Gary Vermeulen
Manager, Information Technology
WR Grace

Saby Waraich
Senior Manager, Information Technology
City of Portland

Ron White
Sr. Infrastructure Systems Admin
C-Tran

Scott White
Director, Information Technology
Bridgewell Resources LLC

Sponsors

HOW TO BE A SPONSOR

Participating exhibitors at INTERFACE achieve a greater return on their investment from this series of IT events than any other face-to-face medium available today. This success is achieved through a time-efficient and cost-effective presence for a pre-qualified audience. This simple formula leads to higher levels of business development opportunity at each event.

GOLD SPONSORS

Atmosera

Atmosera

Atmosera
Atmosera is a leading provider of business-class cloud solutions, providing Azure-managed cloud services for public, hybrid, and private clouds.
Visit Website
Quest Software

Quest Software

Quest Software
At Quest, we solve complex problems with simple solutions. Our philosophy is focused on great products, great service and being simple to do business with. We deliver technology that eliminates the need to choose between efficiency and effectiveness.
Visit Website
Structured

Structured

Structured
Structured is an award-winning solution provider delivering secure, cloud-connected digital infrastructure. For 30 years, we’ve helped clients through all phases of digital transformation by securely bridging people, business and technology.
Visit Website

SILVER SPONSORS

Dasher Technologies

Dasher Technologies

Dasher Technologies
Dasher Technologies is a leading national IT solution provider, headquartered in the Silicon Valley that designs, delivers, and manages innovative solutions that digitally transform businesses.
Visit Website
Druva

Druva

Druva
Druva™️ delivers data protection & management for the cloud era. Druva Cloud Platform is built on AWS & offered as-a-Service & drives down costs by up to 50 percent, delivering globally accessible, scalable & autonomous enterprise data resiliency.
Visit Website
Fortinet

Fortinet

Fortinet
Fortinet empowers its customers with intelligent, seamless protection across the expanding attack surface & the power to take on the ever-increasing performance requirements of the borderless network – today and into the future.
Visit Website
HPE Juniper Networking

HPE Juniper Networking

HPE Juniper Networking
Juniper Networks is now part of HPE. Together, we're building industry-leading, secure, AI-native networks – purpose-built with and for AI. As AI and networking converge, we're driving a bold transformation across enterprises, service providers, and cloud operators.
Visit Website
HPE Zerto Software

HPE Zerto Software

HPE Zerto Software
HPE Zerto Software helps you unlock ransomware resilience, disaster recovery, and continuous data protection to radically reduce data loss and downtime.
Visit Website
IVOXY Consulting

IVOXY Consulting

IVOXY Consulting
Since 2006 IVOXY has been delivering right-sized IT solutions & services throughout the Greater Pacific Northwest. We partner with customers throughout all phases of deploying innovative data availability technologies spanning virtualization, networking, storage, automation, security, data protection, cloud, and beyond.
Visit Website
Malwarebytes

Malwarebytes

Malwarebytes
Malwarebytes protects workplace productivity. We secure all your endpoints so employees can connect confidently, from anywhere. We combine analytics-driven, multi-layer threat protection and industry-leading incident response to both simplify and strengthen overall cybersecurity. You and your team stay up and running, so you can remain focused on driving your business.
Visit Website
NetApp

NetApp

NetApp
NetApp – Our team is data driven. You have a vision for digital transformation. We help you make it all possible.
Visit Website
OneTrust

OneTrust

OneTrust
OneTrust is the #1 most widely used privacy, security and trust technology platform used by more than 5,000 companies to comply with the CCPA, GDPR, ISO27001 and hundreds of the world’s privacy and security laws.
Visit Website
Silver Peak

Silver Peak

Silver Peak
Silver Peak, recently acquired by HPE Aruba, delivers networking software that powers a self-driving wide area network (SD_WAN) that learns and adapts to requirements of the business to ensure the highest levels of end user and application performance.
Visit Website
StorageCraft

StorageCraft

StorageCraft
Arcserve is a global top 5 data protection vendor with best-in-class solutions that manage, protect, and recover all data workloads, from SMB to enterprise and regardless of location or complexity. A 100% channel-centric organization, Arcserve has a presence in over 150 countries, with 19,000 channel partners and 235,000 customers.
Visit Website
Unitrends

Unitrends

Unitrends
Unitrends is trusted by IT leaders worldwide who know that in today's digital world protecting their ideas and keeping their business running is non-negotiable. The company’s Connected Continuity Platform protects virtual, physical, + cloud based systems.
Visit Website

BRONZE SPONSORS

Bitglass

Bitglass

Bitglass
Bitglass’ Total Cloud Security Platform is the only secure access service edge offering that combines a Gartner-MQ-Leading cloud access security broker, the world’s only on-device secure web gateway, and zero trust network access to secure any interaction.
Visit Website
BlackBerry

BlackBerry

BlackBerry
BlackBerry Cybersecurity is a leader in endpoint security, endpoint management, encryption, and embedded systems, protecting enterprises and governments around the world. Our end-to-end approach is deeply rooted in Cylance® AI and machine learning, providing continuous preventative protection, detection, and instant response. We extend protection for your organization against current and future cyberthreats by combining network and endpoint telemetry and by delivering innovative solutions in the areas of cybersecurity, safety, and data privacy.
Visit Website
Darktrace

Darktrace

Darktrace
Darktrace is a leading cybersecurity AI company and the creator of Autonomous Response technology. It provides a comprehensive cyber defense to over 5,500 organizations, protecting the cloud, email, IoT, traditional networks, endpoints, and industrial systems.
Visit Website
Gigamon

Gigamon

Gigamon
Gigamon offers a deep observability pipeline that harnesses actionable network-level intelligence to amplify the power of observability tools. This powerful combination enables IT organizations to assure security and compliance governance, speed root-cause analysis of performance bottlenecks, and lower operational overhead associated with managing hybrid and multi-cloud IT infrastructures.
Visit Website
HPE

HPE

HPE
At Hewlett Packard Enterprise, we aim to be the industry’s leading provider of hybrid IT, built on the secure, next-generation, software-defined infrastructure that will run customers’ data centers today, bridge them to multi-cloud environments tomorrow, and power the emerging intelligent edge that will run campus, branch and Industrial IoT applications for decades to come. All delivered through a world class services capability.
Visit Website
SHI

SHI

SHI
From designing cloud, data center and end user computing strategies that support your hybrid working model to delivering the hardware and software you need to run it, SHI is your complete IT partner.
Visit Website
Sungard Availability Services

Sungard Availability Services

Sungard Availability Services
Sungard Availability Services is a leading provider of critical production & recovery services.With more than 40 years of experience Sungard designs, builds & runs critical IT services that manage complex IT, adapt quickly, build resiliency & availability.
Visit Website
Tools4ever

Tools4ever

Tools4ever
Tools4ever delivers affordable Identity Governance and Administration (IGA) solutions – User Provisioning, Password Management, Single Sign-On (SSO), Self‐Service, Workflow Management – connecting 10 million users to resources.
Visit Website
Veeam

Veeam

Veeam
Veeam is the global leader in Intelligent Data Management for the Hyper-Available Enterprise. Veeam Hyper-Availability Platform is the most complete solution to help customers on the journey to automating data management.
Visit Website

EXHIBITORS & ASSOCIATIONS

7x24 Exchange Oregon & SW Washington

7x24 Exchange Oregon & SW Washington

7x24 Exchange Oregon & SW Washington
The 7x24 Exchange Oregon & SW Washington Chapter provides an open forum for in-region members and member companies to share ideas, challenges, and best practice resolutions to promote growth and success in the Mission Critical and Data Center industries.
Visit Website
8x8, Inc.

8x8, Inc.

8x8, Inc.
8×8 is transforming the future of business communications as a leading Experience Communications as a Service (XCaaS) provider. 8×8 XCaaS brings together customer and employee experience to deliver business agility. It’s the only integrated platform for contact center, voice, video, chat, and APIs that addresses today’s dynamic, critical workplace requirements. Unlike competitors, the 8×8 Experience Communications Platform enables company-wide collaboration, unified administration, shared integrations, and cross-platform AI and analytics through the industry’s only 99.999% financially back, platform-wide service level agreement (SLA). Unlike multi-vendor environments, 8×8 XCaaS provides platform-wide reliability, lowers cost, boosts employee productivity and customer engagement, and delivers intelligence through AI-powered experiences and insights.
Visit Website
A10 Networks

A10 Networks

A10 Networks
A10 Networks delivers high-performance and scalable solutions for Web Application Delivery. A10's flagship AX Series are new generation server load balancers, confirmed to deliver twice the performance at half the price of incumbent solutions.
Visit Website
Allstream

Allstream

Allstream
Allstream is a business communications provider in Canada and the United States. Allstream’s customers benefit from access to an expansive network of experts and a team focused on reliability & customer experience. Our services include voice, collaboration, and connectivity solutions.
Visit Website
Arctic Wolf

Arctic Wolf

Arctic Wolf
Arctic Wolf® is the market leader in security operations, and provides security operations as a concierge service. Our security experts work as an extension of your team to monitor and detect threats, and continually strengthen your security posture.
Visit Website
Check Point Software

Check Point Software

Check Point Software
Check Point is a leading provider of cyber security solutions to governments and corporate enterprises globally. Its solutions protect customers from 5th generation cyber-attacks with an industry leading catch rate of malware, ransomware and other types of attacks.
Visit Website
ChickTech Portland

ChickTech Portland

ChickTech Portland
ChickTech Portland is a chapter of a national non-profit organization dedicated to increasing the number of women and girls pursuing technology-based careers and retaining women in the technology workforce.
Visit Website
Citrix

Citrix

Citrix
Citrix Systems is the global leader and the most trusted name in application delivery infrastructure. More than 200,000 organizations worldwide rely on Citrix to deliver applications with the best performance, highest security and lowest cost.
Visit Website
Commvault

Commvault

Commvault
Commvault is a worldwide leader in delivering data readiness. Commvault's backup and recovery software enables you to protect, manage, and use your data, while managing it in a consistent, compliant way.
Visit Website
CompuNet

CompuNet

CompuNet
CompuNet is a leading U.S. information technology partner, headquartered in Boise, Idaho. The firm specializes in consultation, design and implementation services specifically tailored to solve business problems. With a best-in-class engineering staff and approach, CompuNet focuses on building lasting relationships that prioritize client satisfaction over sales through every step of the journey.
Visit Website
Expel

Expel

Expel
Expel provides transparent managed security, on-prem and in the cloud. It’s the antidote for companies trapped in failed relationships with their managed security service provider (MSSP) and those looking to avoid the frustration of working with one in the first place. To learn more, go to https://www.expel.io.
Visit Website
ExtraHop

ExtraHop

ExtraHop
ExtraHop delivers enterprise cyber analytics that allow you to quickly investigate threats, ensure the delivery of critical applications, and secure your investment in the cloud.
Visit Website
Forcepoint

Forcepoint

Forcepoint
Forcepoint is a strategic cybersecurity partner, entrusted to safeguard organizations while driving digital transformation and growth. Forcepoint is attuned to how people interact with data, providing secure access while enabling employees to create value.
Visit Website
Garland Technology

Garland Technology

Garland Technology
Garland Technology has developed the industry's most reliable test access points and network packet brokers, enabling data centers to address IT challenges and gain complete network visibility. Visit garlandtechnology.com for more information.
Visit Website
Gradient Cyber

Gradient Cyber

Gradient Cyber
Gradient Cyber is a cybersecurity products and services company that uniquely visualizes an organization’s cybersecurity health and provides an actionable roadmap to improve its security posture.
Visit Website
IGEL Technology

IGEL Technology

IGEL Technology
IGEL provides next-gen edge OS endpoint security, optimization, and control solutions for cloud workspaces and virtual desktops.
Visit Website
InfraGard Oregon

InfraGard Oregon

InfraGard Oregon
InfraGard is an essential part of the FBI's outreach efforts. Infragard allows two-way information sharing about intrusion incidents and system vulnerabilities,provides a channel for the DHS to disseminate analytical threat products to the private sector.
Visit Website
ISSA Portland

ISSA Portland

ISSA Portland
The Information Systems Security Association is a not-for-profit organization of information security professionals. It provides educational forums and peer interaction opportunities that enhance the knowledge and professional growth of its members.
Visit Website
Link SourceIT

Link SourceIT

Link SourceIT
Link Source IT is a complete IT services provider. We provide clients with the highest degree of support for their IT projects by offering solutions tailored to fit the unique needs of their organization.
Visit Website
Matrix Networks

Matrix Networks

Matrix Networks
Helping businesses both big and small accomplish their IT and communication goals by delivering innovative technologies supported by integrity, reliability, and genuine customer care.
Visit Website
Nordisk Systems

Nordisk Systems

Nordisk Systems
Nordisk Systems, A Converge Company is a leading technology solutions provider with over three decades of experience in the IT industry. Founded in 1983, Nordisk Systems has been committed to relieving our customer’s technology burdens. We pride ourselves on employing the most highly qualified and certified IT architects and engineers who are up to date with the latest technology from our large database of partners.
Visit Website
Nulia

Nulia

Nulia
Nulia is a pioneer in Digital Enablement, getting users using their digital productivity suites. Nulia Works guides users to attain & maintain digital skills to realize their potential and unlock the value of Office 365.
Visit Website
NW Print Strategies

NW Print Strategies

NW Print Strategies
NW Print Strategies provides FREE on-site printer/mfp repair to those that use Original New (oem) HP toner supplies. Come see us today and take advantage of this great new program sponsored by HP.
Visit Website
Opus Interactive

Opus Interactive

Opus Interactive
Founded in 1996, Opus Interactive provides custom Cloud and Colocation solutions that fit unique requirements for security, scalability, cost, and future growth needs of its customers.
Visit Website
Proofpoint

Proofpoint

Proofpoint
Proofpoint, Inc. is a leading cybersecurity and compliance company that protects organizations’ greatest assets and biggest risks: their people. With an integrated suite of cloud-based solutions, Proofpoint helps companies around the world stop targeted threats, safeguard their data, and make their users more resilient against cyber attacks. Leading organizations of all sizes, including more than half of the Fortune 1000, rely on Proofpoint for people-centric security and compliance solutions that mitigate their most critical risks across email, the cloud, social media, and the web.
Visit Website
QuickStart

QuickStart

QuickStart
QuickStart is an online IT skills training provider dedicated to creating world class technologists. We help IT directors improve project performance by upskilling their technology teams. We ensure multimodal knowledge transfer through our cognitive learning platform.
Visit Website
RakworX

RakworX

RakworX
RakworX manufactures high-quality data center infrastructure products which provide security, power distribution, and airflow management wherever data is created, processed, transmitted and stored.
Visit Website
RedSeal

RedSeal

RedSeal
RedSeal’s cyber risk modeling solution unifies public cloud, private cloud and physical network environments into one, interactive model. RedSeal is at the forefront of building Digital Resilience into organizations with robust cyber risk modeling.
Visit Website
Right! Systems

Right! Systems

Right! Systems
Right! Systems, Inc. is an IT management services company that provides business-driven, multi-vendor IT solutions in Network Infrastructure, Virtualization, Storage, Unified Communications, Telepresence, Security, Mobility and Professional Services.
Visit Website
Rubrik

Rubrik

Rubrik
Rubrik delivers instant application availability for recovery, search, cloud, and development. Hybrid Cloud enterprises benefit from Rubrik’s market-leading Cloud Data Management platform with simplicity, instant data access, app-mobility, policy-driven automation, Ransomware protection, and analytics at scale.
Visit Website
SentinelOne

SentinelOne

SentinelOne
SentinelOne is the future of Endpoint Protection. It unifies prevention, detection and response in a single platform driven by sophisticated machine learning and intelligent automation. It can adapt your defenses against the most advanced cyber-attacks.
Visit Website
SIM Portland

SIM Portland

SIM Portland
For over 10 years the Portland Chapter of the Society for Information Management (SIM) has been the meeting place for IT executives, IT consultants, academicians, and sr business executives who play key roles in the use of IT in their organizations.
Visit Website
Sophos

Sophos

Sophos
Sophos Security's synchronized security approach enables organizations to secure their organization with a suite of products and services designed to tackle the zero-day threats of today and the future.
Visit Website
Technology Association of Oregon

Technology Association of Oregon

Technology Association of Oregon
The Technology Association of Oregon is the largest professional technology association in Oregon and SW Washington. TAO drives economic development by promoting, connecting, and advocating for companies involved in the software and technology industries.
Visit Website
Veritas

Veritas

Veritas
Optimize the protection, performance, and cyber resiliency of all your enterprise data and applications across any cloud, any environment, at any scale.
Visit Website
Wilson Electronics

Wilson Electronics

Wilson Electronics
Wilson Electronics manufactures cellular boosters to resolve poor coverage at home, at work or in your vehicle. FCC & Carrier approved solution for all US cell phone carriers. Expanding cost effective wireless network coverage to everyone, everywhere.
Visit Website
WorkSafe Technologies

WorkSafe Technologies

WorkSafe Technologies
WorkSafe Technologies is a leading authority in seismic protection. WorkSafe Technologies' ISO-Base seismic isolation technology is the most effective way to protect mission-critical and expensive electronic equipment in the event of an earthquake.
Visit Website
Xiologix

Xiologix

Xiologix
Xiologix is a technology solution provider of business driven multi-vendor IT solutions to customers throughout the US and Canada. They offer a wide variety of hardware and software products from the world's leading IT companies.
Visit Website
ZPE Systems

ZPE Systems

ZPE Systems
ZPE Systems helps rethink the way networks are built and managed by providing software-defined, vendor-neutral infrastructure management and networking solutions for data center and branch networks.
Visit Website

Interested in becoming part of our next Portland event?

CONTACT US FOR INFO

Portland

Oregon Convention Center
Portland Ballroom
777 NE Martin Luther King, Jr. Blvd.
Portland, OR 97232

Directions & Parking

About Us

We produce quality, cutting-edge educational seminars, drawn from case studies and best practice examples from leaders in the field.

800-365-6402
Contact Us

Popular Searches

  • Event Registration
  • Become an Exhibitor
  • Become an Advisor
  • Sponsor an Event
  • Contact Event Coordinator
  • Submit Feedback

Seminar Topics

  • Artificial Intelligence
  • BC / DR
  • Culture
  • Data Center Technology
  • Data Management
  • Data Storage
  • Digital Experience
  • Information Security
  • Infrastructure
  • Strategic Management
  • Unified Communications

2026 Events

  • Portland • March 19th
  • Anchorage • April 22nd
  • Honolulu • May 21st
  • Phoenix • June 18th
  • Wyoming • July 9th
  • Montana • July 29th
  • Boise • August 20th
  • Salt Lake City • September 22nd
  • Spokane • October 15th
  • Omaha • November 5th
  • Seattle • December 3rd
  • Home
  • About
  • Get Involved
  • Events
  • Register
  • © 2026 F2F Events, Inc.