F2F Events, Inc.
  • Home
  • About
    • About
    • CPE Credits
    • Session Topics
    • Privacy Policy
      • Scam Warning
    • Code of Conduct
    • Media Kit
  • Get Involved
    • Advisory Council
    • Association Partners
    • Exhibitors
    • Speakers
  • Events
    • Locations
    • Upcoming Events
  • Contact
  • Register

Cutting-edge conferences for over 20 years

Educational Events with Your Local IT Community

View Upcoming Events Register

INTERFACE Anchorage 2023 / See You Next Year

IT Infrastructure is constantly changing, bringing more new challenges with it every day. From ransomware and the latest security threats to emerging developments in AI and the need for increased bandwidth and storage, it’s nearly impossible to keep up to date. Our conference is designed to help. We’ve assembled a combination of Best-in-Breed hardware and software solutions, along with local experts and organizations to help educate, advise and connect you to resources that can help you meet your goals.

Covering Information Security, Infrastructure, Cloud, Disaster Recovery, Communications, and more, you’ll find presentations, panel discussions, and exhibitors covering a variety of topics, as well as the latest innovations and best practices.

CPE SURVEY
SUBSCRIBE TO Anchorage EVENTS

AT A GLANCE

April 27th, 2023
8:30am – 4:30pm

Dena’ina Convention Center
Tikahtnu
600 W. 7th Avenue
Anchorage, AK 99501

Directions & Parking

Venue Accessibility

KEYNOTE: [1 CPE] Law Enforcement and Cyber Incident Response: How We Can Be Allies

  Presented by Kevin Hinrichs • FBI Special Agent, Cyber Squad

Seminar Schedule

VIEW FLOORPLAN
DOWNLOAD SCHEDULE
  • Theater One
  • Theater Two
  • Theater Three
  • Sessions
  • Keynote
9:00 - 9:50 AM

[1 CPE] 40 Years in 40 Minutes – A Journey Through Cyber

  Presented by Grant Asplund, Growth Technologies Evangelist • Check Point Software

A journey through cyber - from stand-alone Apple II computers using PFS or Ashton-Tate software to today’s ubiquitous, always-on, hyper-connected, cloud-first computing. This session is a fun compilation of short stories and excerpts spanning four decades in the cyber industry. Grant will discuss the transition from single systems to networking to the internet… and how cyber security has evolved from securing virtually nothing to virtually everything. Grant will also share his thoughts on the constantly evolving threat landscape including IoT, Cloud, and the still-reigning champion, Email. Finally, Grant will offer considerations for improving your overall security posture today as well as future trends… you’ll even have a chance to win some cash.

Topics: Information Security
10:00 - 10:50 AM

[1 CPE] Cybersecurity and Compliance Updates – What’s New in 2023

  Presented by Rob Wayt, Director of Governance, Risk & Compliance • Structured Communication Systems

The cybersecurity regulatory compliance landscape has never been more complicated, with updates to CMMC, GLBA, PCI, TSA, and security best practices. This discussion will delve into these new and evolving concepts and provide practical ways to solve these challenges, improve security maturity, and remain compliant.

Topics: Information Security
11:00 - 11:50 AM

[1 CPE] Cybersecurity Trends for 2023

  Presented by Jeff Simpson, Sr Sales Executive, Cybersecurity Solutions • AT&T Alaska

With Cybersecurity compliance mandates increasing, and attacks on vulnerable supply chains and endpoints on the rise, it has never been more important to assess and take proactive measures to secure your network. This presentation pulls together information from many different analysts and digests their views on which Cybersecurity priorities your organization may face this year, along with the top eight cybersecurity trends for 2023, such as Supply Chain Resilience, Security Architecture Modernization and Data-Centric Transformation.

Topics: Business Continuity / Disaster Recovery, Data Storage, Information Security, Infrastructure, Strategic Management
1:00 - 1:50 PM

[1 CPE] How Alaska’s New Broadband Reach Can Deliver Benefits to All Communities

  Presented by Mark Carlson, Director of Network Planning • Alaska Communications

Broadband is so influential in society that we would now call it essential infrastructure. Alaska has new broadband projects that are reaching places never touched before. In this session, you will learn about current and future broadband projects taking place around the state of Alaska, upcoming fiber optic projects in rural Alaska, LEO/GEO Satellite technology, and how broadband can influence and improve, life as we know it, to both individuals and communities.

Topics: Infrastructure
2:00 - 2:50 PM

[1 CPE] Panel Discussion: Retaining Your IT Staff in Alaska, Can it be Done?

  Presented by INTERFACE Advisory Council

“The other company is offering higher wages. I get to work remotely as much as I want, and I am getting a four-day workweek. Sorry but I must take it.” Have you heard this just a few times? So many IT hiring managers are having to find creative ways to keep staff members in-house. While budgets and major company overhauls can’t always be achieved, there are methods that can help.

Alaska has some of the most unique challenges in the country for retaining staff. Join the INTERFACE Advisory Council for an open conversation on how to keep your Alaska IT staff intact. This panel features local area IT hiring managers and leaders that deal with these challenges in their own shops. Bring your questions as there will be an opportunity to get advice on the needs you have.

Panelists:

  • Ulf Asplund, Technical Services Manager, Alaska Court System
  • Jeremy Bloomstrom, Senior Programmer Analyst, Matanuska-Susitna Borough
  • Justin Michaud, Senior Program Manager, Mat-Su Borough School District
  • Janelle Mullen, Chief of Operations for IT Customer Services, AK Dept of Health & Social Services
Topics: Culture
Kevin HinrichsKevin HinrichsFBI Special Agent, Cyber Squad
3:00 - 3:50 PM

[1 CPE] Law Enforcement and Cyber Incident Response: How We Can Be Allies

  Presented by Kevin Hinrichs • FBI Special Agent, Cyber Squad

To successfully build a plan for addressing cyber threats, organizations need to know when and how to engage law enforcement. Oftentimes addressing law enforcement is seen as a barrier or a complication for incident handling. Law enforcement should be viewed as an asset and ally in the fight against cyber threats. For companies looking for insight into exactly what they are facing, this cooperation can fill a crucial need. The presentation aims to shed light on what it really means to work with law enforcement, and how that work can be mutually beneficial to both parties.

Special Agent Kevin Hinrichs is a 12-year Alaska resident who spent 13 years in the control system industry as a software developer before joining the FBI. He previously worked as lead developer for a software suite focused on critical condition management across a vast array of ICS/SCADA platforms. Since pivoting to work for the FBI, Special Agent Hinrichs has been assigned to the Cyber Squad in Anchorage where he works on a range of cyber issues including BEC, insider threat, hacktivism, nation-state threats, and has extensively focused on the ransomware threat, specifically enterprise ransomware. Special Agent Hinrichs has a Bachelor's Degree from the University of Houston in Computer Science and Mathematics. Among the roles Special Agent Hinrichs fulfills for the FBI Anchorage office are the InfraGard Coordinator position for the Alaska InfraGard Chapter, the primary point of contact for ICS/SCADA issues, and the subject matter expert for cryptocurrency.

Topics: Information Security
  • Sessions
9:00 - 9:50 AM

[1 CPE] Cybersecurity and AI: The Knowledge of Good and Evil

  Presented by Jim Bates, Certified Leadership Coach • Session Sponsored by Alaska Communications

What’s all the hype about AI? Heard of OpenAI and ChatGPT? What does this mean for cybersecurity? How is, and will, AI be used to help us manage the enormous threat landscape? How will threat agents use AI to thwart our defenses? Join this dynamic session to learn more about AI, what it is, how it’s being used, and why the current conversation is so divided regarding this emerging technology – both good and bad.

Topics: Information Security
10:00 - 10:50 AM

[1 CPE] AI Innovations Fueling Demand for Rapid Network Modernization

  Presented by Joshua Gardiner, Engineering Lead of AI-Driven Enterprise • Juniper Networks

AI recently jumped from a buzzword to the start of a revolution. Juniper is visionary in its use of AI in IT Networking, and we invite you to join our session that highlights the advantages of adopting AI-Driven technologies in your enterprise network.

Attendees will learn how AI can simplify the management of wired & wireless networks as well as support the ever-increasing demands for modern technologies like NAC & SDWAN.

Topics: Artificial Intelligence, Infrastructure
11:00 - 11:50 AM

[1 CPE] How to Simplify and Secure Your Network & What You Need to Know About Wi-FI 6e

  Presented by Jerry Yarborough, Sr SLED Account Executive • Extreme Networks

During the presentation, we will discuss how to simplify your network and make it more secure by using the IEEE standard 802.1aq. We explain the standard, and how it is easier to use than traditional networking and much more secure. We will demo its simplicity and what makes it secure.

We will then move into Wifi 6e and how it is changing the way we must look at wireless deployments. We will discuss all the changes that it has brought us and what we must be planning for with the higher speeds that we will be able to achieve.

Topics: Information Security, Infrastructure
12:00 - 12:50 PM

[1 CPE] Zero Trust Begins with Identity

  Presented by Sami Laine, Director of Technology Strategy • Okta

IAM didn’t rank in the NASCIO priority list before 2019 but has now moved up to #5 and will continue to climb. Yet, many State and Local Government entities find it difficult to articulate a comprehensive IAM strategy and governance framework. To address challenges posed by legacy applications, technical debt, and organizational inertia, a vision of Identity as a Platform can allow for rapid adoption, improved user experience, reduced administrative burden, and contribute to your Zero Trust initiatives. Join this session to:

  • Understand the value of a platform approach to IAM
  • Learn how to enhance existing investments in Microsoft, Duo, and other security solutions
  • Improve cross-functional relationships and employee on/off-boarding
Topics: Information Security
1:00 - 1:50 PM

[1 CPE] Solutions Success with Sourcewell

  Presented by Mitel & Structured

Sourcewell is a national cooperative purchasing program that exists to help organizations save time and money by purchasing from ready-to-use, competitively solicited contracts. Sourcewell often meets the competitive bid requirements for some public sector customers, eliminating the need for a formal RFP process when acquiring a new phone system and expediting the purchasing process for IT Professionals.

For Alaskan State & Local Government, Native Alaskan Tribes & Native Corps, Education, and Nonprofit organizations, there is an opportunity to leverage Sourcewell contracts. And because this contract vehicle is more than just UC Communications, it’s often already approved by purchasing groups inside these entities and provides an easy-to-use solution.

Local Mitel Partner, Structured Communications, currently services and supports Alaskan customers, many of whom have acquired premise or private cloud-based Mitel Phone Systems. We will highlight a few case studies that have used the Sourcewell contract and showcase how Mitel & Structured solved their business concerns through customized solutions.

Topics: Infrastructure, Unified Communications
2:00 - 2:50 PM

[1 CPE] Dark Web Monitoring: It’s time for an Offensive Strategy!

  Presented by Jeff Simpson, Sr Sales Executive, Cybersecurity Solutions • AT&T Alaska

Many organizations discover a cybersecurity breach many months later, too late for any substantial mitigation. With the average cost of breaches in the US at $9.4M, (without including ransom paid), it is advisable for organizations to take a more offensive stance. What if there was a way to detect compromised corporate credentials well before they were used to cause widespread fraud? Dark Web Monitoring goes where cybercriminals traffic stolen emails, usernames, and passwords, and can alert an organization if personal or corporate user information shows up in the Darknet layers. Learn how using a tool like this can help protect an organization’s employees, consumers, and vendors, as well as its reputation.

Topics: Business Continuity / Disaster Recovery, Data Storage, Information Security, Strategic Management
  • Sessions
9:00 - 9:50 AM

[1 CPE] How to Stop East/West Attacks in Your Data Center

  Presented by Aruba Networks

70% of all breaches are caused by endpoint security vulnerabilities, followed by lateral movement in the data center. Halt that hacker traffic. Attend this session to learn about a new category of data center switch that combines best-of-breed L2/3 switching with the industry's first hardware-accelerated programmable processor. This new tool augments your malware and ransomware detection and response capabilities by delivering stateful firewall services inline, at scale, with wire-rate performance and orders of magnitude improvement over traditional data center L2/3 switches. You will learn how to gain visibility and enforce security policy for all East/West flows between workloads to protect the critical assets in your data center.

Topics: Data Center Technology
10:00 - 10:50 AM

[1 CPE] Security Service Edge (SSE) is redefining Cloud, Data, and Network Security

  Presented by Netskope

The inversion effect of cloud applications, users, and data outside of the corporate network, along with the new hybrid workforce, demands a new approach to IT security and network architecture. Cloud application traffic has overtaken web traffic in the enterprise, creating blind spots and complexity with existing legacy security and network solutions that were designed for access to data centers through on-premises security stacks. These challenges demand a new approach to cloud security that delivers the simplicity and agility for access, security, and performance that businesses need for their successful digital transformation journeys while securing their critical data assets and embracing zero-trust principles. They also demand an intelligent solution approach based on a converged, cloud-native architecture.

Topics: Information Security
11:00 - 11:50 AM

[1 CPE] Why is Critical Data Being Compromised?

  Presented by Thales & Structured

Securing critical data and information was where this industry started a long time ago, but it became more challenging with the rapid growth of enterprise data in an interconnected world. The pandemic forced organizations to support a remote workforce and expose critical systems that were once only accessible from inside the company’s network. We’ve increased the attack surface and the number of vulnerabilities which has led to more data breaches. With the technology advancements in access management, data discovery and encryption we can once again shift the focus to securing our data and information. In this presentation, we will discuss a unified data-centric security approach and strategy to protecting your most critical data and information.

1:00 - 1:50 PM

[1 CPE] The Global State of Cyber Insurance

  Presented by Arctic Wolf

When faced with unrelenting cyberattacks, many organizations turn to their insurance company to cover their losses. However, not all organizations are adequately protected.

Topics: Information Security
2:00 - 2:50 PM

[1 CPE] Seeing Your Attack Surface Through the Eyes of an Adversary

  Presented by Kraig Faulkner, Channel Systems Engineer, Cortex • Palo Alto Networks

Modern attack surfaces are dynamic. Without clear visibility that is constantly updated, it is all too easy to have persistent exposures and unmanaged assets. Security practitioners can only be as good as the data they have, so having a strong foundation of continuous discovery and monitoring ensures you can keep up with modern, dynamic attack surfaces in order to find, prioritize, and mitigate exposures as they arise.

Topics: Information Security

Advisory Council

HOW TO BE AN ADVISOR

Advisor-approved content is the foundation upon which INTERFACE was developed. Each conference is guided by an Advisory Council of IT executives and senior managers. Advisor members represent both private and public sector organizations. The council contributes its insight into proposed educational topics and recommends local exhibitors and associations for participation.

EXPAND TO VIEW LIST

Darrell Aldridge
Advanced Computer Technician
Medical Network of Alaska

Ulf Asplund
Manager, Technical Services
Alaska Court System

Michael Chadwick
Director, Internal Audit
Municipality of Anchorage

Brad Davis
Manager, IT Procurement
Chenega Corporation

Dana Gonderzik
Manager, Information Security
Alaska USA Credit Union

Kevin Gustin
Chief Information Security Officer
Chenega Corporation

Jeff Harris
Director, Alaska IT Infrastructure
ConocoPhillips

Brad Heaston
Director, Information Technology
Guardian Security

Paul Hinsberg
Sr Enterprise Architect
Humana, Inc.

Chris Javier
Manager, Information Technology
Galena City School District

Lance Johnson
Risk Analyst Lead
USAA

Chris Letterman
Chief Information Security Officer
State of Alaska

Keith Lewis
Technology Officer
AK Dept of Health & Social Services

Franky Lopez
Manager, Communication Security
ARCTEC Alaska

Wes McEwen
IT Portfolio Management Officer
AK Dept of Transportation & Public Facilities, IT-SPPMO

Mark Merchant
Chief Information Security Officer
Municipality of Anchorage

Justin Michaud
Sr Program Manager
Mat-Su Borough School District

Dan Monarch
Chief Information Security Officer
Matanuska-Susitna Borough

Janelle Mullen
Manager, Information Technology
AK Dept of Health & Social Services

Aaron Mute
Director, Information Technology
Association of Village Council Presidents

Brian Noonan
Director, Information Technology
Altman Rogers & Co.

Matthew Osburn
Director, Information Technology
City of Valdez, AK

Thor Ryan
Chief Risk Officer
AK Dept of Revenue

Bronn Salmon
Chief Information Officer
Sunshine Community Health Center

Mischaud Scruggs
Manager, Information Technology
Assets, Inc.

Amos Secoy
Director, Campus Technology Services
University of Alaska Anchorage

Tamara Serr
Director, Information Services & Cyber Security
Central Peninsula Hospital

Benjamin Shier
Chief Information Technology Officer
University of Alaska Anchorage

Tim Shoemaker Sr.
Manager, Information Technology
General Dynamics Information Technology

Scott Sivulich
Cyber Security Specialist
State of Alaska

Bill Smith
Chief Information Officer
State of Alaska

Andrew Spath
Chief of IT Operations
AK Dept of Family & Community Services

Jerry Tibor
Manager, LAN
University of Alaska Anchorage

Hugh Towe
Manager, Information Technology
AK Dept of Fish and Game

David Vanzant
SVP of Enterprise Security
Alaska USA Credit Union

RC Woodson
Vice President of IT, CIO
Bristol Bay Native Corporation

Eric Wren
Manager, Information Security Infrastructure
Chugach Electric

Dwayne Wright
Vice President, IT Infrastructure
CopperPoint Insurance Companies

Sponsors

HOW TO BE A SPONSOR

Participating exhibitors at INTERFACE achieve a greater return on their investment from this series of IT events than any other face-to-face medium available today. This success is achieved through a time-efficient and cost-effective presence for a pre-qualified audience. This simple formula leads to higher levels of business development opportunity at each event.

GOLD SPONSORS

Alaska Communications

Alaska Communications

Alaska Communications
Alaska Communications is a trusted partner in broadband and managed IT for businesses, schools, healthcare providers, and state and local governments. We confidently provide the latest industry-specific solutions to help address the dynamics of your ever-changing business world.
Visit Website
AT&T

AT&T

AT&T
AT&T helps people connect in meaningful ways every day. We’re building FirstNet for first responders, creating next-generation mobile 5G, and delivering entertainment people love to talk about. Our smart, highly secure solutions serve over 3 million global businesses.
Visit Website
Structured

Structured

Structured
Structured is an award-winning solution provider delivering secure, cloud-connected digital infrastructure. For 30 years, we’ve helped clients through all phases of digital transformation by securely bridging people, business and technology.
Visit Website

SILVER SPONSORS

Arctic Wolf

Arctic Wolf

Arctic Wolf
Arctic Wolf® is the market leader in security operations, and provides security operations as a concierge service. Our security experts work as an extension of your team to monitor and detect threats, and continually strengthen your security posture.
Visit Website
Check Point Software

Check Point Software

Check Point Software
Check Point is a leading provider of cyber security solutions to governments and corporate enterprises globally. Its solutions protect customers from 5th generation cyber-attacks with an industry leading catch rate of malware, ransomware and other types of attacks.
Visit Website
Extreme Networks

Extreme Networks

Extreme Networks
Extreme Networks, Inc. (EXTR) delivers software-driven networking solutions that help IT departments everywhere deliver the ultimate business outcome: stronger connections with customers, partners and employees.
Visit Website
HPE Juniper Networking

HPE Juniper Networking

HPE Juniper Networking
Juniper Networks is now part of HPE. Together, we're building industry-leading, secure, AI-native networks – purpose-built with and for AI. As AI and networking converge, we're driving a bold transformation across enterprises, service providers, and cloud operators.
Visit Website
Netskope

Netskope

Netskope
Netskope, a global SASE leader, helps organizations apply zero trust principles and AI/ML innovations to protect data and defend against cyber threats. The Netskope platform provides optimized access and real-time security for people, devices, and data anywhere they go. Learn how Netskope helps customers be ready for anything on their SASE journey, visit netskope.com.
Visit Website
Okta

Okta

Okta
Okta is the World’s Identity Company. As the leading independent Identity partner, we free everyone to safely use any technology— anywhere, on any device or app. Organizations trust Okta to enable secure access, authentication, and automation. With flexibility and neutrality at the core of our Okta Workforce Identity and Customer Identity Clouds, government, business leaders and developers can focus on innovation and accelerate digital transformation, thanks to customizable solutions and more than 7,000 pre-built integrations.
Visit Website

BRONZE SPONSORS

11:11 Systems

11:11 Systems

11:11 Systems
11:11 Systems is creating a new model delivering the power of "Everything Connected" in connectivity, cloud, and security solutions for customers and partners.
Visit Website
Arista Networks

Arista Networks

Arista Networks
Arista Networks is an industry leader in data-driven, client-to-cloud networking for large data center, campus, and routing environments. Arista’s award-winning platforms deliver availability, agility, automation, analytics, and security through an advanced network operating stack.
Visit Website
Cohesity

Cohesity

Cohesity
Cohesity delivers a web-scale platform that simplifies data protection, consolidates file and object services, provides instant access to test/dev copies, spans from the edge to the cloud, and performs in-place searches and analytics.
Visit Website
Dell

Dell

Dell
Dell Technologies (NYSE:DELL) helps organizations and individuals build their digital future and transform how they work, live and play. The company provides customers with the industry’s broadest and most innovative technology and services portfolio for the data era.
Visit Website
Everpure

Everpure

Everpure
Create an Enterprise Data Cloud that unifies access, simplifies management, and unlocks the value of your data—only with the Everpure platform.
Visit Website
Fortinet

Fortinet

Fortinet
Fortinet helps organizations across the public and private sectors protect the systems, data, and services that keep businesses and communities running. From government agencies and schools to enterprises and service providers, leaders rely on Fortinet to secure critical infrastructure, ensure operational continuity, and defend against evolving cyber threats. Our Security Fabric platform unifies networking and security to deliver the visibility, control, and efficiency organizations need to operate confidently, whether virtual, in the cloud, or on-premises.
Visit Website
GCSIT & Dell

GCSIT & Dell

GCSIT & Dell
GCSIT is a different kind of engineering firm. We act as your personal technology optimization team to create and maintain custom-built, agile infrastructure. We help you transition to the right technology solutions to better handle complex and dynamic challenges.
Visit Website
ImageSource

ImageSource

ImageSource
ImageSource is a software and systems integration firm specializing in Enterprise Content Management.
Visit Website
Rubrik

Rubrik

Rubrik
Rubrik delivers instant application availability for recovery, search, cloud, and development. Hybrid Cloud enterprises benefit from Rubrik’s market-leading Cloud Data Management platform with simplicity, instant data access, app-mobility, policy-driven automation, Ransomware protection, and analytics at scale.
Visit Website
Scale Computing

Scale Computing

Scale Computing
Scale Computing's highly-automated edge infrastructure, virtualization platform, & hyperconverged solutions can handle all of your IT infrastructure needs.
Visit Website
Trellix

Trellix

Trellix
Trellix brings you a living XDR architecture that adapts at the speed of threat actors and delivers advanced cyber threat intelligence. We're changing what security means and what it can do, giving everyone in your organization the confidence that comes with being more secure, every day.
Visit Website

EXHIBITORS & ASSOCIATIONS

AFCEA Alaska

AFCEA Alaska

AFCEA Alaska
AFCEA International is a non-profit organization serving its members by providing a forum for the ethical exchange of information, and dedicated to increasing knowledge through the exploration of issues relevant to its members in information technology.
Visit Website
ARMA Alaska

ARMA Alaska

ARMA Alaska
The ARMA Alaska Chapter’s mission is to Promote and advance the Records and Information Management (RIM) profession and related fields through study, education, research, training, networking, outreach, and member recruitment and retention.
Visit Website
ASIS Alaska

ASIS Alaska

ASIS Alaska
ASIS is dedicated to increasing the effectiveness of security professionals by developing educational programs and materials that address broad security interests, such as the Annual Seminar and Exhibits, as well as specific security topics.
Visit Website
Aurora IT

Aurora IT

Aurora IT
Aurora is a leading Cyber Security Consulting Firm providing consulting services for security development, risk management, compliance, & testing.
Visit Website
CompuNet

CompuNet

CompuNet
CompuNet is a leading U.S. information technology partner, headquartered in Boise, Idaho. The firm specializes in consultation, design and implementation services specifically tailored to solve business problems. With a best-in-class engineering staff and approach, CompuNet focuses on building lasting relationships that prioritize client satisfaction over sales through every step of the journey.
Visit Website
GCI

GCI

GCI
GCI provides voice, video and data communication services to residential, commercial and government customers. GCI deploys the latest technology and equipment with unmatched service and support to connect Alaskans to each other and around the world.
Visit Website
Gigamon

Gigamon

Gigamon
Gigamon offers a deep observability pipeline that harnesses actionable network-level intelligence to amplify the power of observability tools. This powerful combination enables IT organizations to assure security and compliance governance, speed root-cause analysis of performance bottlenecks, and lower operational overhead associated with managing hybrid and multi-cloud IT infrastructures.
Visit Website
HPE Aruba Networking

HPE Aruba Networking

HPE Aruba Networking
Deliver the performance and uninterrupted access your business demands with a Zero Trust foundation and AI-automated operations that help you innovate with the least risk.
Visit Website
HPE Zerto Software

HPE Zerto Software

HPE Zerto Software
HPE Zerto Software helps you unlock ransomware resilience, disaster recovery, and continuous data protection to radically reduce data loss and downtime.
Visit Website
InfraGard Alaska

InfraGard Alaska

InfraGard Alaska
InfraGard is a partnership between the FBI and the private sector. It's an association of businesses,academic institutions,law enforcement agencies,and other participants dedicated who share information to prevent hostile acts against the U.S.
Visit Website
ISACA Anchorage

ISACA Anchorage

ISACA Anchorage
ISACA Anchorage is a local chapter of the international ISACA organization serving the Anchorage and Mat-Su areas. Our goal is to provide local IT audit, governance, and security professionals with the resources to the global ISACA organization.
Visit Website
ISC2 South Central Alaska

ISC2 South Central Alaska

ISC2 South Central Alaska
The goal of ISC2 South Central Alaska is to advance the practice of information security by sharing knowledge, educating practitioners, and assisting the public at large on how to protect and defend against information security threats.
Visit Website
Konica Minolta

Konica Minolta

Konica Minolta
Let Konica Minolta digitally transform your company with business automation solutions tailored for you. From small to enterprise-level clients, we can help.
Visit Website
Lenovo

Lenovo

Lenovo
Lenovo is one of the world's leading personal technology companies, producing innovative PCs and mobile internet devices. A global Fortune 500 company, Lenovo is the world's largest PC vendor and fourth largest smartphone company.
Visit Website
Mitel

Mitel

Mitel
We are the business communication experts powering more than 2 billion connections every day, including over 33 million daily cloud connections. We help companies connect, collaborate and take care of their customers anywhere, anytime, over any device.
Visit Website
Palo Alto Networks

Palo Alto Networks

Palo Alto Networks
Palo Alto Networks™ is the network security company. Its next-generation firewalls enable unprecedented visibility and granular policy control of applications and content – by user, not just IP address – at up to 10Gbps with no performance degradation.
Visit Website
PMI Alaska

PMI Alaska

PMI Alaska
The PMI Alaska Chapter will be recognized as a dynamic organization of Professional Project Managers dedicated to serving the business and educational community of Alaska through the advancement of Project Management.
Visit Website
Qumulo

Qumulo

Qumulo
Qumulo, the leader in data-aware scale-out NAS, helps CIOs and storage administrators store, manage and curate enormous numbers of digital assets.
Visit Website
SentinelOne

SentinelOne

SentinelOne
SentinelOne is the future of Endpoint Protection. It unifies prevention, detection and response in a single platform driven by sophisticated machine learning and intelligent automation. It can adapt your defenses against the most advanced cyber-attacks.
Visit Website
Thales

Thales

Thales
Today’s enterprises depend on the cloud, data and software in order to make decisive decisions. That’s why the most respected brands and largest organizations in the world rely on Thales to help them protect and secure access to their most sensitive information and software wherever it is created, shared or stored – from the cloud and data centers to devices and across networks.
Visit Website
VAST Data

VAST Data

VAST Data
VAST Data delivers the data platform at the heart of the AI-powered world, accelerating time-to-insight for workload-intensive applications. The VAST data platform delivers scalable performance, radically simple data management and enhanced productivity. Launched in 2019, VAST is the fastest-selling data infrastructure startup in history.
Visit Website
Veeam

Veeam

Veeam
Veeam is the global leader in Intelligent Data Management for the Hyper-Available Enterprise. Veeam Hyper-Availability Platform is the most complete solution to help customers on the journey to automating data management.
Visit Website

Interested in becoming part of our next Anchorage event?

CONTACT US FOR INFO

Anchorage

Dena’ina Convention Center
Tikahtnu
600 W. 7th Avenue
Anchorage, AK 99501

Directions & Parking

About Us

We produce quality, cutting-edge educational seminars, drawn from case studies and best practice examples from leaders in the field.

800-365-6402
Contact Us

Popular Searches

  • Event Registration
  • Become an Exhibitor
  • Become an Advisor
  • Sponsor an Event
  • Contact Event Coordinator
  • Submit Feedback

Seminar Topics

  • Artificial Intelligence
  • BC / DR
  • Culture
  • Data Center Technology
  • Data Management
  • Data Storage
  • Digital Experience
  • Information Security
  • Infrastructure
  • Strategic Management
  • Unified Communications

2026 Events

  • Portland • March 19th
  • Anchorage • April 22nd
  • Honolulu • May 21st
  • Phoenix • June 18th
  • Wyoming • July 9th
  • Montana • July 29th
  • Boise • August 20th
  • Salt Lake City • September 22nd
  • Spokane • October 15th
  • Omaha • November 5th
  • Seattle • December 3rd
  • Home
  • About
  • Get Involved
  • Events
  • Register
  • © 2026 F2F Events, Inc.