F2F Events, Inc.
  • Home
  • About
    • About
    • CPE Credits
    • Session Topics
    • Privacy Policy
      • Scam Warning
    • Code of Conduct
    • Media Kit
  • Get Involved
    • Advisory Council
    • Association Partners
    • Exhibitors
    • Speakers
  • Events
    • Locations
    • Upcoming Events
  • Contact
  • Register

Cutting-edge conferences for over 20 years

Educational Events with Your Local IT Community

View Upcoming Events Register

INTERFACE Virtual Hawaii SoCAL 2021 / See You Next Year

IT Infrastructure is constantly changing, bringing more new challenges with it every day. From ransomware and the latest security threats to emerging developments in AI and the need for increased bandwidth and storage, it’s nearly impossible to keep up to date. Our conference is designed to help. We’ve assembled a combination of Best-in-Breed hardware and software solutions, along with local experts and organizations to help educate, advise and connect you to resources that can help you meet your goals.

Covering Information Security, Infrastructure, Cloud, Disaster Recovery, Communications, and more, you’ll find presentations, panel discussions, and exhibitors covering a variety of topics, as well as the latest innovations and best practices.

AT A GLANCE

May 20th, 2021
8:30am – 4:30pm HST
11:30 am - 7:30pm PST

Virtual Conference
Multi-track seminars with Q&A
1-on-1 chat and networking
Hourly prize drawings

KEYNOTE: [1 CPE] You Are No Longer Forgotten: The Small Business Security Challenge

  Presented by Chris Roberts • Chief Security Strategist, Cynet

Seminar Schedule

  • Theater One
  • Theater Two
  • Theater Three
  • Sessions
  • Keynote
9:00 - 9:50 AM

[1 CPE] Do We Need Our Own SOC?

  Presented by VPLS

Within a company, a SOC (Security Operations Center) is the focal point of the company’s security operations and network defense, commonly responsible for real-time monitoring, incident response, and proactive prevention of incidences. Many organizations may feel they are already doing these activities without a SOC. But SOCs vary in maturity levels and capabilities—so does your company really need one?

In this presentation, John Headley, Senior Security Engineer at VPLS, reviews the many components of a SOC to ultimately help you answer the question: “do we need our own SOC?” Join this presentation to learn:

  • The importance of cybersecurity operations within an organization, including how a typical cybersecurity operations team is organized into a SOC
  • What capabilities a SOC can provide to an organization
  • What tools the SOC uses
  • How to quantitatively self-assess if your organization should build a SOC or outsource this responsibility to a managed security services provider
Topics: Information Security
10:00 - 10:50 AM

[1 CPE] How Zero-Trust Enables the Future of “Work from Anywhere” Secure Access

  Presented by Cisco & Duo Security

The perimeter-focused security model of decades past is no longer adequate for securing the modern enterprise. Now, organizations must secure a mobile workforce using a mix of corporate-owned and personal devices to access cloud-based applications and services, often from outside corporate networks — and this trend only accelerated during 2020's global shift to remote work. Fortunately, a modern access strategy built on zero-trust fundamentals can defend today’s workforce while paving the way to a passwordless future. Attend this session to learn how the zero-trust access model works, reduce your reliance on passwords and risk of password-based attacks, and how to start planning and staging your zero-trust evolution today.

Topics: Information Security
11:00 - 11:50 AM

[1 CPE] Do You Feel the Need… the Need for Speed? Top Five SQL Server Query Tuning Tips

  Presented by Quest Software

Query tuning is key to peak performance in SQL Server databases. However, lots of developers and DBAs constantly struggle to pinpoint the root cause of performance issues and spend way too much time trying to fix them. In this presentation, Quest will share their tried-and-true best practices for tuning SQL statements and other issues by utilizing Wait Time Analysis, reviewing execution plans, and using SQL diagramming techniques. In addition, we’ll present several case studies to demonstrate these best practices.

Regardless of the complexity of your database or your skill level, this systematic approach will lead you down the correct tuning path with no guessing, saving countless hours of tuning queries and optimizing the performance of your SQL Server databases.

Topics: Infrastructure, Strategic Management
12:00 - 12:50 PM

[1 CPE] Aligning Projects to Organizational Strategic Objectives

  Presented by INTERFACE Advisory Council

As investments in projects decrease in organizations, it is important to ensure that authorized and funded projects are aligned with the strategic objectives of the organization. This became a challenge in the last year as many of those objectives were forced to be modified – and many projects felt the impact of the change.

In this session, Greta Blash, a PMI-certified instructor, will explain how to align a project with an organization’s strategic objectives and the impact of overall changes to the organization.

Greta has extensive experience as an executive and consulting IT professional, both domestically and internationally. Her areas of experience include: program management, project management, agile development, and business analysis; with emphasis in the areas of customer relationship management, business intelligence, continuous improvement, system implementations, and conversions. Greta is a PMI-certified instructor and a certified project manager (PgMP, PMP, PMI-PBA, PMI-PBA, and CDAP) whose extensive experiences enable her to manage multiple high-risk, high-tech projects.

Topics: Strategic Management
1:00 - 1:50 PM

[1 CPE] Developing a Vision and Strategy for Security Centric IAM Programs

  Presented by Business Partner Solutions

Learn how to defend new age data breaches through Identity Centric Security. 80% of cyber incidents stem from stolen credentials & privileged accounts. By including Identity Centric Security (ICS), organizations can proactively manage their threat landscape, ensuring better threat intelligence and breach defenses.

Topics discussed will inlcude:

  • What is ICS?
  • How does ICS enable risk-based decision-making?
  • How does ICS strengthen breach defense?
  • Approach to embracing ICS
Topics: Information Security, Strategic Management
2:00 - 2:50 PM

[1 CPE] Disaster Recovery Reality Check: Validating Your DR Strategy

  Presented by StorageCraft

Do you have a DR strategy? Learn more from those on the inside of data protection and disaster recovery. See how you compare to other’s DR capabilities and how to build a solid strategy. We’ll also cover key DRaaS capabilities and a solution to make part of our plan.

Topics: Business Continuity / Disaster Recovery
Chris RobertsChris RobertsChief Security Strategist, Cynet
3:00 - 3:50 PM

[1 CPE] You Are No Longer Forgotten: The Small Business Security Challenge

  Presented by Chris Roberts • Chief Security Strategist, Cynet

Most of the security industry is chasing “around” 31,000 larger enterprise-sized companies for their business. The list is well known and circulated and targets are on the backs of ALL the C-Suite, most of the technical folks, and the MSP/VARS that support them. The Security industry circles them like packs of hyena or vultures waiting for one of them to fall, get breached, or for a vendor to be thrown out… pouncing on the fresh kill with glee…

Meanwhile, you’re sitting there getting slaughtered by every adversary known to mankind because you ARE the forgotten, you’re too small for the multi-billion $$ cyber companies whom IF they decide to deal with you will flood you with MSA’s, SOW’s and NDA’s that would take a week’s worth of lawyer time JUST to understand, let alone realize that they’re not accountable for anything, unlikely to want to support you and in all honestly you’ll get a 1-800-YOU-AREN’T-SPECIAL number as your sole source of support.

We’re going to address the current situation, the state of play, and give you some thoughts, suggestions, ideas, AND plans. We’ll provide resources on HOW to evaluate, where to look, what to do, AND, importantly, we’ll do it because it’s what we’re doing. We live, breathe, and deal with this daily. We’ve sat in the meetings when the large cybersecurity companies state, “we’re done dealing with the SMB market” and we’ve got the battle scars from dealing with those subsequent consequences.

Chris is a renowned researcher focusing on counter threat intelligence and vulnerability research within the Information Security industry. Since the late ‘90s, Chris has been deeply involved with security R&D, consulting, and vCISO services to help protect and defend organizations against various types of attacks. As one of the well-known hackers and researchers, Chris is routinely invited to speak at industry conferences and is regularly featured on CNN, The Washington Post, WIRED, and numerous other media publications.

Topics: Information Security
  • Sessions
9:00 - 9:50 AM

[1 CPE] Disaster Recovery Reality Check: Validating Your DR Strategy

  Presented by StorageCraft

Do you have a DR strategy? Learn more from those on the inside of data protection and disaster recovery. See how you compare to other’s DR capabilities and how to build a solid strategy. We’ll also cover key DRaaS capabilities and a solution to make part of our plan.

Topics: Business Continuity / Disaster Recovery
10:00 - 10:50 AM

[1 CPE] Securing the Hybrid Cloud: Visibility Best Practices

  Presented by Gigamon

With the move to cloud and the multitude of approaches, your ability to effectively monitor and secure workloads gets even more difficult. IT complexity, the rate of change, lack of skills, and organizational silos have made confidently managing security and performance nearly impossible. Visibility is critical. Join us for a discussion of the security considerations for on-prem private, public, and hybrid clouds. You’ll learn best practices and see how a little planning and design can go a long way. Achieve a secure and viable hybrid cloud implementation and get a high return on your investment.

Topics: Data Storage, Infrastructure
11:00 - 11:50 AM

[1 CPE] Power-Boost Ransomware Incident Response with Ransomware Kill Switch

  Presented by Airgap

Despite significant investments in security each year, cybercriminals are constantly developing new attack vectors to thwart existing security controls. The growth of connected devices, IoT, and an increasingly remote workforce has widened the enterprise attack surface, enabling cybercriminals to find new ways to breach enterprise perimeter defenses.

A new paradigm shift needs to occur in security to deal with the eventual breach and lateral movement of cyber-attacks. Implementing an enterprise zero-trust security model can help to block the lateral movement of cyber attackers and isolate attacks to where they originate, helping to dramatically reduce the enterprise-wide impact of a cyber-attack. Enterprises need to migrate to a Zero-Trust architecture, helping to gain back control and limit the damage done by cyber-attacks that occur each year. In this session, Ritesh Agrawal, CEO and Co-founder of Airgap Networks, will lead a detailed discussion on how to:

  • Maintain a continuous accurate inventory of enterprise assets.
  • Obtain true visibility and insight on how all devices communicate.
  • Generate zero false-positive alerts based on anomalous behavior.
  • Deploy scalable nano-segmentation of devices to stop lateral movement inside your network via devices (Ransomware Kill-Switch).
  • Implement Single-Sign-On and Multi-Factor Authentication(MFA) for legacy/private applications.
  • Achieve modern IAM/IDM authentication with Zero-Trust Isolation.

Through this discussion, Ritesh will build on these topics and emphasize how zero-trust principles can empower enterprises and achieve better control and response to emerging cyber-threats. Zero-Trust is not hype. Join us to find out more!

Topics: Information Security, Infrastructure
12:00 - 12:50 PM

[1 CPE] Leveraging Assessment Findings to Harden Your Security Perimeter

  Presented by Fortinet

Are you regularly evaluating your network security?

Performing assessments is a tried-and-true method for improving your security posture, but they can be a daunting task for network security staff who are often short on manpower, expertise, and/or time. Regardless, the benefits of running assessments almost always outweigh any potential drawbacks. Having a security assessment in hand will increase your security situational awareness and significantly impact your organization’s risk preparedness and mitigation.

Join us as we discuss the importance of periodically validating your existing security controls and provide learnings and best practices from our experts.

Topics: Information Security
1:00 - 1:50 PM

[1 CPE] Do I Need Software Defined WAN (SD-WAN) for My Organization?

  Presented by VPLS

SD-WAN technology is one of the fastest-growing segments in the networking space, providing options for organizations to securely and reliably connect remote locations.

However, not all SD-WAN solutions provide the same features and capabilities. So, how do you select the best SD-WAN solution for your team and organization? Join this presentation as we help you answer this question and learn about:

  • Common issues with traditional WAN architecture
  • How SD-WAN helps to overcome these issues
  • When and where to deploy SD-WAN
Topics: Infrastructure
2:00 - 2:50 PM

[1 CPE] The Evolution of Vulnerability Management

  Presented by Optiv Security & Tenable

A proactive, risk-driven Vulnerability Management approach delivers comprehensive, continuous visibility and informs technical and business decisions. Join Tenable’s Nathan Wenzler and Optiv’s Doug Drew (a respected Tenable Guardian) as they discuss real-world VM challenges and how to manage and measure your cyber risk.

Topics: Information Security, Strategic Management
  • Sessions
9:00 - 9:50 AM

[1 CPE] Zero Trust: From Theory to Reality in Five Steps

  Presented by Guardicore

Let’s be real. True to its name, there is zero trust about the term “zero trust.” It’s been used as marketecture since its inception. Cut through the fog with this presentation with practical insight and steps to take to ensure your organization makes the most out of ZTA.

Topics: Information Security
10:00 - 10:50 AM

[1 CPE] The Evolution of Vulnerability Management

  Presented by Optiv Security & Tenable

A proactive, risk-driven Vulnerability Management approach delivers comprehensive, continuous visibility and informs technical and business decisions. Join Tenable’s Nathan Wenzler and Optiv’s Doug Drew (a respected Tenable Guardian) as they discuss real-world VM challenges and how to manage and measure your cyber risk.

Topics: Information Security, Strategic Management
11:00 - 11:50 AM

[1 CPE] 2021 State of Malware

  Presented by Malwarebytes

Over the past year, the tools and tactics of cybercrime and cybersecurity adapted against a backdrop of enormous changes to our lives and businesses.

Join us to learn how cybercrime evolved in 2020 and identify ways to safeguard your organization against what’s out there.

We’ll explore:

  • Top threats for businesses and consumers
  • Emerging cybercrime trends and tactics
  • Solutions you can employ to thwart future attacks
Topics: Information Security
12:00 - 12:50 PM

[1 CPE] CI/CD for Networking: Adopting DevOps Principles for a More Robust Network

  Presented by Infoblox

In recent years, continuous integration and continuous deployment, aka CI/CD, have become de facto standards for DevOps-minded software development organizations. Adoption of CI/CD enables software architects and IT specialists to create more flexible, secure and agile infrastructure with new features and functionality that are continually improved and deployed. While compute and storage aspects of environments have benefited greatly from CI/CD, network infrastructure has lagged behind.

This presentation pulls back the covers on efforts taking place to bring CI/CD philosophies to the work of revamping legacy, monolithic network architectures using cloud-native principles, microservices and containerization. The end goal is to create networks that are inherently more adaptable, scalable, automated and simpler to manage.

Speaker Bio: Glenn Sullivan is a Principal Product Manager for Emerging Technologies at Infoblox and joined the Infoblox team when SnapRoute, a company he co-founded in 2015, was acquired by Infoblox. At SnapRoute, Sullivan was responsible for product direction by advocating for the end-user. Prior to founding SnapRoute, Sullivan was responsible for building out hyperscale data center environments at Apple. In addition to core network operational functions, Sullivan led efforts to automate the lifecycle management of various platforms in a multivendor environment. Before Apple, Sullivan was a specialist support engineer on the LAN Switching team in Cisco TAC. While there, his specialty was in turning around customer sentiment by focusing on escalated issues and transforming the customer experience into a positive one. Sullivan has a BS in Network and Systems Administration from RIT (Rochester Institute of Technology).

Topics: Infrastructure, Unified Communications
1:00 - 1:50 PM

[1 CPE] Health and Safety Innovations Lay a Smart Digital Foundation

  Presented by Hitachi Vantara

The pandemic has accelerated innovation to protect health and safety, while laying a foundation for broader digital transformation across industries. Learn how automated detection of PPE, social distancing, collision avoidance, thermal scanning, and compliance analytics are helping companies reduce risk while protecting their workers and customers, and how this shift is preparing them to thrive in our digital future.

Topics: Infrastructure, Strategic Management

Advisory Council

HOW TO BE AN ADVISOR

Advisor-approved content is the foundation upon which INTERFACE was developed. Each conference is guided by an Advisory Council of IT executives and senior managers. Advisor members represent both private and public sector organizations. The council contributes its insight into proposed educational topics and recommends local exhibitors and associations for participation.

EXPAND TO VIEW LIST

Michael Agtunong
Manager, Information Technology
Gather Federal Credit Union

Stephen Alford
Chief Information Officer
Worldwide Environmental Products

Kevin Brockenborough, Jr.
Director, Information Technology
Antimite Termite & Pest Control

Rick Buddine
Chief Information Officer
BIT Corporation

Nathan Chang
Manager, IT Client Services
The Queen’s Health Systems

Becky Christy
Director, Business Continuity
Southern Glazer’s Wine & Spirits

Fred Del Rosario
Manager, Information Technology
Arcturus Therapeutics

Cody Down
Chief Information Officer and Associate Vice President
Hawaii Pacific University

Jeff Ferrer
Manager, Information Technology
HI Dept of Human Services

Ryan Field
Sr Vice President, Director of Technology
American Savings Bank

Ricardo Fitipaldi
Interim Chief Information Security Officer
San Diego State University

Jeromy Giacossa
Sr Director, Information Systems
Exagen

Vince Hoang
Chief Information Security Officer
State of Hawaii

Alan Ito
Information Security Officer
Hawaii Pacific Health

Jodi Ito
Chief Information Security Officer
University of Hawaii

Ray Kelly
VP, Information Security, CISO
Millennium Health

Robert Kuhn
Manager, Information Technology
Retrophin, Inc. (RTRX)

Dana Mendoza
Director, Information Technology
VIP Food Service

Geoff Milford
Technical Analyst
Hawaii Pacific Health

Tim Minick
Director, Information Technology
Pacific Guardian Life

Grant Nakamichi
Manager, IT Infrastructure
Aloha Pacific Federal Credit Union

Michael Nevlida
Sr Technical Program Manager
Zillow

Patrick O’Donnell
Director, Information Technology
Cerritos Community College

Todd Plesco
Chief Information Security Officer
Tabula Rasa HealthCare

Dave Stevens
Professor, Information Security Program
Kapiolani Community College

Nedie Stokosa
Manager, Information Technology
P2S Inc.

Raj Thakar
Sr Director, IS & Data Analytics
Genomatica

Anh Tran
Manager, Information Technology
CA City of El Monte

Tony Velasco
Division Chief, Information Technology
HI City & County of Honolulu

Dwight Victor
Systems & Network Team Lead
General Dynamics Missile Systems

Monique Weiland
Project Manager
Southern California Edison

Charissa Wong
Manager, Information Technology
Bowers + Kubota Consulting

Alan Yamashiro
Project Manager, Information Security
Hawaii Pacific Health

Susan Zielan
Manager, Business Continuity
CoreLogic

Sponsors

HOW TO BE A SPONSOR

Participating exhibitors at INTERFACE achieve a greater return on their investment from this series of IT events than any other face-to-face medium available today. This success is achieved through a time-efficient and cost-effective presence for a pre-qualified audience. This simple formula leads to higher levels of business development opportunity at each event.

GOLD SPONSORS

Optiv

Optiv

Optiv
Optiv is the cyber advisory and solutions leader, delivering strategic and technical expertise to nearly 6,000 companies across every major industry. We partner with organizations to advise, deploy and operate complete cybersecurity programs from strategy and managed security services to risk, integration and technology solutions. With clients at the center of our unmatched ecosystem of people, products, partners and programs, we accelerate business progress like no other company can. At Optiv, we manage cyber risk so you can secure your full potential.
Visit Website
StorageCraft

StorageCraft

StorageCraft
Arcserve is a global top 5 data protection vendor with best-in-class solutions that manage, protect, and recover all data workloads, from SMB to enterprise and regardless of location or complexity. A 100% channel-centric organization, Arcserve has a presence in over 150 countries, with 19,000 channel partners and 235,000 customers.
Visit Website
Tenable

Tenable

Tenable
Tenable, Inc., is the Cyber Exposure company. Over 30,000 organizations around the globe rely on Tenable to understand and reduce cyber risk.
Visit Website
VPLS Solutions

VPLS Solutions

VPLS Solutions
VPLS is your trusted global provider for cloud-to-edge computing and technology services. From hardware and software procurement to managed services, customers worldwide trust VPLS for their cloud, colocation, hosting, backup, and cybersecurity needs.
Visit Website

SILVER SPONSORS

Airgap

Airgap

Airgap
Airgap's Agentless Zero Trust Isolation™ platform is the best defense against ransomware propagation. Put an end to threat propagation and protect your infrastructure - in minutes, not months.
Visit Website
Business Partner Solutions

Business Partner Solutions

Business Partner Solutions
Business Partner Solutions, Inc. is a 15-year-old, leading cybersecurity consulting organization that designs and executes strategies to address clients' complex information security challenges.
Visit Website
Cynet

Cynet

Cynet
Cynet 360 is the world's first Autonomous Breach Protection platform that natively integrates XDR endpoint, user and network attack prevention and detection capabilities with an incident engine that fully automates investigation and remediation actions, backed by a 24/7 world - class MDR service. End to end, fully automated breach protection is now within reach of any organization, regardless of security team size and skill level.
Visit Website
Duo Security

Duo Security

Duo Security
Duo Security, now part of Cisco, is the leading multi-factor authentication (MFA) and secure access provider. Duo is a trusted partner to more than 25,000 customers globally, including Facebook, Yelp, Zillow and more.
Visit Website
Fortinet

Fortinet

Fortinet
Fortinet empowers its customers with intelligent, seamless protection across the expanding attack surface & the power to take on the ever-increasing performance requirements of the borderless network – today and into the future.
Visit Website
Gigamon

Gigamon

Gigamon
Gigamon offers a deep observability pipeline that harnesses actionable network-level intelligence to amplify the power of observability tools. This powerful combination enables IT organizations to assure security and compliance governance, speed root-cause analysis of performance bottlenecks, and lower operational overhead associated with managing hybrid and multi-cloud IT infrastructures.
Visit Website
Guardicore

Guardicore

Guardicore
Guardicore, now part of Akamai, delivers easy-to-use Zero Trust network segmentation to security practitioners across the globe. Our mission is to minimize the effects of high-impact breaches, like ransomware, while protecting the critical assets at the heart of your network. We shut down adversarial lateral movement, fast. From bare metal to virtual machines and containers, Guardicore has you covered across your endpoints, data centers and the cloud. Our software-based platform helps you become more secure to enable your organization’s digital transformation.
Visit Website
Hitachi Vantara

Hitachi Vantara

Hitachi Vantara
Hitachi Vantara helps enterprises create and derive value from their data. Its solutions include best-in-class data management, IT infrastructure and analytics products, IoT solutions and Smart Spaces technologies for a broad range of industries.
Visit Website
Infoblox

Infoblox

Infoblox
Infoblox unites networking and security to deliver unmatched performance and protection. Trusted by Fortune 100 companies and emerging innovators, we provide real-time visibility and control over who and what connects to your network, so your organization runs faster and stops threats earlier.
Visit Website
Malwarebytes

Malwarebytes

Malwarebytes
Malwarebytes protects workplace productivity. We secure all your endpoints so employees can connect confidently, from anywhere. We combine analytics-driven, multi-layer threat protection and industry-leading incident response to both simplify and strengthen overall cybersecurity. You and your team stay up and running, so you can remain focused on driving your business.
Visit Website
Quest Software

Quest Software

Quest Software
At Quest, we solve complex problems with simple solutions. Our philosophy is focused on great products, great service and being simple to do business with. We deliver technology that eliminates the need to choose between efficiency and effectiveness.
Visit Website

BRONZE SPONSORS

Cyberuptive

Cyberuptive

Cyberuptive
Cyberuptive is a full-service international cybersecurity consulting firm based in Hawaii. With analysts positioned nationwide, they offer around the clock services that include CMMC compliance, managed SOC services, and cybersecurity program development.
Visit Website
Imperva

Imperva

Imperva
Imperva is the cybersecurity leader whose mission is to protect data and all paths to it. With an integrated approach that combines edge, application and data security, Imperva protects companies through all stages of their digital journey.
Visit Website
Spectrum Business

Spectrum Business

Spectrum Business
Spectrum Business® delivers a complete portfolio of secure connectivity solutions for small and mid-market businesses and caters to the unique needs of large businesses, communications service providers and government entities. Our industry-leading experts align our products to the needs of each customer, drawing from our full suite of services including internet solutions over hybrid fiber-coax and 100% fiber, video and voice solutions including phone and mobile, as well as unified communications and managed services tailored for our mid-market and large enterprise customers.
Visit Website
Veeam

Veeam

Veeam
Veeam is the global leader in Intelligent Data Management for the Hyper-Available Enterprise. Veeam Hyper-Availability Platform is the most complete solution to help customers on the journey to automating data management.
Visit Website

EXHIBITORS & ASSOCIATIONS

ACP Orange County

ACP Orange County

ACP Orange County
ACP is the premier organization for business continuity professionals providing a powerful networking and learning environment for its members.
Visit Website
AITP San Diego

AITP San Diego

AITP San Diego
The San Diego Chapter is the local community of members of the Association of Information Technology Professionals. The San Diego Chapter holds monthly meetings and produces the annual San Diego Cloud Computing Conference.
Visit Website
ARMA Orange County

ARMA Orange County

ARMA Orange County
OCARMA’s mission is to promote and advance the professional competence of its members to enable them to provide records and information management leadership and information governance expertise within their organizations and communities.
Visit Website
ASIS Hawaii

ASIS Hawaii

ASIS Hawaii
ASIS International is the preeminent organization for security professionals. Founded in 1955, ASIS is dedicated to increasing the effectiveness and productivity of security professionals.
Visit Website
ASIS Orange County

ASIS Orange County

ASIS Orange County
With approximately 38,000 security professionals and over 230 chapters worldwide. The Orange County Chapter is one of the largest chapters in Region 1D, which encompasses Southern California and Hawaii.
Visit Website
ASIS San Diego

ASIS San Diego

ASIS San Diego
ASIS International is the preeminent organization for security professionals. Founded in 1955, ASIS is dedicated to increasing the effectiveness and productivity of security professionals.
Visit Website
CSA

CSA

CSA
The Cloud Security Alliance (CSA) is a non-profit with a mission to promote best practices for providing security assurance within Cloud Computing, and to provide education on the uses of Cloud Computing to help secure all other forms of computing.
Visit Website
ESET

ESET

ESET
For more than 30 years, ESET® has been developing industry-leading IT security software and services to protect businesses, critical infrastructure, and consumers worldwide.
Visit Website
EVOTEK

EVOTEK

EVOTEK
EVOTEK™ is North America's premier enabler of digital business with a focus on innovation. With technology offerings in cybersecurity, data center, automation and cloud, EVOTEK is uniquely equipped to enable customers with the industry shift from traditional IT computing to secure multi-cloud.
Visit Website
ExtraHop

ExtraHop

ExtraHop
ExtraHop delivers enterprise cyber analytics that allow you to quickly investigate threats, ensure the delivery of critical applications, and secure your investment in the cloud.
Visit Website
IIBA Hawaii

IIBA Hawaii

IIBA Hawaii
Local Chapters promote and support IIBA’s professional standards and practices. There are well established Local Chapters in global centers with new ones emerging throughout the IIBA network.
Visit Website
InfraGard Hawaii

InfraGard Hawaii

InfraGard Hawaii
InfraGard is a partnership between the FBI and the private sector. It is an association dedicated to sharing information and intelligence to prevent hostile acts against the U.S.
Visit Website
InfraGard San Diego

InfraGard San Diego

InfraGard San Diego
The purpose of the Infragard San Diego Members Alliance is to mitigate criminal- and terrorist-based threats, risks and losses.
Visit Website
ISACA Hawaii

ISACA Hawaii

ISACA Hawaii
Aloha and welcome to the ISACA Hawaii Chapter. The aim of the Chapter is to sponsor educational seminars, workshops, conduct chapter meetings, and help promote and elevate the visibility of the IS audit, control and security profession throughout the area.
Visit Website
ISACA San Diego

ISACA San Diego

ISACA San Diego
ISACA® is a nonprofit, independent association that advocates for professionals involved in information security, assurance, risk management and governance.
Visit Website
ISC2 Hawaii

ISC2 Hawaii

ISC2 Hawaii
The International Information Systems Security Certification Consortium, Inc., (ISC)², is the global, not-for-profit leader in educating and certifying information security professionals throughout their careers.
Visit Website
PMI Hawaii

PMI Hawaii

PMI Hawaii
PMI is the world's leading not-for-profit membership association for the project management profession. PMI Honolulu's mission is to promote the project management practice and profession through networking, sharing of project experiences, training, education, and certification in the State of Hawaii.
Visit Website
PMI Orange County

PMI Orange County

PMI Orange County
PMI-OC creates value for our members and the community through Project Management excellence, leadership and innovation.
Visit Website
San Diego IT Directors Group

San Diego IT Directors Group

San Diego IT Directors Group
Our group grew out of the San Diego biotech industry. Our original members were all IT Managers or Directors for their companies. Most of the original core members still participate in the group.
Visit Website
Secure Smart Office

Secure Smart Office

Secure Smart Office
Secure, Smart Office is a San Diego-based Secured IT company with decades of combined experience in security & IT focused on protecting small and mid-size organizations of our community. We are a proud provider of ESET, industry-leading IT security products from endpoint and mobile security, encryption, two-factor authentication to cybersecurity awareness training.
Visit Website

Interested in becoming part of our next Hawaii SoCAL event?

CONTACT US FOR INFO

About Us

We produce quality, cutting-edge educational seminars, drawn from case studies and best practice examples from leaders in the field.

800-365-6402
Contact Us

Popular Searches

  • Event Registration
  • Become an Exhibitor
  • Become an Advisor
  • Sponsor an Event
  • Contact Event Coordinator
  • Submit Feedback

Seminar Topics

  • Artificial Intelligence
  • BC / DR
  • Culture
  • Data Center Technology
  • Data Management
  • Data Storage
  • Digital Experience
  • Information Security
  • Infrastructure
  • Strategic Management
  • Unified Communications

2026 Events

  • Portland • March 19th
  • Anchorage • April 22nd
  • Honolulu • May 21st
  • Phoenix • June 18th
  • Wyoming • July 9th
  • Montana • July 29th
  • Boise • August 20th
  • Salt Lake City • September 22nd
  • Spokane • October 15th
  • Omaha • November 5th
  • Seattle • December 3rd
  • Home
  • About
  • Get Involved
  • Events
  • Register
  • © 2026 F2F Events, Inc.