F2F Events, Inc.
  • Home
  • About
    • About
    • CPE Credits
    • Session Topics
    • Privacy Policy
      • Scam Warning
    • Code of Conduct
    • Media Kit
  • Get Involved
    • Advisory Council
    • Association Partners
    • Exhibitors
    • Speakers
  • Events
    • Locations
    • Upcoming Events
  • Contact
  • Register

Cutting-edge conferences for over 20 years

Educational Events with Your Local IT Community

View Upcoming Events Register

INTERFACE Virtual Alaska 2022 / See You Next Year

IT Infrastructure is constantly changing, bringing more new challenges with it every day. From ransomware and the latest security threats to emerging developments in AI and the need for increased bandwidth and storage, it’s nearly impossible to keep up to date. Our conference is designed to help. We’ve assembled a combination of Best-in-Breed hardware and software solutions, along with local experts and organizations to help educate, advise and connect you to resources that can help you meet your goals.

Covering Information Security, Infrastructure, Cloud, Disaster Recovery, Communications, and more, you’ll find presentations, panel discussions, and exhibitors covering a variety of topics, as well as the latest innovations and best practices.

CPE SURVEY
SUBSCRIBE TO Alaska EVENTS

AT A GLANCE

April 21st, 2022
8:30am – 4:30pm

Virtual Conference
Multi-track seminars with Q&A
1-on-1 chat and networking
Hourly prize drawings

KEYNOTE: [1 CPE] Taking Ownership of Security and Optimization in the Digital Age

  Presented by Jim Bates • Founder, President & CEO of Business Improvement Group

Seminar Schedule

  • Theater One
  • Theater Two
  • Sessions
  • Keynote
9:00 - 9:50 AM

[1 CPE] How to Advance Strategic Business Goals with IoT

  Presented by Aruba, a HPE Company

Whether it’s the allure of the concept of the Internet of Things (IoT), a fear of being viewed as a laggard, or internal pressure to do something new, many companies rush head-first into IoT projects without clearly defined objectives or value propositions. The result is a high rate of failure and subsequent disillusionment about the real value of IoT. If your company’s strategic goals require human productivity monitoring, human productivity organizational redesign, augmented reality, energy monitoring, and/or building security, Aruba’s ESP can expedite time-to-insight and time-to-value. The solutions can securely handle all manner of IoT devices and integrate them with enterprise business applications and processes. Join us to learn how you can reduce IoT deployment time to a fraction of what a custom-developed solution would require.

Topics: Infrastructure, Strategic Management
10:00 - 10:50 AM

[1 CPE] Breaking the Ransomware Attack Chain

  Presented by Guardicore, now part of Akamai

Despite consistent increases in security spending, ransomware remains an ever-growing threat to businesses. Surprisingly, the ransomware itself, the malware that does the encryption, is only a part of a larger, equally dangerous, attack chain. Considering the entire chain offers defenders more opportunities to thwart the attack before mass encryption can occur.

In this session, we’ll provide details on how microsegmentation can prevent adversarial techniques that precede and follow the deployment of ransomware itself. By turning our attention to the entire kill chain, a path towards minimizing the likelihood, impact, and recovery time of ransomware becomes clear.

In this session you will learn:

  • Practical steps you can take to disrupt the kill chain before ransomware can be deployed
  • How to leverage AI to map complex environments and expedite the path towards policy enforcement that drastically reduces the impact of ransomware
  • How advancements in host-based segmentation are helping businesses achieve an infrastructure that enables rapid remediation of ransomware events without disrupting business operations
Topics: Information Security
11:00 - 11:50 AM

[1 CPE] Sky Lakes Case Study: Real-life Ransomware Recovery

  Presented by Cohesity

Backup is often the last line of defense against ransomware attacks, which have exponentially increased over the last year. Hear how Sky Lakes Medical Center chose a joint solution from strategic partners Cisco and Cohesity for a modern, efficient data management system to replace an aging backup solution while beating an unexpected ransomware attack. During this session, we’ll give you a brief overview of Cohesity for context and then roll into a 40-minute interview with the Sky Lakes Medical Center Team.

Topics: Information Security
12:00 - 12:50 PM

[1 CPE] All’s Fair in Love and [Cyber] War

  Presented by INTERFACE Advisory Council

Russia’s invasion of Ukraine has captured the world’s attention and prompted a swift response from many nations as the threat of Cyber Warfare is brought into sharp relief. State and Federal agencies have been preparing for the reality of Cyber Warfare for years, and now many private firms are on alert.

What should you really be concerned about right now?

Join the INTERFACE Alaska Advisory Council for a discussion on the real threat of Cyber Warfare. Our panel will discuss incident response along with vulnerability and detection topics. Don’t miss this timely discussion at INTERFACE.

Panelists:

  • Chris Letterman • Chief Information Security Officer, State of Alaska
  • Mark Merchant • Chief Information Security Officer, Municipality of Anchorage
Topics: Information Security
1:00 - 1:50 PM

[1 CPE] Building a Disaster Recovery Program

  Presented by AT&T

Disaster recovery is a critical component for any organization and can significantly reduce the damage and cost associated with information security breaches. Leveraging industry best practices and common frameworks, this presentation will cover core components of constructing, evaluating, and maintaining a disaster recovery program. We will include discussions on policies, processes, technical solutions, and more. Attending the presentation will provide small- to medium-sized businesses and local governments with the foundation needed to create and implement an effective recovery program.

Topics: Business Continuity / Disaster Recovery
Jim BatesJim BatesFounder, President & CEO of Business Improvement Group
2:00 - 2:50 PM

[1 CPE] Taking Ownership of Security and Optimization in the Digital Age

  Presented by Jim Bates • Founder, President & CEO of Business Improvement Group

We as IT practitioners, service providers, manufacturers, managers, executives, and business owners are tasked with leading change––change due to intentional and unintentional events including the internet of things (IoT), digital transformation, intelligent automation, machine learning, robotics, and yes, pesky pandemics that have changed the way we work. These changes introduce new vulnerabilities that expose our data to motivated threat agents. Information security or cybersecurity is everyone’s job. Jim Bates will send out a call to action with some tips on how to get buy-in and lead in this age of digital chaos. We need more than just transformation. We need secure, scalable, and sustainable optimization.

Jim Bates is the Founder, President & CEO of Business Improvement Group, Inc. (BIG) and an Adjunct Professor in several schools at the University of Alaska Anchorage, including the MSPM program. Jim was elected as President-elect to the Project Management Institute Alaska Chapter (PMIAK) for 2018 and as an Executive Adviser for the nationwide Center for Technology. In addition to his many professional certifications, Jim holds master certificates in Business Analysis, Lean Six Sigma, and Project Management from Villanova University.

Jim is an experienced executive and consultant who is passionate about leading business transformation and offering innovative, high-value solutions to everyday business challenges. He has a proven ability to successfully analyze an organization’s critical business requirements, identify deficiencies and potential opportunities, and align and integrate technology.

He strives to help companies develop innovative and cost-effective solutions for enhancing competitiveness, increasing revenues, and improving customer service offerings. Jim is also an engaging, experienced public speaker and instructor. He frequently offers courses in Six Sigma, ITSM/ITIL, HIPAA compliance, leadership training, project management, and more.

Topics: Culture, Information Security, Strategic Management
  • Sessions
9:00 - 9:50 AM

[1 CPE] Leveraging Assessment Findings to Harden Your Security Perimeter

  Presented by Fortinet

Are you regularly evaluating your network security?

Performing assessments is a tried-and-true method for improving your security posture, but they can be a daunting task for network security staff who are often short on manpower, expertise, and/or time. Regardless, the benefits of running assessments almost always outweigh any potential drawbacks. Having a security assessment in hand will increase your security situational awareness and significantly impact your organization’s risk preparedness and mitigation.

Join us as we discuss the importance of periodically validating your existing security controls and provide learnings and best practices from our experts.

Topics: Information Security
10:00 - 10:50 AM

[1 CPE] Payment Card Industry Compliance: How to Become and Stay Compliant

  Presented by Structured

This presentation will discuss the difficulties of becoming and staying compliant with Payment Card Industry (PCI) requirements. The updated Data Security Standard (DSS) 4.0 has been released, and there are numerous changes and enhancements that must be complied with. Whether you are just beginning with PCI for your organization or have many years of experience, there are many challenges, both old and new that can create roadblocks to compliance. With emerging technologies such as zero-trust architecture ready for implementation, find out how to best use these controls for your organizational goals. This presentation will cover the requirements, trouble areas to be aware of, and how you can utilize specific technology in your compliance effort.

Topics: Infrastructure
11:00 - 11:50 AM

[1 CPE] 3 Common Mistakes to Avoid When Designing Your Security Program

  Presented by Fireminds

Every organization has different requirements based on business functions, systems, geography, and resources. However, we’ve observed several key mistakes that are leaving companies and their customers at risk. In this session, we’ll share the pitfalls that we see time and time again and discuss how to avoid them.

Key takeaways include:

  • Understanding the difference between compliance and security
  • Recognizing the untapped potential of your current technology stack
  • How to shift security towards business enablement

After this session, participants should expect to leave with actionable next steps to prevent these mistakes in their organizations.

Topics: Information Security
1:00 - 1:50 PM

[1 CPE] Delivering the Zero Trust Enterprise

  Presented by Palo Alto Networks

Digital transformation is accelerating due to major shifts like the expansion of the hybrid workforce and the continued migration of applications and data to the cloud. Network security teams now have the opportunity to adopt a modern Zero Trust approach that fits this transformation.

But how do you make Zero Trust principles actionable across users, applications, and infrastructure? How can you put them into practice, set priorities, and effectively rebuild security for new environments? Join this session to learn about the three pillars of Zero Trust: users, applications, and infrastructure, and how you can develop a holistic and consistent approach to Zero Trust that can be made actionable across all three of these key domains. We will review various use cases across the organization and how we can support you with our unique blend of the highest level of capabilities, an integrated platform, and extensive in-house expertise around Zero Trust.

Topics: Information Security, Infrastructure

Advisory Council

HOW TO BE AN ADVISOR

Advisor-approved content is the foundation upon which INTERFACE was developed. Each conference is guided by an Advisory Council of IT executives and senior managers. Advisor members represent both private and public sector organizations. The council contributes its insight into proposed educational topics and recommends local exhibitors and associations for participation.

EXPAND TO VIEW LIST

Ulf Asplund
Manager, Technical Services
Alaska Court System

Terence Cato
Director, Information Technology
AK Industrial Development and Export Authority

Brad Davis
Manager, IT Procurement
Chenega Corporation

Dana Gonderzik
Manager, Information Security
Alaska USA Federal Credit Union

Davey Griffith
Manager, Information Technology
Matanuska Valley Federal Credit Union

Kevin Gustin
Chief Information Security Officer
Chenega Corporation

Brad Heaston
Director, Information Technology
Guardian Security

Paul Hinsberg
Sr Enterprise Architect
Alaska USA Federal Credit Union

Chris Javier
Manager, Information Technology
Galena City School District

Lance Johnson
Risk Analyst Lead
USAA

Chris Letterman
Chief Information Security Officer
State of Alaska

Keith Lewis
Manager, Chief Network Services
AK Dept of Health & Social Services

Rodney Long
Manager, Direct Services
Municipality of Anchorage

Franky Lopez
Manager, Communication Security
ARCTEC Alaska

Mark Merchant
Chief Information Security Officer
Municipality of Anchorage

Justin Michaud
Sr Program Manager
Matanuska-Susitna Borough School District

Dan Monarch
Manager, IT Operations
Matanuska-Susitna Borough

Janelle Mullen
Manager, Information Technology
AK Dept of Health & Social Services

Aaron Mute
Director, Information Technology
Association of Village Council Presidents

Thor Ryan
Chief Information Security Officer
AK Dept of Health & Social Services

Mischaud Scruggs
Manager, Information Technology
Assets Inc

Amos Secoy
Director, Campus Technology Services
University of Alaska Anchorage

Benjamin Shier
Chief Information Officer
University of Alaska Anchorage

Timothy Shoemaker Sr.
Manager, Information Technology
General Dynamics Information Technology

Scott Sivulich
Cyber Security Specialist
State of Alaska

Jerry Tibor
Manager, LAN
University of Alaska Anchorage

Hugh Towe
Manager, Information Technology
AK Dept of Fish and Wildlife

David Vanzant
Sr Vice President, Enterprise Security
Alaska USA Federal Credit Union

RC Woodson
Vice President of IT / CIO
Bristol Bay Native Corporation

Eric Wren
Manager, Information Security Infrastructure
Chugach Electric

Dwayne Wright
Manager, Enterprise Infrastructure
Alaska National Insurance Company

John Zetterman
Director, Infrastructure Services
University of Alaska Anchorage

Sponsors

HOW TO BE A SPONSOR

Participating exhibitors at INTERFACE achieve a greater return on their investment from this series of IT events than any other face-to-face medium available today. This success is achieved through a time-efficient and cost-effective presence for a pre-qualified audience. This simple formula leads to higher levels of business development opportunity at each event.

GOLD SPONSORS

Alaska Communications

Alaska Communications

Alaska Communications
Alaska Communications is a trusted partner in broadband and managed IT for businesses, schools, healthcare providers, and state and local governments. We confidently provide the latest industry-specific solutions to help address the dynamics of your ever-changing business world.
Visit Website
Structured

Structured

Structured
Structured is an award-winning solution provider delivering secure, cloud-connected digital infrastructure. For 30 years, we’ve helped clients through all phases of digital transformation by securely bridging people, business and technology.
Visit Website

SILVER SPONSORS

AT&T

AT&T

AT&T
AT&T helps people connect in meaningful ways every day. We’re building FirstNet for first responders, creating next-generation mobile 5G, and delivering entertainment people love to talk about. Our smart, highly secure solutions serve over 3 million global businesses.
Visit Website
Cohesity

Cohesity

Cohesity
Cohesity delivers a web-scale platform that simplifies data protection, consolidates file and object services, provides instant access to test/dev copies, spans from the edge to the cloud, and performs in-place searches and analytics.
Visit Website
Fireminds

Fireminds

Fireminds
Fireminds is an IT consulting firm that specializes in software development, cloud computing, BI, data recovery and managed IT services.
Visit Website
Fortinet

Fortinet

Fortinet
Fortinet empowers its customers with intelligent, seamless protection across the expanding attack surface & the power to take on the ever-increasing performance requirements of the borderless network – today and into the future.
Visit Website
Guardicore

Guardicore

Guardicore
Guardicore, now part of Akamai, delivers easy-to-use Zero Trust network segmentation to security practitioners across the globe. Our mission is to minimize the effects of high-impact breaches, like ransomware, while protecting the critical assets at the heart of your network. We shut down adversarial lateral movement, fast. From bare metal to virtual machines and containers, Guardicore has you covered across your endpoints, data centers and the cloud. Our software-based platform helps you become more secure to enable your organization’s digital transformation.
Visit Website
HPE Aruba Networking

HPE Aruba Networking

HPE Aruba Networking
Deliver the performance and uninterrupted access your business demands with a Zero Trust foundation and AI-automated operations that help you innovate with the least risk.
Visit Website
Palo Alto Networks

Palo Alto Networks

Palo Alto Networks
Palo Alto Networks™ is the network security company. Its next-generation firewalls enable unprecedented visibility and granular policy control of applications and content – by user, not just IP address – at up to 10Gbps with no performance degradation.
Visit Website

BRONZE SPONSORS

Appgate

Appgate

Appgate
Appgate is the secure access company. We empower how people work and connect by providing solutions purpose-built on Zero Trust security principles. This people-defined security approach enables fast, simple and secure connections from any device and location to workloads across any IT infrastructure in cloud, on-premises and hybrid environments. Appgate helps organizations and government agencies worldwide start where they are, accelerate their Zero Trust journey and plan for their future.
Visit Website
CDW-G

CDW-G

CDW-G
Information technology products, expertise, customer support and competitive pricing tailored to fit the unique needs of education, government and healthcare organizations.
Visit Website
ExtraHop

ExtraHop

ExtraHop
ExtraHop delivers enterprise cyber analytics that allow you to quickly investigate threats, ensure the delivery of critical applications, and secure your investment in the cloud.
Visit Website
Red Canary

Red Canary

Red Canary
The Red Canary Security Operations Platform, driven by purpose-built technology, security research, and threat intelligence, provides advanced threat detection and response across your entire IT estate to improve your security outcomes.
Visit Website
Rubrik

Rubrik

Rubrik
Rubrik delivers instant application availability for recovery, search, cloud, and development. Hybrid Cloud enterprises benefit from Rubrik’s market-leading Cloud Data Management platform with simplicity, instant data access, app-mobility, policy-driven automation, Ransomware protection, and analytics at scale.
Visit Website

EXHIBITORS & ASSOCIATIONS

ARMA Alaska

ARMA Alaska

ARMA Alaska
The ARMA Alaska Chapter’s mission is to Promote and advance the Records and Information Management (RIM) profession and related fields through study, education, research, training, networking, outreach, and member recruitment and retention.
Visit Website
InfraGard Alaska

InfraGard Alaska

InfraGard Alaska
InfraGard is a partnership between the FBI and the private sector. It's an association of businesses,academic institutions,law enforcement agencies,and other participants dedicated who share information to prevent hostile acts against the U.S.
Visit Website
ISACA Anchorage

ISACA Anchorage

ISACA Anchorage
ISACA Anchorage is a local chapter of the international ISACA organization serving the Anchorage and Mat-Su areas. Our goal is to provide local IT audit, governance, and security professionals with the resources to the global ISACA organization.
Visit Website
ISC2 South Central Alaska

ISC2 South Central Alaska

ISC2 South Central Alaska
The goal of ISC2 South Central Alaska is to advance the practice of information security by sharing knowledge, educating practitioners, and assisting the public at large on how to protect and defend against information security threats.
Visit Website
Network Users Group Alaska

Network Users Group Alaska

Network Users Group Alaska
Our group is comprised of and focused toward computer network technicians, administrators, and professionals with the goal of offering support, continuing education, and training.
Visit Website
PMI Alaska

PMI Alaska

PMI Alaska
The PMI Alaska Chapter will be recognized as a dynamic organization of Professional Project Managers dedicated to serving the business and educational community of Alaska through the advancement of Project Management.
Visit Website

Interested in becoming part of our next Alaska event?

CONTACT US FOR INFO

About Us

We produce quality, cutting-edge educational seminars, drawn from case studies and best practice examples from leaders in the field.

800-365-6402
Contact Us

Popular Searches

  • Event Registration
  • Become an Exhibitor
  • Become an Advisor
  • Sponsor an Event
  • Contact Event Coordinator
  • Submit Feedback

Seminar Topics

  • Artificial Intelligence
  • BC / DR
  • Culture
  • Data Center Technology
  • Data Management
  • Data Storage
  • Digital Experience
  • Information Security
  • Infrastructure
  • Strategic Management
  • Unified Communications

2026 Events

  • Portland • March 19th
  • Anchorage • April 22nd
  • Honolulu • May 21st
  • Phoenix • June 18th
  • Wyoming • July 9th
  • Montana • July 29th
  • Boise • August 20th
  • Salt Lake City • September 22nd
  • Spokane • October 15th
  • Omaha • November 5th
  • Seattle • December 3rd
  • Home
  • About
  • Get Involved
  • Events
  • Register
  • © 2026 F2F Events, Inc.