F2F Events, Inc.
  • Home
  • About
    • About
    • CPE Credits
    • Session Topics
    • Privacy Policy
      • Scam Warning
    • Code of Conduct
    • Media Kit
  • Get Involved
    • Advisory Council
    • Association Partners
    • Exhibitors
    • Speakers
  • Events
    • Locations
    • Upcoming Events
  • Contact
  • Register

Cutting-edge conferences for over 20 years

Educational Events with Your Local IT Community

View Upcoming Events Register

INTERFACE Boise 2024 / See You Next Year

IT Infrastructure is constantly changing, bringing more new challenges with it every day. From ransomware and the latest security threats to emerging developments in AI and the need for increased bandwidth and storage, it’s nearly impossible to keep up to date. Our conference is designed to help. We’ve assembled a combination of Best-in-Breed hardware and software solutions, along with local experts and organizations to help educate, advise and connect you to resources that can help you meet your goals.

Covering Information Security, Infrastructure, Cloud, Disaster Recovery, Communications, and more, you’ll find presentations, panel discussions, and exhibitors covering a variety of topics, as well as the latest innovations and best practices.

CPE SURVEY
SUBSCRIBE TO Boise EVENTS

AT A GLANCE

August 22nd, 2024
8:30am – 4:30pm

Boise Centre
Grand Ballroom
850 W. Front Street
Boise, ID 83702

Directions & Parking

Venue Accessibility

KEYNOTE: [1 CPE] Cloud AI Ops: Changing the Network Management Paradigm

  Presented by Bob Friday • Chief AI Officer & CTO Enterprise, Juniper Networks

Seminar Schedule

VIEW FLOORPLAN
DOWNLOAD SCHEDULE
  • Theater One
  • Theater Two
  • Theater Three
  • Theater Four
  • Sessions
  • Keynote
9:00 - 9:50 AM

[1 CPE] Maximizing Productivity with Copilot for Microsoft 365 and AI Technologies

  Presented by CompuNet

Explore how to enhance productivity with Copilot for Microsoft 365 and other AI Solutions. This session will focus on possible use cases, along with considerations prior to deployment in a corporate setting.

Topics: Artificial Intelligence
10:00 - 10:50 AM

[1 CPE] The Future of AI-Enabled Data Platforms

  Presented by Ian Clatworthy, Global Director, Infrastructure Product Marketing • Hitachi Vantara

Removing the infrastructure silos and administration complexity around your application’s data gives you the flexibility to consume solutions and deliver total data freedom. Join us as we showcase the future of data storage as a single hybrid cloud platform for applications. Allowing you to consume the data services you need, where and when you need it! Offering a single data plane and control plane across block, file, object, and mainframe, with one common experience for administration, analytics, and automation.

Ian comes from a customer background in Formula 1 and World Rallying. Having a deep understanding of technology and its benefits he took his skills into technology sales and marketing with Dell and HDS. Today he leads Product Marketing for data infrastructure technologies at Hitachi Vantara.

Topics: Artificial Intelligence, Data Management
11:00 - 11:50 AM

[1 CPE] The Current Threat Landscape Requires a Unique Approach

  Presented by Liran Chen, Vice President, Sales Engineering & Technical Services • Forescout

Specialized threats targeting OT environments have been around since at least 2010, with the reports of Stuxnet. Recognizing the criticality of these devices, Threat Actors have continued evolving, continuing to target OT devices, many of which are inherently insecure-by-design. Research, such as Vedere Labs’ OT:ICEFALL research project and Project Basecamp by Digital Bond from 10 years ago showed how significant the scope of vulnerable devices are that are pervasive in critical infrastructure systems. Today’s SOC needs to not only see those devices and the risks they pose while also ensuring accurate detection of the threats uniquely targeting those OT environments they’re deployed in. This session will explore this unique threat landscape and the capabilities required to combat the threats and automatically mitigate the risks specially targeting Operational Technology environments.

Topics: Information Security
1:00 - 1:50 PM

[1 CPE] What the Hack is Going On! An Offensive Look at Modern Breaches

  Presented by Tim Medin, Chief Executive Officer • Red Siege

Join this session for a comprehensive overview of modern cybersecurity threats and how breaches occur. I will highlight the various methods used by cybercriminals, including phishing, social engineering, and ransomware attacks, and emphasize the importance of identifying and addressing vulnerabilities before they can be exploited.

2:00 - 2:50 PM

[1 CPE] Panel: How to Build a Successful Relationship with Your Resellers

  Presented by INTERFACE Advisory Council

A value-added reseller (VAR) can have a tremendous impact on the efficiency of how your IT department functions. Budgets can be a challenge to navigate to ensure your needs are met. A good way to make sure you are getting the most out of your IT purchases is to develop the correct strategic relationship with your VARs.

Join this panel discussion for industry tips on improving communication and learning to be proactive in your approach to solving problems. A quality reseller relationship will not only save you financially, but it can also allow you to have a better performance within your IT department. The knowledge and experience that your reseller’s team has can be a great asset to your own team. Bring your questions about cultivating this relationship and maximizing your long-term value.

Panelists:

  • Lorraine Bessmer, Manager, Cybersecurity, St Luke's Health System
  • Cody Kreps, Director, Information Services, Nampa School District
  • Robert Peterson, Director, Information Technology, Washington County, ID
  • Dan Roberts, Director, Infrastructure, Cybersecurity, Western States CAT
Bob FridayBob FridayChief AI Officer & CTO Enterprise
3:00 - 3:50 PM

[1 CPE] Cloud AI Ops: Changing the Network Management Paradigm

  Presented by Bob Friday • Chief AI Officer & CTO Enterprise, Juniper Networks

Artificial intelligence (AI) is poised to transform every aspect of our lives, from agriculture to health care, autonomous vehicles and mobile internet. But how did AI evolve from a scientific curiosity to a practical necessity? And how is AI changing the way we design, operate, and manage networks?

In this session, we will explore the history and the future of AI, with a focus on networking applications. We will share the Mist journey to cloud AI, and how we leveraged machine learning and deep learning to create a cloud AIOp solution that simplifies and automates network operations, improves user experience, and reduces costs. We will also discuss the fundamental elements of a networking cloud AIOp solution, such as data collection, processing, analysis, and action. Finally, we will examine the impact of AI on networking IT and the broader economy, and how AI can create new opportunities and challenges for network professionals.

Join us for this exciting and informative keynote and learn how AI can help you take your network to the next level.

Bob’s career as a wireless entrepreneur is focused on developing and bringing to market unlicensed wireless technologies. He was recognized as a Wi-Fi “mover and shaker” by Light Reading, was a key contributor to the HS2.0 industry standard and holds over 15 patents.

Bob started his wireless career at Metricom (Ricochet wireless network) with the original release of the part 15 FCC unlicensed rules in developing and deploying wireless mesh networks across the country to connect the first generation of Internet browsers. Following Metricom, Bob co-founded Airespace, a start-up focused on helping enterprises manage the flood of employees bringing unlicensed Wi-Fi technology into their businesses. Cisco acquired Airespace in 2005 for $450M where Bob became the VP/CTO of Cisco enterprise mobility and drove mobility strategy and investments in the wireless business (e.g. Navini, Cognio, ThinkSmart, Phunware, Wilocity, Meraki ). He also drove industry standards such as HS2.0 and market efforts such as Cisco’s Connected Mobile Experience. Bob left Cisco in May 2014 to co-found Mist Systems, an early-stage start-up focused on helping enterprises deliver business critical mobile experiences to their customers and employees.

Topics: Artificial Intelligence
  • Sessions
9:00 - 9:50 AM

[1 CPE] Zero Trust Microsegmentation: It’s Easier Than You Think

  Presented by Tony Steffe, Sr Systems Engineer, CISSP • Illumio

Regardless of the sophistication of the ransomware, the end goal is always the same: get in through a vulnerability and move laterally through your network. Join this presentation as we help peel back the layers to provide you with simple steps to get started that include:

  • Gaining visibility to where you are the most vulnerable
  • Closing risky ports
  • Leveraging tools you already have in place without adding layers of complexity

Tony is a knowledgeable technical professional with 20+ years of experience developing, selling, and integrating technology for enterprise customers. He is effective in sales engineering, Internet security, project management, computer networking, and interpersonal relations. Exceptional at managing the personal and technical challenges that arise from building something new, Tony has successfully built out several high-impact IT projects.

Topics: Data Management, Information Security, Infrastructure
10:00 - 10:50 AM

[1 CPE] The Most Important Shift for Cybersecurity in a Generation

  Presented by Steve Riley, Field CTO • Netskope

We live in a world where everything is hybrid and the blend between personal, corporate, private, and public is ever-changing and presents us with a host of new challenges. This has increased and complicated the attack surface and the pressure to converge tools and do “more with less” is at peak levels. We must meet this watershed moment with the right team, plans, and technology.

Join this interactive session to learn:

  • How to build an effective plan for change without adding to the chaos
  • What consolidation approaches save money without sacrificing security
  • Use cases that deliver immediate value and efficiency while improving user experience
Topics: Information Security
11:00 - 11:50 AM

[1 CPE] AI Unleashed: Navigating the AI Landscape for Responsible Adoption

  Presented by Zach Feingold, Engineering Manager, & Susan Anderson, Vice President of Sales • Cerium Networks

In today’s digital era, AI is not just a buzzword but a robust toolset that, when wielded with precision, can unlock unprecedented value and competitive advantage. As we embark on this journey, we must anchor our strategies in the bedrock of security, ensuring that our AI systems not only enhance our capabilities but also safeguard our assets. This presentation explores practical steps to weave AI into our business fabric, turning challenges into a springboard for growth and innovation. Our goal is to present you with concepts and avenues to consider as you learn to navigate your adoption. Let’s embark on this journey to harness AI’s potential responsibly and effectively.

Topics: Artificial Intelligence
12:00 - 12:50 PM

[1 CPE] The Decarbonization of the Data Center

  Presented by Ian Clatworthy, Global Director, Infrastructure Product Marketing • Hitachi Vantara

Balancing the need for substantial data infrastructure with more eco-friendly policies should be top of all organizational to-do lists. Rather than a competition between corporations, these initiatives should be focused on the larger benefit of a healthier world. That’s why creating a specific data center decarbonization strategy will be key. This will range from improving the visibility and measurement of power usage, to actually reducing the carbon footprint of each operational layer. But where should organizations begin?

Ian comes from a customer background in Formula 1 and World Rallying. Having a deep understanding of technology and its benefits he took his skills into technology sales and marketing with Dell and HDS. Today he leads Product Marketing for data infrastructure technologies at Hitachi Vantara.

Topics: Data Center Technology, Strategic Management
1:00 - 1:50 PM

[1 CPE] Demystifying Zero Trust: Simplifying Network Security

  Presented by Tanner Harrison, Systems Engineer • Fortinet

Today's ever-changing threat landscape challenges traditional security models. The emergence of the Zero Trust model represents a transformative approach, reshaping how organizations protect their assets. This presentation aims to demystify Zero Trust, offering a comprehensive understanding that goes beyond buzzwords. We will explore the foundational concepts of Zero Trust, emphasizing the "never trust, always verify" philosophy. By the end of this session, attendees will be equipped with the knowledge to begin their Zero Trust journey, enhancing their security posture, and protecting critical data and systems from modern threats. Whether you are a security professional, IT manager, or organizational leader, this discussion will empower you to take decisive action toward a more secure future.

Topics: Information Security
2:00 - 2:50 PM

[1 CPE] Navigating the Future of Data Centers: From Hypervisors to Hybrid Solutions

  Presented by CompuNet

Explore the latest trends in data center technology including hardware architectures, virtualization platforms, and the hybrid landscape. This session will share insights into optimizing your data center infrastructure. It will also cover the impact of recent shifts from perpetual to subscription-based licensing.

Topics: Data Center Technology
  • Sessions
9:00 - 9:50 AM

[1 CPE] The Intersection of AI and Cybersecurity

  Presented by Gregory Pepper, Security Architect • Check Point

As artificial intelligence (AI) permeates our lives, it's crucial to address the cybersecurity challenges it presents. In this dynamic landscape, AI will be utilized by both attackers and defenders. We will explore the opportunities of leveraging AI to enhance your business and defenses while acknowledging the potential risks. AI-powered attacks, opaque AI systems, and a lack of standardized security practices demand proactive measures, rigorous protocols, and transparent designs to ensure a secure AI ecosystem.

Topics: Artificial Intelligence, Information Security
10:00 - 10:50 AM

[1 CPE] A Review of FRSecure’s Annual Information Security Report

  Presented by Dave Tuckman, Information Security Consultant • FRSecure

FRSecure (an Information Security company located in Edina, MN) took the results of +/- 400 Validated Information Security Assessments and 55 Incident Response Engagements conducted in 2022 and created an anonymized report from the data called: The State of Information Security. Full details and access to the report are available here: https://frsecure.com/2023-annual-infosec-report/

In this presentation, FRSecure Information Security Consultant Dave Tuckman will highlight key findings in the report, and what we can learn from it.

Understand how you can mitigate risk going forward to protect your business and clients in an ever-changing threat landscape. Dave will provide additional perspective on how you can leverage this information for a better understanding of your third-party (supply, vendor, contractor) relationships.

Topics include:

  • FRSecure’s Annual State of InfoSec Report, informed by over 400 validated security assessments
  • Where organizations are getting it right vs. falling behind
  • How you can use this report to inform your own business’s security decisions
  • How you can use this report to inform your business’s Third-Party Risk Management
Topics: Information Security
11:00 - 11:50 AM

[1 CPE] Modern Logging & Analytics: Will Modularization Make Your SIEM Better?

  Presented by Marty McDonald, Sr Domain Security Advisor • Optiv

In this session, we will discuss trends Optiv is seeing in the SIEM market and how they may relate to your environment. We will focus on the move towards a single collection of logs and routing of those logs to multiple platforms to meet the use cases and requirements of the business and security. Once the collection of the logs is separate from the search, correlation, and analytic layers what does it mean to you?

Marty has 20 years of deep cyber security industry experience gained from a variety of value-added resellers and solutions integrators. Prior roles include Senior Consultant in Security Intelligence for Datalink, and Senior Consultant in the Technology Solutions Delivery team at Accenture. Marty is a cybersecurity professional with experience ranging over a wide variety of clients from small to Fortune 500 corporations in a multitude of industries including government, healthcare, retail, manufacturing, banking, and technology. He has delivered projects for the rationalization of technologies and reference architectures for analytics platforms. He is a subject matter expert (SME) in the design and implementation of Security Incident and Event Management (SIEM) systems and is well-versed in creating detection mechanisms that enhance Security Operation Centers (SOC) and compliance effectiveness. He possesses a unique ability to turn business needs into technology solutions in a cost-effective manner for his clients.

Topics: Information Security
1:00 - 1:50 PM

[1 CPE] The Current Threat Landscape Requires a Unique Approach

  Presented by Liran Chen, Vice President, Sales Engineering & Technical Services • Forescout

Specialized threats targeting OT environments have been around since at least 2010, with the reports of Stuxnet. Recognizing the criticality of these devices, Threat Actors have continued evolving, continuing to target OT devices, many of which are inherently insecure-by-design. Research, such as Vedere Labs’ OT:ICEFALL research project and Project Basecamp by Digital Bond from 10 years ago showed how significant the scope of vulnerable devices are that are pervasive in critical infrastructure systems. Today’s SOC needs to not only see those devices and the risks they pose while also ensuring accurate detection of the threats uniquely targeting those OT environments they’re deployed in. This session will explore this unique threat landscape and the capabilities required to combat the threats and automatically mitigate the risks specially targeting Operational Technology environments.

Topics: Information Security
2:00 - 2:50 PM

[1 CPE] PKIaaS: Empowering Trust in a Dynamic Digital Landscape

  Presented by Matt Rose, Manager, Technical Sales Consulting • Entrust

Digital transformation accelerates at a fast pace, and organizations struggle to secure their digital identities. PKI as a Service (PKIaaS) is a game changer for security. It isn’t just about keys; it’s a blend of agility, scalability, and trust. PKIaaS will provide:

  • Quick Deployment: PKIaaS deploys and expands in minutes to secure your business use cases.
  • Cloud-Native Scalability: Growth at nearly limitless capabilities
  • Security First: Entrust manages the PKI infrastructure for you

We will also review our integration and the ease in which PKIaaS plays with MDM vendors, Microsoft Active Directory and certificate automation and how to seamlessly leverage PKI with your existing enterprise IT platform.

  • Microsoft Intune: Securely enroll devices, manages their lifecycle, and handle certificates.
  • Other MDM vendors: PKIaaS collaborates seamlessly with various MDM partners, enhancing your Zero Trust strategy.
  • Microsoft Active Directory support
  • ACMEv2 and SCEP (Simple Certificate Enrollment Protocol)

As we continue to navigate security within organizations, PKIaaS will provide the assurance that you need.

Topics: Information Security
  • Sessions
10:00 - 10:50 AM

[1 CPE] How to Have a Successful Relationship (With an MSP)

  Presented by Joe Hatton, Director, Cloud Services • Structured

In today’s fast-paced business world, finding the right help is tougher than ever, especially with constant cybersecurity threats making vigilance a top priority. Outsourcing to Managed Service Providers (MSPs) might seem like an easy fix, but did you know that half of all businesses aren’t happy with their MSP? This talk will dive into how you can pick the right MSP and keep things running smoothly. We’ll cover what to look for in an MSP, how to work well together, and ways to keep the relationship strong and beneficial for everyone involved.

11:00 - 11:50 AM

[1 CPE] Future-Proof Your IT: Navigate the Evolving Infrastructure Landscape

  Presented by Mike O'Neil, Director of Systems Engineers • Scale Computing & Structured

In today's rapidly evolving IT landscape, organizations face increasing data storage, security, and operational efficiency demands. As the market responds to Broadcom's acquisition of VMware, many businesses are reevaluating their infrastructure choices, seeking alternatives that offer greater flexibility, lower costs, and long-term stability. Join Scale Computing for ""Future-Proof Your IT: Navigating the Evolving Infrastructure Landscape,"" where we will explore how Hyperconverged Infrastructure (HCI) revolutionizes how businesses manage their IT environments.

This session will explore the benefits of integrating computing, storage, and virtualization into a single, streamlined architecture. Learn how Scale Computing Platform (SC//Platform) enhances security through simplicity and automation, providing peace of mind in a world where cyber threats are constantly evolving. Discover why now is the time to embrace HCI to meet the growing demands of digital transformation and secure your organization's future.

Topics: Infrastructure
1:00 - 1:50 PM

[1 CPE] When It Comes to Security, The Right Tools Matter

  Presented by Jason Anderson, Channel Sales Engineer, SASE • HPE Aruba Networking & Structured

When it comes to security, the right tools matter. Securing your network no matter where your users are located can be difficult and complex. Over the last year, many IT leaders have embraced a Secure Access Service Edge (SASE) framework to enable faster and more secure connectivity across their global organizations. SASE converges the functions of network and security solutions into a single, cloud-native service that delivers consistent connectivity and security from everywhere. Find out how HPE Unified SASE can help you with tools that are easy to deploy, configure, and manage.

Topics: Information Security
2:00 - 2:50 PM

[1 CPE] Securing the Modern Workplace with Island: A Revolutionary Enterprise Browser Solution

  Presented by Shawn Surber, Sales Engineer • Datec

In today's rapidly evolving digital landscape, securing the modern workplace presents unprecedented challenges and complexities. Traditional security measures often fall short in addressing the sophisticated threats that enterprises face, necessitating innovative solutions that can adapt to the dynamic nature of cyber risks. This presentation is designed to introduce a groundbreaking approach to digital security through the lens of Island, an enterprise browser built from the ground up with security and productivity at its core.

We will explore how Island is redefining the standards of enterprise security by offering a comprehensive suite of features tailored to protect and enhance the digital workspace. Attendees will gain insights into how Island's unique architecture and security-focused functionalities, including advanced data loss prevention (DLP), granular access controls, and seamless integration with existing security ecosystems, are setting a new benchmark in browser capabilities.

Through real-world use cases and success stories, we will demonstrate Island's effectiveness in mitigating risks, ensuring compliance, and fostering a secure yet flexible work environment. By focusing on the strategic advantages of deploying an enterprise browser solution, we aim to equip security professionals, IT leaders, and business executives with the knowledge and tools necessary to navigate the complexities of modern cybersecurity.

Join us to discover how Island is empowering organizations to embrace the future of work with confidence, balancing the need for rigorous security measures with the demands for productivity and innovation in the digital age.

Topics: Information Security, Infrastructure

Advisory Council

HOW TO BE AN ADVISOR

Advisor-approved content is the foundation upon which INTERFACE was developed. Each conference is guided by an Advisory Council of IT executives and senior managers. Advisor members represent both private and public sector organizations. The council contributes its insight into proposed educational topics and recommends local exhibitors and associations for participation.

EXPAND TO VIEW LIST

Ron Anderson
Vice President, Information Technology
Northwest Lineman College

Lorraine Bessmer
Manager, Cybersecurity
St Luke’s Health System

Laurel Caldwell
Director, Information Technology Services
Latah County, ID

Marcus Camden
Chief Information Security Officer
ID Dept of Labor

Michael Case
Manager, IT Service & Support
Blue Cross of Idaho

Brandon Cheyney
Systems Administrator
City of Nampa, ID

Russ Cunningham
Manager, IT Security
ON Semiconductor

Jennifer Dvorak
Chief Information Security Officer
ID Courts

Matt Fuhrman
Manager, Information Security & Privacy
Your Health Idaho

Steve Goff
Director, Information Technology
Northwest Lineman College

Devonte Goodman
Director, Information Technology
City of Eagle, ID

Jon Harris
Director, Information Technology
Wright Brothers, The Building Company

Patti Henderson
Director, Information Technology
Givens Pursley LLP

Daniel Johnson
Manager, IT Security
Boise Cascade

Scott Knights
Chief Information Security Officer
ID Dept of Health & Welfare

Cody Kreps
Director, Information Services
Nampa School District

Kevin Malloy
Chief Technology Officer
Dynamis Energy, LLC

Jason Mertz
Vice President, Information Technology
Idaho First Bank

Andy Miller
Manager, Information Technology
Ada County Highway District

Dan Monighetti
Director, Information Technology
Tovuti LMS

Marc Norton
Manager, Information Technology
ID State Tax Commission

Raul Pena
Director, Information Technology
Payette County, ID

Andrew Peterson
Sr Security Analyst
US Dept of Veterans Affairs

Robert Peterson
Director, Information Technology
Washington County, ID

Morgan Poyser
Director, Information Technology
HB Specialty Foods

Dan Roberts
Director, Infrastructure, Cybersecurity
Western States Cat

Michael Rowell
Vice President, Information Technology
Turn-Key Medical

Cody Shepherd
Sr Manager, IT Operations
Idaho Power Company

John Stiffler
Director, Corporate IT
Boise Cascade Company

Shawn Turner
VP, Chief Information Security Officer
United Heritage Financial Group

Fred Warr
Manager, OIT
Boise State University

Rachel Zahn
Cybersecurity Analyst
Aura

Sponsors

HOW TO BE A SPONSOR

Participating exhibitors at INTERFACE achieve a greater return on their investment from this series of IT events than any other face-to-face medium available today. This success is achieved through a time-efficient and cost-effective presence for a pre-qualified audience. This simple formula leads to higher levels of business development opportunity at each event.

GOLD SPONSORS

CompuNet

CompuNet

CompuNet
CompuNet is a leading U.S. information technology partner, headquartered in Boise, Idaho. The firm specializes in consultation, design and implementation services specifically tailored to solve business problems. With a best-in-class engineering staff and approach, CompuNet focuses on building lasting relationships that prioritize client satisfaction over sales through every step of the journey.
Visit Website
Forescout

Forescout

Forescout
The only automated cybersecurity company that continuously identifies, protects and ensures the compliance of all managed and unmanaged connected assets – IT, IoT, IoMT and OT – so you can more effectively manage cyber risk and mitigate threats.
Visit Website
Hitachi Vantara

Hitachi Vantara

Hitachi Vantara
Hitachi Vantara helps enterprises create and derive value from their data. Its solutions include best-in-class data management, IT infrastructure and analytics products, IoT solutions and Smart Spaces technologies for a broad range of industries.
Visit Website
Structured

Structured

Structured
Structured is an award-winning solution provider delivering secure, cloud-connected digital infrastructure. For 30 years, we’ve helped clients through all phases of digital transformation by securely bridging people, business and technology.
Visit Website

SILVER SPONSORS

Cerium Networks

Cerium Networks

Cerium Networks
Cerium is a recognized innovator and leading provider of a full suite of collaboration, contact center, networking, data center, and security solutions. We help medium to large businesses in the Northwest plan for and then realize the positive impact of technology on their business operations, strategies, and user experiences.
Visit Website
Check Point Software

Check Point Software

Check Point Software
Check Point is a leading provider of cyber security solutions to governments and corporate enterprises globally. Its solutions protect customers from 5th generation cyber-attacks with an industry leading catch rate of malware, ransomware and other types of attacks.
Visit Website
Datec

Datec

Datec
Datec, Inc. is a Pacific Northwest based enterprise infrastructure provider, system integrator, wireless communications hardware supplier and a technical professional services center.
Visit Website
Entrust

Entrust

Entrust
Entrust’s identity and data security solutions enable the Zero Trust maturity journey needed to help protect your organization, and we deliver convenient, secure digital interactions for your customers and citizens.
Visit Website
Fortinet

Fortinet

Fortinet
Fortinet empowers its customers with intelligent, seamless protection across the expanding attack surface & the power to take on the ever-increasing performance requirements of the borderless network – today and into the future.
Visit Website
FRSecure

FRSecure

FRSecure
FRSecure applies industry standards to assess existing information security programs (administrative, physical and technical security controls), and we develop, implement and manage information security programs tailored to each client’s specific security needs.
Visit Website
HPE Juniper Networking

HPE Juniper Networking

HPE Juniper Networking
Juniper Networks is now part of HPE. Together, we're building industry-leading, secure, AI-native networks – purpose-built with and for AI. As AI and networking converge, we're driving a bold transformation across enterprises, service providers, and cloud operators.
Visit Website
Illumio

Illumio

Illumio
Illumio, the Zero Trust Segmentation company, stops breaches and ransomware from spreading across the hybrid attack surface. The Illumio ZTS Platform visualizes how workloads and devices are communicating, creates granular segmentation policies which only allow necessary communication, and automatically isolates ransomware and breaches. Assume breach. Minimize impact. Increase resilience.
Visit Website
Netskope

Netskope

Netskope
Netskope, a global SASE leader, helps organizations apply zero trust principles and AI/ML innovations to protect data and defend against cyber threats. The Netskope platform provides optimized access and real-time security for people, devices, and data anywhere they go. Learn how Netskope helps customers be ready for anything on their SASE journey, visit netskope.com.
Visit Website
Optiv

Optiv

Optiv
Optiv is the cyber advisory and solutions leader, delivering strategic and technical expertise to nearly 6,000 companies across every major industry. We partner with organizations to advise, deploy and operate complete cybersecurity programs from strategy and managed security services to risk, integration and technology solutions. With clients at the center of our unmatched ecosystem of people, products, partners and programs, we accelerate business progress like no other company can. At Optiv, we manage cyber risk so you can secure your full potential.
Visit Website
Red Siege

Red Siege

Red Siege
Red Siege is one of the most trusted information security consulting firms in the industry that concentrates on the latest threats to organizations today. Red Siege performs in-depth analysis, determine organization/business risk, and finds the vulnerabilities before the bad guys do. The Red Siege team of trained, qualified, and experienced information security experts is led by one of the most recognized names in the industry, our CEO Tim Medin.
Visit Website

BRONZE SPONSORS

Arcserve

Arcserve

Arcserve
Arcserve is a global top 5 data protection vendor with best-in-class solutions that manage, protect, and recover all data workloads, from SMB to enterprise and regardless of location or complexity. A 100% channel-centric organization, Arcserve has a presence in over 150 countries, with 19,000 channel partners and 235,000 customers.
Visit Website
Arctic Wolf

Arctic Wolf

Arctic Wolf
Arctic Wolf® is the market leader in security operations, and provides security operations as a concierge service. Our security experts work as an extension of your team to monitor and detect threats, and continually strengthen your security posture.
Visit Website
eSentire

eSentire

eSentire
eSentire’s complete, multi-signal Managed Detection and Response services provide 24/7 cutting-edge protection to prevent cybercriminals from ever disrupting your business.
Visit Website
ESET

ESET

ESET
For more than 30 years, ESET® has been developing industry-leading IT security software and services to protect businesses, critical infrastructure, and consumers worldwide.
Visit Website
HPE Zerto Software

HPE Zerto Software

HPE Zerto Software
HPE Zerto Software helps you unlock ransomware resilience, disaster recovery, and continuous data protection to radically reduce data loss and downtime.
Visit Website
ImageSource

ImageSource

ImageSource
ImageSource is a software and systems integration firm specializing in Enterprise Content Management.
Visit Website
Iron Bow Technologies

Iron Bow Technologies

Iron Bow Technologies
Iron Bow is a leading next generation solutions provider dedicated to empowering clients across government, commercial, education, and healthcare markets.
Visit Website
Right! Systems

Right! Systems

Right! Systems
Right! Systems, Inc. is an IT management services company that provides business-driven, multi-vendor IT solutions in Network Infrastructure, Virtualization, Storage, Unified Communications, Telepresence, Security, Mobility and Professional Services.
Visit Website
Syringa Networks

Syringa Networks

Syringa Networks
Syringa Networks is an industry-leading Managed Network Service Provider. We specialize in dedicated Internet, Voice, SD-WAN, Colocation, and Security. As a local provider, with more than 2,000 miles of fiber​, we deliver quick installs and access to live customer support, 24/7.
Visit Website
ValorC3

ValorC3

ValorC3
ValorC3 is a modern data center, cloud and connectivity partner that delivers agile, scalable IT solutions tailored to the relentless mid-market enterprise. Valor meets clients where they’re at and gets them where they need to grow, helping them navigate the rapidly changing digital landscape with flexible, high-density data centers, extensive infrastructure expansion capabilities, low latency networks, strong partnerships and decades of industry expertise.
Visit Website
VLCM

VLCM

VLCM
VLCM has been in business for over thirty years, and in that time, we’ve helped thousands of customers throughout the Rocky Mountain West find the proper solutions for their IT needs.
Visit Website

EXHIBITORS & ASSOCIATIONS

Adlumin

Adlumin

Adlumin
Adlumin's security and compliance automation platform helps organizations manage evolving threats and cybersecurity compliance requirements.
Visit Website
AVI Systems

AVI Systems

AVI Systems
Transform your communication with AVI Systems, your trusted partner for innovative audio visual and unified collaboration solutions.
Visit Website
Barracuda

Barracuda

Barracuda
Barracuda Networks is the worldwide leader in Security, Application Delivery and Data Protection Solutions. More than 200,000 global customers trust Barracuda to safeguard their employees, data, and applications from a wide range of threats. Barracuda provides easy, comprehensive and affordable solutions for email protection, application protection, network protection and data protection. We are continually innovating to deliver tomorrow’s security technology, today.
Visit Website
ByteSpeed

ByteSpeed

ByteSpeed
ByteSpeed has been providing IT Solutions, including custom built hardware, networking solutions, and professional IT services in all 50 states in the US since 1999. https://bytespeed.com/
Visit Website
CISA

CISA

CISA
CISA is the Nation’s risk advisor, working with partners to defend against today’s threats and collaborating to build more secure and resilient infrastructure for the future.
Visit Website
Cloudbrink

Cloudbrink

Cloudbrink
Cloudbrink brings high-performance connectivity to the modern hybrid workforce anywhere in the world. The company uses AI and ML to provide edge-native hybrid access as a service (HAaaS). HAaaS delivers accelerated performance for cloud, SaaS, and data center applications.
Visit Website
Computer Support Systems

Computer Support Systems

Computer Support Systems
Computer Support Systems, LLC provides products within the Emerson and Liebert Network Power portfolio to support data center solutions.
Visit Website
Create Spaces

Create Spaces

Create Spaces
Create Spaces procures, designs, and installs commercial furniture, audio visual technology and provides skilled labor! Explore our extensive portfolio of excellent projects in the Boise area and beyond.
Visit Website
Delinea

Delinea

Delinea
Seamless, intelligent, centralized authorization to better secure the modern enterprise. The Delinea Platform enables you to discover all identities, assign appropriate access levels, detect irregularities, and immediately respond to identity threats in real-time.
Visit Website
Ednetics

Ednetics

Ednetics
For more than 25 years Ednetics has been on a mission to directly address the challenges faced by schools in acquiring and utilizing technology. Recognizing the close relationship between higher education, libraries, and technological advancements, we expanded our focus to serve the public sector and our technology portfolio has grown. From modernizing operations with communications, network, cybersecurity, and data infrastructure to improving safety with physical security solutions. Today, we proudly support and empower educational institutions, libraries, local and state governments throughout the Western US.
Visit Website
Fatbeam

Fatbeam

Fatbeam
Connect to What’s Next Reliability. Scalability. Service. When speeds and connectivity are guaranteed, you have less to worry about and more time to focus on what will move your organization forward. Fatbeam makes this possible. We help businesses scale with lit and dark fiber options that improve network performance while eliminating connectivity issues and access.
Visit Website
GuidePoint Security

GuidePoint Security

GuidePoint Security
GuidePoint Security provides trusted cybersecurity consulting expertise, solutions, and services that help organizations make better decisions and minimize risk.
Visit Website
HPE Aruba Networking

HPE Aruba Networking

HPE Aruba Networking
Deliver the performance and uninterrupted access your business demands with a Zero Trust foundation and AI-automated operations that help you innovate with the least risk.
Visit Website
Idaho Technology Council

Idaho Technology Council

Idaho Technology Council
The mission of the Idaho Technology Council is to help technology companies in Idaho start, grow, and thrive. We are a member-driven organization committed to the success of Idaho’s technology ecosystem.
Visit Website
Infoblox

Infoblox

Infoblox
Infoblox unites networking and security to deliver unmatched performance and protection. Trusted by Fortune 100 companies and emerging innovators, we provide real-time visibility and control over who and what connects to your network, so your organization runs faster and stops threats earlier.
Visit Website
ISACA Boise

ISACA Boise

ISACA Boise
With more than 100,000 members in more than 180 countries, ISACA (www.isaca.org) is a recognized worldwide leader in IT governance, control, security and assurance.
Visit Website
Island

Island

Island
Meet Island, the Enterprise Browser that gives you control over SaaS governance, visibility and productivity. Secure your critical data and apps with Island.
Visit Website
ISSA Boise

ISSA Boise

ISSA Boise
The primary goal of the Information Systems Security Association, Inc. (ISSA) is to promote management practices that will ensure the confidentiality, integrity and availability of organizational information resources.
Visit Website
iT1 Source

iT1 Source

iT1 Source
Since 2003, iT1 Source has provided a wide range of IT solutions –– from big data and communications to online support and virtualization.
Visit Website
Legrand

Legrand

Legrand
The industry-leading brands of Approved Networks Ortronics, Raritan, Server Technology, Starline and ZPE empower Legrand’s Data, Power & Control to produce innovative solutions for data centers, building networks, and facility infrastructures. Our division designs, manufactures, and markets world-class products for a more productive and sustainable future. The exceptional reliability of our technologies results from decades of proven performance and a dedication to research and development. For more information, please visit our website.
Visit Website
Mimecast

Mimecast

Mimecast
Mimecast is a cybersecurity provider that helps thousands of organizations worldwide make email safer, restore trust and bolster cyber resilience.
Visit Website
MSPAA

MSPAA

MSPAA
The MSP Association of America (MSPAA) has been established with three primary missions, each of which follows a unique trajectory aimed at providing our clients, members, and students with a collaborative and informative pathway towards building a future for technology, business, and education.
Visit Website
Neat

Neat

Neat
Neat designs simple and elegant pioneering video devices for Microsoft Teams and Zoom Rooms, helping make the meeting space experience the best it can be. Continuously pushing boundaries, Neat devices are incredibly easy to install, set up and use.
Visit Website
Palo Alto Networks

Palo Alto Networks

Palo Alto Networks
Palo Alto Networks™ is the network security company. Its next-generation firewalls enable unprecedented visibility and granular policy control of applications and content – by user, not just IP address – at up to 10Gbps with no performance degradation.
Visit Website
PMI Western Idaho

PMI Western Idaho

PMI Western Idaho
The PMI Western Idaho Chapter’s mission is to advance the practice and profession of Project Management.
Visit Website
Pure Storage

Pure Storage

Pure Storage
Pure Storage uncomplicates data storage, delivering a cloud experience that empowers organizations to maximize their data while reducing the complexity and expense of managing the infrastructure behind it. With certified customer satisfaction in the top 1% of B2B companies, Pure's customers are among the happiest in the world.
Visit Website
Rain Networks

Rain Networks

Rain Networks
Rain Networks is a Value-Added-Distributor located near Seattle, Washington. The company was founded in 2003 with the vision of bringing the world's best technology products to the people that need them to make their business run more efficiently.
Visit Website
Scale Computing

Scale Computing

Scale Computing
Scale Computing's highly-automated edge infrastructure, virtualization platform, & hyperconverged solutions can handle all of your IT infrastructure needs.
Visit Website
Scality

Scality

Scality
Scality provides scale-out, hybrid-cloud capable file and object storage solutions. See what makes our company the leader in data storage software.
Visit Website
Sony

Sony

Sony
Sony Electronics' Imaging Products and Solutions Americas develops and manufactures video and audio technologies for a range of professional applications.
Visit Website
Technology Source

Technology Source

Technology Source
With access to over 500 service providers, Technology Source works alongside IT departments to create best-in-breed solutions that include Managed IT Services—including Cybersecurity, Telecom Services and Mobility Services. Our primary objective is to reduce operational expenses, improve efficiencies and deliver an outstanding customer experience for our client partners.
Visit Website
Tevora

Tevora

Tevora
Fortify your company’s defenses, reinforce compliance with industry and government regulations, & guide you to more effective management of cyber risk.
Visit Website
Thales

Thales

Thales
Today’s enterprises depend on the cloud, data and software in order to make decisive decisions. That’s why the most respected brands and largest organizations in the world rely on Thales to help them protect and secure access to their most sensitive information and software wherever it is created, shared or stored – from the cloud and data centers to devices and across networks.
Visit Website
Triden Group

Triden Group

Triden Group
Triden Group is a solution and services company that provides tailored, comprehensive cybersecurity solutions to address your organizational challenges and achieve your goals and outcomes. Leveraging our repertoire of skills, software, and services, we construct the ideal solutions for your organization to protect your data, assets, and operations.
Visit Website
Veeam

Veeam

Veeam
Veeam is the global leader in Intelligent Data Management for the Hyper-Available Enterprise. Veeam Hyper-Availability Platform is the most complete solution to help customers on the journey to automating data management.
Visit Website
Verkada

Verkada

Verkada
Verkada provides cloud-managed security solutions—video surveillance, access control, alarms, and more—designed to simplify physical security and deliver real-time insights for safer, smarter buildings.
Visit Website
Vertiv

Vertiv

Vertiv
At Vertiv, We support today's growing mobile and cloud computing markets with our portfolio of power, thermal and infrastructure management products, software and solutions, all complemented by our global service network.
Visit Website

Interested in becoming part of our next Boise event?

CONTACT US FOR INFO

Boise

Boise Centre
Grand Ballroom
850 W. Front Street
Boise, ID 83702

Directions & Parking

About Us

We produce quality, cutting-edge educational seminars, drawn from case studies and best practice examples from leaders in the field.

800-365-6402
Contact Us

Popular Searches

  • Event Registration
  • Become an Exhibitor
  • Become an Advisor
  • Sponsor an Event
  • Contact Event Coordinator
  • Submit Feedback

Seminar Topics

  • Artificial Intelligence
  • BC / DR
  • Culture
  • Data Center Technology
  • Data Management
  • Data Storage
  • Digital Experience
  • Information Security
  • Infrastructure
  • Strategic Management
  • Unified Communications

2026 Events

  • Portland • March 19th
  • Anchorage • April 22nd
  • Honolulu • May 21st
  • Phoenix • June 18th
  • Wyoming • July 9th
  • Montana • July 29th
  • Boise • August 20th
  • Salt Lake City • September 22nd
  • Spokane • October 15th
  • Omaha • November 5th
  • Seattle • December 3rd
  • Home
  • About
  • Get Involved
  • Events
  • Register
  • © 2026 F2F Events, Inc.