F2F Events, Inc.
  • Home
  • About
    • About
    • CPE Credits
    • Session Topics
    • Privacy Policy
      • Scam Warning
    • Code of Conduct
    • Media Kit
  • Get Involved
    • Advisory Council
    • Association Partners
    • Exhibitors
    • Speakers
  • Events
    • Locations
    • Upcoming Events
  • Contact
  • Register

Cutting-edge conferences for over 20 years

Educational Events with Your Local IT Community

View Upcoming Events Register

INTERFACE Omaha 2023 / See You Next Year

IT Infrastructure is constantly changing, bringing more new challenges with it every day. From ransomware and the latest security threats to emerging developments in AI and the need for increased bandwidth and storage, it’s nearly impossible to keep up to date. Our conference is designed to help. We’ve assembled a combination of Best-in-Breed hardware and software solutions, along with local experts and organizations to help educate, advise and connect you to resources that can help you meet your goals.

Covering Information Security, Infrastructure, Cloud, Disaster Recovery, Communications, and more, you’ll find presentations, panel discussions, and exhibitors covering a variety of topics, as well as the latest innovations and best practices.

CPE SURVEY
SUBSCRIBE TO Omaha EVENTS

AT A GLANCE

November 2nd, 2023
8:30am – 4:30pm

CHI Health Center Omaha
Junior Ballroom
455 N. 10th Street
Omaha, NE 68102

Directions & Parking

Venue Accessibility

KEYNOTE: [1 CPE] Defend Today, Secure Tomorrow

  Presented by Warren Hagelstien • Cybersecurity Advisor, CISA

Seminar Schedule

VIEW FLOORPLAN
DOWNLOAD SCHEDULE
  • Theater One
  • Theater Two
  • Sessions
  • Keynote
9:00 - 9:50 AM

[1 CPE] Cyber Security is National Security

  Presented by Kenneth A. Schmutz, Supervisory Special Agent • FBI

Cybersecurity is one of the FBI’s highest priorities. Our strategy is multifaceted. We take aim at the actors, disrupt their operations, and go after their money. One of the most important actions a business can take in preparing for a cyber security incident is to make a cyber incident response plan and include the FBI in that plan. When the FBI quickly engages with a company hit by a cyber-attack, we’re able to share indicators that help network defenders identify malicious activity and intelligence about the actors that inform a company’s decision-making during a crisis. As the cyber threat has evolved over the past 20 years, one thing has remained the same: The FBI is at the center of acting on cyber threat information to provide support to victims and impose costs on cybercriminals.

Topics: Information Security
10:00 - 10:50 AM

[1 CPE] Hybrid Cloud: Empowering IT with Resiliency, Multicloud Strategies, Optimal Spend, & Sustainability

  Presented by Michael Donahue, Sr Director, Hybrid Cloud Solutions • Hitachi Vantara

The hybrid cloud has emerged as a game-changing paradigm for modern IT infrastructure, offering IT Leaders and above a wealth of opportunities to drive innovation and efficiency. With the ever-increasing demand for cyber resiliency, flexibility, and sustainability, it is crucial for IT constituents to grasp the intricacies of the hybrid cloud, including key concepts such as security, multicloud, nearcloud, cloud spend optimization, data refactorization, and sustainability practices.

Throughout the session, real-world case studies and examples will be shared from Day 0, Day 1, and Day 2 customers.

  • Day 0 means you want to take advantage of this new framework but are still working through how to adopt hybrid cloud, how to secure it, and how to recruit proper talent to maximize it.
  • Day 1 means your organization took the first step and has a minimum spend commit they must meet. However, you’re still unsure of how to meet it because you’re still determining which applications to refactor, which containerized microservices to adopt, how to reskill existing talent, and how to implement your compliance and governance strategy.
  • Day 2 means your organization has already overcome these hurdles. Nice work! Instead of worrying about hitting a minimum spend commit, you’re now focused on optimizing your environment to limit sprawling cloud costs and looking towards data repatriation efforts.

Participants will have the opportunity to engage in interactive discussions and pose questions, fostering a collaborative learning environment. By the end of this session, IT Leaders will have the knowledge and tools necessary to evaluate, plan, and implement hybrid cloud solutions that align with their organization's goals, including sustainability. Afterall, Hitachi is committed to providing solutions that are exclusively carbon-neutral or zero-carbon, ensuring a sustainable and environmentally friendly approach.

Topics: Infrastructure
11:00 - 11:50 AM

[1 CPE] Thirty Years of Arguing with Adults

  Presented by Paul Dant, Senior Director of Cybersecurity Research • Illumio

In this talk, you’ll hear hilarious stories from a former child hacker that eerily predict the treacherous security landscape of today. Do you want to know why we’re still losing to ransomware? Attend this talk to find out and get insight into how you can start actually solving security problems and prepare your organization for the inevitable breach.

Paul has been coding and hacking since 1987. As a security researcher, he has performed offensive security testing of facilities ranging from nuclear energy plants to hospitals to tent-pole film sets. He’s presented to countless audiences the realities of cyberattacks, the hacker mindset, and new paradigms to address the potentially life-impacting threats we are faced with today.

He is currently the Senior Director of Cybersecurity Research at Illumio, where he works across industries to help organizations understand how to protect their critical assets in the "assume breach" mentality of zero trust.

Topics: Information Security
1:00 - 1:50 PM

[1 CPE] Retaining Your IT Staff in Nebraska, Can it Be Done?

  Presented by INTERFACE Advisory Council

“The other company is offering higher wages. I get to work remotely as much as I want and get a four-day workweek. Sorry, but I must take it.” Have you heard this just a few times? So many IT hiring managers are having to find creative ways to keep staff members in-house. While budgets and major company overhauls can’t always be achieved, some methods can help.

Companies throughout Nebraska have challenges in retaining IT staff. Join the INTERFACE Advisory Council for an open conversation on how to keep your local IT staff intact. This panel features local IT hiring managers and leaders dealing with these challenges in their shops. Bring your questions as there will be an opportunity to get advice on your specific needs.

Moderator: Ron Woerner, Professor, Bellevue University

Panelists:

  • Samantha Harvey-Fleeman, Account Director, LinkedIn
  • Rob LaMagna-Reiter, Chief information Security Officer, Hudl
  • Lisa McKee, President, ISACA Omaha
Topics: Culture
2:00 - 2:50 PM

[1 CPE] Educating Your Guesses: How to Quantify Risk and Uncertainty

  Presented by Sara Anstey, Director of Data Analytics and Integration • Novacoast

Asking for budget and justifying spend in cybersecurity departments can be a difficult task due to limited data and high uncertainty of future events. This talk will dive into quantitative risk analysis as it relates to cybersecurity –– how to model uncertain events and understand financial risk. Attendees will see a first-hand demonstration of how quantitative modeling can be used to communicate risk and understand ROI. Attendees will walk away with the tools needed to present cyber risk as a dollar amount that can be easily understood by other business decision-makers at their company.

Topics: Data Management, Information Security
Warren HagelstienWarren HagelstienCybersecurity Advisor, CISA
3:00 - 3:50 PM

[1 CPE] Defend Today, Secure Tomorrow

  Presented by Warren Hagelstien • Cybersecurity Advisor, CISA

Join Warren Hagelstien, CISA Cybersecurity Advisor, for a discussion of the evolution of ransomware, beginning with the first reported incident to the present. This presentation will provide a high-level overview of one incident followed by a look at the lessons learned. We’ll close with an introduction to the Department of Homeland Security’s (DHS) youngest agency, the Cybersecurity and Infrastructure Security Agency (CISA), and resources available at “no cost” to State, Local, Tribal, and Territorial Governments and Organizations with Critical Infrastructure.

Mr. Warren Hagelstien serves as a Cybersecurity Advisor for Region 7 (IA, KS, MO, and NE) for CISA in the Integrated Operations Division. Based in Omaha, NE he supports the Department of Homeland Security’s mission of partnering with industry and government to understand and manage risk, strengthening the security and resilience of the nation’s critical infrastructure. Mr. Hagelstien provides cyber preparedness assessments and protective resources, working group support, leadership, partnership in public-private development, and coordination and support in times of cyber threat, disruption, or attack to the nation’s sixteen critical infrastructure sectors and state, local, tribal, and territorial government entities.

Mr. Hagelstien holds a Master of Science in Cybersecurity and a Master of Business Administration from Bellevue University. He also holds a Bachelor of Science degree in Management Information Systems from Bellevue University. He is a member of (ISC)2 and has been a Certified Information System Security Professional (CISSP) in good standing for the past 12 years.

Topics: Information Security
  • Sessions
9:00 - 9:50 AM

[1 CPE] Optimizing Mainframe Environments Against Today’s Cybersecurity Threats

  Presented by Don Pecha, Chief Information Security Officer • FNTS

IBM Z is more modern than you may think. The IBM Mainframe is inherently built around security and quantum proof. Mainframes are still at the core of many businesses. Their mission critical data is secured and runs on a mainframe. Insurance, Finance, Manufacturing, Grocery, and Healthcare among other businesses are still actively leveraging mainframes. How do we know these critical machines are secure?

Topics: Information Security
10:00 - 10:50 AM

[1 CPE] How to Prepare and Respond to Data-Oriented Cyberattacks in Realtime

  Presented by Jonathan Halstuch, Co-Founder and CTO • RackTop Systems with SD3IT

Today’s cyber threats call for a new approach to data security, placing protections closer to the data. In this session, you’ll develop an understanding of why advanced cyber storage solutions are critical for defending production data from theft and destructive cyberattacks like ransomware. Learn strategies for reducing your organization’s threat window with a data-centric zero-trust architecture and artificial intelligence. Improve security and cyber hygiene while embracing the CISA Zero Trust Maturity Model to ensure your organization’s data is defended during each of the three phases of an attack.

Key takeaways:

  • Stay ahead of insider threats, data theft, ransomware, and extortionware with active defense
  • Improve security and cyber hygiene by aligning with the CISA Zero Trust Maturity Model
  • How to involve stakeholders in a data-centric approach to security
Topics: Business Continuity / Disaster Recovery, Data Storage, Information Security
11:00 - 11:50 AM

[1 CPE] Selecting an MDR Vendor for Your Organization

  Presented by Tim Evans, Co-Founder and Senior Vice President • Adlumin

Join Adlumin's EVP, Tim Evans, as he provides guidance on selecting the right Managed Detection and Response (MDR) vendor for your organization. Evans will cover key considerations such as assessing your organization's security needs, evaluating the vendor's capabilities and expertise, and ensuring alignment with your organization's goals and objectives. Attendees will gain insights into the critical factors to consider when choosing an MDR vendor to enhance their organization's cybersecurity posture.

Topics: Information Security
12:00 - 12:50 PM

[1 CPE] Learning from the IT Titans of Omaha & Lessons from the Recent Past

  Presented by Scott Davis, CDW Enterprise Architecture Team Field CTO & former Hitachi Field CTO  • Hitachi Vantara & CDW

You deserve a raise. Scratch that, you deserve a vacation and a raise. As an IT Titan, you were immeasurable in keeping your company afloat when the world halted in 2020 and threw all your initiatives into chaos. As an IT Titan, you persevered when all your priorities shifted to supporting every employee remotely and transforming your business into running 24/7 during the WFH mandate, while still caring for your loved ones. You achieved migrating your organization into the cloud, extending your security firewalls into the homes of your workforce, keeping stringent compliance requirements, and automating workflows to continue meeting stretch goals with limited staff. Whew!

As you reflect on your accomplishments, what did you learn? And what could you have done differently that will be top of mind to adapt to the woes of today, including perhaps mounting technical debt, a looming recession, an upcoming election year, ongoing supply chain issues, and urgent sustainability efforts?

  • In the year of efficiency, how can businesses leverage cloud repatriation efforts and containerization to cut ballooning cloud costs?
  • As you continue layering security tool after security tool, how can you implement cyber resiliency and drastically limit your risk from attackers?
  • With the looming recession and a hiring freeze, how can IT departments meet stretch goals by leveraging adaptive automation technologies, such as ChatGPT? And how can compliance teams regulate these new tools to ensure data privacy while maintaining brand equity?
  • How can you help accelerate your organization’s timeline for becoming carbon net-zero and ditch reusable straws and $0.10 plastic bags?

Join us as we review the top IT trends for 2023/2024 with CDW’s Scott Davis, Strategist and Former Hitachi Field CTO. As a former CTO and COO, Scott brings a unique perspective in guiding programs for organizational change. He brings his executive experience to help identify customer goals and challenges that disrupt the status quo to enable a better digital transformation roadmap leveraging the value of data, the IoT, and AI to achieve new business insights faster.

Topics: Strategic Management
1:00 - 1:50 PM

[1 CPE] Cyber Audibles: Making the Most of Your Digital Defense

  Presented by Jamion Aden, Solutions Architect • IP Pathways

In the realm of cybersecurity, no conventional game plan, Business Continuity Plan, or tabletop exercise can fully anticipate and mitigate the challenges posed by cyber threats. Join us as we navigate through real-world encounters, and 'calling the play at the line,' when ransomware becomes the opposing force.

Our Solutions Architect, Jamion Aden, leverages over 18 years of comprehensive industry experience to lead this engaging and interactive presentation. In doing so, we aim to equip you with the necessary insights and strategies essential to effective event preparedness, as well as furnish your security toolkit with the necessary tools for bolstering your organization's cyber defenses.

Topics: Information Security
2:00 - 2:50 PM

[1 CPE] How AI Can Think Like an Attacker

  Presented by Darktrace

In the face of skyrocketing cyber risk, detecting and responding to attacks is no longer enough. Organizations must take proactive steps to prevent threats before they happen and to recover if compromised. In this session, Darktrace unveil an ambitious new approach to security, with core engines powering AI technologies to prevent, detect, respond, and ultimately heal from attacks across all areas of their digital environment. Together, these engines combine to strengthen organizations’ security posture in a virtuous AI feedback ‘loop,’ which provides powerful end-to-end, bespoke, and self-learning solutions unique to each organization.

Topics: Information Security

Advisory Council

HOW TO BE AN ADVISOR

Advisor-approved content is the foundation upon which INTERFACE was developed. Each conference is guided by an Advisory Council of IT executives and senior managers. Advisor members represent both private and public sector organizations. The council contributes its insight into proposed educational topics and recommends local exhibitors and associations for participation.

EXPAND TO VIEW LIST

Jason Boche
Sr Director, Corporate Development & Strategy
Union Pacific

Eric Carel
Manager, Information Security
Farmers Mutual of Nebraska

Bob Copley
Chief Technology Officer
The Garrett Group

Jay Gnuse
Director, Information Technology
Chief Industries

Rick Haugerud
AVP, Information Technology Services
University of Nebraska

Cindi Hildebrandt
VP, Sr IT Controls & Governance Officer
Bank of the West

Andy Hinton
Sr Manager, Information Security
CSG International

Matt Johnson
Sr Vice President of IT, Chief Financial Officer
PremierBank

Tim Jones
Director, Information Technology
TD2

Michael Kearns
Chief Information Security Officer
Nebraska Methodist Health System

Karim Khayati
Director, Architecture & DevOps
Aya Healthcare

Rob LaMagna-Reiter
Chief information Security Officer
Hudl

Christian Lind
Director, Information Technology
Nebraska Cancer Specialists

Eric Matulka
Vice President, Information Technology
Haley Residential

Lisa McKee
President
ISACA Omaha

David Newell
Manager, Digital Controls & Governance, Compliance
BMO US

Amber Roberts
Sr Product Owner, Product Manager
Kiewit Corporation

Derek Sailors
Director, Information Systems
Community Hospital

Ed Toner
Chief Information Officer
State of Nebraska

Dana Turner
Chief Information Security Officer
Union Bank and Trust

Leesa Wees
VP & Manager, IT Controls Governance
Bank of the West

Sponsors

HOW TO BE A SPONSOR

Participating exhibitors at INTERFACE achieve a greater return on their investment from this series of IT events than any other face-to-face medium available today. This success is achieved through a time-efficient and cost-effective presence for a pre-qualified audience. This simple formula leads to higher levels of business development opportunity at each event.

GOLD SPONSORS

Hitachi Vantara

Hitachi Vantara

Hitachi Vantara
Hitachi Vantara helps enterprises create and derive value from their data. Its solutions include best-in-class data management, IT infrastructure and analytics products, IoT solutions and Smart Spaces technologies for a broad range of industries.
Visit Website

SILVER SPONSORS

Adlumin

Adlumin

Adlumin
Adlumin's security and compliance automation platform helps organizations manage evolving threats and cybersecurity compliance requirements.
Visit Website
Darktrace

Darktrace

Darktrace
Darktrace is a leading cybersecurity AI company and the creator of Autonomous Response technology. It provides a comprehensive cyber defense to over 5,500 organizations, protecting the cloud, email, IoT, traditional networks, endpoints, and industrial systems.
Visit Website
FNTS

FNTS

FNTS
FNTS is a trusted multi-cloud and managed IT services provider with a proven 25-year history supporting mainframe environments and a wide range of operating systems, including Windows, Linux, Unix AIX and iSeries. We also provide elevated layered security solutions to industries with strict regulations and compliance requirements.
Visit Website
Illumio

Illumio

Illumio
Illumio, the Zero Trust Segmentation company, stops breaches and ransomware from spreading across the hybrid attack surface. The Illumio ZTS Platform visualizes how workloads and devices are communicating, creates granular segmentation policies which only allow necessary communication, and automatically isolates ransomware and breaches. Assume breach. Minimize impact. Increase resilience.
Visit Website
IP Pathways

IP Pathways

IP Pathways
IP Pathways delivers a consultant-led experience to overcome all IT challenges your organization faces today. Our best-in-class engineers first listen to your goals then architect, implement, monitor, support, and manage custom technology solutions to help you reach them. Whether in the cloud or on-premise, we strive to understand your business and become a true strategic technology partner.
Visit Website
Novacoast

Novacoast

Novacoast
Novacoast is an international cybersecurity company specializing in IT services and software development. With a 28-year history in the industry, Novacoast has built and maintains IT security solutions for some of the world’s largest private and public organizations. Our team is comprised of hundreds of specialists with backgrounds in IT advisory, development and engineering, and managed services. Together, we’re committed to identifying unique ways to improve the productivity and security posture of our customers.
Visit Website
SD3IT

SD3IT

SD3IT
SD3IT is a trusted IT Solution provider untangling the procurement process for your business requirements for modernization, digital transformation, data centric and cyber security by leveraging innovative technologies and vast partner relationships.
Visit Website

BRONZE SPONSORS

Arctic Wolf

Arctic Wolf

Arctic Wolf
Arctic Wolf® is the market leader in security operations, and provides security operations as a concierge service. Our security experts work as an extension of your team to monitor and detect threats, and continually strengthen your security posture.
Visit Website
baramundi

baramundi

baramundi
baramundi Software offers efficient, secure, and cross-platform management of workstation environments. With over 20 years of UEM experience across the globe, over 4,000 customers benefit from our intuitive, single-interface platform.
Visit Website
Critical Start

Critical Start

Critical Start
Critical Start Managed Cyber Risk Reduction solutions ensure continuous security monitoring and mitigation, delivering robust protection against threats. With our platform’s maturity assessments, event analytics, response capabilities, and a team of expert risk mitigators, achieve the highest level of cyber risk reduction and increase confidence in attaining desired security maturity.
Visit Website
CrowdStrike

CrowdStrike

CrowdStrike
CrowdStrike® provides cloud-delivered endpoint and workload protection. Leveraging artificial intelligence (AI), the CrowdStrike Falcon® platform protects customers against cyberattacks on endpoints and workloads on or off the network by offering visibility and protection across the enterprise.
Visit Website
eSentire

eSentire

eSentire
eSentire’s complete, multi-signal Managed Detection and Response services provide 24/7 cutting-edge protection to prevent cybercriminals from ever disrupting your business.
Visit Website
ForgeRock

ForgeRock

ForgeRock
Solve any identity use case without breaking legacy systems. Get the ForgeRock identity Platform as-a-Service or push-button deployment to any cloud.
Visit Website
LogRhythm

LogRhythm

LogRhythm
LogRhythm, Inc. is an independent security intelligence company that integrates security information and event management, log management, file integrity monitoring, network forensics, and host forensics.
Visit Website

EXHIBITORS & ASSOCIATIONS

AFCEA Greater Omaha

AFCEA Greater Omaha

AFCEA Greater Omaha
AFCEA's vision is to be the premier information technology and communications association for professionals in international government and academia worldwide. The Greater Omaha Chapter supports this vision by providing a forum for information exchange.
Visit Website
Alert Logic

Alert Logic

Alert Logic
Cybersecurity Made Easy. The most comprehensive Managed Detection and Response (MDR) and Web Application Firewall (WAF) solutions for public clouds, on-premises, and hybrid environments.
Visit Website
ARMA Nebraska

ARMA Nebraska

ARMA Nebraska
ARMA Nebraska is a chapter of ARMA International, a not-for-profit professional association, and the authority on governing information as a strategic asset. Our goal is to be a valuable resource for information management professionals.
Visit Website
Axelliant

Axelliant

Axelliant
Axelliant design, deploy, implement, and manage advanced IT solutions and services with agility and responsiveness through the entire solution delivery process. Axelliant is there to guide customers on their personalized journey to success.
Visit Website
Carrier Access

Carrier Access

Carrier Access
Carrier Access IT is the Midwest’s trusted IT partner, delivering business IT services through intimate client relationships, enterprise expertise, talented engineers, and strategic partners.
Visit Website
CDW

CDW

CDW
With full-stack expertise, CDW helps you design, orchestrate and manage technologies that drive business success.
Visit Website
HDI Nebraska

HDI Nebraska

HDI Nebraska
HDI Nebraska provides a collaborative communications network for our members in the region. The group focuses on the sharing of knowledge, experiences and techniques that are used to improve your skills.
Visit Website
IIA Ak-Sar-Ben

IIA Ak-Sar-Ben

IIA Ak-Sar-Ben
The IIA is the internal audit profession's global voice, recognized authority, and principal educator. Generally, members work in internal auditing, risk management, governance, internal control, information technology audit, education, and security.
Visit Website
InfraGard Nebraska

InfraGard Nebraska

InfraGard Nebraska
InfraGard is an information sharing and analysis effort serving the interests and combining the knowledge base of a wide range of members. At its most basic level, InfraGard is a partnership between the FBI and the private sector.
Visit Website
ISACA Omaha

ISACA Omaha

ISACA Omaha
Our aim is to sponsor local educational seminars and workshops, conduct regular chapter meetings, and help to further promote and elevate the visibility of the IS audit, control and security profession throughout the region.
Visit Website
MSPAA

MSPAA

MSPAA
The MSP Association of America (MSPAA) has been established with three primary missions, each of which follows a unique trajectory aimed at providing our clients, members, and students with a collaborative and informative pathway towards building a future for technology, business, and education.
Visit Website
NEbraskaCERT

NEbraskaCERT

NEbraskaCERT
NEbraskaCERT provides repositories of technical information; links to and with other information sources; and assists in providing both academic courses and technical certifications in information security.
Visit Website
Omaha 365

Omaha 365

Omaha 365
The Omaha SharePoint/Office 365 User Group meets monthly. We cover all aspects of SharePoint and Office 365. From basic user interactions, to management and development. We strive to have a full range of interesting topics that will appeal to our members.
Visit Website
PMI Heartland

PMI Heartland

PMI Heartland
PMI Heartland provides face-to-face contact with peers from various organizations and industries working in the project management field. We promote project management professionalism within local businesses, universities and professional organizations.
Visit Website
RackTop Systems

RackTop Systems

RackTop Systems
RackTop Systems specializes in Enterprise Data Management hardware and software, offering the most secure, most compliant solution on the market.
Visit Website
TierPoint

TierPoint

TierPoint
TierPoint offers personalized, comprehensive IT solutions, including colocation data centers, managed cloud, and recovery services. We are security-focused, cloud-forward, and data center-strong, a champion for untangling the hybrid complexity of modern IT, so you can free up resources to innovate, exceed customer expectations, and drive revenue.
Visit Website
Veritas

Veritas

Veritas
Optimize the protection, performance, and cyber resiliency of all your enterprise data and applications across any cloud, any environment, at any scale.
Visit Website

Interested in becoming part of our next Omaha event?

CONTACT US FOR INFO

Omaha

CHI Health Center Omaha
Junior Ballroom
455 N. 10th Street
Omaha, NE 68102

Directions & Parking

About Us

We produce quality, cutting-edge educational seminars, drawn from case studies and best practice examples from leaders in the field.

800-365-6402
Contact Us

Popular Searches

  • Event Registration
  • Become an Exhibitor
  • Become an Advisor
  • Sponsor an Event
  • Contact Event Coordinator
  • Submit Feedback

Seminar Topics

  • Artificial Intelligence
  • BC / DR
  • Culture
  • Data Center Technology
  • Data Management
  • Data Storage
  • Digital Experience
  • Information Security
  • Infrastructure
  • Strategic Management
  • Unified Communications

2026 Events

  • Portland • March 19th
  • Anchorage • April 22nd
  • Honolulu • May 21st
  • Phoenix • June 18th
  • Wyoming • July 9th
  • Montana • July 29th
  • Boise • August 20th
  • Salt Lake City • September 22nd
  • Spokane • October 15th
  • Omaha • November 5th
  • Seattle • December 3rd
  • Home
  • About
  • Get Involved
  • Events
  • Register
  • © 2026 F2F Events, Inc.