F2F Events, Inc.
  • Home
  • About
    • About
    • CPE Credits
    • Session Topics
    • Privacy Policy
      • Scam Warning
    • Code of Conduct
    • Media Kit
  • Get Involved
    • Advisory Council
    • Association Partners
    • Exhibitors
    • Speakers
  • Events
    • Locations
    • Upcoming Events
  • Contact
  • Register

Cutting-edge conferences for over 20 years

Educational Events with Your Local IT Community

View Upcoming Events Register

INTERFACE Virtual Salt Lake City 2021 / See You Next Year

IT Infrastructure is constantly changing, bringing more new challenges with it every day. From ransomware and the latest security threats to emerging developments in AI and the need for increased bandwidth and storage, it’s nearly impossible to keep up to date. Our conference is designed to help. We’ve assembled a combination of Best-in-Breed hardware and software solutions, along with local experts and organizations to help educate, advise and connect you to resources that can help you meet your goals.

Covering Information Security, Infrastructure, Cloud, Disaster Recovery, Communications, and more, you’ll find presentations, panel discussions, and exhibitors covering a variety of topics, as well as the latest innovations and best practices.

AT A GLANCE

May 6th, 2021
8:30am – 4:30pm

Virtual Conference
Multi-track seminars with Q&A
1-on-1 chat and networking
Hourly prize drawings

KEYNOTE: [1 CPE] Privacy is Coming and It’s Going to Change Everything!

  Presented by Howard Loos • Chief Information Privacy Officer, Brigham Young University

Seminar Schedule

  • Theater One
  • Theater Two
  • Theater Three
  • Sessions
  • Keynote
9:00 - 9:50 AM

[1 CPE] Automating the Analyst

  Presented by Darktrace

Alongside the rise of today’s dynamic workforce, the speed and scale of sophisticated cyber-attacks are rapidly increasing. As the cybersecurity industry continues to endure an ongoing skills shortage, over-worked and under-resourced teams urgently need augmentation in order to defend against evolving, sophisticated threats.

For over three years, Darktrace experts have been working to meet this challenge, investigating whether they could teach AI to think like a cybersecurity analyst. It takes subtle, nuanced skills and implicit knowledge for an analyst to detect genuinely threatening activity, and the creation of the world-first Cyber AI Analyst took analyzing over one hundred of the world’s top threat analysts and complex machine learning algorithms. Join Darktrace as we discuss the Cyber AI Analyst in action.

Topics: Information Security
10:00 - 10:50 AM

[1 CPE] Incredible Ways to Hack Email & How to Stop the Bad Guys

  Presented by KnowBe4

Email is still a top attack vector the bad guys use. A whopping 91% of cyberattacks start with a phishing email, but email hacking is much more than phishing and launching malware! Join us as we explore some of the ways hackers use social engineering to trick your users into revealing sensitive data or enabling malicious code to run. We will also share a special treat - a (pre-recorded) hacking demo by Kevin Mitnick.

You will learn:

  • How silent malware launches, remote password hash capture, and how rogue rules work.
  • Why rogue documents, establishing fake relationships and getting you to compromise your ethics are so effective.
  • Details behind clickjacking and web beacons.
  • Actionable steps on how to defend against them all.

If all you were worried about were phishing attempts, think again!

Topics: Information Security
11:00 - 11:50 AM

[1 CPE] 2021 State of Malware

  Presented by Malwarebytes

Over the past year, the tools and tactics of cybercrime and cybersecurity adapted against a backdrop of enormous changes to our lives and businesses.

Join us to learn how cybercrime evolved in 2020 and identify ways to safeguard your organization against what’s out there.

We’ll explore:

  • Top threats for businesses and consumers
  • Emerging cybercrime trends and tactics
  • Solutions you can employ to thwart future attacks
Topics: Information Security
12:00 - 12:50 PM

[1 CPE] Your Office and Workspace Reimagined

  Presented by INTERFACE Advisory Council

Remote working during the pandemic has proved to be beneficial for some companies and employees. Even as we forecast a return to the office soon, many will want to work remotely on a permanent basis.

We are seeing an evolution of the definition of an office. There will certainly still be offices for all organizations where employees perform their work as normal. Now that remote working has shown to be an added value, IT departments need to lead this change in structure.

Join the INTERFACE- Advisory Council for a look at what lies ahead. How are you adjusting your security procedures? What have you learned over the last year with employees working remotely? We will discuss how IT departments should be involved in the decision-making and execution of policies. Also, this changing model of a traditional office could have effects on the job pool. Opportunities for IT professionals to find employment from out of market companies will only increase.

Panelists:

  • Ryan Taylor • Vice President, Information Technology, Paramount Acceptance
  • Danny Yeo • Information Technology Director, Brigham Young University
  • Corona Ngatuvai • Chief Technology Architect, State of Utah
  • Nyle Stoddard • Manager, Information Security, RR Donnelley

1:00 - 1:50 PM

[1 CPE] Architecting for the Agentless

  Presented by Gigamon

Today's networks are swarming with IoT, OT, and virtual devices of every size and shape. As they have proliferated, and the security attack surface has likewise increased, the market has responded with a wide variety of technologies to help understand, manage, and secure just what is on your network. This is the rise of the technologies classified as "agentless" and there is a good chance you will be looking, now or in the future, at a project that comprises such technologies. While much of what is fundamentally required to enable these technologies is not new, organizations struggle with trying to implement these on an "ad hoc" basis, with little thought to future considerations or scale.

This presentation will take about a more strategic approach to handling these implementations, what a visibility fabric is, and how today's organizations can architect their environments for their future needs.

Topics: Information Security, Infrastructure
2:00 - 2:50 PM

[1 CPE] Security vs. Compliance: Turning InfoSec Success into Audit Wins

  Presented by Tripwire

Security and compliance teams both strive to design, establish, and enforce controls to protect an organization. But even with shared goals in place, security and compliance teams often manage business risk in relative isolation. So how can these teams set aside tension and work better together to create a winning alliance?

In this session, we explore the key differences between security and compliance initiatives. It’s crucial to understand that being fully compliant doesn’t necessarily mean an organization is fundamentally secure. We’ll cover how the two initiatives complement each other when it comes to minimizing risk and how both teams can collaborate to create efficiencies. Attendees will learn how to leverage compliance policies to set the foundation to a robust information security program, while providing true visibility and coverage, consolidating toolsets, and reducing costs. Lastly, we’ll discuss how to ensure that a successful security program can help organizations prepare for an upcoming audit to ultimately achieve and maintain continuous compliance.

Topics: Information Security
Howard LoosHoward LoosChief Information Privacy Officer, Brigham Young University
3:00 - 3:50 PM

[1 CPE] Privacy is Coming and It’s Going to Change Everything!

  Presented by Howard Loos • Chief Information Privacy Officer, Brigham Young University

Security is the most important concern for your data, right? This is true, however, the focus on data privacy has become much more relevant over the last couple of years. Join Howard Loos, for a high-level overview of the current US privacy landscape and how current laws protect specific types of Personally Identifiable Information (PII). Howard will discuss how GDPR and other growing “general” privacy laws will change how information is viewed by the business and managed by IT.

You will get a summary of the nine guiding principles to help comply with the new privacy environment. This presentation will be a good starting point for all IT professionals to get a better handle on the changing Data Privacy landscape.

Howard Loos, CRM, IGP, CIPP/US has more than 25 years of experience in the governance of information, focusing on Data Privacy and Records & Information Management. During most of those years, Howard worked as a consultant, working in the Financial, Manufacturing, Oil & Gas, and Technology industries, as well as Education and Federal Government. His specialties include reducing an organization’s information related risk, strategy & program development, organizational governance, requirements gathering, and vendor selection.

Howard attended the University of North Dakota, where he received his bachelor’s degree, majoring in both Business Administration and Records and Information Management. He later received an MBA from the same university.

Howard is a Certified Records Manager, Information Governance Professional, Certified Information Privacy Professional, and Certified Change Practitioner. He currently works at Brigham Young University as the Chief Information Privacy Officer & Director of Information Management.

Topics: Information Security
  • Sessions
9:00 - 9:50 AM

[1 CPE] Discover How SD-WAN Edge and Cloud Security are Enabling Digital Transformation

  Presented by Silver Peak

Adoption of cloud services and the explosive increase in mobile and IoT devices have driven enterprises to transform both their WAN and security architectures – not just one or the other. The strategic imperative is to deploy a more intelligent, highly automated software-defined wide area network (WAN) that can be seamlessly integrated with modern cloud-delivered security services. Gartner coined the term “secure access service edge” (SASE) to describe this cloud-first architecture. During this session, we’ll discuss:

  • SD-WAN and security considerations enterprises must address when migrating to a SASE architecture
  • How to address Zero Trust access security requirements for remote workers and IoT
  • Pros and cons of single vendor vs multi-vendor SASE implementations
Topics: Data Storage, Infrastructure
10:00 - 10:50 AM

[1 CPE] CI/CD for Networking: Adopting DevOps Principles for a More Robust Network

  Presented by Infoblox

In recent years, continuous integration and continuous deployment, aka CI/CD, have become de facto standards for DevOps-minded software development organizations. Adoption of CI/CD enables software architects and IT specialists to create more flexible, secure and agile infrastructure with new features and functionality that are continually improved and deployed. While compute and storage aspects of environments have benefited greatly from CI/CD, network infrastructure has lagged behind.

This presentation pulls back the covers on efforts taking place to bring CI/CD philosophies to the work of revamping legacy, monolithic network architectures using cloud-native principles, microservices and containerization. The end goal is to create networks that are inherently more adaptable, scalable, automated and simpler to manage.

Speaker Bio: Glenn Sullivan is a Principal Product Manager for Emerging Technologies at Infoblox and joined the Infoblox team when SnapRoute, a company he co-founded in 2015, was acquired by Infoblox. At SnapRoute, Sullivan was responsible for product direction by advocating for the end-user. Prior to founding SnapRoute, Sullivan was responsible for building out hyperscale data center environments at Apple. In addition to core network operational functions, Sullivan led efforts to automate the lifecycle management of various platforms in a multivendor environment. Before Apple, Sullivan was a specialist support engineer on the LAN Switching team in Cisco TAC. While there, his specialty was in turning around customer sentiment by focusing on escalated issues and transforming the customer experience into a positive one. Sullivan has a BS in Network and Systems Administration from RIT (Rochester Institute of Technology).

Topics: Infrastructure, Unified Communications
11:00 - 11:50 AM

[1 CPE] Unified Endpoint Management

  Presented by Quest Software

This presentation highlights the reasons and need for Unified Endpoint Management in your business strategy. This presentation’s sole purpose is to educate C-level and system administrators of the need for UEM as well as what aspects are important. One of the problems with endpoint management today is the proliferation of endpoints. During this global health crisis especially, we are seeing a large work-from-home movement in businesses all over the world. In order to combat this issue, you must have an endpoint management strategy that works not only on the network but off of it as well.

Topics: Infrastructure, Strategic Management
12:00 - 12:50 PM

[1 CPE] How Zero-Trust Enables the Future of “Work from Anywhere” Secure Access

  Presented by Cisco & Duo Security

The perimeter-focused security model of decades past is no longer adequate for securing the modern enterprise. Now, organizations must secure a mobile workforce using a mix of corporate-owned and personal devices to access cloud-based applications and services, often from outside corporate networks — and this trend only accelerated during 2020's global shift to remote work. Fortunately, a modern access strategy built on zero-trust fundamentals can defend today’s workforce while paving the way to a passwordless future. Attend this session to learn how the zero-trust access model works, reduce your reliance on passwords and risk of password-based attacks, and how to start planning and staging your zero-trust evolution today.

Topics: Information Security
1:00 - 1:50 PM

[1 CPE] The Top 10 List: Ransomware Preparation

  Presented by Tonaquint Data Center

Carl Wilkins, Director of Cloud Operations for Tonaquint Data Centers provides a Top 10 list of things you can do to mitigate the risk of Ransomware affecting you. Topics will include how to protect your data, how to protect your systems and infrastructure, and situations to be aware of that might indicate the presence of Ransomware in your environment.

Topics: Information Security
2:00 - 2:50 PM

[1 CPE] The Case for Automation: Why Every Business Needs It

  Presented by Aruba, a HPE Company

As networks evolved from delivering basic connectivity (wired and wireless) to more sophisticated needs, enterprise security has moved from a strong, wall methodology to untrusted connections for every user. Join us to learn how network automation can reduce the burden on IT staff to keep up with the latest networking requirements while safely connecting workers, customers, and citizens to critical services.

Topics: Infrastructure
  • Sessions
9:00 - 9:50 AM

[1 CPE] Situational Awareness Into the Dark Web

  Presented by Check Point Software

In our journey through this session, we take you through the evolution, goals, and motivation of the Dark Web. We will share with you what and whom you can find on the platforms as well as the major conflicts individuals face while exploring this web. The session also exposes you to the syndicates and structures running on the platforms. Surprisingly, we see how those groups were among the first to embrace and implement Blockchain technology and created a major global demand for crypto currencies. This is the time to listen, learn, and be exposed to the deepest secrets of the Dark Web.

10:00 - 10:50 AM

[1 CPE] The Evolution of Vulnerability Management

  Presented by Optiv Security & Tenable

A proactive, risk-driven Vulnerability Management approach delivers comprehensive, continuous visibility and informs technical and business decisions. Join Tenable’s Nathan Wenzler and Optiv’s Doug Drew (a respected Tenable Guardian) as they discuss real-world VM challenges and how to manage and measure your cyber risk.

Topics: Information Security, Strategic Management
11:00 - 11:50 AM

[1 CPE] Modern Applications and Creative Attackers: Application Security in Flux

  Presented by Imperva

The rise of ransom DDoS attacks is just one indication that application security attacks are more complex and targeted than ever. Attacks are now targeting business logic via APIs and microservices, leveraging malicious bots to steal your customers' accounts. Application security that only protects against the OWASP top 10 attacks delivers insufficient protection in today’s threat landscape. Join our CTO, Kunal Anand, as he explores these challenges and offers insight into what you can be doing today to help protect your tomorrow.

Topics: Information Security
1:00 - 1:50 PM

[1 CPE] The Evolution of Vulnerability Management

  Presented by Optiv Security & Tenable

A proactive, risk-driven Vulnerability Management approach delivers comprehensive, continuous visibility and informs technical and business decisions. Join Tenable’s Nathan Wenzler and Optiv’s Doug Drew (a respected Tenable Guardian) as they discuss real-world VM challenges and how to manage and measure your cyber risk.

Topics: Information Security, Strategic Management
2:00 - 2:50 PM

[1 CPE] How Salt Lake County Gained Visibility and Control of Distributed Endpoints

  Presented by Tanium

When the COVID-19 pandemic forced much of the world to stay at home overnight, state, and local government leaders swiftly pivoted their workforces remote so they could continue to deliver critical citizen services. But this rapid shift opened new cybersecurity vulnerabilities. Suddenly, attack surfaces expanded, and endpoints became widely distributed, leading to an increase in cyber threats.

Learn how Salt Lake County’s Information Technology Division:

  • Patched in a new distributed workforce
  • Managed their remote endpoints with increased critical vulnerabilities
  • Tracked their IT assets and continue to mature their Endpoint Management
Topics: Information Security

Advisory Council

HOW TO BE AN ADVISOR

Advisor-approved content is the foundation upon which INTERFACE was developed. Each conference is guided by an Advisory Council of IT executives and senior managers. Advisor members represent both private and public sector organizations. The council contributes its insight into proposed educational topics and recommends local exhibitors and associations for participation.

EXPAND TO VIEW LIST

Ron Boyer
Director, Information Technology
UT Summit County

Cory Brown
Director, Information Systems
Consulmed

Blaine Carter
Chief Information Security Officer
Franklin Covey

David Clark
Director, Information Technology
Utah State Bar

John Coker
Manager, Information Systems
Central Utah Water Conservancy District

Randall Crowther
Sr Network Administrator
UT Cache County

James Duckett
Manager, Technology Division
UT City of St George

Mark Evans
Director, Information Security
UT Salt Lake County

David Fletcher
Chief Technology Officer
State of Utah

Robert Frailey
Manager, Information Systems
Utah Medical Products

Neal Francom
Manager, Security, Compliance & Audit
OODA Health

Robert Gray
Director, Global Information Security
Henry Schein One

Daniel Harmuth
Director, Information Technology
UT Transit Authority

Steve Howard
Information Security Officer
Numismatic Guaranty Corporation

Matt Huff
Chief Information Officer
Tanner LLC

Mary Huth
Sr Risk Officer
Zions Bancorporation

Corona Ngatuvai
Chief Technology Architect
State of Utah

Bobette Phillips
Manager, Information Security
UT Tax Commission

Brad Porter
Director, Information Technology
UP Railroad Employees Health Systems

Greg Pugh
Information System Security Officer
Space Dynamics Laboratory

Scott Rushforth
Chief Operations Officer
Horizon Credit Union

Jake Schroeder
Sr Director, Information Security
HigherVue

Fred Shepherd
Vice President, Information Technology
Avalon Health Care

Jon Shurtliff
Director of Technology
Oakdell Egg Farms

Nyle Stoddard
Manager, Information Security
RR Donnelley

Ryan Taylor
Vice President, Information Technology
Paramount Acceptance

Tyler Tholen
Manager, Risk Management
Honeywell

Danny Yeo
Information Technology Director
Brigham Young University

Shawn Young
Manager, Information Assurance
Barnes Aerospace

Sponsors

HOW TO BE A SPONSOR

Participating exhibitors at INTERFACE achieve a greater return on their investment from this series of IT events than any other face-to-face medium available today. This success is achieved through a time-efficient and cost-effective presence for a pre-qualified audience. This simple formula leads to higher levels of business development opportunity at each event.

GOLD SPONSORS

HPE Aruba Networking

HPE Aruba Networking

HPE Aruba Networking
Deliver the performance and uninterrupted access your business demands with a Zero Trust foundation and AI-automated operations that help you innovate with the least risk.
Visit Website
Optiv

Optiv

Optiv
Optiv is the cyber advisory and solutions leader, delivering strategic and technical expertise to nearly 6,000 companies across every major industry. We partner with organizations to advise, deploy and operate complete cybersecurity programs from strategy and managed security services to risk, integration and technology solutions. With clients at the center of our unmatched ecosystem of people, products, partners and programs, we accelerate business progress like no other company can. At Optiv, we manage cyber risk so you can secure your full potential.
Visit Website
Silver Peak

Silver Peak

Silver Peak
Silver Peak, recently acquired by HPE Aruba, delivers networking software that powers a self-driving wide area network (SD_WAN) that learns and adapts to requirements of the business to ensure the highest levels of end user and application performance.
Visit Website
Tenable

Tenable

Tenable
Tenable, Inc., is the Cyber Exposure company. Over 30,000 organizations around the globe rely on Tenable to understand and reduce cyber risk.
Visit Website

SILVER SPONSORS

Check Point Software

Check Point Software

Check Point Software
Check Point is a leading provider of cyber security solutions to governments and corporate enterprises globally. Its solutions protect customers from 5th generation cyber-attacks with an industry leading catch rate of malware, ransomware and other types of attacks.
Visit Website
Darktrace

Darktrace

Darktrace
Darktrace is a leading cybersecurity AI company and the creator of Autonomous Response technology. It provides a comprehensive cyber defense to over 5,500 organizations, protecting the cloud, email, IoT, traditional networks, endpoints, and industrial systems.
Visit Website
Duo Security

Duo Security

Duo Security
Duo Security, now part of Cisco, is the leading multi-factor authentication (MFA) and secure access provider. Duo is a trusted partner to more than 25,000 customers globally, including Facebook, Yelp, Zillow and more.
Visit Website
Gigamon

Gigamon

Gigamon
Gigamon offers a deep observability pipeline that harnesses actionable network-level intelligence to amplify the power of observability tools. This powerful combination enables IT organizations to assure security and compliance governance, speed root-cause analysis of performance bottlenecks, and lower operational overhead associated with managing hybrid and multi-cloud IT infrastructures.
Visit Website
Imperva

Imperva

Imperva
Imperva is the cybersecurity leader whose mission is to protect data and all paths to it. With an integrated approach that combines edge, application and data security, Imperva protects companies through all stages of their digital journey.
Visit Website
Infoblox

Infoblox

Infoblox
Infoblox unites networking and security to deliver unmatched performance and protection. Trusted by Fortune 100 companies and emerging innovators, we provide real-time visibility and control over who and what connects to your network, so your organization runs faster and stops threats earlier.
Visit Website
KnowBe4

KnowBe4

KnowBe4
KnowBe4 is the world’s largest integrated platform for new-school security awareness training and simulated phishing. KnowBe4 was created to help organizations manage the ongoing problem of social engineering through a comprehensive new-school awareness training approach.
Visit Website
Malwarebytes

Malwarebytes

Malwarebytes
Malwarebytes protects workplace productivity. We secure all your endpoints so employees can connect confidently, from anywhere. We combine analytics-driven, multi-layer threat protection and industry-leading incident response to both simplify and strengthen overall cybersecurity. You and your team stay up and running, so you can remain focused on driving your business.
Visit Website
Quest Software

Quest Software

Quest Software
At Quest, we solve complex problems with simple solutions. Our philosophy is focused on great products, great service and being simple to do business with. We deliver technology that eliminates the need to choose between efficiency and effectiveness.
Visit Website
Tanium

Tanium

Tanium
Tanium gives the world's largest enterprises and government organizations the unique power to secure, control and manage millions of endpoints across the enterprise. 
Visit Website
TRIPWIRE

TRIPWIRE

TRIPWIRE
Tripwire delivers advanced threat, security and compliance solutions used by over 9,000 organizations, including over 50% of the Fortune 500. Tripwire enables enterprises around the world to detect, prevent, report and respond to cyber security threats.
Visit Website
ValorC3

ValorC3

ValorC3
ValorC3 is a modern data center, cloud and connectivity partner that delivers agile, scalable IT solutions tailored to the relentless mid-market enterprise. Valor meets clients where they’re at and gets them where they need to grow, helping them navigate the rapidly changing digital landscape with flexible, high-density data centers, extensive infrastructure expansion capabilities, low latency networks, strong partnerships and decades of industry expertise.
Visit Website

BRONZE SPONSORS

Extreme Networks

Extreme Networks

Extreme Networks
Extreme Networks, Inc. (EXTR) delivers software-driven networking solutions that help IT departments everywhere deliver the ultimate business outcome: stronger connections with customers, partners and employees.
Visit Website
Sanity Solutions

Sanity Solutions

Sanity Solutions
Sanity Solutions, Inc. is headquartered in Denver, CO with offices in Minnesota and Utah. We focus on comprehensive IT solutions and establishing ourselves as a trusted adviser. We believe in delivering a legendary experience professionally and personally.
Visit Website

EXHIBITORS & ASSOCIATIONS

ASIS Salt Lake City

ASIS Salt Lake City

ASIS Salt Lake City
Founded in 1955, ASIS is dedicated to increasing the effectiveness and productivity of security professionals by developing educational programs and materials that address broad security interests, such as the ASIS Annual Seminar and Exhibits.
Visit Website
ExtraHop

ExtraHop

ExtraHop
ExtraHop delivers enterprise cyber analytics that allow you to quickly investigate threats, ensure the delivery of critical applications, and secure your investment in the cloud.
Visit Website
HDI Salt Lake City

HDI Salt Lake City

HDI Salt Lake City
HDI is the professional association and certification body for the technical service and support industry. HDI hosts acclaimed conferences, produces renowned publications and research, and certifies and trains thousands of professionals each year.
Visit Website
IIBA Salt Lake City

IIBA Salt Lake City

IIBA Salt Lake City
International Institute of Business Analysis (IIBA) is the independent non-profit professional association to serve the growing field of business analysis. IIBA connects Members, Chapters, Corporations and Partners around the world to advance business analysis.
Visit Website
InfraGard Salt Lake City

InfraGard Salt Lake City

InfraGard Salt Lake City
InfraGard is a cooperative undertaking between the U.S. Government (led by the FBI) and an association of businesses, academic institutions, state and local law enforcement agencies.
Visit Website
ISACA Utah

ISACA Utah

ISACA Utah
The aim of the ISACA Utah Chapter is to sponsor local educational seminars and workshops, conducts regular chapter meetings, and help to further promote and elevate the visibility of the IS audit, control and security profession throughout the area.
Visit Website
ISSA Salt Lake City

ISSA Salt Lake City

ISSA Salt Lake City
The primary goal of the Information Systems Security Association, Inc. (ISSA) is to promote management practices that will ensure the confidentiality, integrity and availability of organizational information resources. .
Visit Website
PMI Northern Utah

PMI Northern Utah

PMI Northern Utah
PMI is the international non-profit association for advancing the profession of project management. The organization administers the Project Management Professional (PMP) certification program and puts on international and regional seminars.
Visit Website
Silicon Slopes

Silicon Slopes

Silicon Slopes
Silicon Slopes is the voice, hub, and heart of Utah’s startup and tech community. We are a nonprofit organization empowering the local tech community to learn, connect, and serve in an effort to make entrepreneurship and opportunity accessible to all.
Visit Website

Interested in becoming part of our next Salt Lake City event?

CONTACT US FOR INFO

About Us

We produce quality, cutting-edge educational seminars, drawn from case studies and best practice examples from leaders in the field.

800-365-6402
Contact Us

Popular Searches

  • Event Registration
  • Become an Exhibitor
  • Become an Advisor
  • Sponsor an Event
  • Contact Event Coordinator
  • Submit Feedback

Seminar Topics

  • Artificial Intelligence
  • BC / DR
  • Culture
  • Data Center Technology
  • Data Management
  • Data Storage
  • Digital Experience
  • Information Security
  • Infrastructure
  • Strategic Management
  • Unified Communications

2026 Events

  • Portland • March 19th
  • Anchorage • April 22nd
  • Honolulu • May 21st
  • Phoenix • June 18th
  • Wyoming • July 9th
  • Montana • July 29th
  • Boise • August 20th
  • Salt Lake City • September 22nd
  • Spokane • October 15th
  • Omaha • November 5th
  • Seattle • December 3rd
  • Home
  • About
  • Get Involved
  • Events
  • Register
  • © 2026 F2F Events, Inc.