F2F Events, Inc.
  • Home
  • About
    • About
    • CPE Credits
    • Session Topics
    • Privacy Policy
      • Scam Warning
    • Code of Conduct
    • Media Kit
  • Get Involved
    • Advisory Council
    • Association Partners
    • Exhibitors
    • Speakers
  • Events
    • Locations
    • Upcoming Events
  • Contact
  • Register

Cutting-edge conferences for over 20 years

Educational Events with Your Local IT Community

View Upcoming Events Register

INTERFACE Virtual Sacramento Reno 2021 / See You Next Year

IT Infrastructure is constantly changing, bringing more new challenges with it every day. From ransomware and the latest security threats to emerging developments in AI and the need for increased bandwidth and storage, it’s nearly impossible to keep up to date. Our conference is designed to help. We’ve assembled a combination of Best-in-Breed hardware and software solutions, along with local experts and organizations to help educate, advise and connect you to resources that can help you meet your goals.

Covering Information Security, Infrastructure, Cloud, Disaster Recovery, Communications, and more, you’ll find presentations, panel discussions, and exhibitors covering a variety of topics, as well as the latest innovations and best practices.

AT A GLANCE

September 16th, 2021
8:30am – 4:30pm

Virtual Conference
Multi-track seminars with Q&A
1-on-1 chat and networking
Hourly prize drawings

KEYNOTE: [1 CPE] The Strongest Links in Your Chain: A Conversation on Team Engagement

  Presented by Alan Cunningham • Chief Information Officer, State of Nevada

Seminar Schedule

  • Theater One
  • Theater Two
  • Theater Three
  • Sessions
  • Keynote
9:00 - 9:50 AM

[1 CPE] How to Manage and Simplify Your IT While Lowering Your TCO for Government

  Presented by Nutanix

As Government leaders pivot to meet the unique challenges of an extraordinary 2021, a new normal is emerging: organizations are increasingly tasking IT to find and deliver rapid new business value through increased efficiency, enhanced automation, accelerated time to market, sharp innovation, and rock-solid cost savings.

For these organizations, it’s time to reach a new economic advantage. Learn how you can save your valuable budget, time, and manpower and redistribute resources toward more high-value initiatives. After all, your infrastructure should deliver returns—not add complexity and costs over time.

Topics: Business Continuity / Disaster Recovery
10:00 - 10:50 AM

[1 CPE] How Zero-Trust Enables the Future of “Work from Anywhere” Secure Access

  Presented by Duo Security

The perimeter-focused security model of decades past is no longer adequate for securing the modern enterprise. Now, organizations must secure a mobile workforce using a mix of corporate-owned and personal devices to access cloud-based applications and services, often from outside corporate networks — and this trend only accelerated during 2020's global shift to remote work. Fortunately, a modern access strategy built on zero-trust fundamentals can defend today’s workforce while paving the way to a passwordless future. Attend this session to learn how the zero-trust access model works, reduce your reliance on passwords and risk of password-based attacks, and how to start planning and staging your zero-trust evolution today.

Topics: Information Security
11:00 - 11:50 AM

[1 CPE] Discover How SD-WAN Edge and Cloud Security are Enabling Digital Transformation

  Presented by Silver Peak & Aruba, a HPE Company

Adoption of cloud services and the explosive increase in mobile and IoT devices have driven enterprises to transform both their WAN and security architectures – not just one or the other. The strategic imperative is to deploy a more intelligent, highly automated software-defined wide area network (WAN) that can be seamlessly integrated with modern cloud-delivered security services. Gartner coined the term “secure access service edge” (SASE) to describe this cloud-first architecture. During this session, we’ll discuss:

  • SD-WAN and security considerations enterprises must address when migrating to a SASE architecture
  • How to address Zero Trust access security requirements for remote workers and IoT
  • Pros and cons of single vendor vs multi-vendor SASE implementations
Topics: Data Storage, Infrastructure
12:00 - 12:50 PM

[1 CPE] Privacy in the Age of Big Data: You Want to Know What About Me?

  Presented by Steve Smith • Chief Information Officer, University of Nevada Reno

Do you know who has access to data about you? What data, where it is, how it is shared, when (if ever) it is deleted? Facial recognition and other biometric tracking capabilities may be giving rise to surveillance capitalism. We are normalizing technologies that nobody knows how they will be used in the long term. At the same time laws like the European Union General Data Protection Regulation (GDPR) and the California Consumer Privacy Act (CCPA) are imposing compliance requirements that impact how business is conducted. Learn the latest about the technologies and the policies that impact privacy and how it may impact the role of IT.

Bio:
Steve Smith is the Vice Provost for Information Technology and CIO for the University of Nevada, Reno (UNR). UNR is a Carnegie Classified R-1 research university and the land grant institution for the state of Nevada. Steve has been at UNR since 2015. Prior to that, he held similar positions at the University of Hawaii system and the University of Alaska system with over 35 years of experience in information technology in higher education. He has extensive experience in networks and large systems for research and education. He is chair of the board for the Pacific Northwest Gigapop and Co-Chair of the Schools, Health & Libraries Broadband (SHLB) Coalition Higher Education Policy Group. Steve is also a member of the Juniper Higher Education Advisory Board and the VMWare Higher Education Peer Advisory Board.

Topics: Information Security
1:00 - 1:50 PM

[1 CPE] Handling the “New Normal” in Security and Beyond

  Presented by Keson Khieu • Chief Information Officer, California Emergency Medical Services Authority

Now that a hybrid workforce is likely to be the standard in both public and private enterprises, IT staffs have had to adapt. There has been an increase in ransomware threats that are making headlines. Handling privacy and compliance requirements has created unique challenges.

Security leaders must now navigate in new waters. We are truly entering a new model of cybersecurity that is here to stay. Join Keson Khieu, CISSP, PMP, ITIL, for a though-provoking discussion. You will get many takeaways about how these new challenges are actually great business opportunities for your firm.

Topics: Information Security
2:00 - 2:50 PM

[1 CPE] Data Classification and Compliance with Secure Storage

  Presented by Hitachi Vantara

With the continuing expanse of data, many companies struggle to store, categorize, and account for all of their corporate data. Due to this intensifying challenge, companies are unable to retrieve and analyze data in a way that leads to proper data governance. As their data grows, regulatory bodies institute laws and regulations to protect consumers’ data and ensure businesses are operating ethically. Unfortunately, companies that fail to comply with these changing regulations face large fines, loss of market share, and consumer backlash.

Join us for a demo to learn how Hitachi’s solutions can help companies find and manage their data through Data Classification and Secured Storage. Also learn if your company qualifies for the complimentary $100,000 data assessment 700+ customers have benefited from over the past decade.

Topics: Data Storage, Information Security
Alan CunninghamAlan CunninghamChief Information Officer, State of Nevada
3:00 - 3:50 PM

[1 CPE] The Strongest Links in Your Chain: A Conversation on Team Engagement

  Presented by Alan Cunningham • Chief Information Officer, State of Nevada

As information technology professionals, we are used to constant change and the exhilaration that results from solving tough challenges. A chronic high-skilled labor shortage during a global pandemic has been the Everest of organizational challenges that government and all businesses are learning how to navigate, often with a reduction in resources.

Join Nevada State Chief Information Officer Alan Cunningham to learn why your current teams are your organization’s greatest asset, and how to reframe the current challenge of attracting, retaining, and developing technical talent pools as an exciting opportunity to create organizational resilience.

As CIO, Alan Cunningham establishes the strategic direction of Nevada state information technology. He served as the Washoe County School District’s Information Security Officer since 2016, following a 30 plus-year IT career in the private sector. He is a Certified Information Systems Security Professional (CISSP), certified in Strategic Planning, Policy and Leadership (GSTRT) and System and Network Auditor (GSNA) with extensive experience in cybersecurity operations, disaster recovery, business continuity planning, and policy and strategic planning. As an experienced street motorcycle racer, risk assessment is a constantly practiced skill.

Topics: Strategic Management
  • Sessions
9:00 - 9:50 AM

[1 CPE] Ransomware In Focus: How AI Surgically Contains the Threat

  Presented by Darktrace

In the immediate aftermath of a ransomware attack, executives too often face a difficult dilemma: either pay a ransom or shut down critical systems and services. In today’s increasingly complex digital ecosystems, the collateral damage that ensues from ransomware attacks can be broad-ranging and destructive, with organizations taking days, weeks, or even months to recover.

But what if there was another way out – a way to surgically contain ransomware in its earliest stages, without disrupting normal business operations? Join this presentation to learn how Cyber AI is helping thousands of organizations fight back against ransomware. We’ll discuss:

  • The impact of ‘double-extortion’ ransomware and ‘ransomware-as-a-service’
  • Real-world examples of ransomware detected by Cyber AI
  • How self-learning AI responds proportionately to ransomware, thanks to its deep understanding of an organization’s pattern of life
Topics: Information Security
10:00 - 10:50 AM

[1 CPE] Health and Safety Innovations Lay a Smart Digital Foundation

  Presented by Hitachi Vantara

The pandemic has accelerated innovation to protect health and safety, while laying a foundation for broader digital transformation across industries. Learn how automated detection of PPE, social distancing, collision avoidance, thermal scanning, and compliance analytics are helping companies reduce risk while protecting their workers and customers, and how this shift is preparing them to thrive in our digital future.

Topics: Infrastructure, Strategic Management
11:00 - 11:50 AM

[1 CPE] The Rise of Secure Access Service Edge

  Presented by Bitglass

Secure access service edge has quickly emerged as a hot topic in cybersecurity, but what exactly does it mean and why should organizations care? As cloud migration, BYOD adoption, and remote work have skyrocketed in prevalence, it has become increasingly apparent that organizations need to think differently about security. While legacy tools like firewalls are no longer equipped to handle the modern IT ecosystem, SASE platforms are built for this exact moment.

In this presentation, you will learn:

  • The core components SASE
  • The functionality you need to secure cloud, web, and remote access use cases
  • Architectural considerations for SASE platforms
Topics: Information Security
12:00 - 12:50 PM

[1 CPE] Ransomware: Why Does This Keep Happening?

  Presented by Arctic Wolf

Join Coy Thorp, Systems Engineer for Arctic Wolf, as he discusses the history and evolution of ransomware and why it has become so difficult to detect and mitigate. The basic premise is this: organizations spend more today than ever before to address cybersecurity risk, yet breaches are on the rise and there is no end in sight. What can your company do to prepare itself for the attack that is imminently on the horizon?

Topics: Information Security
1:00 - 1:50 PM

[1 CPE] Thinking Upstream About White House Cybersecurity Executive Order 14028

  Presented by Tidelift

A few months ago, the U.S. White House released cybersecurity executive order 14028, an attempt by the United States government to use its purchasing power to create positive changes to the way cybersecurity is addressed around the world.

Recent high-profile breaches like the Colonial Pipeline ransomware attack or the SolarWinds software supply chain attack have shown that our cybersecurity defenses are woefully inadequate. This executive order forces a higher standard of cybersecurity for any organization selling software to the federal government, which in turn makes it the de facto global standard for all software in the future.

Tidelift CEO and co-founder Donald Fischer shares his perspective on how the cybersecurity executive order impacts software supply chain security. He’ll brief attendees on the key issues addressed by the executive order, including software bill of materials (SBOM), supply chain security, and provenance requirements. He’ll outline the gaps that most organizations will need to close to stay in compliance. And he’ll share a proactive approach to addressing open-source software supply chain health and security upstream.

If you want to ensure your organization is fully prepared for the coming changes, you won’t want to miss this session.

Topics: Information Security, Infrastructure
2:00 - 2:50 PM

[1 CPE] How to Manage and Simplify Your IT While Lowering Your TCO for Government

  Presented by Nutanix

As Government leaders pivot to meet the unique challenges of an extraordinary 2021, a new normal is emerging: organizations are increasingly tasking IT to find and deliver rapid new business value through increased efficiency, enhanced automation, accelerated time to market, sharp innovation, and rock-solid cost savings.

For these organizations, it’s time to reach a new economic advantage. Learn how you can save your valuable budget, time, and manpower and redistribute resources toward more high-value initiatives. After all, your infrastructure should deliver returns—not add complexity and costs over time.

Topics: Business Continuity / Disaster Recovery
  • Sessions
9:00 - 9:50 AM

[1 CPE] What Got Us Here, Won’t Get Us to Where We’re Going…

  Presented by Aruba, a HPE Company

Over the past couple of decades, we’ve relied on a certain predictable and repeatable model of expectations from our infrastructure that has delivered. However, the demands of Digital Transformation, the pace of change, the capabilities within our teams -- and of course the pandemic -- have created business pressures that traditional ways of building and security infrastructure just can’t keep pace with.

The time is now to reflect, reset, and embrace a different way that will increase agility and flexibility as well as enhance performance and security. Lose the baggage of the past, travel light, and let’s chart a course for the journey ahead.

Topics: Business Continuity / Disaster Recovery, Information Security, Infrastructure
10:00 - 10:50 AM

[1 CPE] Situational Awareness Into the Dark Web

  Presented by Check Point Software

In our journey through this session, we take you through the evolution, goals, and motivation of the Dark Web. We will share with you what and whom you can find on the platforms as well as the major conflicts individuals face while exploring this web. The session also exposes you to the syndicates and structures running on the platforms. Surprisingly, we see how those groups were among the first to embrace and implement Blockchain technology and created a major global demand for crypto currencies. This is the time to listen, learn, and be exposed to the deepest secrets of the Dark Web.

Topics: Information Security
11:00 - 11:50 AM

[1 CPE] Build Tailored Customer Experiences

  Presented by Okta

Businesses are in the middle of a transformation. As every company becomes a technology company, you must be obsessed about the customer’s experience.

Modern Customer Identity and Access Management (CIAM) is foundational to building digital customer experiences. Discover how you can transform your business with modern, digital experiences your customers demand by creating frictionless registration and login for your apps.

Topics: Digital Experience, Infrastructure
1:00 - 1:50 PM

[1 CPE] Immutable Storage: Level-Up Ransomware Readiness

  Presented by Arcserve & StorageCraft

IDC advises that a 3-2-1-1 strategy is the new best practice for effectively protecting customers against ransomware. The last 1 is the important piece of the puzzle, where a copy is also stored on immutable storage. The growing risk of compromise to your customers’ data – specifically via ransomware DEMANDS the most up to date and complete solutions arsenal.

Topics: Data Storage, Information Security

Advisory Council

HOW TO BE AN ADVISOR

Advisor-approved content is the foundation upon which INTERFACE was developed. Each conference is guided by an Advisory Council of IT executives and senior managers. Advisor members represent both private and public sector organizations. The council contributes its insight into proposed educational topics and recommends local exhibitors and associations for participation.

EXPAND TO VIEW LIST

Wendy Brown
Director, IT Operations
MD Labs

Bert Carroll
VP, Chief Information Security Officer
EMPLOYERS Insurance

Tony Coronas
Director, Information Technology
Roebbelen Contracting

Bob Dehnhardt
Chief Information Security Officer
State of Nevada

Maisha Dottery
Chief Technology Strategist
CA State Treasurer’s Office

Dan Erlendson
Sr Server Administrator
University of Nevada Reno

Chris Fischer
Manager, Information Technology
DLL Techs

Dave Forbes
Manager, Information Technology
Grand Sierra Resort

Adam German
Chief Information Security Officer
CA State Controller’s Office

Zak Gulling
Chief Information Officer
Monarch Casino

Heather Hall
Manager, Information Security Program
EMPLOYERS Insurance

Veralyn Hensley
Director, Vendor Management
Mechanics Bank

Michael Hull
Manager, IT Support
HDR Inc

Ren Johnson
Vice President, Information Technology
Acclamation Insurance Management Services

Keson Khieu
Chief Information Officer
Emergency Medical Services Authority

Tolgay Kizilelma
Chief Information Security Officer
University of California Merced

Ashish Kumar
Information Security Officer
CA Housing Finance Agency

Sam Malla
Manager, Information Technology
CA Dept of Technology

Chris McClendon
Manager, IT Operations
University of Nevada Reno

Sherri McGee
Deputy Chief, Information Technology
NV Dept of Transportation

Russell Nakao
Information Security Officer
CA Housing Finance Agency

Minh Nguyen
Chief Information Security Officer
Cedaron Medical

Harry O’Laughlin
Chief Information Security Officer
CA Dept of Insurance

Abraham Pearson
Director, Information Technology
Monarch Casino & Resort

James Pierce
Manager, Information Technology
Paterson Pacific Parchment Co

Michael Reese
Chief Information Security Officer
Educational Media Foundation

Laurie Schroeder
Sr Manager, IT Projects
Prominence Health Plan

Matt Spears
Assistant Director, Information Services
Corban University

Ajay Wadhwa
Chief Information Security Officer
CA State Compensation Insurance Fund

Sponsors

HOW TO BE A SPONSOR

Participating exhibitors at INTERFACE achieve a greater return on their investment from this series of IT events than any other face-to-face medium available today. This success is achieved through a time-efficient and cost-effective presence for a pre-qualified audience. This simple formula leads to higher levels of business development opportunity at each event.

GOLD SPONSORS

Hitachi Vantara

Hitachi Vantara

Hitachi Vantara
Hitachi Vantara helps enterprises create and derive value from their data. Its solutions include best-in-class data management, IT infrastructure and analytics products, IoT solutions and Smart Spaces technologies for a broad range of industries.
Visit Website
HPE Aruba Networking

HPE Aruba Networking

HPE Aruba Networking
Deliver the performance and uninterrupted access your business demands with a Zero Trust foundation and AI-automated operations that help you innovate with the least risk.
Visit Website
Nutanix

Nutanix

Nutanix
Nutanix makes IT infrastructure invisible with an enterprise cloud platform that delivers the agility and economics of the public cloud, without sacrificing the security and control of on-premises infrastructure.
Visit Website

SILVER SPONSORS

Arcserve

Arcserve

Arcserve
Arcserve is a global top 5 data protection vendor with best-in-class solutions that manage, protect, and recover all data workloads, from SMB to enterprise and regardless of location or complexity. A 100% channel-centric organization, Arcserve has a presence in over 150 countries, with 19,000 channel partners and 235,000 customers.
Visit Website
Arctic Wolf

Arctic Wolf

Arctic Wolf
Arctic Wolf® is the market leader in security operations, and provides security operations as a concierge service. Our security experts work as an extension of your team to monitor and detect threats, and continually strengthen your security posture.
Visit Website
Bitglass

Bitglass

Bitglass
Bitglass’ Total Cloud Security Platform is the only secure access service edge offering that combines a Gartner-MQ-Leading cloud access security broker, the world’s only on-device secure web gateway, and zero trust network access to secure any interaction.
Visit Website
Check Point Software

Check Point Software

Check Point Software
Check Point is a leading provider of cyber security solutions to governments and corporate enterprises globally. Its solutions protect customers from 5th generation cyber-attacks with an industry leading catch rate of malware, ransomware and other types of attacks.
Visit Website
Darktrace

Darktrace

Darktrace
Darktrace is a leading cybersecurity AI company and the creator of Autonomous Response technology. It provides a comprehensive cyber defense to over 5,500 organizations, protecting the cloud, email, IoT, traditional networks, endpoints, and industrial systems.
Visit Website
Duo Security

Duo Security

Duo Security
Duo Security, now part of Cisco, is the leading multi-factor authentication (MFA) and secure access provider. Duo is a trusted partner to more than 25,000 customers globally, including Facebook, Yelp, Zillow and more.
Visit Website
Okta

Okta

Okta
Okta is the World’s Identity Company. As the leading independent Identity partner, we free everyone to safely use any technology— anywhere, on any device or app. Organizations trust Okta to enable secure access, authentication, and automation. With flexibility and neutrality at the core of our Okta Workforce Identity and Customer Identity Clouds, government, business leaders and developers can focus on innovation and accelerate digital transformation, thanks to customizable solutions and more than 7,000 pre-built integrations.
Visit Website
Tidelift

Tidelift

Tidelift
Tidelift provides a proactive approach to managing open source effectively for application development teams. The Tidelift Subscription can improve the health, security, and resilience of your organization’s open source software supply chain.
Visit Website

BRONZE SPONSORS

Gigamon

Gigamon

Gigamon
Gigamon offers a deep observability pipeline that harnesses actionable network-level intelligence to amplify the power of observability tools. This powerful combination enables IT organizations to assure security and compliance governance, speed root-cause analysis of performance bottlenecks, and lower operational overhead associated with managing hybrid and multi-cloud IT infrastructures.
Visit Website
Veeam

Veeam

Veeam
Veeam is the global leader in Intelligent Data Management for the Hyper-Available Enterprise. Veeam Hyper-Availability Platform is the most complete solution to help customers on the journey to automating data management.
Visit Website

EXHIBITORS & ASSOCIATIONS

ARMA Sacramento

ARMA Sacramento

ARMA Sacramento
ARMA International provides education and networking opportunities to information professionals to enable them to use skills and experience to leverage the value of records and knowledge as corporate assets and as contributors to organizational success.
Visit Website
ASIS Northern Nevada

ASIS Northern Nevada

ASIS Northern Nevada
ASIS International is the preeminent organization for security professionals. ASIS is dedicated to increasing the effectiveness and productivity of security professionals by developing educational programs and materials that address broad security interests.
Visit Website
CITE

CITE

CITE
California IT in Education is a not-for-profit, association supporting the IT Professionals working in schools. Our members support hardware, software, help desk, data, WiFi, and installing and maintaining the infrastructure as technology used in schools.
Visit Website
ExtraHop

ExtraHop

ExtraHop
ExtraHop delivers enterprise cyber analytics that allow you to quickly investigate threats, ensure the delivery of critical applications, and secure your investment in the cloud.
Visit Website
IIA Sacramento

IIA Sacramento

IIA Sacramento
The IIA Sacramento Chapter offers exciting opportunities and some of the most cost effective educational opportunities for auditing professionals. The IIA a sponsor of continuing professional education on the National Registry of CPE Sponsors.
Visit Website
IIBA Sacramento

IIBA Sacramento

IIBA Sacramento
The International Institute of Business Analysis (IIBA) Sacramento Valley Chapter (SVC) is dedicated to bringing the Business Analyst community in Sacramento valley together to help Grow, Connect, and Evolve the Business Analysis profession.
Visit Website
InfraGard Sacramento

InfraGard Sacramento

InfraGard Sacramento
InfraGard is a cooperative undertaking between the U.S. Government (led by the FBI) and an association of businesses, academic institutions, state and local law enforcement agencies.
Visit Website
ISACA Sacramento

ISACA Sacramento

ISACA Sacramento
With more than 100,000 members in more than 180 countries, ISACA (www.isaca.org) is a recognized worldwide leader in IT governance, control, security and assurance.
Visit Website
ISSA Sacramento

ISSA Sacramento

ISSA Sacramento
ISSA is the community of choice for international cybersecurity professionals dedicated to advancing individual growth, managing technology risk and protecting critical information and infrastructure.
Visit Website
NCET

NCET

NCET
NCET is an independent 501(c)(3) Nevada nonprofit organization whose programs include the NCET Small Business Expo, the NCET Tech Awards and the monthly Tech Wednesday, Biz Bite and Biz Cafe events.
Visit Website
PMI Northern Nevada

PMI Northern Nevada

PMI Northern Nevada
The Project Management Institute Northern Nevada Chapter focuses on advancing the capability of members to practice their profession of project management for the benefit of other project managers and the greater Northern Nevada community.
Visit Website
SpiceCorps

SpiceCorps

SpiceCorps
Visit Website

Interested in becoming part of our next Sacramento Reno event?

CONTACT US FOR INFO

About Us

We produce quality, cutting-edge educational seminars, drawn from case studies and best practice examples from leaders in the field.

800-365-6402
Contact Us

Popular Searches

  • Event Registration
  • Become an Exhibitor
  • Become an Advisor
  • Sponsor an Event
  • Contact Event Coordinator
  • Submit Feedback

Seminar Topics

  • Artificial Intelligence
  • BC / DR
  • Culture
  • Data Center Technology
  • Data Management
  • Data Storage
  • Digital Experience
  • Information Security
  • Infrastructure
  • Strategic Management
  • Unified Communications

2026 Events

  • Portland • March 19th
  • Anchorage • April 22nd
  • Honolulu • May 21st
  • Phoenix • June 18th
  • Wyoming • July 9th
  • Montana • July 29th
  • Boise • August 20th
  • Salt Lake City • September 22nd
  • Spokane • October 15th
  • Omaha • November 5th
  • Seattle • December 3rd
  • Home
  • About
  • Get Involved
  • Events
  • Register
  • © 2026 F2F Events, Inc.