F2F Events, Inc.
  • Home
  • About
    • About
    • CPE Credits
    • Session Topics
    • Privacy Policy
      • Scam Warning
    • Code of Conduct
    • Media Kit
  • Get Involved
    • Advisory Council
    • Association Partners
    • Exhibitors
    • Speakers
  • Events
    • Locations
    • Upcoming Events
  • Contact
  • Register

Cutting-edge conferences for over 20 years

Educational Events with Your Local IT Community

View Upcoming Events Register

INTERFACE Kansas City 2024 / See You Next Year

IT Infrastructure is constantly changing, bringing more new challenges with it every day. From ransomware and the latest security threats to emerging developments in AI and the need for increased bandwidth and storage, it’s nearly impossible to keep up to date. Our conference is designed to help. We’ve assembled a combination of Best-in-Breed hardware and software solutions, along with local experts and organizations to help educate, advise and connect you to resources that can help you meet your goals.

Covering Information Security, Infrastructure, Cloud, Disaster Recovery, Communications, and more, you’ll find presentations, panel discussions, and exhibitors covering a variety of topics, as well as the latest innovations and best practices.

CPE SURVEY
SUBSCRIBE TO Kansas City EVENTS

AT A GLANCE

June 6th, 2024
8:30am – 4:30pm

Overland Park Convention Center
Ballrooms A2, B, C
6000 College Boulevard
Overland Park, KS 66211

Directions & Parking

Venue Accessibility

KEYNOTE: [1 CPE] A Small Business Journey to the NIST Cybersecurity Framework 2.0

  Presented by Daniel Eliot • National Institute of Standards and Technology

Seminar Schedule

VIEW FLOORPLAN
DOWNLOAD SCHEDULE
  • Theater One
  • Theater Two
  • Sessions
  • Keynote
9:00 - 9:50 AM

[1 CPE] Global Insights on Identity Security Maturity: Why it Matters? Why Now?

  Presented by Jed Knopf, Solutions Architect • CyberArk

In our global survey of 1,500 identity-related security experts, we found only 9% of organizations have the highest level of maturity. These Transformative organizations have the most mature identity security programs as they strategically focus on four key tenets: tools, integration, automation, and continuous threat detection & response. As a result, these organizations significantly outperform their competition in driving business outcomes and reducing risk. Learn how you can mature your identity security program because the future of security starts with identity.

Key Session Takeaways:

  • Top challenges for identity security
  • The four tenets of identity security
  • How to take a holistic approach to identity security
  • Key considerations in evaluating identity security providers
Topics: Information Security
10:00 - 10:50 AM

[1 CPE] Navigating Cloud Complexity: Challenges, Drivers, and Solutions

  Presented by John McHaney, Enterprise Architect • Hitachi Vantara

Join this session for an overview of challenges and drivers for customers related to Cloud, including a General Hybrid Cloud architecture overview with Hitachi On-Prem, Near-Cloud and Hybrid-Cloud Solution Offerings.

John McHaney is an Enterprise Architect at Hitachi Vantara specializing in Cloud, Converged, and Business Applications, with expertise in Oracle and SAP technologies. He joined Hitachi Vantara in October 2018, bringing a background in software development, Oracle database administration, and infrastructure architecture. With experience in technical pre-sales at EMC, Oracle, and Hitachi, John excels in communicating complex solutions. Based in Atlanta, Georgia, he continues to innovate in enterprise architecture, leveraging his extensive experience in Oracle, SAP, and cloud technologies.

Topics: Data Storage, Infrastructure
11:00 - 11:50 AM

[1 CPE] The Current Threat Landscape Requires a Unique Approach

  Presented by Todd Bertchume, Technical Marketing Engineer • Forescout

Specialized threats targeting OT environments have been around since at least 2010, with the reports of Stuxnet. Recognizing the criticality of these devices, Threat Actors have continued evolving, continuing to target OT devices, many of which are inherently insecure-by-design. Research, such as Vedere Labs’ OT:ICEFALL research project and Project Basecamp by Digital Bond from 10 years ago showed how significant the scope of vulnerable devices are that are pervasive in critical infrastructure systems. Today’s SOC needs to not only see those devices and the risks they pose while also ensuring accurate detection of the threats uniquely targeting those OT environments they’re deployed in. This session will explore this unique threat landscape and the capabilities required to combat the threats and automatically mitigate the risks specially targeting Operational Technology environments.

Todd Bertchume is a Technical Marketing Engineer at Forescout. He brings over 23 years of experience in the networking industry working on the partner, customer, and manufacturer side of the business. He holds many industry certifications in networking and security. Over the years, he has helped many customers building data centers and spent the last few years specializing in securing assets in the health care industry.

Topics: Information Security
1:00 - 1:50 PM

[1 CPE] Disaster Preparedness and Data Protection Strategies for Business Continuous Availability

  Presented by Stacey Budd, Data Resilience Expert and Sales Engineer Team Leader • Arcserve

As natural disasters like hurricanes, wildfires, and severe winter events become more frequent and intense, businesses face increasing economic and operational challenges. High-profile disasters, including the Camp Fire in 2018, which incurred a staggering $16.5 billion in damages, and Hurricane Maria's profound impact on Puerto Rico, estimated at $139 billion for full recovery, underscore the escalating financial stakes.

This presentation will explore effective strategies to bolster business resilience in the face of natural catastrophes.

Key elements of the session will include:

  • Critical insights from Arcserve's annual global research study on disaster preparedness.
  • A comprehensive Disaster Preparedness Checklist tailored for companies.
  • Practical tools designed to safeguard business operations and data resilience.

We will delve into the details of a 5-step disaster and ransomware recovery plan template, as well as the 3-2-1-1 backup strategy, which ensures robust data recovery through multiple backup copies stored both locally and offsite. By implementing these strategies, businesses can minimize financial losses, reduce operational downtime, and achieve a rapid recovery, thereby ensuring continuity even during catastrophic events. This session aims to arm business leaders with the essential tools and knowledge to safeguard their enterprises amidst an increasingly unpredictable global landscape.

Topics: Business Continuity / Disaster Recovery, Infrastructure
2:00 - 2:50 PM

[1 CPE] AI: Friend or Foe? An Open Discussion With Your Colleagues

  Presented by INTERFACE Advisory Council

Artificial Intelligence has made a mark already and its use will only continue to expand. Are we fully prepared to embrace AI in our workplaces? Viewpoints differ on how widely AI should be used at this point. Commonly used applications and software now include AI capabilities as a part of their standard offerings. How is this governed in your company? Do you even have an AI policy drafted?

Join the INTERFACE Advisory Council for an open discussion on all things AI. We will cover the risks associated with using AI –– and the risk of NOT using it. What knowledge do you need right now? Bring your questions as we explore the starting points that every IT department needs to consider for an effective AI policy.

Panelists:

  • Jason Kentner, Chief Information Security Officer, KCAS Bioanalytical & Biomarker Services
  • Bill Kim, Chief Information Security Officer, Security Bank of Kansas City
  • Melissa Spicer, Director, Cybersecurity, Evergy
  • Mark Wilcox, Information Security Officer, SVP, NBKC Bank
Topics: Artificial Intelligence
Daniel EliotDaniel EliotNational Institute of Standards and Technology
3:00 - 3:50 PM

[1 CPE] A Small Business Journey to the NIST Cybersecurity Framework 2.0

  Presented by Daniel Eliot • National Institute of Standards and Technology

The NIST Cybersecurity Framework (CSF) 2.0 is here! This is the first major revision of the globally recognized framework since its initial publication in 2014. If that wasn’t exciting enough, NIST also published the CSF 2.0 Small Business Quick Start Guide along with it. As a supplement to the CSF 2.0, the new Small Business Quick Start Guide provides small-to medium-sized businesses (SMB) with resources and considerations to kick-start their cybersecurity risk management strategy using the CSF 2.0. During this talk Daniel Eliot, NIST’s Lead for Small Business Engagement, will provide an overview of updates to the NIST Cybersecurity Framework 2.0 and will showcase the new CSF 2.0 SMB Quick Start Guide and other free NIST small business cybersecurity resources. Eliot will also spend time sharing various ways organizations can get more engaged with NIST’s cybersecurity and privacy work.

Daniel Eliot is the lead for small business engagement within the National Institute of Standards and Technology’s Applied Cybersecurity Division. In this role, he works across NIST's cybersecurity and privacy program to advise and support development of cybersecurity resources, communication materials, and collateral tailored for use by small businesses. He also regularly works directly with the small business community and their advocates through external outreach and engagement. Immediately prior to joining NIST, Daniel worked within MITRE Corporation’s Center for Securing the Homeland, serving as the chief communications strategist at the NIST National Cybersecurity Center of Excellence. In prior roles he has also served as the director of education for the National Cybersecurity Alliance and manager of technology business development for the University of Delaware Office of Economic Innovation and Partnerships.

Topics: Information Security, Strategic Management
  • Sessions
11:00 - 11:50 AM

[1 CPE] Enhancing Cyber Resilience: Integrating AI Strategies

  Presented by Dr. Cheryl Cooper, CISSP, President, & Naeem Babri, Vice President • WiCyS Kansas City

The convergence of business continuity, information security, and organizational resilience forms the cornerstone of cyber resilience, enabling entities to prevent, endure, and recover from cyber threats. This presentation delves into the enhancement of ransomware resilience, with a spotlight on fortifying the Lockheed Martin Cyber Kill Chain. Amidst the escalating prevalence of ransomware, which inflicts substantial financial and operational harm, the presentation will outline strategies to strengthen defenses. The emphasis will be on preemptive actions and incident management, covering backups, recovery processes, containment, and the imperative of employee training on phishing and secure password practices.

Looking ahead, the session will explore the emerging threat of AI-driven ransomware attacks and discuss strategies for future-proofing networks against these sophisticated threats.

There will be three main deliverables:

  1. A comprehensive guide to implementing the Lockheed Martin Cyber Kill Chain for ransomware threat mitigation.
  2. A strategic playbook for integrating artificial intelligence in cyber defense mechanisms.
  3. An actionable framework for employee education and incident response to enhance organizational cyber resilience.

Dr. Cheryl Cooper has over 25 years of experience within the technology and cybersecurity industries, and on top of that, Dr. Cooper served in the U.S. Navy as a Telecom Technology Controller. Under her belt, she holds a doctorate in Computer Science with a concentration in Information Assurance, a Master’s of Science in Criminal Justice with a Specialization in Cybercrime, and multiple certifications– Information System Security Professional (CISSP) under the governing body of the International Information Systems Security Certification Consortium (ISC2), a Certified Data Privacy Solution Engineer (CDPSE) under the governing body ISACA, and a Certified Information Systems Security Auditor (CISSA).

Topics: Artificial Intelligence, Business Continuity / Disaster Recovery, Information Security
12:00 - 12:50 PM

[1 CPE] Navigating the Post-Quantum Encryption Landscape in Data Management Technologies

  Presented by Mauricio Daher, Technical Expert, Data Intelligence and Content Solutions • Hitachi Vantara

Post Quantum Encryption, and how products need to adapt in this brave new world. There is a lot of talk about Generative AI, LLMs, GTP, but if we cannot secure our data - confidentiality, integrity, and availability - perimeter, then nothing else matters. This session will dive into security topics relevant to the landscape of data management technologies we have on-hand today from the top storage solution companies. The challenges for the next five years will require game-changing innovation to keep up with an exponentially expanding threat surface. The winner will be the one to secure the future for the rest until the next bubble comes along.

Currently, Mauricio is a Technical Expert for Data Intelligence and Content: A technical leader in support of Hitachi Vantara’s content business for the Americas. This involves providing technical guidance, and solutions crafting to the sales teams across the organization, working hand in hand with the solution sales specialists.

Before joining HDS, Mauricio was the Regional Solutions Advisor for Dell in the Northeast, focusing on Compellent and EqualLogic storage solutions, and supporting 5 systems engineers from a knowledge management, measurement, and orientation perspective. Prior to Dell, Mauricio was AVP of Data Protection for RBS Citizens Bank based in Rhode Island where he provided strategic leadership in the bank’s data protection architecture and the creation of a service catalog and storage economics model for production storage and BURA. Before RBS Citizens, Mauricio was a Principal Consultant with Glass House during which time he delivered some two dozen strategic engagements in storage and data protection to companies spanning segments like government, airlines, healthcare as well as financial institutions. Before Glass House, Mauricio ran a delivery practice at McData that implemented SAN-based storage and tape virtualization solutions to a variety of enterprise clients such as Wells Fargo, Bank of New York, and a dozen smaller companies.

Mauricio holds an S.M. in Civil and Environmental Engineering with a focus on Information Systems from M.I.T. and a B.S. in Mechanical Engineering from Boston University.

Topics: Artificial Intelligence, Data Management, Information Security
1:00 - 1:50 PM

[1 CPE] The Current Threat Landscape Requires a Unique Approach

  Presented by Todd Bertchume, Technical Marketing Engineer • Forescout

Specialized threats targeting OT environments have been around since at least 2010, with the reports of Stuxnet. Recognizing the criticality of these devices, Threat Actors have continued evolving, continuing to target OT devices, many of which are inherently insecure-by-design. Research, such as Vedere Labs’ OT:ICEFALL research project and Project Basecamp by Digital Bond from 10 years ago showed how significant the scope of vulnerable devices are that are pervasive in critical infrastructure systems. Today’s SOC needs to not only see those devices and the risks they pose while also ensuring accurate detection of the threats uniquely targeting those OT environments they’re deployed in. This session will explore this unique threat landscape and the capabilities required to combat the threats and automatically mitigate the risks specially targeting Operational Technology environments.

Todd Bertchume is a Technical Marketing Engineer at Forescout. He brings over 23 years of experience in the networking industry working on the partner, customer, and manufacturer side of the business. He holds many industry certifications in networking and security. Over the years, he has helped many customers building data centers and spent the last few years specializing in securing assets in the health care industry.

Topics: Information Security

Advisory Council

HOW TO BE AN ADVISOR

Advisor-approved content is the foundation upon which INTERFACE was developed. Each conference is guided by an Advisory Council of IT executives and senior managers. Advisor members represent both private and public sector organizations. The council contributes its insight into proposed educational topics and recommends local exhibitors and associations for participation.

EXPAND TO VIEW LIST

Mike Aylward
Chief Information Officer
Bank of Commerce

Eric Baer
Chief, IT Service and Design Section
US Dept of Agriculture

Jason Baity
Manager, Information Technology
KanEquip

Nancy Baker
Assistant Director, Network Operations
University of Kansas

Kip Ballinger
Sr Cyber Security Specialist
Tista Science & Technology

Shaun Bender
Vice President, Mobile Operations
Sullivan Law Firm

Kevin Blazer
Chief Information Officer
Herring Bank

Richard Borlaza
Director, Information Technology
Hyman Brand Hebrew Academy

Amy Botts
Manager, Information Security Risk
Hallmark Cards, Inc.

Sherry Callahan
Chief Information Security Officer
Dairy Farmers of America

W. S. Cheng
Manager, Information Security & Risk
Spencer Fane LLP

Leys Curley
Sr Manager, Identity & Access Management
Cerner Corporation

David Daniel
Manager, Information Security
Shook, Hardy & Bacon LLP

Geoff Degen
Managing Director, Information Security
CrossFirst Bank

Brandon Fuller
Manager, Information Security
General Electric

Shawn Geib
Chief Information Security Officer
Honeywell FM&T

Adrian Guerrero
Director, Operations
Kansas State Board of Nursing

Dave Ireland
Deputy Director EHSD
US Dept of Agriculture

Britney Kennedy
Global Business Information Security Officer
Cardinal Health

Jason Kentner
Chief Information Security Officer
KCAS Bioanalytical & Biomarker Services

Bill Kim
Chief Information Security Officer
Security Bank of Kansas City

Harry Maroudas
Information Systems Security Officer
USDA Risk Management Agency

Billy McGurgan
Deputy Chief Information Security Officer
Honeywell FM&T

Mike Nixon
Director, Information Security
Stormont Vail Health

Brian Olberding
Manager, IT Operations
Root Insurance

Nathan Powell
IT Administrator
Lewis Rice LLC

Stan Rumford
Vice President, Information Technology
Envista Credit Union

Jenya Sablin
Vice President, Infrastructure Solutions
Black Knight Financial Services

Gary Schieber
Executive Director, Technology & Information Security
Baker University

Tom Scuderi
Sr Manager, Information Security GRC
LTK

Kelly Shoaf
Manager, Information Security
CrossFirst Bank

Maria Singh
Manager, Cybersecurity Content
Enterprise KC

Ed Sitz
Manager, Information Technology
Med James, Inc.

BJ Smith
Head of Information Security
Seaboard Foods

Kara Speciale
Chief Information Security Officer
Children’s Mercy Hospital

Melissa Spicer
Director, Cybersecurity
Evergy

Andrew Spidle
Director, Information Technology
Axcet HR Solutions

Ted Tartenaar
Manager, Information Technology
Johnson County Park & Recreation District

Vernon Turner
Manager, Information Technology
Ultra Precision Control Systems

David Upsdell
Sr Vice President, Information Security
Midwest Trust Company

Rachel Vessar
Director, Technology
Maysville R-I School District

Eric Walters
Chief Information Security Officer
Burns & McDonnell

Brett Wiard
Director, Security
Unite Us

Mark Wilcox
Information Security Officer, SVP
NBKC Bank

Nichole Windholz
Director, Cybersecurity
Onspring

Kyle Zdrojewski
Director, Infrastructure & Support
CrossFirst Bank

Sponsors

HOW TO BE A SPONSOR

Participating exhibitors at INTERFACE achieve a greater return on their investment from this series of IT events than any other face-to-face medium available today. This success is achieved through a time-efficient and cost-effective presence for a pre-qualified audience. This simple formula leads to higher levels of business development opportunity at each event.

GOLD SPONSORS

Forescout

Forescout

Forescout
The only automated cybersecurity company that continuously identifies, protects and ensures the compliance of all managed and unmanaged connected assets – IT, IoT, IoMT and OT – so you can more effectively manage cyber risk and mitigate threats.
Visit Website
Hitachi Vantara

Hitachi Vantara

Hitachi Vantara
Hitachi Vantara helps enterprises create and derive value from their data. Its solutions include best-in-class data management, IT infrastructure and analytics products, IoT solutions and Smart Spaces technologies for a broad range of industries.
Visit Website

SILVER SPONSORS

Arcserve

Arcserve

Arcserve
Arcserve is a global top 5 data protection vendor with best-in-class solutions that manage, protect, and recover all data workloads, from SMB to enterprise and regardless of location or complexity. A 100% channel-centric organization, Arcserve has a presence in over 150 countries, with 19,000 channel partners and 235,000 customers.
Visit Website
CyberArk

CyberArk

CyberArk
Get the most complete Identity Security and Access Management Solutions that enable secure access across any device, anywhere, at just the right time.
Visit Website

BRONZE SPONSORS

Arctic Wolf

Arctic Wolf

Arctic Wolf
Arctic Wolf® is the market leader in security operations, and provides security operations as a concierge service. Our security experts work as an extension of your team to monitor and detect threats, and continually strengthen your security posture.
Visit Website
baramundi

baramundi

baramundi
baramundi Software offers efficient, secure, and cross-platform management of workstation environments. With over 20 years of UEM experience across the globe, over 4,000 customers benefit from our intuitive, single-interface platform.
Visit Website
C&C Group

C&C Group

C&C Group
C&C Group specializes in Intelligent Building Solutions,including Energy Management, NEBB TAB, Security & Fire Systems, Back-Up Power, Network Services, & Access Flooring.
Visit Website
Cribl

Cribl

Cribl
Founded with a vision of simplifying big data and log analytics at scale, Cribl is innovating the real-time data pipeline. Led by a team of experts in IT Operations and Observability, Cribl provides users a new level of visibility, intelligence, and control over their data.
Visit Website
Critical Start

Critical Start

Critical Start
Critical Start Managed Cyber Risk Reduction solutions ensure continuous security monitoring and mitigation, delivering robust protection against threats. With our platform’s maturity assessments, event analytics, response capabilities, and a team of expert risk mitigators, achieve the highest level of cyber risk reduction and increase confidence in attaining desired security maturity.
Visit Website
DataLocker

DataLocker

DataLocker
Keep your data safe. Elevate the security of your IT/OT environments with our comprehensive suite of encrypted storage solutions, endpoint protection, and management tools.
Visit Website
eSentire

eSentire

eSentire
eSentire’s complete, multi-signal Managed Detection and Response services provide 24/7 cutting-edge protection to prevent cybercriminals from ever disrupting your business.
Visit Website
Flexential

Flexential

Flexential
Flexential is a leading hybrid IT infrastructure provider with a national footprint offering expertise in colocation, connectivity, cloud, and managed solutions.
Visit Website
Pondurance

Pondurance

Pondurance
Pondurance Managed Detection and Response is backed by authentic human intelligence. See how Pondurance MDR can help you manage threats.
Visit Website
Sanity Solutions

Sanity Solutions

Sanity Solutions
Sanity Solutions, Inc. is headquartered in Denver, CO with offices in Minnesota and Utah. We focus on comprehensive IT solutions and establishing ourselves as a trusted adviser. We believe in delivering a legendary experience professionally and personally.
Visit Website
VLCM

VLCM

VLCM
VLCM has been in business for over thirty years, and in that time, we’ve helped thousands of customers throughout the Rocky Mountain West find the proper solutions for their IT needs.
Visit Website

EXHIBITORS & ASSOCIATIONS

7x24 Exchange Midwest

7x24 Exchange Midwest

7x24 Exchange Midwest
To provide a forum for our members to expand their professional networks, learn and teach others about new and useful technologies and operations, and to expand the ability to navigate the complex and sometimes intimidating field of Mission Critical Facility Management, Design, Construction, and Operation.
Visit Website
Adlumin

Adlumin

Adlumin
Adlumin's security and compliance automation platform helps organizations manage evolving threats and cybersecurity compliance requirements.
Visit Website
AFCOM Kansas City

AFCOM Kansas City

AFCOM Kansas City
AFCOM advances data center professionals by delivering comprehensive and vendor-neutral education and peer-to-peer networking to its members around the globe.
Visit Website
Akamai

Akamai

Akamai
Akamai is the leading content delivery network (CDN) services provider for media and software delivery, and cloud security solutions.
Visit Website
ASIS Kansas City

ASIS Kansas City

ASIS Kansas City
ASIS International is the preeminent organization for security professionals. Founded in 1955, ASIS is dedicated to increasing the effectiveness and productivity of security professionals.
Visit Website
Automox

Automox

Automox
Manage & secure your hybrid workforce with effortless IT operations. Automatically patch remote systems, configure every endpoint, and deploy software with one cross-platform, cloud console.
Visit Website
CDW

CDW

CDW
With full-stack expertise, CDW helps you design, orchestrate and manage technologies that drive business success.
Visit Website
DAMA Kansas City

DAMA Kansas City

DAMA Kansas City
KC DAMA is a vibrant community of data professionals and business users sharing our experiences and learning from each other. We welcome you to join us.
Visit Website
Darktrace

Darktrace

Darktrace
Darktrace is a leading cybersecurity AI company and the creator of Autonomous Response technology. It provides a comprehensive cyber defense to over 5,500 organizations, protecting the cloud, email, IoT, traditional networks, endpoints, and industrial systems.
Visit Website
DirSec

DirSec

DirSec
We understand that cybersecurity is a constantly evolving landscape, and we are committed to staying on top of the latest trends and technologies to keep our customers protected. With over 20 years of experience in protecting customers from ever-expanding cybersecurity threats, we have grown to become a trusted partner for clients across the country.
Visit Website
Extreme Networks

Extreme Networks

Extreme Networks
Extreme Networks, Inc. (EXTR) delivers software-driven networking solutions that help IT departments everywhere deliver the ultimate business outcome: stronger connections with customers, partners and employees.
Visit Website
HDI Heartland

HDI Heartland

HDI Heartland
The Kansas City Heartland HDI chapter is a dynamic group of IT Service and Support Professionals who meet regularly to share ideas, best practices, provide educational opportunities and build business relationships. From first level resolvers to seasoned corporate leaders, our members represent market-leading companies across multiple verticals including retail, healthcare, education, technology, and finance in the Kansas City Area.
Visit Website
InfraGard Kansas City

InfraGard Kansas City

InfraGard Kansas City
InfraGard is a non-profit organization set up nationally by the FBI to create a forum for public and private organizations to work together in an effort to secure our homeland's Infrastructure and Key Resources (CI/KR).
Visit Website
IP Pathways

IP Pathways

IP Pathways
IP Pathways delivers a consultant-led experience to overcome all IT challenges your organization faces today. Our best-in-class engineers first listen to your goals then architect, implement, monitor, support, and manage custom technology solutions to help you reach them. Whether in the cloud or on-premise, we strive to understand your business and become a true strategic technology partner.
Visit Website
ISACA Kansas City

ISACA Kansas City

ISACA Kansas City
The ISACA KC Chapter was founded in 1984 and continues to promote the education of individuals relating to the auditing of, management consulting in, or direct management of the fields of IT governance, IS audit, security, control and assurance.
Visit Website
ISC2 Kansas City

ISC2 Kansas City

ISC2 Kansas City
ISC²®, is the global, not-for-profit leader ineducating and certifying information security professionals throughout theircareers. We are recognized for Gold Standard certifications and world class education programs.
Visit Website
ISSA Kansas City

ISSA Kansas City

ISSA Kansas City
Through its membership, ISSA -Kansas City helps security professionals in the Kansas City area learn of information security issues and trends, which promote education, collaboration, and leadership, and further the information security profession.
Visit Website
KC Tech Council

KC Tech Council

KC Tech Council
The KC Tech Council represents Kansas City’s tech industry, a diverse ecosystem anchored by multinational corporations and driven by innovative entrepreneurs, with industry footholds in healthcare IT, telecommunications, digital media and more.
Visit Website
KsFiberNet

KsFiberNet

KsFiberNet
KsFiberNet’s 100G statewide backbone network offers the best Ethernet coverage of any carrier in Kansas and beyond the boundaries of our state.
Visit Website
Logicalis

Logicalis

Logicalis
Partner with Logicalis for targeted IT solutions that enable your business to succeed in a digital-first world. From assessment to managed IT services, we have a blueprint for your success.
Visit Website
Meter

Meter

Meter
Meter provides internet infrastructure for businesses. Headquartered in San Francisco, we were founded in 2015 to build enterprise-grade networks that are faster, more accessible, and more secure. Our full-stack approach combines hardware, software, and operations so that any company can seamlessly run on a reliable and modern network.
Visit Website
MSPAA

MSPAA

MSPAA
The MSP Association of America (MSPAA) has been established with three primary missions, each of which follows a unique trajectory aimed at providing our clients, members, and students with a collaborative and informative pathway towards building a future for technology, business, and education.
Visit Website
Scale Computing

Scale Computing

Scale Computing
Scale Computing's highly-automated edge infrastructure, virtualization platform, & hyperconverged solutions can handle all of your IT infrastructure needs.
Visit Website
Technology Group Solutions

Technology Group Solutions

Technology Group Solutions
At TGS we help our customers adopt technologies that enable their businesses to thrive in a connected world. We start by building a relationship that allows us to fully understand our client's business objectives and needs. From there, we tailor solutions around next-generation technologies to drive specific business outcomes and accelerate their return on investment.
Visit Website
WCCiT

WCCiT

WCCiT
We provide innovative business solutions that deliver a competitive advantage to our customers, helping them reduce costs, increase customer loyalty and get the most out of their technology. Every solution we provide is customized. Why? Because one size does not fit all. Your business is unique and it deserves a personalized solution.
Visit Website
WiCyS Kansas City

WiCyS Kansas City

WiCyS Kansas City
Women in CyberSecurity is the premier organization with international reach dedicated to bringing together women in cybersecurity from academia, research and industry to share knowledge, experience, networking and mentoring.
Visit Website
Women in Security Kansas City

Women in Security Kansas City

Women in Security Kansas City
Our vision for Women in Security, Kansas City, is to inspire and support women at all career levels in Information Security. We provide focus for women in Information Security with peer mentoring, workshops, and networking opportunities.
Visit Website

Interested in becoming part of our next Kansas City event?

CONTACT US FOR INFO

Kansas City

Overland Park Convention Center
Ballrooms A2, B, C
6000 College Boulevard
Overland Park, KS 66211

Directions & Parking

About Us

We produce quality, cutting-edge educational seminars, drawn from case studies and best practice examples from leaders in the field.

800-365-6402
Contact Us

Popular Searches

  • Event Registration
  • Become an Exhibitor
  • Become an Advisor
  • Sponsor an Event
  • Contact Event Coordinator
  • Submit Feedback

Seminar Topics

  • Artificial Intelligence
  • BC / DR
  • Culture
  • Data Center Technology
  • Data Management
  • Data Storage
  • Digital Experience
  • Information Security
  • Infrastructure
  • Strategic Management
  • Unified Communications

2026 Events

  • Portland • March 19th
  • Anchorage • April 22nd
  • Honolulu • May 21st
  • Phoenix • June 18th
  • Wyoming • July 9th
  • Montana • July 29th
  • Boise • August 20th
  • Salt Lake City • September 22nd
  • Spokane • October 15th
  • Omaha • November 5th
  • Seattle • December 3rd
  • Home
  • About
  • Get Involved
  • Events
  • Register
  • © 2026 F2F Events, Inc.