F2F Events, Inc.
  • Home
  • About
    • About
    • CPE Credits
    • Session Topics
    • Privacy Policy
      • Scam Warning
    • Code of Conduct
    • Media Kit
  • Get Involved
    • Advisory Council
    • Association Partners
    • Exhibitors
    • Speakers
  • Events
    • Locations
    • Upcoming Events
  • Contact
  • Register

Cutting-edge conferences for over 20 years

Educational Events with Your Local IT Community

View Upcoming Events Register

INTERFACE Boise 2022 / See You Next Year

IT Infrastructure is constantly changing, bringing more new challenges with it every day. From ransomware and the latest security threats to emerging developments in AI and the need for increased bandwidth and storage, it’s nearly impossible to keep up to date. Our conference is designed to help. We’ve assembled a combination of Best-in-Breed hardware and software solutions, along with local experts and organizations to help educate, advise and connect you to resources that can help you meet your goals.

Covering Information Security, Infrastructure, Cloud, Disaster Recovery, Communications, and more, you’ll find presentations, panel discussions, and exhibitors covering a variety of topics, as well as the latest innovations and best practices.

CPE SURVEY
SUBSCRIBE TO Boise EVENTS

AT A GLANCE

September 21st, 2022
8:30am – 4:30pm

Boise Centre
Grand Ballroom
850 W. Front Street
Boise, ID 83702

Directions & Parking

Venue Accessibility

KEYNOTE: [1 CPE] INNOVATION—Alive and Well in Idaho?

  Presented by Jay Larsen • President, Idaho Technology Council

Seminar Schedule

VIEW FLOORPLAN
DOWNLOAD SCHEDULE
  • Theater One
  • Theater Two
  • Theater Three
  • Theater Four
  • Sessions
  • Keynote
9:00 - 9:50 AM

[1 CPE] Data Protection and Immutable Storage

  Presented by CompuNet

The details of this presentation will be available soon. Join this session to improve your understanding of Data Protection, Disasters, Recovery Methods, and Organizational Compliance.

CompuNet is an IT systems integrator and service provider, with 8 offices in the NW. Our approach is to understand our clients’ business needs, engineer IT solutions that precisely fit those needs, and deploy those solutions on time and on budget.

10:00 - 10:50 AM

[1 CPE] Open-Source Developers Are Security’s New Front Line

  Presented by Sonatype

Bad actors have recognized the power of open source and are now beginning to create their own attack opportunities. This new form of assault, where OSS project credentials are compromised and malicious code is intentionally injected into open-source libraries, allows hackers to poison the well. In this session, Sonatype will explain how both security and developers must work together to stop this trend or risk losing the entire open-source ecosystem.

  • Analyze and detail the events leading to today’s “all-out” attack on the OSS industry
  • Define what the future of open source looks like in today’s new normal
  • Outline how developers can step into the role of security to protect themselves and the millions of people depending on them
Topics: Information Security
11:00 - 11:50 AM

[1 CPE] The Journey of Your Cybersecurity Infrastructure and Practice

  Presented by Fortinet

Many questions come to mind when looking at how and what to focus on and prioritize when you wish to security your company's IT infrastructure from the Bad Actors. How do you know what to choose and when? What's your best value for your investment? How does this evolve to keep up with the ever-changing cybersecurity space? What does a basic roadmap look like? Learn how to start the process and address these concerns, get ideas for yourself to allow you a future plan to secure your IT space, whether its on-premises, co-located, in the Cloud, SaaS, or a workforce of mobile/remote employees.

Topics: Information Security
1:00 - 1:50 PM

[1 CPE] Shifting Security Left: DevSecOps

  Presented by Optiv

The ever-increasing pace and pressure for developers to ship code aren’t going to slow, and within many organizations, security is often an afterthought. The impact is products that have security bolted on at the end, impacting user experience, frustrating developers and security engineers, all while leaving security vulnerabilities open for exploiting. Organizations must find ways to meet security requirements while not causing the development teams to get bogged down and delay code delivery.

Ed Lewis, Orchestration and Automation Practice Director at Optiv, will share strategies and approaches his clients use to address common DevSecOps challenges such as poor security collaboration between siloed teams, scaling secrets management, limited automation, tool and process redundancies, and more.

Topics: Information Security
2:00 - 2:50 PM

[1 CPE] The InfoSec Talent Shortage That Wasn’t

  Presented by Critical Start

The experts agree: there isn't nearly enough cyber security talent out there. But what if all the experts, news stories, conference talks, and board room conversations are wrong? What if there is more than enough cyber security talent to get organizations what they need to be successful, secure, and in a reasonable budget? In this presentation, Critical Start's Senior Security Consultant, Alex Humphrey, will discuss ways to hire, train, and retain great cyber security talent, move business objectives forward, and keep the organization secure - all without breaking the bank.

Topics: Culture, Information Security, Strategic Management
Jay LarsenJay LarsenPresident, Idaho Technology Council
3:00 - 3:50 PM

[1 CPE] INNOVATION—Alive and Well in Idaho?

  Presented by Jay Larsen • President, Idaho Technology Council

The purpose of a business is to create and maintain a customer. Idaho businesses need to focus on innovative disruption to meet their customers’ demands today and more importantly, in the future. How are Idaho companies doing with innovation and technology and is Idaho on the upswing?

Jay Larsen is the founder and CEO/President of the Idaho Technology Council, a private sector organization focused on developing the innovative ecosystem in Idaho and helping technology in Idaho and the region start, grow, and thrive. Larsen is a native Idahoan who obtained his BA from Brigham Young University and his MBA from Boise State University.

Telecommunication has been the industry where Jay has spent 22 years of his career, with start-up long-distance companies, and has managed and led teams with US WEST Cellular, AirTouch Cellular, Qwest Communication, and Verizon Wireless in Idaho, Montana, Wyoming, New Mexico, and Utah. During these 22 years, Larsen led teams pioneering and implementing new wireless technologies. He also managed several mergers and acquisitions. He has served on a U.S. Congressman’s staff as Director of Economic Development.

Jay’s key areas of focus are organizational development, marketing, networks, innovation, and leadership. He has served on several boards focused on helping further Idaho talent and the development of innovation. Some of these boards are Idaho Workforce Development Council, Idaho Strategic Energy Alliance, Boise State University CS Industry Advisory Board, Boise State University Foundation Board, Bronco Athletic Association, Boise State University College of Business and Economics Industry Advisory Board, INBRE Advisory Board, Idaho K-12 CS Leadership Team. Larsen has coached several sports teams and lives in Boise, Idaho with his wife (who has been blessed with four sons) and their Jack Russell terrier.

Topics: Culture, Strategic Management
  • Sessions
9:00 - 9:50 AM

[1 CPE] Stopping Attacks, Not Your Business: AI & Autonomous Response

  Presented by Darktrace

With cyber-attackers continuously searching for new ways to outpace security teams, it can lead to a struggle to fight back without disrupting business operations. Join this session to explore the benefits of Autonomous Response as a must-have that goes beyond ‘defense,’ including real-world threat finds and attack scenarios.

Topics: Information Security
10:00 - 10:50 AM

[1 CPE] Hacking Like a White Hat Wizard

  Presented by Check Point

Harry Potter-themed talk track about the similarities of Magic and Hacking and some of the more magical moments from Check Point Research from 2021. Discussing companies turning a blind eye to cybercrime: “If you ignore it, if you don’t learn about it, you won’t be able to protect yourself from it.”

David Hobbs currently serves in the Office of the CTO at Check Point while also managing Security Engineering in the Pacific Northwest. With over 25 years of experience, David has served as a consultant to numerous Federal and State Agencies, including the FBI, US Army Counterintelligence, Secret Service, and many private investigation companies.

David is certified on several technology platforms including Firewalls, IPS/IDS, UTM, Malware Prevention, and Encryption technologies, and has a deep understanding of security and networking overall. In addition to his technical expertise, David served as an expert in several practice areas including exploit research, penetration testing, forensic investigation, security countermeasures, wireless and radio security, social engineering, and compliance. David has taught ethical hacking to some of the largest national organizations and has been published in many articles and publications.

Topics: Information Security
11:00 - 11:50 AM

[1 CPE] Migrating to a Multi-Cloud Environment: A Non-idealistic Approach

  Presented by Cerium Networks

Multi-Cloud. A new buzzword? Or a path of digital transformation on which many have unknowingly already embarked?

During this session, we will explore the definition of ""Multi-Cloud"", the maturity level of various providers - including your private cloud(s), and the competencies required to manage mission-critical applications in these cloud(s). We will review multiple migration and consumption models as well as business outcomes. The move to Multi-Cloud deployment is a strategy generally explored for greater efficiency, greater flexibility, and reduced complexity. However, these deployments often include increased compliance and security requirements, potentially additional cost, and certainly a new skill set which may not exist within your organization. We will explore these topics and more in our discussion on migrating a data center to a Multi-Cloud environment.

Topics: Data Center Technology
1:00 - 1:50 PM

[1 CPE] E911 Laws and Regulations: What You Need to Know

  Presented by CompuNet

The details of this presentation will be available soon. Join this session to gain an understanding of Emergency Services Laws and Regulations.

CompuNet is an IT systems integrator and service provider, with 8 offices in the NW. Our approach is to understand our clients’ business needs, engineer IT solutions that precisely fit those needs, and deploy those solutions on time and on budget.

2:00 - 2:50 PM

[1 CPE] Automate or Die: DevSecOps in the Age of Software Supply Chain Attacks

  Presented by Sonatype

As nimble organizations deliver new innovations, adversaries are also upping their game; something we’ve seen in recent high-profile and devastating cyber-attacks. Bad actors have the intent and ability to exploit security vulnerabilities in the software supply chain - and in some cases plant vulnerabilities themselves. They have increased scale through automation and improved breach success through precision targeting. If we don’t fight back by doing the same - automating security directly in the DevOps pipeline - then we’ll always be at the hackers’ mercy. This session will provide new research on the above and details on how to get started.

Key takeaways:

  • Real-world examples of how large and small companies are implementing DevSecOps practices in their own delivery pipelines and increasing developer awareness of risks
  • A walkthrough of how security principles have been automated into a CICD pipeline and what standards for implementation are beginning to follow suit
  • Why DevSecOps is more than a buzzword and why it’s vital to protecting your software supply chain
  • How automating the security of policies makes it harder to ignore
  • Sessions
9:00 - 9:50 AM

[1 CPE] Protecting Your Data from Ransomware Where it Lives: Your Last Line of Defense

  Presented by Hitachi Vantara

If an attack happens and it makes it all the way to your data, then they have already broken through all of your walls. Where your data lives IS your last line of defense, which is why the Armed Forces that protects the USA trusts Hitachi to protect them. Prevention is great and all but without that last line of defense, you’re a sitting duck. Attend this session to learn how Hitachi serves as your last line of defense against ransomware attacks.

Topics: Information Security
10:00 - 10:50 AM

[1 CPE] Human Intelligence vs Automated Technologies in Penetration Testing

  Presented by Synack

Security testing can be done in several different ways. The challenge is in identifying the best approach for your organization, the one that aligns with your threat model and security concerns.

This presentation covers:

  • The roles of scanners, offensive penetration testing, bug bounty programs as well as attack and breach simulation (BAS) solutions
  • How different vulnerabilities map to different discovery methods
  • What automated technologies (scanners and BAS tools) really do
  • What penetration testers really do
11:00 - 11:50 AM

[1 CPE] Top 10 Myths and Misconceptions About Ransomware

  Presented by Bitdefender

2021 was “the year of ransomware.” But so were 2017, 2018, 2019, and 2020 – and so far, 2022 is not very different. Ransomware is no longer a problem discussed only in the cybersecurity and tech communities – it is now a regular topic in mainstream media headlines and executive board meetings.

So why is ransomware such a menace, and why can we not seem to get rid of it? One of the reasons is that we seem to miss the continued evolution of ransomware. We keep preparing for the last war. Ransomware in 2022 is very different than ransomware in 2017, yet we still treat it the same way.

Roy Correa, Enterprise Field Engineer will help you to learn more about:

  • Ransomware evolution and what we need to un-learn to effectively combat it
  • The most common myths, misunderstandings, and misconceptions about ransomware and the threat actors behind it
  • The most effective tips to become more cyber resilient and prevent security incidents from turning into catastrophic breaches
Topics: Information Security
1:00 - 1:50 PM

[1 CPE] Breaking the Ransomware Attack Chain

  Presented by Akamai

Despite consistent increases in security spending, ransomware remains an ever-growing threat to businesses. Surprisingly, the ransomware itself, the malware that does the encryption, is only a part of a larger, equally dangerous, attack chain. Considering the entire chain offers defenders more opportunities to thwart the attack before mass encryption can occur.

In this session, we’ll provide details on how microsegmentation can prevent adversarial techniques that precede and follow the deployment of ransomware itself. By turning our attention to the entire kill chain, a path towards minimizing the likelihood, impact, and recovery time of ransomware becomes clear.

In this session you will learn:

  • Practical steps you can take to disrupt the kill chain before ransomware can be deployed
  • How to leverage AI to map complex environments and expedite the path towards policy enforcement that drastically reduces the impact of ransomware
  • How advancements in host-based segmentation are helping businesses achieve an infrastructure that enables rapid remediation of ransomware events without disrupting business operations

Join Speaker Chris McIntosh, GCSA/GCSE SE Akamai Segmentation

  • Sr Solutions Engineer, Pacific Northwest Akamai Segmentation
  • 19 years working in IT, last 4+ focused in Networking, Security
  • Positions include Support, Admin and Systems Engineer
  • Networking, Storage, Security, and Backup background
Topics: Information Security
2:00 - 2:50 PM

[1 CPE] Challenge the Threat of Ransomware: Best Practices to Prepare, Mitigate, and Recover

  Presented by Zerto

Ransomware attacks continue to rise in volume, severity, and costs to businesses attacked while cyber criminals continue inventing new and unexpected methods to spread malware and encrypt critical data. As attacks continue to specialize, no organization is immune to ransomware. So how do you avoid being forced to pay a ransom, disruptions to services and supply chains, and damage to your brand in the news? Join recovery and data protection experts from Zerto to discuss best practices for when – not if – ransomware strikes. Be prepared to minimize downtime, data loss, and mitigate the risks of ransomware. In this session, you’ll learn:

  • Ransomware 101: A breakdown of a ransomware attack and how it affects systems
  • Steps you can take to reduce the likelihood of attacks on your system
  • How to choose a best-in-class recovery solution for ransomware
  • How you can best harden your recovery systems against attacks
  • How to create a recovery plan to react and recover quickly
  • Real example of a company hit twice by ransomware and how they improved recovery time from weeks to minutes by planning ahead
Topics: Information Security
  • Sessions
9:00 - 9:50 AM

[1 CPE] Who’s Attacking You?

  Presented by Critical Insight

One of the most common questions from IT Leaders and Executives is: Who would attack our organization and why?

In this panel discussion, we’ll examine the most common cyberattack perpetrators and their methods. From hostile Nation-States to teenagers to some threat actors you might not expect. We will discuss the methods these attackers are using to gain access to your networks, be it unpatched systems, newly found zero days, as well as other avenues into your network. Also covered will be the intent of these attacks, whether it is to steal your intellectual property, extort your cryptocurrency, or to disrupt your operation to meet strategic goals. Most importantly, we will discuss how to tell the difference, and how to protect yourself.

Topics: Business Continuity / Disaster Recovery, Data Center Technology, Data Storage, Information Security, Infrastructure, Strategic Management
10:00 - 10:50 AM

[1 CPE] The Top 10 List: Ransomware Preparation

  Presented by Tonaquint Data Center

Carl Wilkins, Director of Cloud Operations for Tonaquint Data Centers provides a Top 10 list of things you can do to mitigate the risk of Ransomware affecting you. Topics will include how to protect your data, how to protect your systems and infrastructure, and situations to be aware of that might indicate the presence of Ransomware in your environment.

Topics: Information Security
11:00 - 11:50 AM

[1 CPE] Cyber Security: A National Threat

  Presented by Arctic Wolf

When searching for vulnerable targets, cyber hackers do not care how big or small your company is. As world events continue to unfold in China and Russia, cyber warfare has become a national threat to American companies.

Join Arctic Wolf's session to learn how IT leaders can be proactive, rather than reactive to protect their companies from cyber hackers.

Topics: Information Security
1:00 - 1:50 PM

[1 CPE] 2022 Threat Review

  Presented by Malwarebytes

The Malwarebytes 2022 Threat Review is an annual report on the latest threats, attack trends, and privacy breaches impacting individuals, organizations, and national security. Researchers detail threat intelligence across operating systems and examine how privacy has shifted and the ways that cybercriminals and crimes are evolving. With a stronger understanding of the threat landscape, organizations and individuals can make more informed security and cyber-protection decisions.

Topics: Information Security
2:00 - 2:50 PM

[1 CPE] Cloud is a Tool, Not a Destination

  Presented by GCSIT

So, you’re ready to move to the cloud. Where do you start? Moving business functions to the cloud is almost always a good idea, but there is no “one cloud fits all” solution. The cloud offers a great number of benefits to the intelligent and engaged IT decision-maker, but the cloud is a tool to be leveraged and utilized, not a destination to be achieved.

Cloud adoption is a realistic approach to embracing the benefits of cloud computing. Join this session to gain a full breadth understanding of requirements to help you decide when, how, and how much to move to the cloud. Learn how the cloud adoption approach evaluates and encourages the use of Cloud resources when and where they make sense.

Topics: Data Center Technology, Data Storage

Advisory Council

HOW TO BE AN ADVISOR

Advisor-approved content is the foundation upon which INTERFACE was developed. Each conference is guided by an Advisory Council of IT executives and senior managers. Advisor members represent both private and public sector organizations. The council contributes its insight into proposed educational topics and recommends local exhibitors and associations for participation.

EXPAND TO VIEW LIST

Lorraine Bessmer
Manager, Cybersecurity
St Luke’s Health System

Laurel Caldwell
Director, Information Technology
Latah County, ID

Michael Case
Manager, IT Service & Support
Blue Cross of Idaho

Brandon Cheyney
Systems Administrator
City of Nampa, ID

Russ Cunningham
Manager, IT Security
ON Semiconductor

Herman Doering
HIPAA Information Security Officer
St Luke’s Health System

Jennifer Dvorak
Chief Information Security Officer
ID Courts

Matt Fuhrman
Manager, Information Security & Privacy
Your Health Idaho

Steve Goff
Director, Information Technology
Northwest Lineman College

Devonte Goodman
Director, Information Technology
City of Eagle, ID

Patti Henderson
Director, Information Technology
Givens Pursley LLP

Mary Howard
Computer Systems Administrator
Shoshone-Paiute Tribes

Jeremy Hull
Director, Information Technology
Direct Orthopedic Care

Scott Knights
Chief Information Security Officer
ID Dept of Health & Welfare

Raul Pena
Manager, Information Technology
Payette County, ID

Andrew Peterson
Information Systems Security Manager
US Dept of Veterans Affairs

Robert Peterson
Director, Information Technology
Washington County, ID

Jason Povey
Chief Information Officer
Power County Hospital District

Morgan Poyser
Director, Information Technology
Idaho First Bank

Adam Reno
Manager, IT Infrastructure Services
City of Boise, ID

Cody Shepherd
Sr Manager, IT Operations
Idaho Power Company

John Stiffler
Director, Corporate IT
Boise Cascade Company

Bob Tanabe
Manager, Support
Boise Cascade Company

Keith Tresh
Chief Information Security Officer
ID Information Technology Services

Shawn Turner
Vice President, Network Operations
United Heritage Financial Group

Fred Warr
Manager, OIT Business Services
Boise State University

Brian Weissinger
Manager, Information Technology
Idaho Power Company

Sponsors

HOW TO BE A SPONSOR

Participating exhibitors at INTERFACE achieve a greater return on their investment from this series of IT events than any other face-to-face medium available today. This success is achieved through a time-efficient and cost-effective presence for a pre-qualified audience. This simple formula leads to higher levels of business development opportunity at each event.

GOLD SPONSORS

CompuNet

CompuNet

CompuNet
CompuNet is a leading U.S. information technology partner, headquartered in Boise, Idaho. The firm specializes in consultation, design and implementation services specifically tailored to solve business problems. With a best-in-class engineering staff and approach, CompuNet focuses on building lasting relationships that prioritize client satisfaction over sales through every step of the journey.
Visit Website
Sonatype

Sonatype

Sonatype
Sonatype is the developer-friendly full-spectrum software supply chain management platform that helps organizations and software developers.
Visit Website

SILVER SPONSORS

Akamai

Akamai

Akamai
Akamai is the leading content delivery network (CDN) services provider for media and software delivery, and cloud security solutions.
Visit Website
Arctic Wolf

Arctic Wolf

Arctic Wolf
Arctic Wolf® is the market leader in security operations, and provides security operations as a concierge service. Our security experts work as an extension of your team to monitor and detect threats, and continually strengthen your security posture.
Visit Website
Bitdefender

Bitdefender

Bitdefender
Bitdefender is a cybersecurity leader delivering best-in-class threat prevention, detection, and response solutions worldwide. Guardian over millions of consumer, business, and government environments, we are the industry’s trusted expert for eliminating threats, protecting privacy and data, and enabling cyber resiliency.
Visit Website
Cerium Networks

Cerium Networks

Cerium Networks
Cerium is a recognized innovator and leading provider of a full suite of collaboration, contact center, networking, data center, and security solutions. We help medium to large businesses in the Northwest plan for and then realize the positive impact of technology on their business operations, strategies, and user experiences.
Visit Website
Check Point Software

Check Point Software

Check Point Software
Check Point is a leading provider of cyber security solutions to governments and corporate enterprises globally. Its solutions protect customers from 5th generation cyber-attacks with an industry leading catch rate of malware, ransomware and other types of attacks.
Visit Website
Critical Insight

Critical Insight

Critical Insight
Critical Insight defends your critical assets, so you can achieve your critical missions. We augment and amplify your team with our team and defend your organization with a personalized blend of MDR, managed, and professional services to assess, test, and monitor 24x7. Critical Insight. We Defend. You Thrive.
Visit Website
Critical Start

Critical Start

Critical Start
Critical Start Managed Cyber Risk Reduction solutions ensure continuous security monitoring and mitigation, delivering robust protection against threats. With our platform’s maturity assessments, event analytics, response capabilities, and a team of expert risk mitigators, achieve the highest level of cyber risk reduction and increase confidence in attaining desired security maturity.
Visit Website
Darktrace

Darktrace

Darktrace
Darktrace is a leading cybersecurity AI company and the creator of Autonomous Response technology. It provides a comprehensive cyber defense to over 5,500 organizations, protecting the cloud, email, IoT, traditional networks, endpoints, and industrial systems.
Visit Website
Fortinet

Fortinet

Fortinet
Fortinet helps organizations across the public and private sectors protect the systems, data, and services that keep businesses and communities running. From government agencies and schools to enterprises and service providers, leaders rely on Fortinet to secure critical infrastructure, ensure operational continuity, and defend against evolving cyber threats. Our Security Fabric platform unifies networking and security to deliver the visibility, control, and efficiency organizations need to operate confidently, whether virtual, in the cloud, or on-premises.
Visit Website
GCSIT

GCSIT

GCSIT
GCSIT is a different kind of engineering firm. We act as your personal technology optimization team to create and maintain custom-built, agile infrastructure. We help you transition to the right technology solutions to better handle complex and dynamic challenges.
Visit Website
Hitachi Vantara

Hitachi Vantara

Hitachi Vantara
Hitachi Vantara helps enterprises create and derive value from their data. Its solutions include best-in-class data management, IT infrastructure and analytics products, IoT solutions and Smart Spaces technologies for a broad range of industries.
Visit Website
HPE Zerto Software

HPE Zerto Software

HPE Zerto Software
HPE Zerto Software helps you unlock ransomware resilience, disaster recovery, and continuous data protection to radically reduce data loss and downtime.
Visit Website
Malwarebytes

Malwarebytes

Malwarebytes
Malwarebytes protects workplace productivity. We secure all your endpoints so employees can connect confidently, from anywhere. We combine analytics-driven, multi-layer threat protection and industry-leading incident response to both simplify and strengthen overall cybersecurity. You and your team stay up and running, so you can remain focused on driving your business.
Visit Website
Optiv

Optiv

Optiv
Optiv is the cyber advisory and solutions leader, delivering strategic and technical expertise to nearly 6,000 companies across every major industry. We partner with organizations to advise, deploy and operate complete cybersecurity programs from strategy and managed security services to risk, integration and technology solutions. With clients at the center of our unmatched ecosystem of people, products, partners and programs, we accelerate business progress like no other company can. At Optiv, we manage cyber risk so you can secure your full potential.
Visit Website
Synack

Synack

Synack
Synack’s premier on-demand security testing platform harnesses a talented, vetted community of security researchers and smart technology to deliver continuous penetration testing and vulnerability management, with actionable results. We are committed to making the world more secure by closing the cybersecurity skills gap, giving organizations on-demand access to the most-trusted security researchers in the world.
Visit Website
ValorC3

ValorC3

ValorC3
ValorC3 is a modern data center, cloud and connectivity partner that delivers agile, scalable IT solutions tailored to the relentless mid-market enterprise. Valor meets clients where they’re at and gets them where they need to grow, helping them navigate the rapidly changing digital landscape with flexible, high-density data centers, extensive infrastructure expansion capabilities, low latency networks, strong partnerships and decades of industry expertise.
Visit Website

BRONZE SPONSORS

ExtraHop

ExtraHop

ExtraHop
ExtraHop delivers enterprise cyber analytics that allow you to quickly investigate threats, ensure the delivery of critical applications, and secure your investment in the cloud.
Visit Website
Neurilink

Neurilink

Neurilink
At Neurilink, we create reliable and easy-to-use workplace AV solutions that restore productivity and reinforce your company's professional image. Get a quote for your meeting rooms, training rooms, auditorium and shared spaces.
Visit Website
Rubrik

Rubrik

Rubrik
Rubrik delivers instant application availability for recovery, search, cloud, and development. Hybrid Cloud enterprises benefit from Rubrik’s market-leading Cloud Data Management platform with simplicity, instant data access, app-mobility, policy-driven automation, Ransomware protection, and analytics at scale.
Visit Website
Tanium

Tanium

Tanium
Tanium gives the world's largest enterprises and government organizations the unique power to secure, control and manage millions of endpoints across the enterprise. 
Visit Website
Veeam

Veeam

Veeam
Veeam is the global leader in Intelligent Data Management for the Hyper-Available Enterprise. Veeam Hyper-Availability Platform is the most complete solution to help customers on the journey to automating data management.
Visit Website
Windstream

Windstream

Windstream
Windstream Corp. (Nasdaq: WIN) is a leading provider of advanced network communications, including cloud computing and managed services, to businesses nationwide.
Visit Website

EXHIBITORS & ASSOCIATIONS

Axonius

Axonius

Axonius
Axonius is an asset inventory management platform that focuses on cybersecurity solutions and policies.
Visit Website
ByteSpeed

ByteSpeed

ByteSpeed
ByteSpeed has been providing IT Solutions, including custom built hardware, networking solutions, and professional IT services in all 50 states in the US since 1999. https://bytespeed.com/
Visit Website
Cohesity

Cohesity

Cohesity
Cohesity delivers a web-scale platform that simplifies data protection, consolidates file and object services, provides instant access to test/dev copies, spans from the edge to the cloud, and performs in-place searches and analytics.
Visit Website
Elastic

Elastic

Elastic
Elastic delivers cloud-native enterprise search, observability, and security solutions that enhance customer and employee search experiences, keep mission-critical applications running smoothly, and protect against cyber threats.
Visit Website
HIMSS Idaho

HIMSS Idaho

HIMSS Idaho
The Idaho Chapter of the Healthcare Information and Management Systems Society provides leadership to foster the advancement and effective use of information technology in Idaho health care. Its professional members include individuals in the fields of information systems, clinical systems, management engineering, and telecommunications.
Visit Website
HPE Aruba Networking

HPE Aruba Networking

HPE Aruba Networking
Deliver the performance and uninterrupted access your business demands with a Zero Trust foundation and AI-automated operations that help you innovate with the least risk.
Visit Website
Idaho Technology Council

Idaho Technology Council

Idaho Technology Council
The mission of the Idaho Technology Council is to help technology companies in Idaho start, grow, and thrive. We are a member-driven organization committed to the success of Idaho’s technology ecosystem.
Visit Website
Infoblox

Infoblox

Infoblox
Infoblox unites networking and security to deliver unmatched performance and protection. Trusted by Fortune 100 companies and emerging innovators, we provide real-time visibility and control over who and what connects to your network, so your organization runs faster and stops threats earlier.
Visit Website
ISACA Boise

ISACA Boise

ISACA Boise
With more than 100,000 members in more than 180 countries, ISACA (www.isaca.org) is a recognized worldwide leader in IT governance, control, security and assurance.
Visit Website
ISSA Boise

ISSA Boise

ISSA Boise
The primary goal of the Information Systems Security Association, Inc. (ISSA) is to promote management practices that will ensure the confidentiality, integrity and availability of organizational information resources.
Visit Website
Matrix Networks

Matrix Networks

Matrix Networks
Helping businesses both big and small accomplish their IT and communication goals by delivering innovative technologies supported by integrity, reliability, and genuine customer care.
Visit Website
Neat

Neat

Neat
Neat designs simple and elegant pioneering video devices for Microsoft Teams and Zoom Rooms, helping make the meeting space experience the best it can be. Continuously pushing boundaries, Neat devices are incredibly easy to install, set up and use.
Visit Website
Right! Systems

Right! Systems

Right! Systems
Right! Systems, Inc. is an IT management services company that provides business-driven, multi-vendor IT solutions in Network Infrastructure, Virtualization, Storage, Unified Communications, Telepresence, Security, Mobility and Professional Services.
Visit Website
SentinelOne

SentinelOne

SentinelOne
SentinelOne is the future of Endpoint Protection. It unifies prevention, detection and response in a single platform driven by sophisticated machine learning and intelligent automation. It can adapt your defenses against the most advanced cyber-attacks.
Visit Website
VAST Data

VAST Data

VAST Data
VAST Data delivers the data platform at the heart of the AI-powered world, accelerating time-to-insight for workload-intensive applications. The VAST data platform delivers scalable performance, radically simple data management and enhanced productivity. Launched in 2019, VAST is the fastest-selling data infrastructure startup in history.
Visit Website
Verkada

Verkada

Verkada
Verkada provides cloud-managed security solutions—video surveillance, access control, alarms, and more—designed to simplify physical security and deliver real-time insights for safer, smarter buildings.
Visit Website
VMUG Boise

VMUG Boise

VMUG Boise
The VMware User Group (VMUG) is an independent, global, customer-led organization, created to maximize members’ use of VMware and partner solutions through knowledge sharing, training, collaboration, and events.
Visit Website
Zscaler

Zscaler

Zscaler
As a leader in Gartner’s Magic Quadrant, Zscaler enforces business policy, mitigates risk and provides twice the functionality at a fraction of the cost of current solutions, utilizing a multi-tenant, globally-deployed infrastructure.
Visit Website

Interested in becoming part of our next Boise event?

CONTACT US FOR INFO

Boise

Boise Centre
Grand Ballroom
850 W. Front Street
Boise, ID 83702

Directions & Parking

About Us

We produce quality, cutting-edge educational seminars, drawn from case studies and best practice examples from leaders in the field.

800-365-6402
Contact Us

Popular Searches

  • Event Registration
  • Become an Exhibitor
  • Become an Advisor
  • Sponsor an Event
  • Contact Event Coordinator
  • Submit Feedback

Seminar Topics

  • Artificial Intelligence
  • BC / DR
  • Culture
  • Data Center Technology
  • Data Management
  • Data Storage
  • Digital Experience
  • Information Security
  • Infrastructure
  • Strategic Management
  • Unified Communications

2026 Events

  • Portland • March 19th
  • Anchorage • April 22nd
  • Honolulu • May 21st
  • Phoenix • June 18th
  • Wyoming • July 9th
  • Montana • July 29th
  • Boise • August 20th
  • Salt Lake City • September 22nd
  • Spokane • October 15th
  • Omaha • November 5th
  • Seattle • December 3rd
  • Home
  • About
  • Get Involved
  • Events
  • Register
  • © 2026 F2F Events, Inc.