F2F Events, Inc.
  • Home
  • About
    • About
    • CPE Credits
    • Session Topics
    • Privacy Policy
      • Scam Warning
    • Code of Conduct
    • Media Kit
  • Get Involved
    • Advisory Council
    • Association Partners
    • Exhibitors
    • Speakers
  • Events
    • Locations
    • Upcoming Events
  • Contact
  • Register

Cutting-edge conferences for over 20 years

Educational Events with Your Local IT Community

View Upcoming Events Register

INTERFACE Spokane 2024 / See You Next Year

IT Infrastructure is constantly changing, bringing more new challenges with it every day. From ransomware and the latest security threats to emerging developments in AI and the need for increased bandwidth and storage, it’s nearly impossible to keep up to date. Our conference is designed to help. We’ve assembled a combination of Best-in-Breed hardware and software solutions, along with local experts and organizations to help educate, advise and connect you to resources that can help you meet your goals.

Covering Information Security, Infrastructure, Cloud, Disaster Recovery, Communications, and more, you’ll find presentations, panel discussions, and exhibitors covering a variety of topics, as well as the latest innovations and best practices.

CPE SURVEY
SUBSCRIBE TO Spokane EVENTS

AT A GLANCE

October 16th, 2024
8:30am – 4:30pm

Spokane Convention Center
Ballroom 111ABC
334 W. Spokane Falls Blvd
Spokane, WA 99201

Directions & Parking

KEYNOTE: [1 CPE] Moving to Agile at Gonzaga: Lessons Learned

  Presented by Borre Ulrichsen • Chief Information Officer, Gonzaga University

Seminar Schedule

VIEW FLOORPLAN
DOWNLOAD SCHEDULE
  • Theater One
  • Theater Two
  • Sessions
  • Keynote
9:00 - 9:50 AM

[1 CPE] Can You Prevent a Cyberattack?

  Presented by Jeff Polczynski, Director of Solutions Architecture • 11:11 Systems

Sprawling cloud infrastructure, remote and hybrid work, and ever more brazen threat actors have made it nearly infeasible to have an answer for every threat vector encroaching upon your organization. How can you withstand the onslaught of attacks?

Let's discuss how to build a comprehensive plan for preventing bad actors and malicious insiders from compromising your systems, disrupting your business operations, and harming your company brand.

Jeff T. Polczynski is the Director of Solutions Architecture at 11:11 Systems. Previously, he was a key member of the Network Engineering team, where he helped design and build the network infrastructure for the 11:11 Cloud. Jeff has more than 20 years of experience in data center, networking and security roles across government, financial services, and service provider companies. Outside of work, he loves backpacking and is always on the lookout for the perfect spot to hang his hammock for a night under the stars.

Topics: Information Security
10:00 - 10:50 AM

[1 CPE] Are You AI Ready? Securing M365 Copilot

  Presented by Structured

This presentation dives into the transformative potential of Generative AI (GenAI) and Microsoft's M365 Copilot. We’ll cover the fundamental differences between GenAI and Machine Learning, highlighting GenAI's ability to create new content and its applications across various industries. We’ll also provide an in-depth look at Microsoft Copilot, showcasing its role in enhancing productivity through intelligent suggestions and automation. Additionally, we’ll introduce a comprehensive Copilot Assessment service designed to evaluate an organization's readiness for AI integration, focusing on IT infrastructure, security, data governance, and compliance. Emphasis is placed on ensuring secure integration and adherence to global data privacy standards, making it a critical resource for organizations embarking on their AI journey.

Topics: Artificial Intelligence
11:00 - 11:50 AM

[1 CPE] AI in Cybersecurity: Navigating the Double-Edged Sword

  Presented by Johan Bloomhart, Principal Sales Engineer • WatchGuard & BlackPoint IT

The rise of Artificial Intelligence (AI) has introduced both transformative opportunities and unprecedented risks to the cybersecurity landscape. While AI is a powerful tool for automating threat detection and enhancing security protocols, it also presents new avenues for cybercriminals to launch more sophisticated attacks. In AI in Cybersecurity: Navigating the Double-Edged Sword, we’ll explore AI’s dual impact—empowering both defenders and attackers—and discuss how to harness AI responsibly to protect against emerging threats.

This session will cover:

  • An overview of AI’s evolution and its prominence in the modern business world.
  • How malicious actors exploit AI for nefarious purposes, and the vulnerabilities that arise.
  • How cybersecurity professionals use AI to fortify defenses, identify threats, and mitigate risks.
  • Predictions for AI’s long-term influence on the security industry.
  • The latest technological tools and techniques that can mitigate the risks posed by AI.

We’ll also offer guidance on developing an artificial intelligence policy that allows your organization to leverage AI’s productivity benefits while minimizing risks to data security. Participants will walk away with actionable insights into how to implement AI securely in their business, staying ahead of both competitors and cyber threats.

Topics: Artificial Intelligence, Information Security
12:00 - 12:50 PM

[1 CPE] Disaster Preparedness and Data Protection Strategies for Business Continuous Availability

  Presented by Matthew Kern, Sales Engineer • Arcserve

As natural disasters like hurricanes, wildfires, and severe winter events become more frequent and intense, businesses face increasing economic and operational challenges. High-profile disasters, including the Camp Fire in 2018, which incurred a staggering $16.5 billion in damages, and Hurricane Maria's profound impact on Puerto Rico, estimated at $139 billion for full recovery, underscore the escalating financial stakes.

This presentation will explore effective strategies to bolster business resilience in the face of natural catastrophes.

Key elements of the session will include:

  • Critical insights from Arcserve's annual global research study on disaster preparedness.
  • A comprehensive Disaster Preparedness Checklist tailored for companies.
  • Practical tools designed to safeguard business operations and data resilience.

We will delve into the details of a 5-step disaster and ransomware recovery plan template, as well as the 3-2-1-1 backup strategy, which ensures robust data recovery through multiple backup copies stored both locally and offsite. By implementing these strategies, businesses can minimize financial losses, reduce operational downtime, and achieve a rapid recovery, thereby ensuring continuity even during catastrophic events. This session aims to arm business leaders with the essential tools and knowledge to safeguard their enterprises amidst an increasingly unpredictable global landscape.

Topics: Business Continuity / Disaster Recovery, Infrastructure
1:00 - 1:50 PM

[1 CPE] LIVE Hack: Unmasking AI’s Dark Side

  Presented by Wayne Johnson, CEO • Stellar & iT1 Source

In this eye-opening presentation, we will delve into the darker applications of artificial intelligence, specifically focusing on its potential to craft malicious code and generate deceptive voice replicas. As AI continues to evolve, its capabilities extend beyond beneficial innovations, posing significant ethical and security challenges. This session aims to shed light on how AI can be manipulated to perform nefarious tasks, such as writing harmful software or impersonating voices with high accuracy. Through live demonstrations and critical discussions, we aim to equip the audience with a comprehensive understanding of these risks and foster a dialogue on developing robust countermeasures and ethical guidelines to prevent misuse of AI technologies. Join us as we explore the shadowy corners of AI applications, understanding their implications and preparing for a secure technological future.

Topics: Artificial Intelligence
2:00 - 2:50 PM

[1 CPE] AI Unleashed: Navigating the AI Landscape for Responsible Adoption

  Presented by Hunter Helfgott, AI Adoption Specialist, & Kevin Heide, Director of Technical Sales • Cerium Networks

In today’s digital era, AI is not just a buzzword but a robust toolset that, when wielded with precision, can unlock unprecedented value and competitive advantage. As we embark on this journey, we must anchor our strategies in the bedrock of security, ensuring that our AI systems not only enhance our capabilities but also safeguard our assets. This presentation explores practical steps to weave AI into our business fabric, turning challenges into a springboard for growth and innovation. Our goal is to present you with concepts and avenues to consider as you learn to navigate your adoption. Let’s embark on this journey to harness AI’s potential responsibly and effectively.

Topics: Artificial Intelligence
Borre UlrichsenBorre UlrichsenChief Information Officer, Gonzaga University
3:00 - 3:50 PM

[1 CPE] Moving to Agile at Gonzaga: Lessons Learned

  Presented by Borre Ulrichsen • Chief Information Officer, Gonzaga University

Gonzaga is seeing an increasing need for flexibility and agility in implementing and supporting information technology in a higher education environment that is constantly evolving. In this session, Borre Ulrichsen, Chief Information Officer, will cover the drivers behind Gonzaga's transition to agile, how information technology worked with the community during the transition, and some of the benefits the university is reaping from this new way of working.

Borre Ulrichsen has served as the Chief Information Officer at Gonzaga University since August 2016. From 2011 to 2016 he was the Chief Information Officer and Associate Vice President for IT Services at California State University, East Bay. From 2002 to 2011, he was the Director of Information Systems Projects at San Francisco State University. Previous to that he held various IT leadership roles in the private sector. Borre completed his MBA at the Haas School of Business at UC Berkeley. He also earned a master’s degree in engineering from the Norwegian University of Science and Technology.

Topics: Information Security
  • Sessions
9:00 - 9:50 AM

[1 CPE] The Intersection of AI and Cybersecurity

  Presented by Gregory Pepper, Security Architect • Check Point

As artificial intelligence (AI) permeates our lives, it's crucial to address the cybersecurity challenges it presents. In this dynamic landscape, AI will be utilized by both attackers and defenders. We will explore the opportunities of leveraging AI to enhance your business and defenses while acknowledging the potential risks. AI-powered attacks, opaque AI systems, and a lack of standardized security practices demand proactive measures, rigorous protocols, and transparent designs to ensure a secure AI ecosystem.

Topics: Artificial Intelligence, Information Security
10:00 - 10:50 AM

[1 CPE] SLED Challenges: Budgets, Compliance, E-Rate

  Presented by Michael Townsend, Solutions Architect, & Robert Gherbaz, vCIO • Barracuda & BlackPoint IT

SLED (State/Local Government, Education) customers face unique challenges when adopting new technologies, such as limited budgets, lengthy approval processes, and outdated infrastructure. With over 30 years of experience in the K-12 education sector, Michael understands these hurdles firsthand. His deep insight into the constraints faced by SLED organizations enables him to guide decision-makers through the complexities of implementing new solutions.

In the cybersecurity space, where threats evolve rapidly, Michael helps SLED customers navigate the landscape while working within the confines of limited resources and procedural barriers. His "been there, done that" experience ensures that SLED clients overcome challenges and adopt essential technologies.

Topics: Information Security
11:00 - 11:50 AM

[1 CPE] Proactive Threat Mitigation Through East/West Traffic Isolation

  Presented by HPE Aruba Networking & Structured

Ransomware and targeted cyber security threats are on the rise. A proactive prevention strategy should use both tried and proven methodologies as well as new and emerging technologies. East West traffic identification and isolation is key in preventing malicious content from spreading, both in the Data Center and at the Campus Edge of the network. We will focus on innovative approaches to address the security compliance, performance, agility, and scalability demands of today’s highly distributed, hybrid, network environments.

Topics: Information Security
12:00 - 12:50 PM

[1 CPE] Sprung a Leak! Unit 42’s 2024 Leak Site Analysis

  Presented by Palo Alto Networks & Structured

Unit 42 monitors ransomware and extortion leak sites closely to keep tabs on threat activity and monitors data from dedicated leak sites (DLS) that are often only accessible through the dark web. Throughout our analysis, we compare activity results so that we are accounting for any seasonal fluctuations that can occur due to annual holidays, travel seasons and other recurring events that may impact threat activity. Here we will take a dive into those key leak site trends impacting the state of cybersecurity.

Topics: Information Security
1:00 - 1:50 PM

[1 CPE] Could You Recover from a Cyberattack?

  Presented by Jeff Polczynski, Director of Solutions Architecture • 11:11 Systems

Cybercrime continues to be the number one worry for most organizations, and for good reason. Cyberattacks are the most common reason for an outage — and the most impactful. But defending against cyberattacks is only one part of a holistic plan for surviving a ransomware attack. Could you recover if cyber criminals targeted your organization?

During our presentation, we’ll discuss how to create a holistic cyber resilience strategy that considers ongoing technical drift and changes.

Jeff T. Polczynski is the Director of Solutions Architecture at 11:11 Systems. Previously, he was a key member of the Network Engineering team, where he helped design and build the network infrastructure for the 11:11 Cloud. Jeff has more than 20 years of experience in data center, networking and security roles across government, financial services, and service provider companies. Outside of work, he loves backpacking and is always on the lookout for the perfect spot to hang his hammock for a night under the stars.

Topics: Business Continuity / Disaster Recovery
2:00 - 2:50 PM

[1 CPE] Demystifying Zero Trust: Simplifying Network Security

  Presented by Tanner Harrison, Systems Engineer • Fortinet

Today's ever-changing threat landscape challenges traditional security models. The emergence of the Zero Trust model represents a transformative approach, reshaping how organizations protect their assets. This presentation aims to demystify Zero Trust, offering a comprehensive understanding that goes beyond buzzwords. We will explore the foundational concepts of Zero Trust, emphasizing the "never trust, always verify" philosophy. By the end of this session, attendees will be equipped with the knowledge to begin their Zero Trust journey, enhancing their security posture, and protecting critical data and systems from modern threats. Whether you are a security professional, IT manager, or organizational leader, this discussion will empower you to take decisive action toward a more secure future.

Topics: Information Security

Advisory Council

HOW TO BE AN ADVISOR

Advisor-approved content is the foundation upon which INTERFACE was developed. Each conference is guided by an Advisory Council of IT executives and senior managers. Advisor members represent both private and public sector organizations. The council contributes its insight into proposed educational topics and recommends local exhibitors and associations for participation.

EXPAND TO VIEW LIST

Jennifer Aguiar
Supervisor, Information Technology
Fairchild Air Force Base

Dan Brown
Cybersecurity Advisor
CISA

Laurel Caldwell
Director, IT Services
Latah County, ID

Ben Calvert
Chief Information Officer
Vista Title & Escrow

Paul Carugati
Head of Information Security
Syngenta

Ken Clegg
Director, Information Security
Ministry Brands

Ian Cornwall
Director, Information Technology
METER Group, Inc.

Kai Dailey
IT Security Program Manager
501 Commons

James Davidson
Director, Information Technology
Ferry County Health

Shane Fuller
Assistant Director, Technology Services
Community Colleges of Spokane

Chad Goodhue
Director, Technology Services
Walla Walla County, WA

Pete Hansen
Chief, Information Technology
Fairchild Air Force Base

Udochukwu Madumere
Manager, Networks and Engineering
Kaiser Aluminum

Melissa Mason
Vice President, Information Risk Compliance
Umpqua Bank

Dave Nevala
Director, Information Technology
Lukins & Annis PS

Andrew Rausch
Chief Information Officer
Lydig Construction

Joe Sams
Manager, Information Systems
Teck American, Inc.

Naci Seyhanli
IT Security Analyst
Spokane Regional Health District

Steve Simmons
Director, Center for Network Computing
Eastern Washington University

Derek Southerly
Sr Manager, Digital Automation
Harman International

Cory Staheli
Chief Information Officer
Trans-System, Inc.

Troy Wunderlich
VP & Director, Risk Management
Washington Trust Bank

Sponsors

HOW TO BE A SPONSOR

Participating exhibitors at INTERFACE achieve a greater return on their investment from this series of IT events than any other face-to-face medium available today. This success is achieved through a time-efficient and cost-effective presence for a pre-qualified audience. This simple formula leads to higher levels of business development opportunity at each event.

GOLD SPONSORS

11:11 Systems

11:11 Systems

11:11 Systems
11:11 Systems is creating a new model delivering the power of "Everything Connected" in connectivity, cloud, and security solutions for customers and partners.
Visit Website
BlackPoint IT

BlackPoint IT

BlackPoint IT
Established in 1977, BlackPoint IT Services is a leading provider of comprehensive IT and Telecom Managed Services, catering to small and medium-sized businesses across the United States. Our commitment to excellence extends globally, with remote services offered internationally for our clients. Our diverse service offerings encompass Carrier, IT Networking, Telecom professional services, and project management, ensuring that our clients receive end-to-end support for their technology needs. At BlackPoint, we are dedicated to delivering tailored solutions that harness the power of current technologies, empowering our clients to achieve their business objectives both today and in the future. With a strong focus on innovation and customer satisfaction, we take pride in our ability to offer a wide range of services while maintaining a high level of expertise. Our team's collaborative approach and unwavering dedication to excellence make BlackPoint the ideal partner for businesses seeking cutting-edge IT and Telecom solutions.
Visit Website
Structured

Structured

Structured
Structured is an award-winning solution provider delivering secure, cloud-connected digital infrastructure. For 30 years, we’ve helped clients through all phases of digital transformation by securely bridging people, business and technology.
Visit Website

SILVER SPONSORS

Arcserve

Arcserve

Arcserve
Arcserve is a global top 5 data protection vendor with best-in-class solutions that manage, protect, and recover all data workloads, from SMB to enterprise and regardless of location or complexity. A 100% channel-centric organization, Arcserve has a presence in over 150 countries, with 19,000 channel partners and 235,000 customers.
Visit Website
Cerium Networks

Cerium Networks

Cerium Networks
Cerium is a recognized innovator and leading provider of a full suite of collaboration, contact center, networking, data center, and security solutions. We help medium to large businesses in the Northwest plan for and then realize the positive impact of technology on their business operations, strategies, and user experiences.
Visit Website
Check Point Software

Check Point Software

Check Point Software
Check Point is a leading provider of cyber security solutions to governments and corporate enterprises globally. Its solutions protect customers from 5th generation cyber-attacks with an industry leading catch rate of malware, ransomware and other types of attacks.
Visit Website
Fortinet

Fortinet

Fortinet
Fortinet helps organizations across the public and private sectors protect the systems, data, and services that keep businesses and communities running. From government agencies and schools to enterprises and service providers, leaders rely on Fortinet to secure critical infrastructure, ensure operational continuity, and defend against evolving cyber threats. Our Security Fabric platform unifies networking and security to deliver the visibility, control, and efficiency organizations need to operate confidently, whether virtual, in the cloud, or on-premises.
Visit Website
iT1 Source

iT1 Source

iT1 Source
Since 2003, iT1 Source has provided a wide range of IT solutions –– from big data and communications to online support and virtualization.
Visit Website

BRONZE SPONSORS

CompuNet

CompuNet

CompuNet
CompuNet is a leading U.S. information technology partner, headquartered in Boise, Idaho. The firm specializes in consultation, design and implementation services specifically tailored to solve business problems. With a best-in-class engineering staff and approach, CompuNet focuses on building lasting relationships that prioritize client satisfaction over sales through every step of the journey.
Visit Website
ESET

ESET

ESET
For more than 30 years, ESET® has been developing industry-leading IT security software and services to protect businesses, critical infrastructure, and consumers worldwide.
Visit Website
Exbabylon

Exbabylon

Exbabylon
Exbabylon is a uniquely Northwest boutique IT firm with a team of energetic, experienced IT professionals who have a passion for making things work better, smarter and more secure through on premise, cloud and hybrid solutions.
Visit Website
Extreme Networks

Extreme Networks

Extreme Networks
Extreme Networks, Inc. (EXTR) delivers software-driven networking solutions that help IT departments everywhere deliver the ultimate business outcome: stronger connections with customers, partners and employees.
Visit Website
GCSIT & Dell

GCSIT & Dell

GCSIT & Dell
GCSIT is a different kind of engineering firm. We act as your personal technology optimization team to create and maintain custom-built, agile infrastructure. We help you transition to the right technology solutions to better handle complex and dynamic challenges.
Visit Website
HPE Zerto Software

HPE Zerto Software

HPE Zerto Software
HPE Zerto Software helps you unlock ransomware resilience, disaster recovery, and continuous data protection to radically reduce data loss and downtime.
Visit Website
Iron Bow Technologies

Iron Bow Technologies

Iron Bow Technologies
Iron Bow is a leading next generation solutions provider dedicated to empowering clients across government, commercial, education, and healthcare markets.
Visit Website
Nuvodia

Nuvodia

Nuvodia
Nuvodia is an award-winning Managed Services Provider with certified technology experts that have one mission – make your business better. Nuvodia proudly serves the IT support needs of businesses from Pacific Northwest to the Desert Southwest, and Radiology Informatics nationwide.
Visit Website
Optiv

Optiv

Optiv
Optiv is the cyber advisory and solutions leader, delivering strategic and technical expertise to nearly 6,000 companies across every major industry. We partner with organizations to advise, deploy and operate complete cybersecurity programs from strategy and managed security services to risk, integration and technology solutions. With clients at the center of our unmatched ecosystem of people, products, partners and programs, we accelerate business progress like no other company can. At Optiv, we manage cyber risk so you can secure your full potential.
Visit Website
Right! Systems

Right! Systems

Right! Systems
Right! Systems, Inc. is an IT management services company that provides business-driven, multi-vendor IT solutions in Network Infrastructure, Virtualization, Storage, Unified Communications, Telepresence, Security, Mobility and Professional Services.
Visit Website

EXHIBITORS & ASSOCIATIONS

Arista Networks

Arista Networks

Arista Networks
Arista Networks is an industry leader in data-driven, client-to-cloud networking for large data center, campus, and routing environments. Arista’s award-winning platforms deliver availability, agility, automation, analytics, and security through an advanced network operating stack.
Visit Website
Barracuda

Barracuda

Barracuda
Barracuda Networks is the worldwide leader in Security, Application Delivery and Data Protection Solutions. More than 200,000 global customers trust Barracuda to safeguard their employees, data, and applications from a wide range of threats. Barracuda provides easy, comprehensive and affordable solutions for email protection, application protection, network protection and data protection. We are continually innovating to deliver tomorrow’s security technology, today.
Visit Website
CISA

CISA

CISA
CISA is the Nation’s risk advisor, working with partners to defend against today’s threats and collaborating to build more secure and resilient infrastructure for the future.
Visit Website
Cisco

Cisco

Cisco
Cisco is the worldwide leader in IT that helps companies seize the opportunities of tomorrow by proving that amazing things can happen when you connect the previously unconnected. Cisco delivers intelligent cybersecurity for the real world.
Visit Website
Cribl

Cribl

Cribl
Founded with a vision of simplifying big data and log analytics at scale, Cribl is innovating the real-time data pipeline. Led by a team of experts in IT Operations and Observability, Cribl provides users a new level of visibility, intelligence, and control over their data.
Visit Website
Dell

Dell

Dell
Dell Technologies (NYSE:DELL) helps organizations and individuals build their digital future and transform how they work, live and play. The company provides customers with the industry’s broadest and most innovative technology and services portfolio for the data era.
Visit Website
Ericsson

Ericsson

Ericsson
Ericsson’s enterprise wireless solutions enable organizations to innovate, operate, and grow anywhere — without constraints. Ericsson NetCloud, Cradlepoint routers, and Enterprise 5G solutions provide the flexibility of public and private 5G, with the zero trust security of simplified SASE.
Visit Website
Fatbeam

Fatbeam

Fatbeam
Connect to What’s Next Reliability. Scalability. Service. When speeds and connectivity are guaranteed, you have less to worry about and more time to focus on what will move your organization forward. Fatbeam makes this possible. We help businesses scale with lit and dark fiber options that improve network performance while eliminating connectivity issues and access.
Visit Website
HPE Aruba Networking

HPE Aruba Networking

HPE Aruba Networking
Deliver the performance and uninterrupted access your business demands with a Zero Trust foundation and AI-automated operations that help you innovate with the least risk.
Visit Website
HPE Juniper Networking

HPE Juniper Networking

HPE Juniper Networking
Juniper Networks is now part of HPE. Together, we're building industry-leading, secure, AI-native networks – purpose-built with and for AI. As AI and networking converge, we're driving a bold transformation across enterprises, service providers, and cloud operators.
Visit Website
InfraGard Washington

InfraGard Washington

InfraGard Washington
InfraGard is a partnership between the FBI and the private sector representing businesses, academia, state , local law enforcement agencies, and other participants dedicated to sharing information and intelligence to prevent hostile acts against the U.S.
Visit Website
LaunchPad Inland Northwest

LaunchPad Inland Northwest

LaunchPad Inland Northwest
LaunchPad INW is a professional services organization committed to leading a regional, collaborative initiative to strengthen our regional innovation ecosystem. We deliver inclusive programs and events that connect, mentor and inspire people and companies to achieve greater success.
Visit Website
Mountain View Tech

Mountain View Tech

Mountain View Tech
Dependable IT support services based in Central Washington helping businesses optimize and protect their operations and overcome technical issues.
Visit Website
MSPAA

MSPAA

MSPAA
The MSP Association of America (MSPAA) has been established with three primary missions, each of which follows a unique trajectory aimed at providing our clients, members, and students with a collaborative and informative pathway towards building a future for technology, business, and education.
Visit Website
Palo Alto Networks

Palo Alto Networks

Palo Alto Networks
Palo Alto Networks™ is the network security company. Its next-generation firewalls enable unprecedented visibility and granular policy control of applications and content – by user, not just IP address – at up to 10Gbps with no performance degradation.
Visit Website
Rain Networks

Rain Networks

Rain Networks
Rain Networks is a Value-Added-Distributor located near Seattle, Washington. The company was founded in 2003 with the vision of bringing the world's best technology products to the people that need them to make their business run more efficiently.
Visit Website
Ruckus Networks

Ruckus Networks

Ruckus Networks
Ruckus Networks is redefining connectivity around the globe. We build secure wired and wireless access networks for organizations that place a premium on connectivity experiences for end-users as well as simplicity and lower-cost-per-connection for IT.
Visit Website
Scale Computing

Scale Computing

Scale Computing
Scale Computing's highly-automated edge infrastructure, virtualization platform, & hyperconverged solutions can handle all of your IT infrastructure needs.
Visit Website
Stellar

Stellar

Stellar
Our mission is to make migrating to the cloud easier for enterprises than ever before. The cloud isn't just for people with massive development teams that can re-architect enterprise apps to make moving to a big-name public cloud cost-effective. At Stellar, we want to bring the power of cloud computing to everyone and help our customers worry less about IT infrastructure.
Visit Website
STEP CG

STEP CG

STEP CG
When you choose STEP CG, you get a trusted partner that understands your business strategy. We’re a leading managed IT, security and cloud services provider with award-winning, nationwide solutions. We support a full portfolio of networking, voice, security and professional service solutions. Our network technology solutions are powered by strategic engineers and best of breed technologies across a wide range of industries.
Visit Website
Thales

Thales

Thales
Today’s enterprises depend on the cloud, data and software in order to make decisive decisions. That’s why the most respected brands and largest organizations in the world rely on Thales to help them protect and secure access to their most sensitive information and software wherever it is created, shared or stored – from the cloud and data centers to devices and across networks.
Visit Website
WatchGuard

WatchGuard

WatchGuard
For 25 years, WatchGuard Technologies has pioneered easy-to-deploy and easy to manage solutions. With industry-leading network security, secure Wi-Fi, MFA, Endpoint and network intelligence products and services for more than 250,000 companies. In a world where the cybersecurity landscape is constantly evolving, and new threats emerge each day, WatchGuard makes enterprise-grade cybersecurity technology accessible for every company.
Visit Website

Interested in becoming part of our next Spokane event?

CONTACT US FOR INFO

Spokane

Spokane Convention Center
Ballroom 111ABC
334 W. Spokane Falls Blvd
Spokane, WA 99201

Directions & Parking

About Us

We produce quality, cutting-edge educational seminars, drawn from case studies and best practice examples from leaders in the field.

800-365-6402
Contact Us

Popular Searches

  • Event Registration
  • Become an Exhibitor
  • Become an Advisor
  • Sponsor an Event
  • Contact Event Coordinator
  • Submit Feedback

Seminar Topics

  • Artificial Intelligence
  • BC / DR
  • Culture
  • Data Center Technology
  • Data Management
  • Data Storage
  • Digital Experience
  • Information Security
  • Infrastructure
  • Strategic Management
  • Unified Communications

2026 Events

  • Portland • March 19th
  • Anchorage • April 22nd
  • Honolulu • May 21st
  • Phoenix • June 18th
  • Wyoming • July 9th
  • Montana • July 29th
  • Boise • August 20th
  • Salt Lake City • September 22nd
  • Spokane • October 15th
  • Omaha • November 5th
  • Seattle • December 3rd
  • Home
  • About
  • Get Involved
  • Events
  • Register
  • © 2026 F2F Events, Inc.