F2F Events, Inc.
  • Home
  • About
    • About
    • CPE Credits
    • Session Topics
    • Privacy Policy
      • Scam Warning
    • Code of Conduct
    • Media Kit
  • Get Involved
    • Advisory Council
    • Association Partners
    • Exhibitors
    • Speakers
  • Events
    • Locations
    • Upcoming Events
  • Contact
  • Register

Cutting-edge conferences for over 20 years

Educational Events with Your Local IT Community

View Upcoming Events Register

INTERFACE Virtual Hawaii 2020 / See You Next Year

IT Infrastructure is constantly changing, bringing more new challenges with it every day. From ransomware and the latest security threats to emerging developments in AI and the need for increased bandwidth and storage, it’s nearly impossible to keep up to date. Our conference is designed to help. We’ve assembled a combination of Best-in-Breed hardware and software solutions, along with local experts and organizations to help educate, advise and connect you to resources that can help you meet your goals.

Covering Information Security, Infrastructure, Cloud, Disaster Recovery, Communications, and more, you’ll find presentations, panel discussions, and exhibitors covering a variety of topics, as well as the latest innovations and best practices.

AT A GLANCE

September 17th, 2020
8:30am – 3:30pm

Virtual Conference
Multi-track seminars with Q&A
1-on-1 chat and networking
Hourly prize drawings

KEYNOTE: Cyber Considerations During a Pandemic: Cyber Leaders’ Perspectives

  Presented by Jodi Ito • Chief Information Security Officer, University of Hawaii

Seminar Schedule

  • Theater One
  • Theater Two
  • Theater Three
  • Sessions
  • Keynote
9:00 - 9:50 AM

Ransomware Protection Doesn’t Have to Break the Bank

  Presented by StorageCraft

Ransomware attacks have increased over 130% since the COVID crisis. Everyone is a target and even those with preventative measures in place are at risk. We will review some of the latest attacks and offer best practices in how to protect your organization without increasing budgets.

Topics: Data Storage
10:00 - 10:50 AM

IT Interrupted: Best Practices in Disaster Recovery Planning

  Presented by Zerto

As IT application availability requirements continue to evolve, technology continues change to meet the new requirements. Join us as we discuss planning considerations for bringing your virtualized workloads into the next generation of IT resilience. You will learn about data center options to consider as part of your recovery strategy, business and technical trade-offs that will have to be made, capacity planning considerations, and testing approaches to that are possible that will optimize application up-time.

Topics: Business Continuity / Disaster Recovery
11:00 - 11:50 AM

Work from Home: Do You Have a Strategy?

  Presented by Nutanix

As we have seen in 2020, many companies are working to enable their employees to have a work from home capability. However, there are many factors that contribute to whether that will be possible or not. Are their apps supported? What devices are supported? How secure will they be? What latency issues will they incur and where is the data locality?

All of these topics and more will be addressed.

Topics: Culture, Infrastructure
12:00 - 12:50 PM

The Digital Transformation of Education

  Presented by INTERFACE Advisory Council

As the Hawaii State Department of Education responds to the changing situation of the “New Normal”, we have accelerated the modernization of our legacy systems. By focusing on automation and software as a service, the Department has been able to meet the rapidly evolving needs of telework and distance learning. By focusing on the work that is good enough, a technology transformation that was already well under way has been able to accelerate and meet the needs of students across the state.

Presenter:
Brook Conner • Assistant Superintendent & CIO, Hawaii Department of Education

Topics: Infrastructure, Strategic Management
1:00 - 1:50 PM

Do You Feel the Need… the Need for Speed? Top Five SQL Server Query Tuning Tips

  Presented by Quest Software

Query tuning is key to peak performance in SQL Server databases. However, lots of developers and DBAs constantly struggle to pinpoint the root cause of performance issues and spend way too much time in trying to fix them. In this presentation, Quest will share their tried and true best practices for tuning SQL statements and other issues by utilizing Wait Time Analysis, reviewing execution plans and using SQL diagramming techniques. In addition, several case studies will be used to demonstrate these best practices.

Regardless of the complexity of your database or your skill level, this systematic approach will lead you down the correct tuning path with no guessing, saving countless hours of tuning queries and optimizing performance of your SQL Server databases.

Topics: Infrastructure
Jodi ItoJodi ItoChief Information Security Officer, University of Hawaii
2:00 - 2:50 PM

Cyber Considerations During a Pandemic: Cyber Leaders’ Perspectives

  Presented by Jodi Ito • Chief Information Security Officer, University of Hawaii

Join us for a panel discussion, led by Jodi Ito, Information Security Officer for the University of Hawaii. This panel will cast a wide net around the multitude of cyber-related considerations and issues that society is facing with our current pandemic situation. From securing telework locations, health screening when re-opening, servicing customers during a shutdown in a secure manner, to providing equitable distance-delivered education - the panelists will engage in a lively roundtable discussion of these topics and more.

Panelists:
Jodi Ito • Chief Information Security Officer, University of Hawaii
Vince Hoang • Chief Information Security Officer, State of Hawaii
Alan Ito • Information Security Officer, Hawaii Pacific Health
Ryan Field • Sr. Vice President, Director of Technology & Architecture, American Savings Bank

Jodi Ito is the Chief Information Security Officer with the University of Hawaii (UH) System in the Office of the Vice President for Information Technology since 2000 and has been with the University since 1982.

Jodi is responsible for the security and protection of information assets across the University of Hawaii System. These responsibilities include developing and managing policies and procedures for the UH information security program, conducting risk & vulnerability analysis for critical assets, overseeing investigations into cyber incidents, & developing and conducting training on information policy & security issues across all 10 UH campuses and affiliated research & education centers. She has also organized several large scale red/blue team cybersecurity exercises on the UH cyber range involving University students, Hawaii National Guard, military, state, and federal government agencies.

Jodi is a Principal Investigator and Program Director for the NSA’s GenCyber Camps in Hawaii to introduce cybersecurity to high school students and teachers. She is also the co-PI on the NSF/NSA Scholarship For Services grants to provide full-ride scholarships for students pursuing cybersecurity degrees and the NSF Computer Science Principles for Hawaii to train high school teachers to be able to teach AP Computer Sciences Principles. She is also a member of the REN-ISAC, MS-ISAC, Educause, and Infragard. Most recently, she is an active founding member of the newly organized CyberHawaii and co-chairs the Education and Workforce Development Committee.

Jodi graduated from the University of Hawaii at Manoa with both a Bachelors of Science degree in Computer Science in 1982 and a Masters of Science degree in Information and Computer Science in 1987.

Topics: Information Security, Infrastructure
  • Sessions
9:00 - 9:50 AM

Gaining Network Visibility with Application Intelligence

  Presented by Gigamon

Come discuss how gaining visibility into your network has become more of a challenge than ever before. With the evolution from the Data Center to Virtual Environments, Public and Private Clouds, our exposure has never been greater.

In this session we will cover Span vs. TAP, Traffic Aggregation, Packet Brokers, Traffic Intelligence, Virtual Environments and how to get that one view of all your data.

Learn how to maximize the ROI on your existing tools while increasing your scope of visibility.

Who knows, you might even have fun?! Heckling Encouraged!

Topics: Information Security
10:00 - 10:50 AM

Responsible Administration: The Admin Insider (Threat)

  Presented by One Identity

System Administrators are critical people to every organization. They design, build, and maintain all the parts and pieces that enable business, whether that’s retail, healthcare, or even a government agency. Ensuring sysadmin tasks are performed as securely as possible without hampering their ability to keep our business running is a delicate balance. These “insiders” not only know how the systems operate but have the credentials and privileges to operate them.

In this session, we will demonstrate an Active Directory breach using pass-the-hash and discuss ways to enable the System Administrators to operate in a way that not only protects the business from threats but also enables them to perform the intricate tasks they accomplish daily to keep business flowing under the covers.

Topics: Information Security, Strategic Management
11:00 - 11:50 AM

Talking to the Board About the New Realities of IT Security

  Presented by ExtraHop Networks

With the sudden shift of the global workforce from in-office to remote, IT teams quickly transformed their operations to accommodate the new realities of business — including large-scale adoption of work-from-home technologies, heightened activity on customer-facing networks, and greater use of online services.

While these examples of agility allowed business to continue, they also greatly increased the risk of misconfigurations and cyberthreats. Now, it's looking like they could be here to say for a while. On top of that, bad actors have wasted no time trying to exploit new vulnerabilities. In the past several weeks, we've seen ransomware attacks affect several major organizations. These attacks come on the tail of a surge of attacks across the board brought on during the pandemic, as hackers scanned and took advantage of new workloads, and vulnerable VPN connections and misconfigurations left the gates to the network open.

When attacks like these make headlines, panicked board members have one question for CISOs: how can we be sure that won’t happen to us? We will share top strategies for CISOs to lead board-level conversations about risk management amidst the stark new realities of IT.

Topics: Culture, Information Security
12:00 - 12:50 PM

It Ain’t Done ‘Til It’s Automated: Security at the Speed of DevOps

  Presented by Check Point

Companies are rapidly migrating applications and workloads to the cloud. For many this is a Software as a Service for a first option, with migration to public cloud second, and only if necessary will workloads be deployed inside of the legacy data center. This is further complicated by the desire to accelerate the development lifecycle allowing devops to drive the IT migration. InfoSec is playing catchup to the business and devops constant acceleration.

In this session, you will learn strategies and best practices for allowing SecOps to keep up with the Speed of DevOps, as well as fundamental security knowledge applicable for any workload migration to any cloud provider.

Topics: Information Security
1:00 - 1:50 PM

Top 5 Use Cases for Endpoint Protection in Operational Technology

  Presented by VPLS

The Air Gap: A Double-edged Sword

Endpoints are frequently the target of initial compromise or attacks. It can take just minutes, if not seconds, to compromise the endpoints, putting industrial environments at risk. One recent study found that 30% of breaches involved malware being installed on endpoints.

Operational Technology (OT) endpoints are particularly vulnerable given the legacy technology powering environments like our manufacturing plants, power stations, and other critical infrastructure. Many organizations rely on an air gap for cybersecurity to protect their industrial environments.

Unfortunately, the air gap is a double-edged sword. While it may help insulate and shrink the attack surface, like all prevention measures, it is not 100%.

Join this presentation to explore how you can:

  • Stop breaches and prevent data loss and ransomware damage with no dwell time.
  • Eliminate alert fatigue and optimize operations with customizable, standardized incident response processes.
  • Ensure business continuity in the event of a security incident, keeping systems online.
  • Reduce the cost of legacy EDR solutions, enabling response and remediation without negatively impacting business.
Topics: Information Security, Strategic Management
  • Sessions
9:00 - 9:50 AM

What is HCI and How Does it Enable a Public Cloud On-Prem?

  Presented by Nutanix

Hyperconverged Infrastructure (HCI) has been taking the IT industry by storm the past 5 years. As businesses are exploring what this means to them, they need to ask themselves should we consider changing our infrastructure? During this session we will cover the following discussions:

  • What is HCI exactly and why consider it?
  • Why are companies moving to the cloud and why are they now moving back?
  • How do I create the Public Cloud experience in my own On-Prem solution?
  • What hypervisors work with HCI solutions?
Topics: Infrastructure, Strategic Management
10:00 - 10:50 AM

Shifting from ITSM to ESM as a Way to Enable and Transform the Enterprise

  Presented by ServiceNow

As a member of IT, have you found yourself doubting your relationship with the rest of the organization as you're perceived as a cost center rather an equal part stakeholder with a common goal? Do you find yourself struggling to collaborate with the rest of the organization as the tech debt in your organization has created seemingly insurmountable silo's? If you feel any of this describes your work environment and how IT may be perceived, please join the discussion in how the concepts of IT Service Management need to shift to a more inclusive Enterprise Service Management strategy. Ultimately, driving more effective technology purchasing, collaboration across the enterprise and re-branding of IT as an organizational enabler.

Topics: Culture
11:00 - 11:50 AM

Ransomware Protection Doesn’t Have to Break the Bank

  Presented by StorageCraft

Ransomware attacks have increased over 130% since the COVID crisis. Everyone is a target and even those with preventative measures in place are at risk. We will review some of the latest attacks and offer best practices in how to protect your organization without increasing budgets.

Topics: Data Storage

Advisory Council

HOW TO BE AN ADVISOR

Advisor-approved content is the foundation upon which INTERFACE was developed. Each conference is guided by an Advisory Council of IT executives and senior managers. Advisor members represent both private and public sector organizations. The council contributes its insight into proposed educational topics and recommends local exhibitors and associations for participation.

EXPAND TO VIEW LIST

David Chang
Director, Technical Support
First Presbyterian Church

Nathan Chang
Manager, IT Client Services
The Queen’s Health Systems

Brook Conner
Assistant Superintendent & CIO
HI Department of Education

Curt Dodds
Manager, Information Technology
U of H, Institute for Astronomy

Cody Down
Chief Information Officer & Associate Vice President
Hawaii Pacific University

Jeff Ferrer
Manager, Information Technology
HI Dept of Human Services

Wendee Hilderbrand
Managing Counsel & Privacy Officer
Hawaiian Electric Company

Alan Ito
Information Security Officer
Hawaii Pacific Health

Dana Mendoza
Director, Information Technology
VIP Food Service

Geoff Milford
Technical Analyst
Hawaii Pacific Health

Tim Minick
Director, Information Technology
HPM Building Supply

Grant Nakamichi
Manager, IT Infrastructure
Aloha Pacific Federal Credit Union

Jim Sleutel
Vice President & Manager, Cybersecurity
Finance Factors

Dave Stevens
Professor, Information Security Program
Kapiolani Community College

Tony Velasco
IT Division Chief
City & County of Honolulu

Dwight Victor
Systems & Network Team Lead
General Dynamics Missile Systems

Greg Wolf
ESS Manager
Matson

Charissa Wong
Manager, Information Technology
Bowers + Kubota Consulting

Sponsors

HOW TO BE A SPONSOR

Participating exhibitors at INTERFACE achieve a greater return on their investment from this series of IT events than any other face-to-face medium available today. This success is achieved through a time-efficient and cost-effective presence for a pre-qualified audience. This simple formula leads to higher levels of business development opportunity at each event.

GOLD SPONSORS

Nutanix

Nutanix

Nutanix
Nutanix makes IT infrastructure invisible with an enterprise cloud platform that delivers the agility and economics of the public cloud, without sacrificing the security and control of on-premises infrastructure.
Visit Website
StorageCraft

StorageCraft

StorageCraft
Arcserve is a global top 5 data protection vendor with best-in-class solutions that manage, protect, and recover all data workloads, from SMB to enterprise and regardless of location or complexity. A 100% channel-centric organization, Arcserve has a presence in over 150 countries, with 19,000 channel partners and 235,000 customers.
Visit Website

SILVER SPONSORS

Check Point Software

Check Point Software

Check Point Software
Check Point is a leading provider of cyber security solutions to governments and corporate enterprises globally. Its solutions protect customers from 5th generation cyber-attacks with an industry leading catch rate of malware, ransomware and other types of attacks.
Visit Website
ExtraHop

ExtraHop

ExtraHop
ExtraHop delivers enterprise cyber analytics that allow you to quickly investigate threats, ensure the delivery of critical applications, and secure your investment in the cloud.
Visit Website
Gigamon

Gigamon

Gigamon
Gigamon offers a deep observability pipeline that harnesses actionable network-level intelligence to amplify the power of observability tools. This powerful combination enables IT organizations to assure security and compliance governance, speed root-cause analysis of performance bottlenecks, and lower operational overhead associated with managing hybrid and multi-cloud IT infrastructures.
Visit Website
HPE Zerto Software

HPE Zerto Software

HPE Zerto Software
HPE Zerto Software helps you unlock ransomware resilience, disaster recovery, and continuous data protection to radically reduce data loss and downtime.
Visit Website
ONE IDENTITY

ONE IDENTITY

ONE IDENTITY
One Identity portfolio of identity governance, access management, privileged management and identity as a service solutions, helps organizations optimize identity and access management (IAM).For more info, visit http://www.oneidentity.com.#GetIAMRight
Visit Website
Quest Software

Quest Software

Quest Software
At Quest, we solve complex problems with simple solutions. Our philosophy is focused on great products, great service and being simple to do business with. We deliver technology that eliminates the need to choose between efficiency and effectiveness.
Visit Website
ServiceNow

ServiceNow

ServiceNow
ServiceNow is changing the way people work. ServiceNow provides service management for every department in the enterprise including IT, human resources, facilities, field service and more.
Visit Website
VPLS Solutions

VPLS Solutions

VPLS Solutions
VPLS is your trusted global provider for cloud-to-edge computing and technology services. From hardware and software procurement to managed services, customers worldwide trust VPLS for their cloud, colocation, hosting, backup, and cybersecurity needs.
Visit Website

BRONZE SPONSORS

Mimecast

Mimecast

Mimecast
Mimecast is a cybersecurity provider that helps thousands of organizations worldwide make email safer, restore trust and bolster cyber resilience.
Visit Website
Veeam

Veeam

Veeam
Veeam is the global leader in Intelligent Data Management for the Hyper-Available Enterprise. Veeam Hyper-Availability Platform is the most complete solution to help customers on the journey to automating data management.
Visit Website

EXHIBITORS & ASSOCIATIONS

Fortinet

Fortinet

Fortinet
Fortinet helps organizations across the public and private sectors protect the systems, data, and services that keep businesses and communities running. From government agencies and schools to enterprises and service providers, leaders rely on Fortinet to secure critical infrastructure, ensure operational continuity, and defend against evolving cyber threats. Our Security Fabric platform unifies networking and security to deliver the visibility, control, and efficiency organizations need to operate confidently, whether virtual, in the cloud, or on-premises.
Visit Website
Sirius

Sirius

Sirius
Sirius is a national integrator of technology-based business solutions that span the enterprise. Business and data center solutions from the brightest minds in the business, built on products and services from the world’s top technology companies.
Visit Website

Interested in becoming part of our next Hawaii event?

CONTACT US FOR INFO

About Us

We produce quality, cutting-edge educational seminars, drawn from case studies and best practice examples from leaders in the field.

800-365-6402
Contact Us

Popular Searches

  • Event Registration
  • Become an Exhibitor
  • Become an Advisor
  • Sponsor an Event
  • Contact Event Coordinator
  • Submit Feedback

Seminar Topics

  • Artificial Intelligence
  • BC / DR
  • Culture
  • Data Center Technology
  • Data Management
  • Data Storage
  • Digital Experience
  • Information Security
  • Infrastructure
  • Strategic Management
  • Unified Communications

2026 Events

  • Portland • March 19th
  • Anchorage • April 22nd
  • Honolulu • May 21st
  • Phoenix • June 18th
  • Wyoming • July 9th
  • Montana • July 29th
  • Boise • August 20th
  • Salt Lake City • September 22nd
  • Spokane • October 15th
  • Omaha • November 5th
  • Seattle • December 3rd
  • Home
  • About
  • Get Involved
  • Events
  • Register
  • © 2026 F2F Events, Inc.