F2F Events, Inc.
  • Home
  • About
    • About
    • CPE Credits
    • Session Topics
    • Privacy Policy
      • Scam Warning
    • Code of Conduct
    • Media Kit
  • Get Involved
    • Advisory Council
    • Association Partners
    • Exhibitors
    • Speakers
  • Events
    • Locations
    • Upcoming Events
  • Contact
  • Register

Cutting-edge conferences for over 20 years

Educational Events with Your Local IT Community

View Upcoming Events Register

INTERFACE Virtual Spokane 2021 / See You Next Year

IT Infrastructure is constantly changing, bringing more new challenges with it every day. From ransomware and the latest security threats to emerging developments in AI and the need for increased bandwidth and storage, it’s nearly impossible to keep up to date. Our conference is designed to help. We’ve assembled a combination of Best-in-Breed hardware and software solutions, along with local experts and organizations to help educate, advise and connect you to resources that can help you meet your goals.

Covering Information Security, Infrastructure, Cloud, Disaster Recovery, Communications, and more, you’ll find presentations, panel discussions, and exhibitors covering a variety of topics, as well as the latest innovations and best practices.

AT A GLANCE

October 14th, 2021
8:30am – 4:30pm

Virtual Conference
Multi-track seminars with Q&A
1-on-1 chat and networking
Hourly prize drawings

KEYNOTE: [1 CPE] The Future of Cyber Education: How to Create a Cybersecurity Culture

  Presented by Heather Stratford • CEO, Drip7

Seminar Schedule

  • Theater One
  • Theater Two
  • Structured Theater
  • Sessions
  • Keynote
9:00 - 9:50 AM

[1 CPE] Ransomware In Focus: How AI Surgically Contains the Threat

  Presented by Darktrace

In the immediate aftermath of a ransomware attack, executives too often face a difficult dilemma: either pay a ransom or shut down critical systems and services. In today’s increasingly complex digital ecosystems, the collateral damage that ensues from ransomware attacks can be broad-ranging and destructive, with organizations taking days, weeks, or even months to recover.

But what if there was another way out – a way to surgically contain ransomware in its earliest stages, without disrupting normal business operations? Join this presentation to learn how Cyber AI is helping thousands of organizations fight back against ransomware. We’ll discuss:

  • The impact of ‘double-extortion’ ransomware and ‘ransomware-as-a-service’
  • Real-world examples of ransomware detected by Cyber AI
  • How self-learning AI responds proportionately to ransomware, thanks to its deep understanding of an organization’s pattern of life
Topics: Information Security
10:00 - 10:50 AM

[1 CPE] Cybersecurity Market Trends and MDR

  Presented by Bitdefender

Mobile workforces were already an increasing trend in business even before we all had to deal with sending our teams home during the pandemic. As many of us work through our return to office plans with hope in our hearts, it is clear that the remote work trend has intensified and will likely continue to do so in the future.

Remote work has challenged traditional security approaches and forced us to think harder about how we can best support the changing nature of work. Thankfully, many of the technology, process, and people changes needed to support remote workers have significant benefits in our overall security posture.

For this session, we’ll talk about trends our security operations center saw in remote work environments and their impact on security operations, discuss theories around how to plan and support these workers, and talk about technology approaches that may help your organization support these workers better while improving your overall security posture.

Topics: Information Security, Strategic Management
11:00 - 11:50 AM

[1 CPE] The Anatomy of a Ransomware Attack

  Presented by Red Canary

In this presentation, we walk through the Anatomy of a Ransomware Attack. Bobby Mazzotti will lead the discussion on best practices and strategies you can apply at your organization. In this webinar, security leaders will learn:

  • How to enhance your team’s abilities to identify security incidents
  • The key components of a ransomware attack
  • Effective ways to improve your security program
Topics: Information Security
12:00 - 12:50 PM

[1 CPE] The Hybrid Office Environment is Here to Stay

  Presented by INTERFACE Advisory Council

Since the start of the pandemic, your workflow and office structure have shifted tremendously. The way any firm operates now has adapted to the change in remote workers. We have seen return to office plans constantly changed, pushed backed, or completely scrapped. Has your company returned employees to the office? Are those plans on hold?

Join the INTERFACE Advisory Council for an open discussion about these items and more. Will your company have a large amount of staff permanently working remotely? Do you need more shared space workstations for employees? We will discuss some tips for preparing your IT staff for all the possible scenarios that will come your way.

Panelists:
David Guggenbickler, VP, Director of Service Operations, Umpqua Bank
Michael Sloon, Director, ITSD, City of Spokane
Joe Sams, Manager, Information Systems, Teck American Incorporated

Topics: Strategic Management
1:00 - 1:50 PM

[1 CPE] Security at the Edge of Hybrid Work

  Presented by Citrix Systems

Robust and secured internet connectivity is essential to delivering on the promises of hybrid work. From defining the scope of experience across the workforce to protecting privileged and administrative access, evolved technologies and protective measures are required from the browser to the cloud. This session will help you understand how security at the edge combined with robust application access management and secured browser solutions enable the security outcomes essential to hybrid work.

Topics: Information Security
2:00 - 2:50 PM

[1 CPE] Security vs. Compliance: Turning InfoSec Success into Audit Wins

  Presented by Tripwire

Security and compliance teams both strive to design, establish, and enforce controls to protect an organization. But even with shared goals in place, security and compliance teams often manage business risk in relative isolation. So how can these teams set aside tension and work better together to create a winning alliance?

In this session, we explore the key differences between security and compliance initiatives. It’s crucial to understand that being fully compliant doesn’t necessarily mean an organization is fundamentally secure. We’ll cover how the two initiatives complement each other when it comes to minimizing risk and how both teams can collaborate to create efficiencies. Attendees will learn how to leverage compliance policies to set the foundation to a robust information security program, while providing true visibility and coverage, consolidating toolsets, and reducing costs. Lastly, we’ll discuss how to ensure that a successful security program can help organizations prepare for an upcoming audit to ultimately achieve and maintain continuous compliance.

Topics: Information Security
Heather StratfordHeather StratfordCEO, Drip7
3:00 - 3:50 PM

[1 CPE] The Future of Cyber Education: How to Create a Cybersecurity Culture

  Presented by Heather Stratford • CEO, Drip7

Cybersecurity education has evolved into its own industry category within IT over the past ten years. Ninety percent of data breaches can be traced back to human error. IT teams around the globe are constantly learning about and implementing new safeguards to use technology as the protection for safeguarding personal data and company information. Addressing the “people factor” of cybersecurity is both more complicated and often difficult for IT teams to successfully navigate.

Heather calls Spokane home and is a national thought-leader in the IT Training and Cybersecurity field. She is the founder and CEO of Stronger International and more recently Drip7 — a microlearning platform for cybersecurity education. She has helped a wide range of clients with cyber and compliance education from General Motors, Stanford, SABIC, MultiCare, and Deloitte. Heather regularly gives keynote speeches, writes articles, and is frequently asked to comment on National cybersecurity topics. She has a passion for including more diversity and women in cybersecurity and entrepreneurial start-ups. Heather is a National Tory Burch fellow, graduate of the Goldman Sachs 10,000 Small Businesses Program, received the Women in Business Leadership Award, and is an adjunct professor at Whitworth University in their MBA program. She has 5 children, loves to travel and waterski, and has recently shifted from mountain biking to riding motorcycles.

Topics: Information Security
  • Sessions
11:00 - 11:50 AM

[1 CPE] Maelstrom of Security

  Presented by Jerry Petru • President, InfraGard State of Washington Chapter

Join this research-based, high-level session with a twist of humor, on the challenges all businesses face today. This will not be a live demo or hands-on how-to, but rather is designed to arm attendees with information as a takeaway and allow for rumination on what can be done better in their environment.

Hacking activity is at an all-time high as home cloud & Covid-19 remote working has become the standard. Where are you in your cloud journey? Automating in silos will never simplify organizational transformation. Relevant for Key Stakeholders of Business Units, CSOs, CISOs, CEOs, IT management, and support roles in networking and security backgrounds, this discussion will cover bad hygiene and password complexity.

Mr. Petru is a Fellow of the British Computer Society (BCS), The Chartered Institute for IT. He is an innovative, and technically sophisticated professional, offering substantial years of broad-based experience in evaluating large corporate systems as well as in identifying operating systems and software issues between different hardware platforms. Today, Jerry is the President of The Washington State InfraGard Chapter. Mr. Petru also owns an SDVOSB “Veterans for Cybersecurity Framework L.L.C.”.

Powered with a comprehensive background in development and implementation, he has authored more than forty-two different courses and two books based on AIX/UNIX, Security, Linux, Networking, and Virtualization technologies teaching to an audience of thousands around the world for the past twenty-five years. Jerry has spoken at forty-nine International Conferences over the past twenty-one years. He is equipped with a proven track record of success in designing and implementing system security, high availability, disaster recovery, and long-range strategic plans for Fortune 100 Companies. Mr. Petru is armed with stellar qualifications in all facets of project lifecycle development, from initial analysis and conceptual design to implementation, quality review, and enhancement to optimize operational efficiencies that improve business and IT operations.

Topics: Information Security
  • Sessions
9:00 - 9:50 AM

[1 CPE] Payment Card Industry Compliance: How to Become and Stay Compliant

  Presented by Structured

This presentation will discuss the difficulties of becoming and staying compliant with Payment Card Industry (PCI) requirements. Although currently in version 3.2.1, the updated Data Security Standard (DSS) 4.0 is coming soon and there are numerous changes and enhancements that must be complied with. Whether you are just beginning with PCI for your organization or have many years of experience, there are many challenges, both old and new that can create roadblocks to compliance. With emerging technologies such as zero-trust architecture ready for implementation, find out how to best use these controls for your organizational goals. This presentation will cover the requirements, trouble areas to be aware of, and how you can utilize specific technology in your compliance effort.

Topics: Infrastructure
10:00 - 10:50 AM

[1 CPE] Ransomware Resilience: Best Practices to Prepare, Mitigate, and Recover

  Presented by Zerto

Large organizations are still being forced to pay ransoms due to ransomware attacks. Disruptions to services and supply chains are putting ransomware victims in the news under a negative spotlight. Join recovery and resilience experts from Zerto to discuss best practices to minimize downtime and avoid paying ransoms by being prepared. In this session, you’ll learn:

  • Ransomware 101: A breakdown of a ransomware attack and how it affects systems
  • What steps you can take to reduce the likelihood of attacks on your system
  • How to best choose a recovery solution for ransomware
  • How you can best harden your recovery systems against attacks
  • How to create a recovery plan to react and recovery quickly
  • How a company hit twice by ransomware improved recovery time from weeks to minutes by planning ahead
Topics: Information Security
11:00 - 11:50 AM

[1 CPE] How to Advance Strategic Business Goals with IoT

  Presented by Aruba, a HPE Company

Whether it’s the allure of the concept of the Internet of Things (IoT), a fear of being viewed as a laggard, or internal pressure to do something new, many companies rush head-first into IoT projects without clearly defined objectives or value propositions. The result is a high rate of failure and subsequent disillusionment about the real value of IoT. If your company’s strategic goals require human productivity monitoring, human productivity organizational redesign, augmented reality, energy monitoring, and/or building security, Aruba’s ESP can expedite time-to-insight and time-to-value. The solutions can securely handle all manner of IoT devices and integrate them with enterprise business applications and processes. Join us to learn how you can reduce IoT deployment time to a fraction of what a custom-developed solution would require.

Topics: Infrastructure, Strategic Management
1:00 - 1:50 PM

[1 CPE] SASE: The Power of Convergence

  Presented by Palo Alto Networks

Fueled by digital transformation and a massive shift to work-from-home, traditional enterprise networking and security infrastructures have been stretched to the breaking point. Legacy on-premises point-product approaches of yesteryear simply don’t make sense anymore. It’s time for a new model with the Secure Access Service Edge, or SASE (pronounced “sassy”).

SASE is quickly becoming the predominant network and security architecture that underpins our post-COVID world. SASE is the convergence of network services like SD-WAN, and security services like FWaaS, SWG, CASB, and ZTNA, into a single, cloud-delivered service model.

Join this presentation to learn:

  • Why networking and security must converge in the cloud
  • The key use cases driving SASE adoption
  • Real-world case studies of customers who have adopted SASE
Topics: Strategic Management
2:00 - 2:50 PM

[1 CPE] Discover How SD-WAN Edge and Cloud Security are Enabling Digital Transformation

  Presented by Silver Peak & Aruba, a HPE Company

Adoption of cloud services and the explosive increase in mobile and IoT devices have driven enterprises to transform both their WAN and security architectures – not just one or the other. The strategic imperative is to deploy a more intelligent, highly automated software-defined wide area network (WAN) that can be seamlessly integrated with modern cloud-delivered security services. Gartner coined the term “secure access service edge” (SASE) to describe this cloud-first architecture. During this session, Aruba and Silver Peak will discuss:

  • SD-WAN and security considerations enterprises must address when migrating to a SASE architecture
  • How to address Zero Trust access security requirements for remote workers and IoT
  • Pros and cons of single vendor vs multi-vendor SASE implementations
Topics: Data Storage, Information Security, Infrastructure

Advisory Council

HOW TO BE AN ADVISOR

Advisor-approved content is the foundation upon which INTERFACE was developed. Each conference is guided by an Advisory Council of IT executives and senior managers. Advisor members represent both private and public sector organizations. The council contributes its insight into proposed educational topics and recommends local exhibitors and associations for participation.

EXPAND TO VIEW LIST

Kevin Bleek
Director, Information Technology
Sunshine Health Facilities, Inc.

Dan Brown
Systems and Security Administrator
Washington State University

Laurel Caldwell
Director, Information Technology Services
Latah County

Ben Calvert
Manager, Information Technology
Vista Title & Escrow

Ken Clegg
Director, Information Security
Ministry Brands

James Davidson
Chief Information Officer
Ferry County Health

Carol DeMuth
Programmer & Analyst
Spokane Regional Health District

Shane Fuller
Manager, Data Center & Network Operations
Community Colleges of Spokane

Clint Hagen
Manager, Information Technology
NEW Health Programs

Pete Hansen
Chief, Information Technology
Fairchild Air Force Base

Jerry Hindberg
Associate Director, Network & Cybersecurity
Lewis-Clark State College

Bryant Kyger
Manager, Information Technology
Community Health of Central Washington

Melissa Mason
Sr Information Security Analyst
Umpqua Bank

Jason Minton
Director, IT & Systems Assets
Washington State University, Spokane

Alan Nelson
Director, Operations
AssuriCare

Theresa Pellham
Sr Manager, IT Infrastructure
City of Spokane

Dennis Reed
Manager, Information Technology
Southern Cross

Joe Sams
Manager, Information Systems
Teck American Incorporated

Steve Simmons
Director, Center for Network Computing
Eastern Washington University

Michael Sloon
Director, Innovations Technology Services Dept
WA City of Spokane

Derek Southerly
Manager, Global IT Operations
Harman International

Cory Staheli
Chief Information Officer
Trans-System, Inc

Duane Swizer
SVP Chief Technology Officer
Columbia Bank

Sponsors

HOW TO BE A SPONSOR

Participating exhibitors at INTERFACE achieve a greater return on their investment from this series of IT events than any other face-to-face medium available today. This success is achieved through a time-efficient and cost-effective presence for a pre-qualified audience. This simple formula leads to higher levels of business development opportunity at each event.

GOLD SPONSORS

Structured

Structured

Structured
Structured is an award-winning solution provider delivering secure, cloud-connected digital infrastructure. For 30 years, we’ve helped clients through all phases of digital transformation by securely bridging people, business and technology.
Visit Website

SILVER SPONSORS

Bitdefender

Bitdefender

Bitdefender
Bitdefender is a cybersecurity leader delivering best-in-class threat prevention, detection, and response solutions worldwide. Guardian over millions of consumer, business, and government environments, we are the industry’s trusted expert for eliminating threats, protecting privacy and data, and enabling cyber resiliency.
Visit Website
Citrix

Citrix

Citrix
Citrix Systems is the global leader and the most trusted name in application delivery infrastructure. More than 200,000 organizations worldwide rely on Citrix to deliver applications with the best performance, highest security and lowest cost.
Visit Website
Darktrace

Darktrace

Darktrace
Darktrace is a leading cybersecurity AI company and the creator of Autonomous Response technology. It provides a comprehensive cyber defense to over 5,500 organizations, protecting the cloud, email, IoT, traditional networks, endpoints, and industrial systems.
Visit Website
Drip7

Drip7

Drip7
Drip7 is a cybersecurity training platform aimed at educating users on an employee-level in safer, smarter cyber practices. Drip7 is different because it is based on providing mobile, consistent training to encourage engagement and behavior change.
Visit Website
Red Canary

Red Canary

Red Canary
The Red Canary Security Operations Platform, driven by purpose-built technology, security research, and threat intelligence, provides advanced threat detection and response across your entire IT estate to improve your security outcomes.
Visit Website
TRIPWIRE

TRIPWIRE

TRIPWIRE
Tripwire delivers advanced threat, security and compliance solutions used by over 9,000 organizations, including over 50% of the Fortune 500. Tripwire enables enterprises around the world to detect, prevent, report and respond to cyber security threats.
Visit Website

BRONZE SPONSORS

Arctic Wolf

Arctic Wolf

Arctic Wolf
Arctic Wolf® is the market leader in security operations, and provides security operations as a concierge service. Our security experts work as an extension of your team to monitor and detect threats, and continually strengthen your security posture.
Visit Website

EXHIBITORS & ASSOCIATIONS

ExtraHop

ExtraHop

ExtraHop
ExtraHop delivers enterprise cyber analytics that allow you to quickly investigate threats, ensure the delivery of critical applications, and secure your investment in the cloud.
Visit Website
HPE Aruba Networking

HPE Aruba Networking

HPE Aruba Networking
Deliver the performance and uninterrupted access your business demands with a Zero Trust foundation and AI-automated operations that help you innovate with the least risk.
Visit Website
HPE Zerto Software

HPE Zerto Software

HPE Zerto Software
HPE Zerto Software helps you unlock ransomware resilience, disaster recovery, and continuous data protection to radically reduce data loss and downtime.
Visit Website
IIA Spokane

IIA Spokane

IIA Spokane
Established in 1941, The Institute of Internal Auditors (IIA) is an international professional association. The IIA is the internal audit profession's global voice, recognized authority, acknowledged leader, chief advocate, and principal educator.
Visit Website
IIBA Seattle

IIBA Seattle

IIBA Seattle
As the voice of the business analysis community, IIBA supports the recognition of the profession, and works to maintain standards and certification. The Seattle chapter supports its members through providing a community and educational opportunities.
Visit Website
InfraGard Washington

InfraGard Washington

InfraGard Washington
InfraGard is a partnership between the FBI and the private sector representing businesses, academia, state , local law enforcement agencies, and other participants dedicated to sharing information and intelligence to prevent hostile acts against the U.S.
Visit Website
Palo Alto Networks

Palo Alto Networks

Palo Alto Networks
Palo Alto Networks™ is the network security company. Its next-generation firewalls enable unprecedented visibility and granular policy control of applications and content – by user, not just IP address – at up to 10Gbps with no performance degradation.
Visit Website
PMI Inland Northwest

PMI Inland Northwest

PMI Inland Northwest
Our mission is to make project management the most highly respected, highly-valued profession in the Inland Northwest area. We create an environment to support networking and encourage volunteer support. Chapter holds regular monthly meetings.
Visit Website
Silver Peak

Silver Peak

Silver Peak
Silver Peak, recently acquired by HPE Aruba, delivers networking software that powers a self-driving wide area network (SD_WAN) that learns and adapts to requirements of the business to ensure the highest levels of end user and application performance.
Visit Website

Interested in becoming part of our next Spokane event?

CONTACT US FOR INFO

About Us

We produce quality, cutting-edge educational seminars, drawn from case studies and best practice examples from leaders in the field.

800-365-6402
Contact Us

Popular Searches

  • Event Registration
  • Become an Exhibitor
  • Become an Advisor
  • Sponsor an Event
  • Contact Event Coordinator
  • Submit Feedback

Seminar Topics

  • Artificial Intelligence
  • BC / DR
  • Culture
  • Data Center Technology
  • Data Management
  • Data Storage
  • Digital Experience
  • Information Security
  • Infrastructure
  • Strategic Management
  • Unified Communications

2026 Events

  • Portland • March 19th
  • Anchorage • April 22nd
  • Honolulu • May 21st
  • Phoenix • June 18th
  • Wyoming • July 9th
  • Montana • July 29th
  • Boise • August 20th
  • Salt Lake City • September 22nd
  • Spokane • October 15th
  • Omaha • November 5th
  • Seattle • December 3rd
  • Home
  • About
  • Get Involved
  • Events
  • Register
  • © 2026 F2F Events, Inc.