F2F Events, Inc.
  • Home
  • About
    • About
    • CPE Credits
    • Session Topics
    • Privacy Policy
      • Scam Warning
    • Code of Conduct
    • Media Kit
  • Get Involved
    • Advisory Council
    • Association Partners
    • Exhibitors
    • Speakers
  • Events
    • Locations
    • Upcoming Events
  • Contact
  • Register

Cutting-edge conferences for over 20 years

Educational Events with Your Local IT Community

View Upcoming Events Register

INTERFACE Virtual Omaha 2020 / See You Next Year

IT Infrastructure is constantly changing, bringing more new challenges with it every day. From ransomware and the latest security threats to emerging developments in AI and the need for increased bandwidth and storage, it’s nearly impossible to keep up to date. Our conference is designed to help. We’ve assembled a combination of Best-in-Breed hardware and software solutions, along with local experts and organizations to help educate, advise and connect you to resources that can help you meet your goals.

Covering Information Security, Infrastructure, Cloud, Disaster Recovery, Communications, and more, you’ll find presentations, panel discussions, and exhibitors covering a variety of topics, as well as the latest innovations and best practices.

AT A GLANCE

November 10th, 2020
8:30am – 3:30pm

Virtual Conference
Multi-track seminars with Q&A
1-on-1 chat and networking
Hourly prize drawings

KEYNOTE: The Rise of the Cyber Attack, How Can We Protect Ourselves?

  Presented by Kenneth A. Schmutz • Supervisory Special Agent, FBI

Seminar Schedule

  • Theater One
  • Theater Two
  • Sessions
  • Keynote
9:00 - 9:50 AM

DRaaS for Everyone

  Presented by StorageCraft

Are you really ready for a data disaster? Learn more about how disaster recovery has changed the last couple years and how to put together a DR strategy for your business. Learn about a simple and economic DRaaS solution.

Topics: Data Storage
10:00 - 10:50 AM

IT Interrupted: Best Practices in Disaster Recovery Planning

  Presented by Zerto

As IT application availability requirements continue to evolve, technology continues change to meet the new requirements.  Join us as we discuss planning considerations for bringing your virtualized workloads into the next generation of IT resilience.  You will learn about data center options to consider as part of your recovery strategy, business and technical trade-offs that will have to be made, capacity planning considerations, and testing approaches to that are possible that will optimize application up-time.

Topics: Business Continuity / Disaster Recovery
11:00 - 11:50 AM

Responsible Administration: The Admin Insider (Threat)

  Presented by One Identity

System Administrators are critical people to every organization. They design, build, and maintain all the parts and pieces that enable business, whether that’s retail, healthcare, or even a government agency. Ensuring sysadmin tasks are performed as securely as possible without hampering their ability to keep our business running is a delicate balance. These “insiders” not only know how the systems operate but have the credentials and privileges to operate them.

In this session, we will demonstrate an Active Directory breach using pass-the-hash and discuss ways to enable the System Administrators to operate in a way that not only protects the business from threats but also enables them to perform the intricate tasks they accomplish daily to keep business flowing under the covers.

Topics: Information Security, Strategic Management
1:00 - 1:50 PM

DRaaS for Everyone

  Presented by StorageCraft

Are you really ready for a data disaster? Learn more about how disaster recovery has changed the last couple years and how to put together a DR strategy for your business. Learn about a simple and economic DRaaS solution.

Topics: Data Storage
Kenneth A. SchmutzKenneth A. SchmutzSupervisory Special Agent, FBI
2:00 - 2:50 PM

The Rise of the Cyber Attack, How Can We Protect Ourselves?

  Presented by Kenneth A. Schmutz • Supervisory Special Agent, FBI

This presentation will highlight the rise in cyber-attacks coming from criminals, nation state actors, insiders, and terrorists. These attacks include ransomware, business email compromise, data theft, and theft of intellectual property. Supervisory Special Agent Schmutz will discuss ways in which these cyber adversaries are getting into our systems including current investigations being worked by the FBI's Omaha Cyber Task Force. He will finish by providing ideas and resources that companies have used to reduce their vulnerability to these attacks.

Supervisory Special Agent (SSA) Schmutz graduated from Utah State University with a Bachelors and Masters degree in Information Systems. He worked for 13 years in the private sector for IT companies prior to joining the FBI in 2004. SSA Schmutz investigated computer intrusions his whole career which included his time in Seattle, Chicago and the FBI’s Cyber Division in Washington DC where he focused on cyber threats to the critical infrastructure. In August of 2012, he was transferred to the Omaha Field Division where he serves as the supervisor of the FBI’s Cyber Task Force (CTF).

Topics: Information Security
  • Sessions
9:00 - 9:50 AM

Cyber AI and Geopolitics: Managing Tomorrow’s Cyber Risk

  Presented by Darktrace

Against a backdrop of escalating geopolitical tensions and an ever-evolving threat landscape, the risk of cyber-attacks to governments and the private sector alike has never been higher. Join Darktrace’s Director of Strategic Threat, Marcus Fowler, and Americas CISO, JR Tietsort to discuss this new era of cyber-threat and how Cyber AI can help defenders regain the upper hand.

 

This speaking session will include a Q&A with our experts, and explore:

  • How nation-state attacks are changing
  • How organizations can respond to the classic balance of security and productivity
  • How organizational maturity in risk management is maintained whilst ensuring cyber defense

Topics: Information Security
10:00 - 10:50 AM

The Number One Challenge In The Digital Transformation to the Cloud – You

  Presented by Check Point

Using public clouds for enterprise datacenters is now mainstream; the advantages are significant and the gained agility undisputable. However, the number of services and options being offered is daunting. With these choices come consequences; one misconfiguration can put your entire organization at risk…or worse.

Another reality you will face as you scale is the challenge of using a ‘one-size-fits-all’ interface. Imagine scrolling through lists of assets when the numbers are in the hundreds or even thousands. Think about trying to find a misconfigured or exposed S3 bucket when you have thousands; it’s like finding a needle in a stack of needles.

If you’re like most enterprises, you have a resource gap and don’t have the experienced, trained security professionals maintaining your cloud environment(s). This gap exacerbates risks. The cloud environments available today are extremely comprehensive and powerful, but in unskilled hands, one fat-finger can have dire consequences. As you implement ephemeral cloud-native services like Lambda functions and other cloud-native platform components, new challenges will arise when conducting threat-detection and attribution.

In this session, you’ll see your future and what to expect managing your public cloud-based datacenter. You’ll learn why Gartner says, “Through 2023, at least 99% of cloud security failures will be the customer’s fault.” We will highlight the top challenges you will face and show you what you should prepare for before you scale. We will also detail recommended best practices for securing and maintaining compliance in your public cloud data center.

Topics: Information Security
11:00 - 11:50 AM

Infoblox Threat Intelligence Report: July – September 2020

  Presented by Infoblox

This session will dive into recent Threat Intelligence Research including new malware variants and trends that were prominent over the July-September 2020 timeframe. We will examine specific Ransomware, Infostealers, Trojans, and RATS! attacks that surfaced over the last 90 days. Discover tips to improve your defenses and defeat these types of treats.

Topics: Information Security
12:00 - 12:50 PM

ICS and Cybersecurity’s Critical Path

  Presented by NebraskaCERT

Industrial Controls Systems are increasingly vulnerable to attack. Organizational budgets don’t always allow for the full replacement of operational technology (OT) or building automation management (BAM) equipment that was initially purchased on a longer lifecycle than most typical IT purchases. Security is becoming paramount to ensuring access to critical systems and information and continues to be an exploitable risk in organizations, even during a pandemic, due to ransomware, phishing, and poor asset management techniques. Strategic security that is aligned with your organization needs to be balanced with the budget, risk, and organizational culture.

How do organizations implement critical security controls while still supporting the goals of production, user experience, and efficiency? When buildings are designed and built, and the building administration systems are put into place, how does this impact the risk of healthcare, manufacturing, or financial organization? Are those systems part of the cybersecurity risk analysis?

During this presentation, attendees will review best practices on both sides of the ICS security and IT security continuum. In addition, a simple approach that focuses on the fundamentals of security to reduce risk in these environments is presented. Attendees will walk away from this workshop with actionable knowledge on how to facilitate the conversation as to how OT/BAM security and IT security must work together to align risk with cost in most environments. 

Presenter: Matt Morton • Board Member for NebraskaCERT

 
Topics: Information Security
1:00 - 1:50 PM

Hot Topics in ComPriSec

  Presented by INTERFACE Advisory Council

Compliance, Privacy, and Security (ComPriSec) Professionals struggle in their role with competing priorities and responsibilities. This panel of ComPriSec industry experts defines each role, provides management strategies, and explains solutions for common challenges. Any gaps are room for lawsuits, breaches, and leaked data. Here you will learn how to bridge the new normal worlds of ComPriSec.

Moderated by:
Ron Woerner, CISSP, CISM • Technology Professor for the College of Science and Technology, Bellevue University

Panelists:
Rob LaMagna-Reiter, CISSP, CISM, CDPSE, CHP, PCIP, Sec+ • Chief Information Security Officer, FNTS
Lisa McKee, CISA, CDPSE, PCIP, MSSL • Senior Manager Security and Privacy Solutions, Protiviti
Matt Morton, HCISPP, CISM, CISSP, CGEIT • Board Member for NebraskaCERT

Topics: Information Security

Advisory Council

HOW TO BE AN ADVISOR

Advisor-approved content is the foundation upon which INTERFACE was developed. Each conference is guided by an Advisory Council of IT executives and senior managers. Advisor members represent both private and public sector organizations. The council contributes its insight into proposed educational topics and recommends local exhibitors and associations for participation.

EXPAND TO VIEW LIST

Mike Bauer
Chief Information Officer
American National Bank

Randy Behounek
Sr VP, Technology Risk
Bank of the West

Krista Freimuth
IS Asset Manager
Mutual of Omaha Insurance Company

Jay Gnuse
Director, Information Technology
Chief Industries

Kevin Hamilton
Vice President, Global Cyber Security
Fiserv

Rick Haugerud
Assistant Vice President, Information Technology Services
University of Nebraska

Andy Hinton
IT Audit Manager
CSG International

Matt Johnson
VP Operational and Tech Risk
Bank of the West

Norman Kromberg
VP, Information Security
Southern Carlson, Inc.

Robert LaMagna-Reiter
Chief Information Security Officer
First National Technology Solutions

Eric Matulka
Vice President, Information Technology
DEI Communities

Sean McCary
Director
Omaha CIO Forum

Lisa McKee
Sr. Manager Security and Privacy
Protivit

Matt Morton
President
NebraskaCERT

Andrew Munger
Global Cyber Threat Hunt Lead
Zurich Insurance

Jinson Pappalil
Director, Information Technology
Metropolitan Utilities District

Trista Renstrom
Security Specialist
WoodmenLife

Amber Roberts
Sr. IT Support Analyst
Gavilon Group, LLC

Tom Rolfes
Administrative Services Manager
Nebraska Information Technology Commission

Ryan Smith
Director, Technology
AHSTW Community School District

Ed Toner
Chief Information Officer
State of Nebraska

Mike Welna
Sr Information Security Officer
Boys Town

Luke Wentz
Manager, IT Security
Orion Advisor Solutions, LLC

Sponsors

HOW TO BE A SPONSOR

Participating exhibitors at INTERFACE achieve a greater return on their investment from this series of IT events than any other face-to-face medium available today. This success is achieved through a time-efficient and cost-effective presence for a pre-qualified audience. This simple formula leads to higher levels of business development opportunity at each event.

GOLD SPONSORS

StorageCraft

StorageCraft

StorageCraft
Arcserve is a global top 5 data protection vendor with best-in-class solutions that manage, protect, and recover all data workloads, from SMB to enterprise and regardless of location or complexity. A 100% channel-centric organization, Arcserve has a presence in over 150 countries, with 19,000 channel partners and 235,000 customers.
Visit Website

SILVER SPONSORS

Check Point Software

Check Point Software

Check Point Software
Check Point is a leading provider of cyber security solutions to governments and corporate enterprises globally. Its solutions protect customers from 5th generation cyber-attacks with an industry leading catch rate of malware, ransomware and other types of attacks.
Visit Website
Darktrace

Darktrace

Darktrace
Darktrace is a leading cybersecurity AI company and the creator of Autonomous Response technology. It provides a comprehensive cyber defense to over 5,500 organizations, protecting the cloud, email, IoT, traditional networks, endpoints, and industrial systems.
Visit Website
HPE Zerto Software

HPE Zerto Software

HPE Zerto Software
HPE Zerto Software helps you unlock ransomware resilience, disaster recovery, and continuous data protection to radically reduce data loss and downtime.
Visit Website
Infoblox

Infoblox

Infoblox
Infoblox unites networking and security to deliver unmatched performance and protection. Trusted by Fortune 100 companies and emerging innovators, we provide real-time visibility and control over who and what connects to your network, so your organization runs faster and stops threats earlier.
Visit Website
ONE IDENTITY

ONE IDENTITY

ONE IDENTITY
One Identity portfolio of identity governance, access management, privileged management and identity as a service solutions, helps organizations optimize identity and access management (IAM).For more info, visit http://www.oneidentity.com.#GetIAMRight
Visit Website

BRONZE SPONSORS

ESET

ESET

ESET
For more than 30 years, ESET® has been developing industry-leading IT security software and services to protect businesses, critical infrastructure, and consumers worldwide.
Visit Website
Tools4ever

Tools4ever

Tools4ever
Tools4ever delivers affordable Identity Governance and Administration (IGA) solutions – User Provisioning, Password Management, Single Sign-On (SSO), Self‐Service, Workflow Management – connecting 10 million users to resources.
Visit Website
Unitrends

Unitrends

Unitrends
Unitrends is trusted by IT leaders worldwide who know that in today's digital world protecting their ideas and keeping their business running is non-negotiable. The company’s Connected Continuity Platform protects virtual, physical, + cloud based systems.
Visit Website
Veeam

Veeam

Veeam
Veeam is the global leader in Intelligent Data Management for the Hyper-Available Enterprise. Veeam Hyper-Availability Platform is the most complete solution to help customers on the journey to automating data management.
Visit Website

EXHIBITORS & ASSOCIATIONS

SHI

SHI

SHI
From designing cloud, data center and end user computing strategies that support your hybrid working model to delivering the hardware and software you need to run it, SHI is your complete IT partner.
Visit Website

Interested in becoming part of our next Omaha event?

CONTACT US FOR INFO

About Us

We produce quality, cutting-edge educational seminars, drawn from case studies and best practice examples from leaders in the field.

800-365-6402
Contact Us

Popular Searches

  • Event Registration
  • Become an Exhibitor
  • Become an Advisor
  • Sponsor an Event
  • Contact Event Coordinator
  • Submit Feedback

Seminar Topics

  • Artificial Intelligence
  • BC / DR
  • Culture
  • Data Center Technology
  • Data Management
  • Data Storage
  • Digital Experience
  • Information Security
  • Infrastructure
  • Strategic Management
  • Unified Communications

2026 Events

  • Portland • March 19th
  • Anchorage • April 22nd
  • Honolulu • May 21st
  • Phoenix • June 18th
  • Wyoming • July 9th
  • Montana • July 29th
  • Boise • August 20th
  • Salt Lake City • September 22nd
  • Spokane • October 15th
  • Omaha • November 5th
  • Seattle • December 3rd
  • Home
  • About
  • Get Involved
  • Events
  • Register
  • © 2026 F2F Events, Inc.