F2F Events, Inc.
  • Home
  • About
    • About
    • CPE Credits
    • Session Topics
    • Privacy Policy
      • Scam Warning
    • Code of Conduct
    • Media Kit
  • Get Involved
    • Advisory Council
    • Association Partners
    • Exhibitors
    • Speakers
  • Events
    • Locations
    • Upcoming Events
  • Contact
  • Register

Cutting-edge conferences for over 20 years

Educational Events with Your Local IT Community

View Upcoming Events Register

INTERFACE Salt Lake City 2024 / See You Next Year

IT Infrastructure is constantly changing, bringing more new challenges with it every day. From ransomware and the latest security threats to emerging developments in AI and the need for increased bandwidth and storage, it’s nearly impossible to keep up to date. Our conference is designed to help. We’ve assembled a combination of Best-in-Breed hardware and software solutions, along with local experts and organizations to help educate, advise and connect you to resources that can help you meet your goals.

Covering Information Security, Infrastructure, Cloud, Disaster Recovery, Communications, and more, you’ll find presentations, panel discussions, and exhibitors covering a variety of topics, as well as the latest innovations and best practices.

CPE SURVEY
SUBSCRIBE TO Salt Lake City EVENTS

AT A GLANCE

July 11th, 2024
8:30am – 4:30pm

Salt Palace Convention Center
Room 255
90 S West Temple
Salt Lake City, UT 84101

Directions & Parking

KEYNOTE: [1 CPE] Views from the Porch: Tackling the Enablement of a Cybersecurity Workforce

  Presented by Ed Vasko • CISSP, Founder and CEO of s3ntry Corp

Seminar Schedule

VIEW FLOORPLAN
DOWNLOAD SCHEDULE
  • Theater One
  • Theater Two
  • Theater Three
  • Sessions
  • Keynote
9:00 - 9:50 AM

[1 CPE] Security Trends and Predictions

  Presented by Peter Ingebrigtsen, Sr Technical Marketing Manager • Arctic Wolf

In a dynamic cybersecurity landscape and fast-paced market, organizations grapple with ever-changing threats. Uncertainty abounds as they seek to benchmark themselves against their peers and prioritize initiatives. Join Arctic Wolf Senior Technical Marketing Manager, Peter Ingebrigtsen, as he explores key areas organizations are focusing on, top threat concerns, and responses by established organizations to emerging threats. Leveraging Arctic Wolf research, Peter further presents five critical security predictions for the next 12 months.

Topics: Information Security
10:00 - 10:50 AM

[1 CPE] The Future of AI-Enabled Data Platforms

  Presented by Ian Clatworthy, Global Director, Infrastructure Product Marketing • Hitachi Vantara

Removing the infrastructure silos and administration complexity around your application’s data gives you the flexibility to consume solutions and deliver total data freedom. Join us as we showcase the future of data storage as a single hybrid cloud platform for applications. Allowing you to consume the data services you need, where and when you need it! Offering a single data plane and control plane across block, file, object, and mainframe, with one common experience for administration, analytics, and automation.

Ian comes from a customer background in Formula 1 and World Rallying. Having a deep understanding of technology and its benefits he took his skills into technology sales and marketing with Dell and HDS. Today he leads Product Marketing for data infrastructure technologies at Hitachi Vantara.

Topics: Artificial Intelligence, Data Management
11:00 - 11:50 AM

[1 CPE] Maximize Your Investment in Technology

  Presented by Dave Carlson, President • Summit Technology

Our company is consistently growing by 40% per year. We are doing this not by adding any additional people, but by maximizing the capabilities of the technology we are already paying for. In this session, we’ll show you the tools and techniques that we are using as well as some demos on how to do the same in your organization.

Topics: Strategic Management
1:00 - 1:50 PM

[1 CPE] What the Hack is going on! An Offensive Look at Modern Breaches

  Presented by Tim Medin, Chief Executive Officer • Red Siege

Join this session for a comprehensive overview of modern cybersecurity threats and how breaches occur. I will highlight the various methods used by cybercriminals, including phishing, social engineering, and ransomware attacks, and emphasize the importance of identifying and addressing vulnerabilities before they can be exploited.

Topics: Information Security
2:00 - 2:50 PM

[1 CPE] Panel: How to Build a Successful Relationship with Your Resellers

  Presented by INTERFACE Advisory Council

A value-added reseller (VAR) can have a tremendous impact on the efficiency of how your IT department functions. Budgets can be a challenge to navigate to ensure your needs are met. A good way to make sure you are getting the most out of your IT purchases is to develop the correct strategic relationship with your VARs.

Join this panel discussion for industry tips on improving communication and learning to be proactive in your approach to solving problems. A quality reseller relationship will not only save you financially, but it can also allow you to have a better performance within your IT department. The knowledge and experience that your reseller’s team has can be a great asset to your own team. Bring your questions about cultivating this relationship and maximizing your long-term value.

Moderator:

  • Greg Pugh, Information System Security Officer, Space Dynamics Laboratory

Panelists:

  • David Clark, Director of Information Technology, Utah State Bar
  • Stephen Grigg, Sr Manager, Information Systems, Space Dynamics Laboratory
  • Matt Snow, Account Executive, CompuNet
  • Shawn Young, Director of Cybersecurity, Barnes Group, Inc.
Topics: Strategic Management
Ed VaskoEd VaskoCISSP, Founder and CEO of s3ntry Corp
3:00 - 3:50 PM

[1 CPE] Views from the Porch: Tackling the Enablement of a Cybersecurity Workforce

  Presented by Ed Vasko • CISSP, Founder and CEO of s3ntry Corp

Ed Vasko has spent over 30 years leading cybersecurity companies that provide critical services and platforms to clients around the world. Now he is deeply involved in solving the national crisis of not having an effective supply of cybersecurity workers to meet our national needs. In this keynote, he will share a career perspective of how this crisis developed and methods both educators and employers can take to begin solving our needs regionally and nationally. Come be a part of this "porch conversation" and join the discussion.

Ed Vasko, CISSP, is the Founder and CEO of s3ntry Corp. Prior to founding s3ntry corp, he was the director of Boise State University’s Institute of Pervasive Cybersecurity. He is a cybersecurity leader and entrepreneur with over 33 years of experience protecting organizations from cyber adversaries. Before joining Boise State University, Edward established and was a Senior Vice President at Avertium, a leading national managed security and consulting provider. He was the co-Founder and CEO of one of the nation’s largest providers of cybersecurity advisory and managed security services, with over 2,000 active clients around the world.

Edward’s other passion is tackling the challenge of cyber workforce development. He has served on over 20 education advisory boards providing expertise around cybersecurity industry needs. He has been appointed by multiple governors to tackle statewide cybersecurity workforce issues. Most importantly though, Edward is a proud father and husband.

Topics: Culture, Information Security, Strategic Management
  • Sessions
9:00 - 9:50 AM

[1 CPE] Disaster Preparedness and Data Protection Strategies for Business Continuous Availability

  Presented by Arcserve

As natural disasters like hurricanes, wildfires, and severe winter events become more frequent and intense, businesses face increasing economic and operational challenges. High-profile disasters, including the Camp Fire in 2018, which incurred a staggering $16.5 billion in damages, and Hurricane Maria's profound impact on Puerto Rico, estimated at $139 billion for full recovery, underscore the escalating financial stakes.

This presentation will explore effective strategies to bolster business resilience in the face of natural catastrophes.

Key elements of the session will include:

  • Critical insights from Arcserve's annual global research study on disaster preparedness.
  • A comprehensive Disaster Preparedness Checklist tailored for companies.
  • Practical tools designed to safeguard business operations and data resilience.

We will delve into the details of a 5-step disaster and ransomware recovery plan template, as well as the 3-2-1-1 backup strategy, which ensures robust data recovery through multiple backup copies stored both locally and offsite. By implementing these strategies, businesses can minimize financial losses, reduce operational downtime, and achieve a rapid recovery, thereby ensuring continuity even during catastrophic events. This session aims to arm business leaders with the essential tools and knowledge to safeguard their enterprises amidst an increasingly unpredictable global landscape.

Topics: Business Continuity / Disaster Recovery, Infrastructure
10:00 - 10:50 AM

[1 CPE] Global Insights on Identity Security Maturity: Why it Matters? Why Now?

  Presented by Chris Tow, Solutions Engineer • CyberArk

In our global survey of 1,500 identity-related security experts, we found only 9% of organizations have the highest level of maturity. These Transformative organizations have the most mature identity security programs as they strategically focus on four key tenets: tools, integration, automation, and continuous threat detection & response. As a result, these organizations significantly outperform their competition in driving business outcomes and reducing risk. Learn how you can mature your identity security program because the future of security starts with identity.

Key Session Takeaways:

  • Top challenges for identity security
  • The four tenets of identity security
  • How to take a holistic approach to identity security
  • Key considerations in evaluating identity security providers

Chris Tow is a Strategic Solutions Engineer at CyberArk and joined the company in 2023. He has a long history in the cybersecurity space having previously worked at Lookout and Good Technology (now Blackberry). Chris holds a B.S. in Electrical Engineering and Computer Science from the University of California, Berkeley and a Master’s Degree in Computer Science from UCLA.

Topics: Information Security
11:00 - 11:50 AM

[1 CPE] Intelligent SSE: Secure Everything from Anywhere

  Presented by Travis Pinto, Regional Solutions Engineering Manager • Netskope

This session will provide a technical overview of Security Service Edge (SSE), focused on the following topics:

  • Unintentional or unapproved data movement
  • Data protection for internal and external threats
  • Conditional and contextual access to safely enable cloud & SaaS applications
  • Protection from cloud-enabled SaaS and web threats
  • Work from anywhere with a secure, fast experience

You will walk away understanding the fundamentals of SSE and how it will benefit your business.

Topics: Data Management, Information Security, Infrastructure
12:00 - 12:50 PM

[1 CPE] The Decarbonization of the Data Center

  Presented by Ian Clatworthy, Global Director, Infrastructure Product Marketing • Hitachi Vantara

Balancing the need for substantial data infrastructure with more eco-friendly policies should be top of all organizational to-do lists. Rather than a competition between corporations, these initiatives should be focused on the larger benefit of a healthier world. That’s why creating a specific data center decarbonization strategy will be key. This will range from improving the visibility and measurement of power usage, to actually reducing the carbon footprint of each operational layer. But where should organizations begin?

Ian comes from a customer background in Formula 1 and World Rallying. Having a deep understanding of technology and its benefits he took his skills into technology sales and marketing with Dell and HDS. Today he leads Product Marketing for data infrastructure technologies at Hitachi Vantara.

Topics: Data Center Technology, Strategic Management
1:00 - 1:50 PM

[1 CPE] Zero Trust Microsegmentation: It’s Easier Than You Think

  Presented by Craig Lockhart, Sr Systems Engineer • Illumio

Regardless of the sophistication of the ransomware, the end goal is always the same: get in through a vulnerability and move laterally through your network. Join this presentation as we help peel back the layers to provide you with simple steps to get started that include:

  • Gaining visibility to where you are the most vulnerable
  • Closing risky ports
  • Leveraging tools you already have in place without adding layers of complexity

With over 25 years of experience in the cybersecurity industry, Craig is a seasoned expert in implementing innovative security solutions, specializing in security edge, multi-factor authentication (MFA), remote access, decryption, and Secure Access Service Edge(SASE) technologies. Craig leverages his experience to focus on finding optimum solutions to ensure technology supports business goals. His expertise has been instrumental in deploying robust security infrastructures for numerous large organizations across the western regions.

Topics: Information Security
2:00 - 2:50 PM

[1 CPE] Maximize Your Investment in Technology

  Presented by Dave Carlson, President • Summit Technology

Our company is consistently growing by 40% per year. We are doing this not by adding any additional people, but by maximizing the capabilities of the technology we are already paying for. In this session, we’ll show you the tools and techniques that we are using as well as some demos on how to do the same in your organization.

Topics: Strategic Management
  • Sessions
9:00 - 9:50 AM

[1 CPE] Rise of Generative AI-Driven Attacks

  Presented by Shan Zhou, Director of Sales Engineering • Vectra AI& Structured

The rise of AI has fundamentally changed what we see, what we know, and what we do. We will delve into the negative and positive impact AI plays in information security with specific examples of the resources, platforms, and methodologies used by adversaries and defenders.

Topics: Artificial Intelligence, Information Security
10:00 - 10:50 AM

[1 CPE] Cybersecurity and Compliance For 2024

  Presented by Rob Wayt, Director of Governance, Risk, and Compliance • Structured

The cybersecurity regulatory compliance landscape has never been more complicated, and this presentation will provide information and updates to CMMC, GLBA, PCI, TSA, generative AI and security best practices. This discussion will focus on security solutions to these challenges, including penetration testing and zero trust implementations. Rob Wayt, Director of Governance, Risk, and Compliance at Structured will be the presenter.

Topics: Artificial Intelligence, Information Security
11:00 - 11:50 AM

[1 CPE] AI-Driven Networking

  Presented by Juniper Networks & Structured

Every connection counts. Nearly every vital experience in modern-day life requires a strong network connection. At Juniper, we believe that connectivity is not the same as experiencing a great connection. When you shift from simply measuring connectivity to focusing on the experience of the end-to-end connection – everything changes. Join us to learn how Juniper is revolutionizing networking with an experience-first approach driven by the industry’s only AI-Native Platform.

Topics: Artificial Intelligence
1:00 - 1:50 PM

[1 CPE] A Pragmatic Approach to Implementing a Cloud Service Operating Model

  Presented by Pure Storage & Structured

For almost 10 years now, future-focused datacenter teams have been trying to evolve to a more cloud-like operating model. Some of us have succeeded, some of us have failed. During this fun-filled, example-heavy session, Solutions Architect Tristan Todd will share patterns of failure, patterns of success, some practical examples, and recipes for success on how organizations have succeeded in realizing success in adapting to a cloud ops model. This will be a fun, interactive, high-energy session that you won't want to miss!

Topics: Data Center Technology, Data Storage
2:00 - 2:50 PM

[1 CPE] A Complete Security Blueprint

  Presented by Brad Nigh, Consulting Strategist • FRSecure

By analyzing your existing program, work completed, and using our categorization—foundational, developing, and mature—you should be able to place yourself and get an idea of what’s next for your security program.

Brad Nigh is a passionate information security expert with 25+ years of overall IT experience, including 15+ years of IT management and leadership experience working in 24/7 environments that required top-tier technical skills, and efficient project management. In addition, he has years of experience working in highly regulated industries that are required to comply with PCI-DSS, HIPAA, HITECH, Sarbanes-Oxley, OCC, and various state regulatory requirements. At FRSecure he leads the Consulting Services practice serving businesses of all sizes, in all industries by cooperatively solving the complex issues surrounding information security.

Topics: Information Security

Advisory Council

HOW TO BE AN ADVISOR

Advisor-approved content is the foundation upon which INTERFACE was developed. Each conference is guided by an Advisory Council of IT executives and senior managers. Advisor members represent both private and public sector organizations. The council contributes its insight into proposed educational topics and recommends local exhibitors and associations for participation.

EXPAND TO VIEW LIST

Ron Boyer
Director, Information Technology
Summit County, UT

Jim Carlton
Manager, Enterprise Systems and Security
Midway Mechanical Services

Blaine Carter
Global Chief Information Officer
Franklin Covey

David Clark
Director, Information Technology
Utah State Bar

John Coker
Manager, Information Systems
Central Utah Water Conservancy District

Chad Davis
Manager, Information Security, Risk, and Compliance
Xevant

Phil Day
Director, IT Audit
The Church of Jesus Christ LDS

James Duckett
Manager, Technology Division
City of St. George, UT

Robert Frailey
Manager, Information Systems
Utah Medical Products

Stephen Grigg
Sr Manager, Information Systems
Space Dynamics Laboratory

Daniel Harmuth
Chief Information Officer
Rocky Mountain University of Health Professions

Michael Hughes
Director, Information Technology
Mission Health Services

Mary Huth
Sr Manager, Internal Audit
Protiviti

Robert Irizarry
Regional Director, Internal Audit
Franklin Templeton Investments

Waqas Javed
Director, Information Technology
Utah Zoological Society

Sylvia Jessen
Director, Information Technology
University of Utah School of Medicine

Tom Judd
Sr Director, Information Technology
Filevine

George McEwan
Chief Strategy Officer
State of Utah

Bobette Phillips
Director, Information Systems & Security
UT Tax Commission

Jason Povey
Chief Information Officer
Power County Hospital District

Greg Pugh
Information System Security Officer
Space Dynamics Laboratory

Scott Rushforth
Chief Operations Officer
Horizon Credit Union

Mike Saldivar
Manager, Information Systems
Journal Technologies

John Stevens
Manager, IT Operations
Iron Road

Nyle Stoddard
Manager, Information Security
RR Donnelley

Jason Struck
Chief Information Security Officer
Salt Lake City Corporation

George Sturua
Manager, Corporate IT
Kuhl Clothing Company

Paul Tew
Information Security Officer
Snow College

Tyler Tholen
Sr Manager, Cybersecurity
Honeywell

Bryan Wilkins
Manager, Enterprise Information Security
Space Dynamics Laboratory

Danny Yeo
Director, Information Technology
Brigham Young University

Shawn Young
Director, Cybersecurity
Barnes Group, Inc.

Sponsors

HOW TO BE A SPONSOR

Participating exhibitors at INTERFACE achieve a greater return on their investment from this series of IT events than any other face-to-face medium available today. This success is achieved through a time-efficient and cost-effective presence for a pre-qualified audience. This simple formula leads to higher levels of business development opportunity at each event.

GOLD SPONSORS

Hitachi Vantara

Hitachi Vantara

Hitachi Vantara
Hitachi Vantara helps enterprises create and derive value from their data. Its solutions include best-in-class data management, IT infrastructure and analytics products, IoT solutions and Smart Spaces technologies for a broad range of industries.
Visit Website
Structured

Structured

Structured
Structured is an award-winning solution provider delivering secure, cloud-connected digital infrastructure. For 30 years, we’ve helped clients through all phases of digital transformation by securely bridging people, business and technology.
Visit Website
Summit Technology

Summit Technology

Summit Technology
At Summit Technology our goal is to break the mold of the standard MSPs and VARs and forge an entirely new type of technology consultancy – a Curated Technology Partner.
Visit Website

SILVER SPONSORS

Arcserve

Arcserve

Arcserve
Arcserve is a global top 5 data protection vendor with best-in-class solutions that manage, protect, and recover all data workloads, from SMB to enterprise and regardless of location or complexity. A 100% channel-centric organization, Arcserve has a presence in over 150 countries, with 19,000 channel partners and 235,000 customers.
Visit Website
Arctic Wolf

Arctic Wolf

Arctic Wolf
Arctic Wolf® is the market leader in security operations, and provides security operations as a concierge service. Our security experts work as an extension of your team to monitor and detect threats, and continually strengthen your security posture.
Visit Website
CyberArk

CyberArk

CyberArk
Get the most complete Identity Security and Access Management Solutions that enable secure access across any device, anywhere, at just the right time.
Visit Website
FRSecure

FRSecure

FRSecure
FRSecure applies industry standards to assess existing information security programs (administrative, physical and technical security controls), and we develop, implement and manage information security programs tailored to each client’s specific security needs.
Visit Website
Illumio

Illumio

Illumio
Illumio, the Zero Trust Segmentation company, stops breaches and ransomware from spreading across the hybrid attack surface. The Illumio ZTS Platform visualizes how workloads and devices are communicating, creates granular segmentation policies which only allow necessary communication, and automatically isolates ransomware and breaches. Assume breach. Minimize impact. Increase resilience.
Visit Website
Netskope

Netskope

Netskope
Netskope, a global SASE leader, helps organizations apply zero trust principles and AI/ML innovations to protect data and defend against cyber threats. The Netskope platform provides optimized access and real-time security for people, devices, and data anywhere they go. Learn how Netskope helps customers be ready for anything on their SASE journey, visit netskope.com.
Visit Website
Red Siege

Red Siege

Red Siege
Red Siege is one of the most trusted information security consulting firms in the industry that concentrates on the latest threats to organizations today. Red Siege performs in-depth analysis, determine organization/business risk, and finds the vulnerabilities before the bad guys do. The Red Siege team of trained, qualified, and experienced information security experts is led by one of the most recognized names in the industry, our CEO Tim Medin.
Visit Website

BRONZE SPONSORS

baramundi

baramundi

baramundi
baramundi Software offers efficient, secure, and cross-platform management of workstation environments. With over 20 years of UEM experience across the globe, over 4,000 customers benefit from our intuitive, single-interface platform.
Visit Website
CompuNet

CompuNet

CompuNet
CompuNet is a leading U.S. information technology partner, headquartered in Boise, Idaho. The firm specializes in consultation, design and implementation services specifically tailored to solve business problems. With a best-in-class engineering staff and approach, CompuNet focuses on building lasting relationships that prioritize client satisfaction over sales through every step of the journey.
Visit Website
Critical Start

Critical Start

Critical Start
Critical Start Managed Cyber Risk Reduction solutions ensure continuous security monitoring and mitigation, delivering robust protection against threats. With our platform’s maturity assessments, event analytics, response capabilities, and a team of expert risk mitigators, achieve the highest level of cyber risk reduction and increase confidence in attaining desired security maturity.
Visit Website
Les Olson IT

Les Olson IT

Les Olson IT
Les Olson Company provides comprehensive office technology solutions including copiers, printers, managed print services, document management, and IT services. Serving businesses across Utah since 1956, they prioritize efficiency and customer satisfaction through innovative technology solutions.
Visit Website
Optiv

Optiv

Optiv
Optiv is the cyber advisory and solutions leader, delivering strategic and technical expertise to nearly 6,000 companies across every major industry. We partner with organizations to advise, deploy and operate complete cybersecurity programs from strategy and managed security services to risk, integration and technology solutions. With clients at the center of our unmatched ecosystem of people, products, partners and programs, we accelerate business progress like no other company can. At Optiv, we manage cyber risk so you can secure your full potential.
Visit Website
Semperis

Semperis

Semperis
Semperis is the industry's most comprehensive Active Directory security and recovery platform, protecting hybrid AD environments from identity-based attacks.
Visit Website
Syringa Networks

Syringa Networks

Syringa Networks
Syringa Networks is an industry-leading Managed Network Service Provider. We specialize in dedicated Internet, Voice, SD-WAN, Colocation, and Security. As a local provider, with more than 2,000 miles of fiber​, we deliver quick installs and access to live customer support, 24/7.
Visit Website
ValorC3

ValorC3

ValorC3
ValorC3 is a modern data center, cloud and connectivity partner that delivers agile, scalable IT solutions tailored to the relentless mid-market enterprise. Valor meets clients where they’re at and gets them where they need to grow, helping them navigate the rapidly changing digital landscape with flexible, high-density data centers, extensive infrastructure expansion capabilities, low latency networks, strong partnerships and decades of industry expertise.
Visit Website
VLCM

VLCM

VLCM
VLCM has been in business for over thirty years, and in that time, we’ve helped thousands of customers throughout the Rocky Mountain West find the proper solutions for their IT needs.
Visit Website

EXHIBITORS & ASSOCIATIONS

Adlumin

Adlumin

Adlumin
Adlumin's security and compliance automation platform helps organizations manage evolving threats and cybersecurity compliance requirements.
Visit Website
Apporto

Apporto

Apporto
Managed Cloud Desktops by Apporto. Deliver a fully managed and integrated cloud desktop solution and stop hassling with infrastructure.
Visit Website
ARMA Salt Lake City

ARMA Salt Lake City

ARMA Salt Lake City
Information is at the center of everything an organization does. Records are information assets and hold value for the organization. ARMA International is the authority on managing records and information paper and electronic.
Visit Website
CompuTech

CompuTech

CompuTech
With cutting-edge cybersecurity solutions, CompuTech helps safeguard your critical data, networks, and systems from evolving threats, ensuring your business stays protected against cyberattacks.
Visit Website
HPE Juniper Networking

HPE Juniper Networking

HPE Juniper Networking
Juniper Networks is now part of HPE. Together, we're building industry-leading, secure, AI-native networks – purpose-built with and for AI. As AI and networking converge, we're driving a bold transformation across enterprises, service providers, and cloud operators.
Visit Website
IIA Salt Lake City

IIA Salt Lake City

IIA Salt Lake City
Established in 1941, The Institute of Internal Auditors (IIA) is an international professional association. The IIA is the internal audit profession's global voice, recognized authority, acknowledged leader, chief advocate, and principal educator.
Visit Website
Infoblox

Infoblox

Infoblox
Infoblox unites networking and security to deliver unmatched performance and protection. Trusted by Fortune 100 companies and emerging innovators, we provide real-time visibility and control over who and what connects to your network, so your organization runs faster and stops threats earlier.
Visit Website
Invite Networks

Invite Networks

Invite Networks
Explore INVITE Networks managed IT services in Salt Lake City. We are your trusted resource for comprehensive IT solutions, including MSP, collaboration, cybersecurity, and more. Learn how we can support your business.
Visit Website
ISACA Utah

ISACA Utah

ISACA Utah
The aim of the ISACA Utah Chapter is to sponsor local educational seminars and workshops, conducts regular chapter meetings, and help to further promote and elevate the visibility of the IS audit, control and security profession throughout the area.
Visit Website
ISC2 Salt Lake City

ISC2 Salt Lake City

ISC2 Salt Lake City
The International Information Systems Security Certification Consortium, Inc., (ISC)²®, is the global, not-for-profit leader in educating and certifying information security professionals throughout their careers.
Visit Website
Kiteworks

Kiteworks

Kiteworks
Kiteworks is a dedicated Private Content Network (PCN) of internal and external digital communications that ensures privacy protection and compliance of an organization’s most sensitive information.
Visit Website
MSPAA

MSPAA

MSPAA
The MSP Association of America (MSPAA) has been established with three primary missions, each of which follows a unique trajectory aimed at providing our clients, members, and students with a collaborative and informative pathway towards building a future for technology, business, and education.
Visit Website
Neat

Neat

Neat
Neat designs simple and elegant pioneering video devices for Microsoft Teams and Zoom Rooms, helping make the meeting space experience the best it can be. Continuously pushing boundaries, Neat devices are incredibly easy to install, set up and use.
Visit Website
Palo Alto Networks

Palo Alto Networks

Palo Alto Networks
Palo Alto Networks™ is the network security company. Its next-generation firewalls enable unprecedented visibility and granular policy control of applications and content – by user, not just IP address – at up to 10Gbps with no performance degradation.
Visit Website
Pure Storage

Pure Storage

Pure Storage
Pure Storage uncomplicates data storage, delivering a cloud experience that empowers organizations to maximize their data while reducing the complexity and expense of managing the infrastructure behind it. With certified customer satisfaction in the top 1% of B2B companies, Pure's customers are among the happiest in the world.
Visit Website
Scale Computing

Scale Computing

Scale Computing
Scale Computing's highly-automated edge infrastructure, virtualization platform, & hyperconverged solutions can handle all of your IT infrastructure needs.
Visit Website
SecurityMetrics

SecurityMetrics

SecurityMetrics
SecurityMetrics protects e-commerce and payments leaders, global acquirers, and their customers from security breaches and data theft. They are an Approved Scanning Vendor, Qualified Security Assessor, and have tested over 1 million payment systems.
Visit Website
Vectra AI

Vectra AI

Vectra AI
Vectra AI's Threat Detection and Response Platform protects your business from cyberattacks by detecting attackers in real time and taking immediate action.
Visit Website

Interested in becoming part of our next Salt Lake City event?

CONTACT US FOR INFO

Salt Lake City

Salt Palace Convention Center
Room 255
90 S West Temple
Salt Lake City, UT 84101

Directions & Parking

About Us

We produce quality, cutting-edge educational seminars, drawn from case studies and best practice examples from leaders in the field.

800-365-6402
Contact Us

Popular Searches

  • Event Registration
  • Become an Exhibitor
  • Become an Advisor
  • Sponsor an Event
  • Contact Event Coordinator
  • Submit Feedback

Seminar Topics

  • Artificial Intelligence
  • BC / DR
  • Culture
  • Data Center Technology
  • Data Management
  • Data Storage
  • Digital Experience
  • Information Security
  • Infrastructure
  • Strategic Management
  • Unified Communications

2026 Events

  • Portland • March 19th
  • Anchorage • April 22nd
  • Honolulu • May 21st
  • Phoenix • June 18th
  • Wyoming • July 9th
  • Montana • July 29th
  • Boise • August 20th
  • Salt Lake City • September 22nd
  • Spokane • October 15th
  • Omaha • November 5th
  • Seattle • December 3rd
  • Home
  • About
  • Get Involved
  • Events
  • Register
  • © 2026 F2F Events, Inc.