F2F Events, Inc.
  • Home
  • About
    • About
    • CPE Credits
    • Session Topics
    • Privacy Policy
      • Scam Warning
    • Code of Conduct
    • Media Kit
  • Get Involved
    • Advisory Council
    • Association Partners
    • Exhibitors
    • Speakers
  • Events
    • Locations
    • Upcoming Events
  • Contact
  • Register

Cutting-edge conferences for over 20 years

Educational Events with Your Local IT Community

View Upcoming Events Register

INTERFACE Phoenix 2022 / See You Next Year

IT Infrastructure is constantly changing, bringing more new challenges with it every day. From ransomware and the latest security threats to emerging developments in AI and the need for increased bandwidth and storage, it’s nearly impossible to keep up to date. Our conference is designed to help. We’ve assembled a combination of Best-in-Breed hardware and software solutions, along with local experts and organizations to help educate, advise and connect you to resources that can help you meet your goals.

Covering Information Security, Infrastructure, Cloud, Disaster Recovery, Communications, and more, you’ll find presentations, panel discussions, and exhibitors covering a variety of topics, as well as the latest innovations and best practices.

CPE SURVEY
SUBSCRIBE TO Phoenix EVENTS

AT A GLANCE

July 15th, 2022
8:30am – 4:30pm

Westin Kierland Resort
Trailblazers Ballroom
6902 E. Greenway Parkway
Scottsdale, AZ 85245

Directions & Parking

Venue Health & Safety

KEYNOTE: [1 CPE] Mental Malware: Social Platforms and the Dawn of the Disinformation Age

  Presented by Michael Manrod • Chief Information Security Officer, Grand Canyon Education

Seminar Schedule

VIEW FLOORPLAN
DOWNLOAD SCHEDULE
  • Theater One
  • Theater Two
  • Theater Three
  • Sessions
  • Keynote
9:00 - 9:50 AM

[1 CPE] Stopping Attacks, Not Your Business: AI & Autonomous Response

  Presented by Darktrace

With cyber-attackers continuously searching for new ways to outpace security teams, it can lead to a struggle to fight back without disrupting business operations. Join this session to explore the benefits of Autonomous Response as a must-have that goes beyond ‘defense,’ including real-world threat finds and attack scenarios.

Topics: Information Security
10:00 - 10:50 AM

[1 CPE] Breaking the Ransomware Attack Chain

  Presented by Guardicore, now part of Akamai

Despite consistent increases in security spending, ransomware remains an ever-growing threat to businesses. Surprisingly, the ransomware itself, the malware that does the encryption, is only a part of a larger, equally dangerous, attack chain. Considering the entire chain offers defenders more opportunities to thwart the attack before mass encryption can occur.

In this session, we’ll provide details on how microsegmentation can prevent adversarial techniques that precede and follow the deployment of ransomware itself. By turning our attention to the entire kill chain, a path towards minimizing the likelihood, impact, and recovery time of ransomware becomes clear.

In this session you will learn:

  • Practical steps you can take to disrupt the kill chain before ransomware can be deployed
  • How to leverage AI to map complex environments and expedite the path towards policy enforcement that drastically reduces the impact of ransomware
  • How advancements in host-based segmentation are helping businesses achieve an infrastructure that enables rapid remediation of ransomware events without disrupting business operations
Topics: Information Security
11:00 - 11:50 AM

[1 CPE] Navigating Today’s Threat Landscape: A Current State of Cybersecurity

  Presented by Fortinet

Join this session for a comprehensive look at the current state of cybersecurity. Today’s ever-evolving threat landscape requires an integrated, automated approach to security. Learn how you can mitigate risk in your organization, optimize your security team’s operations, and gain best practices to integrate and consolidate your security tools; whether you’ve taken a multi-vendor or single-vendor approach.

Topics: Information Security
12:00 - 12:50 PM

[1 CPE] Silos are for Grain, Not Information

  Presented by INTERFACE Advisory Council & ARMA Arizona

Fifty years ago, the corporate Records and Information Management (RIM) department dealt with paper, file cabinets, and boxes in warehouses; microfiche was considered high-tech. The Information Technology (IT) department ran a mainframe computer in the basement that crunched financial numbers; a terminal in the cashier’s office was considered high-tech. And never the twain would meet. Today, such segregation of corporate functions is not only unnecessary, but it could also be counterproductive or even dangerous. RIM and IT represent distinct, and equally valuable, “mindsets,” but they must work together with Privacy, Security, Compliance, Legal, Human Resources, and even Marketing under comprehensive Information Governance (IG) and Information Lifecycle Management strategies. These strategies align all aspects of data creation (capture), gathering (collaboration), management (retention/storage), circulation (version control), security, legal holds/discovery, and final disposition or archiving with organizational mission, policies, and goals.

Three members of the Arizona chapter of the Association of Records Management and Administration International (ARMA), representing three different types of organizations, discuss how RIM and IT can break down legacy silos and work together to achieve information governance – and the value of ARMA membership.

  • President, ARMA Arizona | Mark MacFarlane, Manager, Enterprise Records and Information Management, Cambia Health Solutions
  • Vice President, ARMA Arizona | Tanesha Charity, Manager, Administrative Services, Valley Metro
  • Vice President for Programs and Education, ARMA Arizona | Ken Withers, Deputy Executive Director, The Sedona Conference®
Topics: Data Management
1:00 - 1:50 PM

[1 CPE] Communication Breakdown

  Presented by INTERFACE Advisory Council

How difficult is it to communicate? This may sound like a rhetorical question, but it does pose challenges. IT departments are frequently in the middle of executing a business plan while the communication falls to others. Technology professionals are now responsible for facilitating improved communication between C-Suite, End-users, and the public.

Please join the INTERFACE Phoenix Advisory Council for a discussion on the challenges of the current communication landscape in your company. Firms of all types and sizes struggle with ensuring that all interested parties have the needed information to perform their jobs. IT departments must lead the way in evolving modern, efficient communication regarding policy, security, procedures, and other operating aspects of the business. Bring your questions for this open conversation with area leaders who will share their experiences and insights.

  • Lester Godsey, Chief Information Security Officer, Maricopa County
  • John Kullman, Sr Manager, Network, Yuma County
  • Patrick O'Keefe, Head of Global Cyber Security and Risk Management, Circle K
  • Lynne Pizzini, Director, Security Governance, Assurance, and Design, CIT Bank
Topics: Culture
2:00 - 2:50 PM

[1 CPE] Challenge the Threat of Ransomware: Best Practices to Prepare, Mitigate, and Recover

  Presented by Zerto

Ransomware attacks continue to rise in volume, severity, and costs to businesses attacked while cyber criminals continue inventing new and unexpected methods to spread malware and encrypt critical data. As attacks continue to specialize, no organization is immune to ransomware. So how do you avoid being forced to pay a ransom, disruptions to services and supply chains, and damage to your brand in the news? Join recovery and data protection experts from Zerto to discuss best practices for when – not if – ransomware strikes. Be prepared to minimize downtime, data loss, and mitigate the risks of ransomware. In this session, you’ll learn:

  • Ransomware 101: A breakdown of a ransomware attack and how it affects systems
  • Steps you can take to reduce the likelihood of attacks on your system
  • How to choose a best-in-class recovery solution for ransomware
  • How you can best harden your recovery systems against attacks
  • How to create a recovery plan to react and recover quickly
  • Real example of a company hit twice by ransomware and how they improved recovery time from weeks to minutes by planning ahead
Topics: Information Security
Michael ManrodMichael ManrodChief Information Security Officer, Grand Canyon Education
3:00 - 3:50 PM

[1 CPE] Mental Malware: Social Platforms and the Dawn of the Disinformation Age

  Presented by Michael Manrod • Chief Information Security Officer, Grand Canyon Education

In recent years, we have seen our world reshaped dramatically as technology has worked its way deeper into our daily lives. As mobility and social platforms reshape how we interact, the speed of information has accelerated, all while the overall trustworthiness of information has deteriorated. In this talk, we will examine human processing flaws that can be exploited via disinformation campaigns (Mental Malware), along with ways such campaigns may be interrupted.

Mike Manrod presently serves as the Chief Information Security Officer for Grand Canyon Education, responsible for leading the security team and formulating the vision and strategy for protecting students, staff, and information assets across the enterprise. Previous experiences include serving as a threat prevention engineer for Check Point and working as a consultant and analyst for other organizations.

Mike is also a co-author/contributor for the joint book project Understanding New Security Threats published by Routledge in 2019, along with multiple articles and whitepapers. When he’s not working, he spends time playing video games with his kids or doing projects around the farm.

Topics: Culture, Infrastructure
  • Sessions
9:00 - 9:50 AM

[1 CPE] Disrupting the Means to Prevent the End: A Guide to Detecting Ransomware

  Presented by Red Canary

Ransomware has been a dominant cybersecurity threat for the better part of the last decade. However, it doesn’t walk alone. It’s almost always the eventual payload delivered by earlier-stage malicious software or activity. Luckily, if you can detect the threats that deliver the ransomware, you can stop the ransomware before it arrives.

In this talk, we’ll extensively reference Red Canary’s 2022 Threat Detection Report, examining the malware and other malicious tools that adversaries often use to deliver ransomware. While the specific trojans and strains of ransomware may change from one attack to the next, adversary tactics, techniques, and procedures are often similar across campaigns and threats. By developing robust detection coverage for the techniques adversaries abuse most often, rather than focusing on individual threats, security teams can achieve defense-in-depth against the many threats that leverage those techniques and the broader trends that dominate the infosec landscape.

Want to learn more about the prevalent adversary techniques and threats that can lead to a ransomware infection? Attendees will leave with:

  • A better understanding of the threats and tools that commonly precede a ransomware infection
  • Guidance on relevant collection and data sources that offer visibility into the threats and techniques that adversaries use to deliver ransomware
  • Actionable information on how security teams can develop the capacity to detect, prevent, and mitigate ransomware and other threats
  • Strategies for testing their ability to observe and detect common threats with free and easy-to-use tools like Atomic Red Team
Topics: Information Security
10:00 - 10:50 AM

[1 CPE] End Point Security and Management in the Modern Era

  Presented by Quest Software

Join this session on improving endpoint security in the modern IT workplace, including the discovering rogue devices, patching devices, removing outdated software, blocking harmful applications, and performing vulnerability scans to discover CVEs contained within an environment.

Topics: Information Security
11:00 - 11:50 AM

[1 CPE] Zero-Trust Architectures

  Presented by Rubrik

Organizations have invested heavily in IT security, attempting to fortify their perimeter, network, endpoint, and application protections. Despite these investments, hackers are successfully penetrating these defenses and targeting enterprise data, including backup data. Ransomware is starting to specifically target online backups by encrypting or deleting them. If your organization was the target of an attack today, how do you know what data was impacted and where? Manually sifting through millions of files and comparing each snapshot consumes FTE time and prolongs recovery exponentially. Mass restores of the entire environment could mean high data loss and weeks' worth of work down the drain. In this session, we will discuss how to protect your last line of defense, the backups. We will walk through the anatomy of a recovery, the best practices, and advanced tools to ensure you will not have to pay a ransom, and how to quickly recover your data to continue business operations.

Topics: Business Continuity / Disaster Recovery, Information Security
1:00 - 1:50 PM

[1 CPE] Why Smart Cities Are Safer Cities Thanks to Real-Time Data and AI

  Presented by iT1 Source & Wireless Guardian

Intelligent technology helps public safety organizations gain a holistic understanding of their cities, deepen public confidence and strengthen community connections. This session will explain the relationship the using Real-Time Data and Artificial Intelligence to create safer, more resilient communities. As part of the discussion, the presenter will explain the following:

  • Data and AI are helpful in real-time response
  • Data and AI are also reshaping long-term public safety processes
  • How smart safety technologies aid in environmental monitoring, emergency management and other situations
  • How smart technology pulls in signals from an array of sources across cities

The presenter will also stress public safety isn’t a top-down hierarchy. It’s actually a collective effort that prioritizes the needs of the community and depends on strong relationships. By realizing the future of public safety, smart city technology transforms the ability to serve local communities.

Topics: Artificial Intelligence, Infrastructure
2:00 - 2:50 PM

[1 CPE] Pure SOC Fury: The Cybersecurity Book of Bad Decisions

  Presented by Arctic Wolf

Join this presentation for insights taken from the frontlines of security operations. The session will draw on experiences and observations from real-world incidents and interesting SOC data points and trends. There are four broad bad decisions that we see being played out, time and again, across cybersecurity and from which everyone can and should learn. Arctic Wolf will show how a focus on Security Operations aligned with outcomes that matter to you will position you to start your journey toward ending your cyber risk.

Topics: Information Security
  • Sessions
9:00 - 9:50 AM

[1 CPE] Asset Visibility is Foundational to Effective Attack Surface Management

  Presented by Armis

Organizational assets are everywhere, across any network, and with diversified asset types like IT, IoT, OT & IoMT. Today's organizations struggle to manage this extended attack surface, leaving unseen gaps in risk posture. So why is it that in 2022 organizations still fail to instantly and accurately answer basic questions of what they have, never mind understanding risks and threats across the heavily expanded footprint? Is it the manual effort to find and understand the asset landscape or that existing tools are only focused on a particular asset types like IT? Join Armis for this informative session where we'll explore what the expanded attack looks like and how to address the increased threat that most organizations face.

Topics: Information Security
10:00 - 10:50 AM

[1 CPE] What is “Universal Zero Trust Network Access” for IT and OT Environment?

  Presented by Airgap

Hybrid workforce is forcing IT to manage two sets of access products for remote work and for in-office work. This inefficiency leads to higher costs, operational complexity of managing duplicate policies, and different experience for on-prem and remote workers. Why must IT organizations deal with VLANs, ACLs, port, 802.1x, NACs and their configurations for when your employees are on-premises versus when the employees are working from remote locations?

In this session, you’ll learn the key principles of Universal Zero Trust Network Access and how a unified stack across hybrid workforce can reduce operational complexities, improve user experience, and reduce downtime for IT and OT organizations.

Topics: Information Security
11:00 - 11:50 AM

[1 CPE] Top 10 Myths and Misconceptions About Ransomware

  Presented by Bitdefender

2021 was “the year of ransomware.” But so were 2017, 2018, 2019, and 2020 – and so far, 2022 is not very different. Ransomware is no longer a problem discussed only in the cybersecurity and tech communities – it is now a regular topic in mainstream media headlines and executive board meetings.

So why is ransomware such a menace, and why can we not seem to get rid of it? One of the reasons is that we seem to miss the continued evolution of ransomware. We keep preparing for the last war. Ransomware in 2022 is very different than ransomware in 2017, yet we still treat it the same way.

Roy Correa, Enterprise Field Engineer will help you to learn more about:

  • Ransomware evolution and what we need to un-learn to effectively combat it
  • The most common myths, misunderstandings, and misconceptions about ransomware and the threat actors behind it
  • The most effective tips to become more cyber resilient and prevent security incidents from turning into catastrophic breaches
Topics: Information Security
1:00 - 1:50 PM

[1 CPE] Immutable Storage: Level-Up Ransomware Readiness

  Presented by Arcserve

Data is expected to grow to 200 ZB by the end of 2025. More data to manage, more data to protect. IDC recommends a 3-2-1-1 best practice as a mid-market data protection strategy. The addition of the new "1" is a copy of the data on immutable storage. Backup data is a key tool in business continuity & disaster recovery planning. Securing this backup data and maintaining multiple copies of it allow for a resilient recovery plan. Your cyber security plan is incomplete without a reliable recovery plan. In the event of any disaster, natural or man-made, like a ransomware attack, getting your IT systems and workloads back on their feet as fast as possible is essential. Join us as we share best practices to help keep your data protected and secure with multiple layers of defenses. We will share our perspective on how organizations can simplify the approach of incorporating guidance from NIST’s Cybersecurity Framework into their own environments.

Topics: Business Continuity / Disaster Recovery
2:00 - 2:50 PM

[1 CPE] 2022 Threat Review

  Presented by Malwarebytes

The Malwarebytes 2022 Threat Review is an annual report on the latest threats, attack trends, and privacy breaches impacting individuals, organizations, and national security. Researchers detail threat intelligence across operating systems and examine how privacy has shifted and the ways that cybercriminals and crimes are evolving. With a stronger understanding of the threat landscape, organizations and individuals can make more informed security and cyber-protection decisions.

Topics: Information Security

Advisory Council

HOW TO BE AN ADVISOR

Advisor-approved content is the foundation upon which INTERFACE was developed. Each conference is guided by an Advisory Council of IT executives and senior managers. Advisor members represent both private and public sector organizations. The council contributes its insight into proposed educational topics and recommends local exhibitors and associations for participation.

EXPAND TO VIEW LIST

Daniel Addington
IT Security Architect
Grand Canyon Education

Scott Campbell
Chief Information Security Officer
City of Tempe

Don Clariza
Sr Lead Control Management Officer
Wells Fargo

Pamela Davis
Cyber Security Threat Intelligence
American Airlines

Rich Donaldson
Information Security Officer
AZ Dept of Economic Security

Rachel Evans
Manager, Applications
City of Tempe

Anthony Flot
Chief Information Security Officer
AZ Health Care Cost Containment System

Lester Godsey
Chief Information Security Officer
Maricopa County

Ryan Gruver
Director, IT Operations
Banner Health

Luke Guillow
Manager, Information Technology
ReBath LLC

Stephanie Inners
Manager, IT & Systems
R. E. Darling Co., Inc.

Michael Kell
Director, Technology
Vantage Mobility

John Kullman
Sr Manager, Network
Yuma County

Michael Leff
Manager, Information Technology
Cutter Aviation

Robert Loy
Director, Technology Programs
Grand Canyon University

Tom Magrini
Assistant Chief Information Officer
City of Phoenix

Mike Manrod
Chief Information Security Officer
Grand Canyon Education

Randall Mitchell
Manager, Production and Systems
Arizona Musicfest

Peter Newman
Faculty Chair, Engineering & Info Science
DeVry University

Lynne Pizzini
Director, Security Governance, Assurance, and Design
CIT Bank

Nati Shah
Vice President, Enterprise Data Solutions
Wells Fargo

Jerry Simpson
Manager, Information Technology
Phoenix Fire Technical Services

John Stark
Information Security Officer
AZ Dept of Health Services

Keith Stocks
Vice President, Information Risk Management
Union Bank

Joanne Storbeck
Manager, Global Business Continuity Planning
Freeport McMoRan

Isaiah Washington
Chief Information Officer
Glendale Community College

Robert Werhanowicz
Director, Instructional Technology
Buckeye Union High School

David Williams
Chief Information Officer
Southwest Network

Sponsors

HOW TO BE A SPONSOR

Participating exhibitors at INTERFACE achieve a greater return on their investment from this series of IT events than any other face-to-face medium available today. This success is achieved through a time-efficient and cost-effective presence for a pre-qualified audience. This simple formula leads to higher levels of business development opportunity at each event.

SILVER SPONSORS

Airgap

Airgap

Airgap
Airgap's Agentless Zero Trust Isolation™ platform is the best defense against ransomware propagation. Put an end to threat propagation and protect your infrastructure - in minutes, not months.
Visit Website
Arcserve

Arcserve

Arcserve
Arcserve is a global top 5 data protection vendor with best-in-class solutions that manage, protect, and recover all data workloads, from SMB to enterprise and regardless of location or complexity. A 100% channel-centric organization, Arcserve has a presence in over 150 countries, with 19,000 channel partners and 235,000 customers.
Visit Website
Arctic Wolf

Arctic Wolf

Arctic Wolf
Arctic Wolf® is the market leader in security operations, and provides security operations as a concierge service. Our security experts work as an extension of your team to monitor and detect threats, and continually strengthen your security posture.
Visit Website
Armis

Armis

Armis
Armis is the global leader in cyber asset security. Fortune 500 companies trust our real-time, comprehensive asset intelligence to deliver full visibility and automated enforcement across every connected asset and environment. Armis helps organizations across any industry continuously secure their entire cyber-asset attack surface.
Visit Website
Bitdefender

Bitdefender

Bitdefender
Bitdefender is a cybersecurity leader delivering best-in-class threat prevention, detection, and response solutions worldwide. Guardian over millions of consumer, business, and government environments, we are the industry’s trusted expert for eliminating threats, protecting privacy and data, and enabling cyber resiliency.
Visit Website
Darktrace

Darktrace

Darktrace
Darktrace is a leading cybersecurity AI company and the creator of Autonomous Response technology. It provides a comprehensive cyber defense to over 5,500 organizations, protecting the cloud, email, IoT, traditional networks, endpoints, and industrial systems.
Visit Website
Fortinet

Fortinet

Fortinet
Fortinet empowers its customers with intelligent, seamless protection across the expanding attack surface & the power to take on the ever-increasing performance requirements of the borderless network – today and into the future.
Visit Website
Guardicore

Guardicore

Guardicore
Guardicore, now part of Akamai, delivers easy-to-use Zero Trust network segmentation to security practitioners across the globe. Our mission is to minimize the effects of high-impact breaches, like ransomware, while protecting the critical assets at the heart of your network. We shut down adversarial lateral movement, fast. From bare metal to virtual machines and containers, Guardicore has you covered across your endpoints, data centers and the cloud. Our software-based platform helps you become more secure to enable your organization’s digital transformation.
Visit Website
HPE Zerto Software

HPE Zerto Software

HPE Zerto Software
HPE Zerto Software helps you unlock ransomware resilience, disaster recovery, and continuous data protection to radically reduce data loss and downtime.
Visit Website
iT1 Source

iT1 Source

iT1 Source
Since 2003, iT1 Source has provided a wide range of IT solutions –– from big data and communications to online support and virtualization.
Visit Website
Malwarebytes

Malwarebytes

Malwarebytes
Malwarebytes protects workplace productivity. We secure all your endpoints so employees can connect confidently, from anywhere. We combine analytics-driven, multi-layer threat protection and industry-leading incident response to both simplify and strengthen overall cybersecurity. You and your team stay up and running, so you can remain focused on driving your business.
Visit Website
Quest Software

Quest Software

Quest Software
At Quest, we solve complex problems with simple solutions. Our philosophy is focused on great products, great service and being simple to do business with. We deliver technology that eliminates the need to choose between efficiency and effectiveness.
Visit Website
Red Canary

Red Canary

Red Canary
The Red Canary Security Operations Platform, driven by purpose-built technology, security research, and threat intelligence, provides advanced threat detection and response across your entire IT estate to improve your security outcomes.
Visit Website
Rubrik

Rubrik

Rubrik
Rubrik delivers instant application availability for recovery, search, cloud, and development. Hybrid Cloud enterprises benefit from Rubrik’s market-leading Cloud Data Management platform with simplicity, instant data access, app-mobility, policy-driven automation, Ransomware protection, and analytics at scale.
Visit Website

BRONZE SPONSORS

Allstream

Allstream

Allstream
Allstream is a business communications provider in Canada and the United States. Allstream’s customers benefit from access to an expansive network of experts and a team focused on reliability & customer experience. Our services include voice, collaboration, and connectivity solutions.
Visit Website
BlackBerry

BlackBerry

BlackBerry
BlackBerry Cybersecurity is a leader in endpoint security, endpoint management, encryption, and embedded systems, protecting enterprises and governments around the world. Our end-to-end approach is deeply rooted in Cylance® AI and machine learning, providing continuous preventative protection, detection, and instant response. We extend protection for your organization against current and future cyberthreats by combining network and endpoint telemetry and by delivering innovative solutions in the areas of cybersecurity, safety, and data privacy.
Visit Website
Cyolo

Cyolo

Cyolo
Cyolo helps organizations in the IT and OT spaces stay secure while maximizing productivity and business continuity in an era of distributed workforces and unprecedented cyber threats. Cyolo’s next-generation zero trust network access solution (ZTNA 2.0) enables identity-based authentication and access to all users, including employees, third parties, remote and on-site, seamlessly, and securely connecting stakeholders to work environments.
Visit Website
SRP Telecom

SRP Telecom

SRP Telecom
SRP operates one of the largest fiber-optic networks in Arizona, spanning 15 cities and consisting of over 1,800 route miles. SRP Telecom offers the most geographically diverse fiber network in the Phoenix metropolitan area and is paving the way for the future of data centers and digital innovation.
Visit Website

EXHIBITORS & ASSOCIATIONS

ACP Phoenix

ACP Phoenix

ACP Phoenix
ACP is a professional organization that provides a forum for the exchange of experiences and information for business continuity leaders throughout a network of local Chapters.
Visit Website
ACTRA

ACTRA

ACTRA
ACTRA serves as the hub for collaborative information sharing, where partners from industry, government, academia, law enforcement and intelligence come together, to respond to cyber threats, protecting our nation’s security interests.
Visit Website
Adlumin

Adlumin

Adlumin
Adlumin's security and compliance automation platform helps organizations manage evolving threats and cybersecurity compliance requirements.
Visit Website
AFCOM Phoenix

AFCOM Phoenix

AFCOM Phoenix
AFCOM advances data center professionals by delivering comprehensive and vendor-neutral education and peer-to-peer networking to its members around the globe.
Visit Website
Arizona Technology Council

Arizona Technology Council

Arizona Technology Council
The Arizona Technology Council is the driving force behind making our state the fastest growing technology hub in the nation; connecting and empowering Arizona’s technology community.
Visit Website
ARMA Arizona

ARMA Arizona

ARMA Arizona
The mission of ARMA International is to educate, advocate, and provide resources that enable professionals to manage information as a critical element of organizational operations and governance.
Visit Website
ASIS Phoenix

ASIS Phoenix

ASIS Phoenix
ASIS International is dedicated to increasing the effectiveness and productivity of security professionals by developing educational programs and materials that address broad security interests as well as specific security topic areas.
Visit Website
Beyond Identity

Beyond Identity

Beyond Identity
The most secure, passwordless authentication platform for tech forward-thinking organizations, globally. Breaking down the barriers between identity, security, and device management, Beyond Identity fundamentally changes the way the world logs in – eliminating passwords and providing users with a frictionless multi-factor login experience.
Visit Website
HOLMANS USA

HOLMANS USA

HOLMANS USA
HOLMANS USA is leading provider of technology to federal, state, education, and commercial markets Specializing in Solutions for Data Center, Desktop Client, Printing, Mobility and more. With our national sales and service centers, dedicated inventory, customized eCommerce solutions, assets management, HOLMANS USA has been helping clients efficiently achieve their business goals for over 60 years.
Visit Website
HPE Aruba Networking

HPE Aruba Networking

HPE Aruba Networking
Deliver the performance and uninterrupted access your business demands with a Zero Trust foundation and AI-automated operations that help you innovate with the least risk.
Visit Website
InfraGard Arizona

InfraGard Arizona

InfraGard Arizona
Arizona InfraGard’s Mission is to help protect Arizona’s infrastructure by supporting the priorities of the FBI to cultivate partnerships with public and private sectors through the sharing of actionable information,training and educational events.
Visit Website
ISACA Phoenix

ISACA Phoenix

ISACA Phoenix
The purpose of the ISACA Phoenix Chapter is to promote the education of individuals for the improvement and development of their capabilities relating to the auditing of and/or management consulting in the field of Information Systems audit and control.
Visit Website
ISSA Phoenix

ISSA Phoenix

ISSA Phoenix
The mission of the Phoenix ISSA Chapter is to provide a forum for the education of information security to its members through presentations and open discussions on topics important to the members and the information security industry.
Visit Website
PMI Phoenix

PMI Phoenix

PMI Phoenix
Project Management Institute (PMI) is the world's leading not-for-profit professional membership association for the project, program and portfolio management profession.
Visit Website
SDSUG

SDSUG

SDSUG
SDSUG is a group of information technology professionals in the Phoenix area dedicated to the security of our digital systems. We meet quarterly to discuss security issues, tech trends, and share our successes and failures so we can learn from each other.
Visit Website
Tanium

Tanium

Tanium
Tanium gives the world's largest enterprises and government organizations the unique power to secure, control and manage millions of endpoints across the enterprise. 
Visit Website
Wireless Guardian

Wireless Guardian

Wireless Guardian
Wireless Guardian is the world’s first forward-facing human threat detection system and the most effective investigative security solution for today’s high-tech environment. Providing protection to patrons and facilities, Wireless Guardian tracks security threats up to a mile outside the facility’s perimeter. The operational effectiveness of Wireless Guardian is the ability to vet every Pedestrian, device, RFID tag, iOT device, and vehicle.
Visit Website
World Wide Technology

World Wide Technology

World Wide Technology
World Wide Technology (WWT) WWT, a $20B, privately held technology solutions provider leading the AI and Digital Revolution, has over 30 years of experience helping the world's largest organizations make the right technology decisions faster. Commercial enterprise, public sector and service provider clients work with WWT from strategy to execution bolstered by hands-on access to cutting-edge capabilities across infrastructure, data and AI, security, cloud and more through the Advanced Technology Center.
Visit Website

Interested in becoming part of our next Phoenix event?

CONTACT US FOR INFO

Phoenix

Westin Kierland Resort
Trailblazers Ballroom
6902 E. Greenway Parkway
Scottsdale, AZ 85245

Directions & Parking

About Us

We produce quality, cutting-edge educational seminars, drawn from case studies and best practice examples from leaders in the field.

800-365-6402
Contact Us

Popular Searches

  • Event Registration
  • Become an Exhibitor
  • Become an Advisor
  • Sponsor an Event
  • Contact Event Coordinator
  • Submit Feedback

Seminar Topics

  • Artificial Intelligence
  • BC / DR
  • Culture
  • Data Center Technology
  • Data Management
  • Data Storage
  • Digital Experience
  • Information Security
  • Infrastructure
  • Strategic Management
  • Unified Communications

2026 Events

  • Portland • March 19th
  • Anchorage • April 22nd
  • Honolulu • May 21st
  • Phoenix • June 18th
  • Wyoming • July 9th
  • Montana • July 29th
  • Boise • August 20th
  • Salt Lake City • September 22nd
  • Spokane • October 15th
  • Omaha • November 5th
  • Seattle • December 3rd
  • Home
  • About
  • Get Involved
  • Events
  • Register
  • © 2026 F2F Events, Inc.