F2F Events, Inc.
  • Home
  • About
    • About
    • CPE Credits
    • Session Topics
    • Privacy Policy
      • Scam Warning
    • Code of Conduct
    • Media Kit
  • Get Involved
    • Advisory Council
    • Association Partners
    • Exhibitors
    • Speakers
  • Events
    • Locations
    • Upcoming Events
  • Contact
  • Register

Cutting-edge conferences for over 20 years

Educational Events with Your Local IT Community

View Upcoming Events Register

INTERFACE Portland 2023 / See You Next Year

IT Infrastructure is constantly changing, bringing more new challenges with it every day. From ransomware and the latest security threats to emerging developments in AI and the need for increased bandwidth and storage, it’s nearly impossible to keep up to date. Our conference is designed to help. We’ve assembled a combination of Best-in-Breed hardware and software solutions, along with local experts and organizations to help educate, advise and connect you to resources that can help you meet your goals.

Covering Information Security, Infrastructure, Cloud, Disaster Recovery, Communications, and more, you’ll find presentations, panel discussions, and exhibitors covering a variety of topics, as well as the latest innovations and best practices.

CPE SURVEY
SUBSCRIBE TO Portland EVENTS

AT A GLANCE

March 21st, 2023
8:30am – 4:30pm

Oregon Convention Center
Portland Ballroom
777 NE Martin Luther King, Jr. Blvd.
Portland, OR 97232

Directions & Parking

Venue Accessibility

KEYNOTE: [1 CPE] Technology Drives Our Clean Energy Future

  Presented by Dave Worth • Divisional CIO, Portland General Electric

Seminar Schedule

VIEW FLOORPLAN
DOWNLOAD SCHEDULE
  • Theater One
  • Theater Two
  • Theater Three
  • Theater Four
  • Sessions
  • Keynote
9:00 - 9:50 AM

[1 CPE] Why is Critical Data Being Compromised?

  Presented by Benjamin Longuechaud, Sr Sales Engineer, Thales Cloud Security  • Thales Group

Securing critical data and information was where this industry started a long time ago, but it became more challenging with the rapid growth of enterprise data in an interconnected world. The pandemic forced organizations to support a remote workforce and expose critical systems that were once only accessible from inside the company’s network. We’ve increased the attack surface and the number of vulnerabilities which has led to more data breaches. With the technology advancements in access management, data discovery and encryption we can once again shift the focus to securing our data and information. In this presentation, we will discuss a unified data-centric security approach and strategy to protecting your most critical data and information.

Benjamin Longuechaud is a Senior Sales Engineer for Thales Cloud Security, the world-wide leader in data security, hardware and software encryption. Benjamin started his career as a Software Engineer developing Cloud-based applications before training and supporting software development teams. He recently joined Thales to focus on creating security strategies to Discover, Protect and Control data wherever it resides.

Topics: Information Security
10:00 - 10:50 AM

[1 CPE] 40 Years in 40 Minutes – A Journey Through Cyber

  Presented by Grant Asplund, Growth Technologies Evangelist • Check Point Software

A journey through cyber - from stand-alone Apple II computers using PFS or Ashton-Tate software to today’s ubiquitous, always-on, hyper-connected, cloud-first computing. This session is a fun compilation of short stories and excerpts spanning four decades in the cyber industry. Grant will discuss the transition from single systems to networking to the internet… and how cyber security has evolved from securing virtually nothing to virtually everything. Grant will also share his thoughts on the constantly evolving threat landscape including IoT, Cloud, and the still-reigning champion, Email. Finally, Grant will offer considerations for improving your overall security posture today as well as future trends… you’ll even have a chance to win some cash.

Topics: Information Security
11:00 - 11:50 AM

[1 CPE] Modern Segmentation Architectures

  Presented by Tyler Conrad and Jeremy Georges • Arista Networks

In this presentation, we will explore the different network segmentation models available, including VLANs, VRFs, and group-based segmentation models.

We will begin with an overview of the different segmentation models and discuss their benefits and drawbacks. VLANs provide a simple way to segment traffic but do not scale well in larger environments. VRFs offer more robust isolation but can be complex to manage. Group-based segmentation models offer a flexible and scalable way to segment traffic based on the endpoint itself rather than the network. We will discuss the implementation and configuration of each of these models and provide examples of how they can be used in different scenarios.

Next, we will discuss how EVPN with either VXLAN or MPLS transport can be used as an attachment point to allow for segmentation to cross the network device boundary and become a network-wide policy.

Finally, we will compare the different models to help you choose the best segmentation approach for your network, as well as how to layer these together to have a more complete design. By the end of this presentation, you will have a better understanding of modern segmentation architectures and be equipped to make informed decisions for your network.

Topics: Data Center Technology, Information Security, Infrastructure
12:00 - 12:50 PM

[1 CPE] Cybersecurity Threats & Best Practices for Information & Operational Technology

  Presented by Leslie Kainoa and Theresa Masse • CISA

The Cybersecurity and Infrastructure Security Agency (CISA) leads the national effort to understand, manage, and reduce risk to our cyber and physical infrastructure. We connect our stakeholders in industry and government to each other and to resources, analyses, and tools to help them build their own cyber, communications, and physical security and resilience, in turn helping to ensure a secure and resilient infrastructure for the American people.

This presentation will feature two local Oregon CISA leaders, Cybersecurity Advisor Leslie Kainoa and Cybersecurity State Coordinator Theresa Masse. It will focus on general cyber threats and, more specifically, on operation technology cybersecurity best practices and current threats. It also will outline cyber services CISA provides at no charge.

Topics: Information Security, Infrastructure
1:00 - 1:50 PM

[1 CPE] Open Source Developers Are Security’s New Front Line

  Presented by Neel Thakkar, Sales Engineer • Sonatype

Bad actors have recognized the power of open source and are now beginning to create their own attack opportunities. This new form of assault allows hackers to poison the well, where OSS project credentials are compromised, and malicious code is intentionally injected into open source libraries. In this session, Sonatype will explain how both security and developers must work together to stop this trend or risk losing the entire open source ecosystem.

  • Analyze and detail the events leading to today’s “all-out” attack on the OSS industry.
  • Define the future of open source in today’s new normal.
  • Outline how developers can step into the role of security to protect themselves and the millions of people depending on them.
Topics: Information Security
2:00 - 2:50 PM

[1 CPE] How You Communicate Risk Might Just Be Your Biggest Risk of All

  Presented by Meghan Maneval, Director of Technical Product Management • Reciprocity

It’s no secret that recent years have seen an uptick in malware attacks, data exfiltration, and vulnerability exploitation. And likely your Executive Leaders and the Board want to know, “Are we doing enough to protect ourselves?” As professionals, we need to be prepared to respond to difficult questions. But all too often, we see risk through the lens of “how” we are protecting our organization instead of “how well” it is protected. Seeing risk through different lenses can skew how risk is communicated resulting in a false sense of security and heightened risk for your organization.

Join this session to learn about the three types of “glasses'' CISOs and Information Security professionals often wear: Rose Colored Glasses, Blinders, and Magnifying Glasses. Learn about the “right” glasses that can help you proactively monitor and communicate risk in a context your organization will understand. Wearing these glasses enables organizational leadership to prioritize investments and agree on a level of protection to enable company success and mitigate your biggest risk of them all.

Topics: Information Security
Dave WorthDave WorthDivisional CIO, Portland General Electric
3:00 - 3:50 PM

[1 CPE] Technology Drives Our Clean Energy Future

  Presented by Dave Worth • Divisional CIO, Portland General Electric

The challenges facing the electrical grid are well known, and well publicized. How will energy be produced? How will it be distributed? How do customers realize the value of their renewable investments? How do we keep it equitable? These are significant challenges, but PGE engineers, technicians, and technologists have converted many challenges into opportunities in our 134-year history, and we feel no different about these. The first step is to orchestrate the activities of each participant and improve the ability to operate our grid using automation. Simultaneously, we are called on to implement, maintain and replace a large amount of infrastructure to support the transition to electricity as an energy source efficiently. The virtuous cycle is a grid that is easier to maintain, more reliable, safer, and equitable to all stakeholders and is being driven through close IT/OT collaboration and cross-functional implementation.

Dave Worth is the Divisional CIO for Advanced Energy Delivery and Utility Operations at Portland General Electric. He leads the technology effort to modernize PGE’s capabilities, in service of its mission to drive Oregon’s energy transformation. Dave’s team focuses on outcomes for customers by delivering, maintaining, and modernizing technology associated with asset & work management, mobile, grid operations, emergency operations, and bulk management systems within PGE’s utility operations. Prior to this role, Dave was the Director of PGE’s Customer Engagement Transformation, which modernized PGE’s billing and metering systems, and is the largest IT project executed by PGE to date. Beyond software delivery and support, Dave’s management and technical expertise include customer service operations, marketing and sales, business development, and telecommunications. Dave lives with his family in Portland, Oregon where he enjoys gardening, playing guitar, and experiencing the outdoors by hiking and camping. Dave has been with PGE for 22 years, and in the IT industry for twenty-five. He graduated Magna Cum Laude from Linfield College with a BS in Business Information Systems (a mixed computer science/finance program).

Topics: Infrastructure
  • Sessions
9:00 - 9:50 AM

[1 CPE] What to Do If You Wake Up with Ransomware

  Presented by John McLaughlin, Sales Engineer • BlackBerry Cylance

You come into work to a bunch of servers that have been infected with ransomware. Where to go from here? We’ll take you through the basic steps you need to take in the event this happens to you.

Topics: Information Security
10:00 - 10:50 AM

[1 CPE] How to Stop East/West Attacks in Your Data Center

  Presented by Aruba Networks

70% of all breaches are caused by endpoint security vulnerabilities, followed by lateral movement in the data center. Halt that hacker traffic. Attend this session to learn about a new category of data center switch that combines best-of-breed L2/3 switching with the industry's first hardware-accelerated programmable processor. This new tool augments your malware and ransomware detection and response capabilities by delivering stateful firewall services inline, at scale, with wire-rate performance and orders of magnitude improvement over traditional data center L2/3 switches. You will learn how to gain visibility and enforce security policy for all East/West flows between workloads to protect the critical assets in your data center.

Topics: Data Center Technology
11:00 - 11:50 AM

[1 CPE] Security and Resiliency for Your Most Critical Data

  Presented by Ratko Puzic, Senior Channel Systems Engineer • Cohesity

Join this session for a walk-through of a real-world ransomware attack and the necessary steps to recover. We will cover a cyber insurance form to show how it aligns with our “Protect, Detect, Recover” point of view, and we will speak to the specific capabilities associated with each point.

Topics: Information Security
1:00 - 1:50 PM

[1 CPE] Panel: Retaining Your IT Staff in 2023, Can it be Done?

  Presented by INTERFACE Advisory Council

“The other company is offering higher wages. I get to work remotely as much as I want, and I am getting a four-day workweek. Sorry but I must take it.” Have you heard this just a few times? So many IT hiring managers are having to find creative ways to keep staff members in-house. While budgets and major company overhauls can’t always be achieved, there are methods that can help.

Join the INTERFACE Portland Advisory Council for an open conversation on how to keep your staff intact. This panel features local area IT hiring managers and leaders that deal with these challenges in their own shops. Bring your questions as there will be an opportunity to get advice on the needs you have.

  • Steve Hankel, Vice President, Information Technology, Johanson Transportation Service
  • Don Hornschuch, Information Technology Manager, OnPoint Community Credit Union
  • Ian Raloff, Sr Applications Systems Engineer, Moda Health
  • Saby Waraich, Chief Information Officer, Clackamas Community College
Topics: Culture
2:00 - 2:50 PM

[1 CPE] Modernizing Physical Security

  Presented by Verkada

In this session, we’ll look at the technologies at the forefront of enterprise building security. Connected security devices can provide users with real-time insights and a full picture of the health and safety of their environments. We’ll explore how to minimize security risks, workplace frustrations, and costly inefficiencies with best–in–class solutions that provide a scalable way to easily configure, monitor and respond to events from anywhere. Learn how modernizing your physical security can help you seamlessly safeguard the physical world –– without sacrificing privacy –– to operate safer, smarter buildings.

  • Sessions
9:00 - 9:50 AM

[1 CPE] How AI Can Think Like an Attacker

  Presented by Darktrace

In the face of skyrocketing cyber risk, detecting and responding to attacks is no longer enough. Organizations must take proactive steps to prevent threats before they happen and to recover if compromised. In this session, Darktrace unveil an ambitious new approach to security, with core engines powering AI technologies to prevent, detect, respond, and ultimately heal from attacks across all areas of their digital environment. Together, these engines combine to strengthen organizations’ security posture in a virtuous AI feedback ‘loop,’ which provides powerful end-to-end, bespoke, and self-learning solutions unique to each organization.

Topics: Information Security
10:00 - 10:50 AM

[1 CPE] Protecting Your Data from Ransomware Where it Lives: Your Last Line of Defense

  Presented by Nik Lainus, Sr Solution Consultant • Hitachi Vantara

If an attack happens and makes it all the way to your data, then they have already broken through all your walls. Where your data lives IS your last line of defense, which is why the Armed Forces that protect the USA trust Hitachi to protect them. Prevention is great but without that last line of defense, you’re a sitting duck. Attend this session to learn how Hitachi serves as your last line of defense against ransomware attacks.

Topics: Information Security
11:00 - 11:50 AM

[1 CPE] Improved Security for SecOps & NetOps that’s Recession Friendly

  Presented by Ryan Parr, Sr Solutions Architect • Infoblox

While the future economic impact on IT budgets is unclear, one thing is clear –– attackers will not slow down and may even ramp up knowing organizations are considering lowering IT and cybersecurity spending. It is clear enterprise security is of extreme importance and making investments stretch is going to become essential. Core network services you already have in place, including DNS, DHCP, and IPAM (IP Address Management) are often overlooked in the cybersecurity world but can become the most powerful weapon against attackers. During this session, you will learn how to leverage existing services to:

  • Reduce the burden on existing security investments, extending their capacity and lifespan
  • Combat up to 92% of malware and ransomware without new security tools
  • Decrease SecOps investigation time by up to 60%
  • Improve your security posture, lowering cyber insurance costs
Topics: Information Security, Infrastructure, Strategic Management
1:00 - 1:50 PM

[1 CPE] Intune: What’s New and What’s Next

  Presented by Structured

Microsoft Intune is quickly becoming a strategic part of not only device management, but compliance and security as well. Structured will cover what’s new and how Intune will impact your Windows PC strategy management.

Structured is an award-winning solution provider delivering secure, cloud-connected digital infrastructure. For 30 years, we’ve helped clients through all phases of digital transformation by securely bridging people, business and technology.

Topics: Infrastructure
2:00 - 2:50 PM

[1 CPE] Zero Trust Microsegmentation – It’s Easier Than You Think

  Presented by Sumi Gorla, Director of Systems Engineering • Illumio

Regardless of the sophistication of the ransomware, the end goal is always the same: get in through a vulnerability and move laterally through your network. Join this presentation as we help peel back the layers to provide you with simple steps to get started that include:

  • Gaining visibility to where you are the most vulnerable
  • Closing risky ports
  • Leveraging tools you already have in place without adding layers of complexity

Sumi Gorla is the Director of Systems Engineering at Illumio. Her responsibilities include executing Illumio strategic product vision, field engineering enablement, and enterprise customer selling and support across US West. Prior to Illumio, Sumi has held several engineering and technical sales leadership roles in companies such as EMC, Brocade, Citrix, and BigSwitch Networks. As a sales leader, Sumi brings a unique approach to problem-solving, from both a technical and a business perspective. Sumi’s strengths are in her ability to explain how technical features can meet business requirements for all levels of audience.

Topics: Information Security
  • Sessions
9:00 - 9:50 AM

[1 CPE] Zero-Trust Architectures

  Presented by Rubrik

Organizations have invested heavily in IT security, attempting to fortify their perimeter, network, endpoint, and application protections. Despite these investments, hackers are successfully penetrating these defenses and targeting enterprise data, including backup data. Ransomware is starting to specifically target online backups by encrypting or deleting them. If your organization was the target of an attack today, how do you know what data was impacted and where? Manually sifting through millions of files and comparing each snapshot consumes FTE time and prolongs recovery exponentially. Mass restores of the entire environment could mean high data loss and weeks' worth of work down the drain. In this session, we will discuss how to protect your last line of defense, the backups. We will walk through the anatomy of a recovery, the best practices, and advanced tools to ensure you will not have to pay a ransom, and how to quickly recover your data to continue business operations.

Topics: Business Continuity / Disaster Recovery, Information Security
10:00 - 10:50 AM

[1 CPE] ChatGPT Did NOT Write This Topic (or did it?)

  Presented by Brian Knopp, Principal Security Engineer • Arctic Wolf

Are "AI" and Machine Learning tools like ChatGPT having an impact on cybersecurity? This session will examine the top attacks looking back on 2022. We'll define them by quantifiable impacts, like affected individuals, cost, and data breaches. We'll also discuss key sociological and economic factors that increased vulnerabilities in 2022, identify industries that saw significant attacks, and summarize the top 5-6 data breaches and evaluate the impact of these threats on personnel retention and insurability, 2023 predictions, and the most common recommendations to improve your security posture.

Topics: Artificial Intelligence, Information Security
11:00 - 11:50 AM

[1 CPE] Seeing Your Attack Surface Through the Eyes of an Adversary

  Presented by Terry Hillis, Systems Engineering, Cortex • Palo Alto Networks

The best way to manage exposure, reduce risk, and improve your security posture is to understand your attack surface through the eyes of an attacker. We’ll demonstrate how to reduce the frequency and severity of your security incidents without additional analysts or efforts and help your organization actively discover, learn about, and respond to unknown risks in all connected systems and exposed services. Learn how you can boost your Attack Surface Management (ASM) with visibility into your on-prem and cloud-based internet-connected assets and recommendations on prioritized actions so you can better defend your organization.

In this session, you will learn about:

  • Trends influencing the modern attack surface
  • How you can build an up-to-date version of your attack surface to include both known and unknown assets
  • Streamline your Attack Surface Management (ASM) program with Unit 42 security expertise and threat intelligence
  • Reduce risk with actionable recommendations from Unit 42 Incident Response (IR) experts
  • Discover shadow IT infrastructure, identify assets vulnerable to CVEs, and gain prioritized recommendations to remediate potential threats before they are exploited
Topics: Information Security

Advisory Council

HOW TO BE AN ADVISOR

Advisor-approved content is the foundation upon which INTERFACE was developed. Each conference is guided by an Advisory Council of IT executives and senior managers. Advisor members represent both private and public sector organizations. The council contributes its insight into proposed educational topics and recommends local exhibitors and associations for participation.

EXPAND TO VIEW LIST

Richard Appleyard
Chief Information Officer
Oregon State Police

Ed Arib
Manager, Technology
Portland Police Bureau

John Beal
Privacy Officer
St. Charles Health System

Michael Bray
Chief Information Security Officer
The Vancouver Clinic

Jeff Brewer
Business Information Security Officer
Conduent, Inc.

Brad Buckmaster
Manager, Information Technology
Plaid Pantries, Inc.

Farah Daher
IT Manager, System Administrator
Portland Community College

Curtis Ellis
Director, Information Technology
Educational Service District 112

Traci Esteve
Director, IT Risk and Compliance
The Standard

Theresa Fichtner
Vice President, Information Technology
NW Preferred Federal Credit Union

Stephen Fitton
Sr Director, Information Technology
AllMed Healthcare Management

Greg Funk
Manager, Information Technology
Oregon Child Development Coalition

Juan Gamboa
Manager, Information Technology
Kokusai Semiconductor Equipment Corp

Brandon Gatke
CIO / CISO
Pacific University

Robert Gibson
Chief Technology Officer
Alta Planning + Design

Jimmy Godard
SVP, Program Manager
Bank of America

Steve Hankel
Vice President, Information Technology
Johanson Transportation Service

Conan Harmon-Walker
Network Architect
Legacy Health System

Brian Hole
Deputy Chief Information Security Officer
Legacy Health System

Don Hornschuch
Manager, Information Technology
OnPoint Community Credit Union

Syed Hussain
Chief Information Officer
Oregon Lottery

Muneer Koborsi
Sr Manager, IT & Risk Management
Epson Portland, Inc.

Ying Ki Kwong
E-Government Program Manager
State of Oregon Office of the CIO

Travis Luckey
Chief Information Officer
OR Dept of Environmental Quality

Gabe Martushev
Vice President, IT Security
Finity Communications, Inc.

Patrick Meaney
Director, Information Technology
Mid-Willamette Valley Community Action

Larry Miller
Chief Information Officer
Taiga Exterior Wood, Inc.

Andrew Nemec
Sr Director, Information Security
Comscore, Inc.

Jake Niesen
Director, Technical Capability
Nike

Smart Ocholi
Chief, Technical Resources Branch
Engineering Division, US Army Corps of Engineers

Christopher Paidhrin
Chief Information Security Officer
City of Portland

Shane Perry
Information Security and Risk Officer
OR Public Employees Retirement System

Ian Raloff
Sr Applications Systems Engineer
Moda Health

Josh Renoe
Director, Information Technology
The Management Group

Sergey Sergeyev
Director, Enterprise Architecture
Silicon Valley Bank

Nathan Struk
Manager, Information Technology
Business Valuation Resources

Marie VerMeer
Director, Technology Services Excellence
Columbia Sportswear Company

Saby Waraich
Chief Information Officer
Clackamas Community College

John Weaver
Sr Manager, IT Infrastructure & Security
Benchmade, Inc.

Ron White
Sr Infrastructure Systems Administrator
C-Tran

Scott White
Director, Information Technology
Bridgewell Resources LLC

Sponsors

HOW TO BE A SPONSOR

Participating exhibitors at INTERFACE achieve a greater return on their investment from this series of IT events than any other face-to-face medium available today. This success is achieved through a time-efficient and cost-effective presence for a pre-qualified audience. This simple formula leads to higher levels of business development opportunity at each event.

GOLD SPONSORS

Structured

Structured

Structured
Structured is an award-winning solution provider delivering secure, cloud-connected digital infrastructure. For 30 years, we’ve helped clients through all phases of digital transformation by securely bridging people, business and technology.
Visit Website

SILVER SPONSORS

Arctic Wolf

Arctic Wolf

Arctic Wolf
Arctic Wolf® is the market leader in security operations, and provides security operations as a concierge service. Our security experts work as an extension of your team to monitor and detect threats, and continually strengthen your security posture.
Visit Website
Arista Networks

Arista Networks

Arista Networks
Arista Networks is an industry leader in data-driven, client-to-cloud networking for large data center, campus, and routing environments. Arista’s award-winning platforms deliver availability, agility, automation, analytics, and security through an advanced network operating stack.
Visit Website
BlackBerry

BlackBerry

BlackBerry
BlackBerry Cybersecurity is a leader in endpoint security, endpoint management, encryption, and embedded systems, protecting enterprises and governments around the world. Our end-to-end approach is deeply rooted in Cylance® AI and machine learning, providing continuous preventative protection, detection, and instant response. We extend protection for your organization against current and future cyberthreats by combining network and endpoint telemetry and by delivering innovative solutions in the areas of cybersecurity, safety, and data privacy.
Visit Website
Cerium Networks

Cerium Networks

Cerium Networks
Cerium is a recognized innovator and leading provider of a full suite of collaboration, contact center, networking, data center, and security solutions. We help medium to large businesses in the Northwest plan for and then realize the positive impact of technology on their business operations, strategies, and user experiences.
Visit Website
Check Point Software

Check Point Software

Check Point Software
Check Point is a leading provider of cyber security solutions to governments and corporate enterprises globally. Its solutions protect customers from 5th generation cyber-attacks with an industry leading catch rate of malware, ransomware and other types of attacks.
Visit Website
Cohesity

Cohesity

Cohesity
Cohesity delivers a web-scale platform that simplifies data protection, consolidates file and object services, provides instant access to test/dev copies, spans from the edge to the cloud, and performs in-place searches and analytics.
Visit Website
Darktrace

Darktrace

Darktrace
Darktrace is a leading cybersecurity AI company and the creator of Autonomous Response technology. It provides a comprehensive cyber defense to over 5,500 organizations, protecting the cloud, email, IoT, traditional networks, endpoints, and industrial systems.
Visit Website
Hitachi Vantara

Hitachi Vantara

Hitachi Vantara
Hitachi Vantara helps enterprises create and derive value from their data. Its solutions include best-in-class data management, IT infrastructure and analytics products, IoT solutions and Smart Spaces technologies for a broad range of industries.
Visit Website
Illumio

Illumio

Illumio
Illumio, the Zero Trust Segmentation company, stops breaches and ransomware from spreading across the hybrid attack surface. The Illumio ZTS Platform visualizes how workloads and devices are communicating, creates granular segmentation policies which only allow necessary communication, and automatically isolates ransomware and breaches. Assume breach. Minimize impact. Increase resilience.
Visit Website
Infoblox

Infoblox

Infoblox
Infoblox unites networking and security to deliver unmatched performance and protection. Trusted by Fortune 100 companies and emerging innovators, we provide real-time visibility and control over who and what connects to your network, so your organization runs faster and stops threats earlier.
Visit Website
Reciprocity

Reciprocity

Reciprocity
Reciprocity helps organizations make proactive, risk-informed decisions by unifying compliance, cybersecurity and IT risk activities and aligning them with the business objectives your organization cares about.
Visit Website
Rubrik

Rubrik

Rubrik
Rubrik delivers instant application availability for recovery, search, cloud, and development. Hybrid Cloud enterprises benefit from Rubrik’s market-leading Cloud Data Management platform with simplicity, instant data access, app-mobility, policy-driven automation, Ransomware protection, and analytics at scale.
Visit Website
Sonatype

Sonatype

Sonatype
Sonatype is the developer-friendly full-spectrum software supply chain management platform that helps organizations and software developers.
Visit Website

BRONZE SPONSORS

Airlock Digital

Airlock Digital

Airlock Digital
Airlock Digital delivers forward-thinking endpoint protection solutions which enable organizations to implement rapid, scalable allowlisting and execution control.
Visit Website
baramundi

baramundi

baramundi
baramundi Software offers efficient, secure, and cross-platform management of workstation environments. With over 20 years of UEM experience across the globe, over 4,000 customers benefit from our intuitive, single-interface platform.
Visit Website
Critical Start

Critical Start

Critical Start
Critical Start Managed Cyber Risk Reduction solutions ensure continuous security monitoring and mitigation, delivering robust protection against threats. With our platform’s maturity assessments, event analytics, response capabilities, and a team of expert risk mitigators, achieve the highest level of cyber risk reduction and increase confidence in attaining desired security maturity.
Visit Website
Extreme Networks

Extreme Networks

Extreme Networks
Extreme Networks, Inc. (EXTR) delivers software-driven networking solutions that help IT departments everywhere deliver the ultimate business outcome: stronger connections with customers, partners and employees.
Visit Website
GCSIT

GCSIT

GCSIT
GCSIT is a different kind of engineering firm. We act as your personal technology optimization team to create and maintain custom-built, agile infrastructure. We help you transition to the right technology solutions to better handle complex and dynamic challenges.
Visit Website
Gigamon

Gigamon

Gigamon
Gigamon offers a deep observability pipeline that harnesses actionable network-level intelligence to amplify the power of observability tools. This powerful combination enables IT organizations to assure security and compliance governance, speed root-cause analysis of performance bottlenecks, and lower operational overhead associated with managing hybrid and multi-cloud IT infrastructures.
Visit Website
ImageSource

ImageSource

ImageSource
ImageSource is a software and systems integration firm specializing in Enterprise Content Management.
Visit Website
IVOXY Consulting

IVOXY Consulting

IVOXY Consulting
Since 2006 IVOXY has been delivering right-sized IT solutions & services throughout the Greater Pacific Northwest. We partner with customers throughout all phases of deploying innovative data availability technologies spanning virtualization, networking, storage, automation, security, data protection, cloud, and beyond.
Visit Website
JT Tech

JT Tech

JT Tech
JT Tech is a Washington State based business that provides a personal level of partnership extending the highest level of a secure IT solution. We help our customers gain a competitive advantage with Network Infrastructure and Security Solutions.
Visit Website
Optiv

Optiv

Optiv
Optiv is the cyber advisory and solutions leader, delivering strategic and technical expertise to nearly 6,000 companies across every major industry. We partner with organizations to advise, deploy and operate complete cybersecurity programs from strategy and managed security services to risk, integration and technology solutions. With clients at the center of our unmatched ecosystem of people, products, partners and programs, we accelerate business progress like no other company can. At Optiv, we manage cyber risk so you can secure your full potential.
Visit Website
Right! Systems

Right! Systems

Right! Systems
Right! Systems, Inc. is an IT management services company that provides business-driven, multi-vendor IT solutions in Network Infrastructure, Virtualization, Storage, Unified Communications, Telepresence, Security, Mobility and Professional Services.
Visit Website
Tidelift

Tidelift

Tidelift
Tidelift provides a proactive approach to managing open source effectively for application development teams. The Tidelift Subscription can improve the health, security, and resilience of your organization’s open source software supply chain.
Visit Website
Veeam

Veeam

Veeam
Veeam is the global leader in Intelligent Data Management for the Hyper-Available Enterprise. Veeam Hyper-Availability Platform is the most complete solution to help customers on the journey to automating data management.
Visit Website

EXHIBITORS & ASSOCIATIONS

7x24 Exchange Oregon & SW Washington

7x24 Exchange Oregon & SW Washington

7x24 Exchange Oregon & SW Washington
The 7x24 Exchange Oregon & SW Washington Chapter provides an open forum for in-region members and member companies to share ideas, challenges, and best practice resolutions to promote growth and success in the Mission Critical and Data Center industries.
Visit Website
Armis

Armis

Armis
Armis is the global leader in cyber asset security. Fortune 500 companies trust our real-time, comprehensive asset intelligence to deliver full visibility and automated enforcement across every connected asset and environment. Armis helps organizations across any industry continuously secure their entire cyber-asset attack surface.
Visit Website
ASIS Columbia River

ASIS Columbia River

ASIS Columbia River
ASIS International is THE organization for security professionals. ASIS is dedicated to increasing the effectiveness and productivity of security professionals by developing educational programs and materials that address broad security interests.
Visit Website
Axelliant

Axelliant

Axelliant
Axelliant design, deploy, implement, and manage advanced IT solutions and services with agility and responsiveness through the entire solution delivery process. Axelliant is there to guide customers on their personalized journey to success.
Visit Website
Bytagig

Bytagig

Bytagig
Bytagig’s managed IT services means never having to worry about your technology again. Improve business efficiencies, productivity, and profitability with reliable IT support from Oregon’s best.
Visit Website
Cato Networks

Cato Networks

Cato Networks
Cato provides the world’s most robust single-vendor SASE platform, converging Cato SD-WAN and a cloud-native security service edge, Cato SSE 360, into a global cloud service. Cato SASE Cloud optimizes and secures application access for all users and locations everywhere.
Visit Website
CISA

CISA

CISA
CISA is the Nation’s risk advisor, working with partners to defend against today’s threats and collaborating to build more secure and resilient infrastructure for the future.
Visit Website
CompuNet

CompuNet

CompuNet
CompuNet is a leading U.S. information technology partner, headquartered in Boise, Idaho. The firm specializes in consultation, design and implementation services specifically tailored to solve business problems. With a best-in-class engineering staff and approach, CompuNet focuses on building lasting relationships that prioritize client satisfaction over sales through every step of the journey.
Visit Website
Duo Security

Duo Security

Duo Security
Duo Security, now part of Cisco, is the leading multi-factor authentication (MFA) and secure access provider. Duo is a trusted partner to more than 25,000 customers globally, including Facebook, Yelp, Zillow and more.
Visit Website
Fortinet

Fortinet

Fortinet
Fortinet helps organizations across the public and private sectors protect the systems, data, and services that keep businesses and communities running. From government agencies and schools to enterprises and service providers, leaders rely on Fortinet to secure critical infrastructure, ensure operational continuity, and defend against evolving cyber threats. Our Security Fabric platform unifies networking and security to deliver the visibility, control, and efficiency organizations need to operate confidently, whether virtual, in the cloud, or on-premises.
Visit Website
Halcyon

Halcyon

Halcyon
Halcyon formed in 2021 by a team of cybersecurity industry veterans after battling the scourge of ransomware (and advanced threats) for years, at some of the largest global security vendors. Halcyon is focused on building products and solutions for mid-market and enterprise customers.
Visit Website
HPE Aruba Networking

HPE Aruba Networking

HPE Aruba Networking
Deliver the performance and uninterrupted access your business demands with a Zero Trust foundation and AI-automated operations that help you innovate with the least risk.
Visit Website
InfraGard Oregon

InfraGard Oregon

InfraGard Oregon
InfraGard is an essential part of the FBI's outreach efforts. Infragard allows two-way information sharing about intrusion incidents and system vulnerabilities,provides a channel for the DHS to disseminate analytical threat products to the private sector.
Visit Website
ISC2 Oregon

ISC2 Oregon

ISC2 Oregon
Our mission is to advance information security in local communities throughout Oregon by providing our members and other security professionals with the opportunity to share knowledge, grow professionally, educate others, and collaborate on projects.
Visit Website
ISSA Portland

ISSA Portland

ISSA Portland
The Information Systems Security Association is a not-for-profit organization of information security professionals. It provides educational forums and peer interaction opportunities that enhance the knowledge and professional growth of its members.
Visit Website
iT1 Source

iT1 Source

iT1 Source
Since 2003, iT1 Source has provided a wide range of IT solutions –– from big data and communications to online support and virtualization.
Visit Website
NetApp

NetApp

NetApp
NetApp – Our team is data driven. You have a vision for digital transformation. We help you make it all possible.
Visit Website
NETSCOUT

NETSCOUT

NETSCOUT
The complexity of our connected world is soaring at rates never before seen, creating problems nearly impossible to find. As Guardians of the Connected World, it is our collective mission to secure and assure the performance of our digital ecosystems - across any application, any cloud, any data center. Our patented Smart Data technology and continuous monitoring was engineered to penetrate the countless layers of services, applications, and hybrid cloud servers that comprise your digital architectures. Identify problems with precision and solve them with confidence.
Visit Website
Palo Alto Networks

Palo Alto Networks

Palo Alto Networks
Palo Alto Networks™ is the network security company. Its next-generation firewalls enable unprecedented visibility and granular policy control of applications and content – by user, not just IP address – at up to 10Gbps with no performance degradation.
Visit Website
PDXWIT

PDXWIT

PDXWIT
We are a community-based non-profit organization. Our purpose is to strengthen the Portland women in tech community by offering: educational programs, partnerships, mentorships, resources and opportunities.
Visit Website
PMI Portland

PMI Portland

PMI Portland
PMI Portland Chapter is the local Chapter of the Project Management Institute, the leading advocate of project management, worldwide. PMI has over 430,000 project management professional members in 193 countries around the globe.
Visit Website
Qohash

Qohash

Qohash
Qohash finds, tracks, and safeguards the world’s most sensitive data. The Qostodian platform deploys in minutes to discover risks, pinpoint insider threats, and track how data propagates between people in real-time. Security teams can understand their sensitive data clearly and quickly, and prioritize threats at the pace of business.
Visit Website
Qumulo

Qumulo

Qumulo
Qumulo, the leader in data-aware scale-out NAS, helps CIOs and storage administrators store, manage and curate enormous numbers of digital assets.
Visit Website
SIM Portland

SIM Portland

SIM Portland
For over 10 years the Portland Chapter of the Society for Information Management (SIM) has been the meeting place for IT executives, IT consultants, academicians, and sr business executives who play key roles in the use of IT in their organizations.
Visit Website
Technology Association of Oregon

Technology Association of Oregon

Technology Association of Oregon
The Technology Association of Oregon is the largest professional technology association in Oregon and SW Washington. TAO drives economic development by promoting, connecting, and advocating for companies involved in the software and technology industries.
Visit Website
Thales

Thales

Thales
Today’s enterprises depend on the cloud, data and software in order to make decisive decisions. That’s why the most respected brands and largest organizations in the world rely on Thales to help them protect and secure access to their most sensitive information and software wherever it is created, shared or stored – from the cloud and data centers to devices and across networks.
Visit Website
Verkada

Verkada

Verkada
Verkada provides cloud-managed security solutions—video surveillance, access control, alarms, and more—designed to simplify physical security and deliver real-time insights for safer, smarter buildings.
Visit Website
WorkSafe Technologies

WorkSafe Technologies

WorkSafe Technologies
WorkSafe Technologies is a leading authority in seismic protection. WorkSafe Technologies' ISO-Base seismic isolation technology is the most effective way to protect mission-critical and expensive electronic equipment in the event of an earthquake.
Visit Website
Wowrack

Wowrack

Wowrack
Wowrack is a global cloud service provider; offering various Hosting services including Managed Hosting Solutions, Dedicated Server Solutions, Colocation, Virtualization, Disaster Recovery, Backup services and much more!
Visit Website
Xiologix

Xiologix

Xiologix
Xiologix is a technology solution provider of business driven multi-vendor IT solutions to customers throughout the US and Canada. They offer a wide variety of hardware and software products from the world's leading IT companies.
Visit Website
Zscaler

Zscaler

Zscaler
As a leader in Gartner’s Magic Quadrant, Zscaler enforces business policy, mitigates risk and provides twice the functionality at a fraction of the cost of current solutions, utilizing a multi-tenant, globally-deployed infrastructure.
Visit Website

Interested in becoming part of our next Portland event?

CONTACT US FOR INFO

Portland

Oregon Convention Center
Portland Ballroom
777 NE Martin Luther King, Jr. Blvd.
Portland, OR 97232

Directions & Parking

About Us

We produce quality, cutting-edge educational seminars, drawn from case studies and best practice examples from leaders in the field.

800-365-6402
Contact Us

Popular Searches

  • Event Registration
  • Become an Exhibitor
  • Become an Advisor
  • Sponsor an Event
  • Contact Event Coordinator
  • Submit Feedback

Seminar Topics

  • Artificial Intelligence
  • BC / DR
  • Culture
  • Data Center Technology
  • Data Management
  • Data Storage
  • Digital Experience
  • Information Security
  • Infrastructure
  • Strategic Management
  • Unified Communications

2026 Events

  • Portland • March 19th
  • Anchorage • April 22nd
  • Honolulu • May 21st
  • Phoenix • June 18th
  • Wyoming • July 9th
  • Montana • July 29th
  • Boise • August 20th
  • Salt Lake City • September 22nd
  • Spokane • October 15th
  • Omaha • November 5th
  • Seattle • December 3rd
  • Home
  • About
  • Get Involved
  • Events
  • Register
  • © 2026 F2F Events, Inc.