F2F Events, Inc.
  • Home
  • About
    • About
    • CPE Credits
    • Session Topics
    • Privacy Policy
      • Scam Warning
    • Code of Conduct
    • Media Kit
  • Get Involved
    • Advisory Council
    • Association Partners
    • Exhibitors
    • Speakers
  • Events
    • Locations
    • Upcoming Events
  • Contact
  • Register

Cutting-edge conferences for over 20 years

Educational Events with Your Local IT Community

View Upcoming Events Register

INTERFACE Seattle 2024 / See You Next Year

IT Infrastructure is constantly changing, bringing more new challenges with it every day. From ransomware and the latest security threats to emerging developments in AI and the need for increased bandwidth and storage, it’s nearly impossible to keep up to date. Our conference is designed to help. We’ve assembled a combination of Best-in-Breed hardware and software solutions, along with local experts and organizations to help educate, advise and connect you to resources that can help you meet your goals.

Covering Information Security, Infrastructure, Cloud, Disaster Recovery, Communications, and more, you’ll find presentations, panel discussions, and exhibitors covering a variety of topics, as well as the latest innovations and best practices.

CPE SURVEY
SUBSCRIBE TO Seattle EVENTS

AT A GLANCE

December 12th, 2024
8:30am – 4:30pm

Seattle Convention Center
Ballroom 6BC
705 Pike Street
Seattle, WA 98101

Directions & Parking

Venue Accessibility

KEYNOTE: [1 CPE] CIO: Chief Insanity Officer – Thriving in the Role Without Losing Your Mind

  Presented by Megan Clarke • Chief Information Officer, King County WA

Seminar Schedule

VIEW FLOORPLAN
DOWNLOAD SCHEDULE
  • Theater One
  • Theater Two
  • Theater Three
  • Theater Four
  • Sessions
  • Keynote
9:00 - 9:50 AM

[1 CPE] The Current Threat Landscape Requires a Unique Approach

  Presented by Liran Chen, Vice President, Sales Engineering & Technical Services • Forescout

Specialized threats targeting OT environments have been around since at least 2010, with the reports of Stuxnet. Recognizing the criticality of these devices, Threat Actors have continued evolving, continuing to target OT devices, many of which are inherently insecure-by-design. Research, such as Vedere Labs’ OT:ICEFALL research project and Project Basecamp by Digital Bond from 10 years ago showed how significant the scope of vulnerable devices are that are pervasive in critical infrastructure systems. Today’s SOC needs to not only see those devices and the risks they pose while also ensuring accurate detection of the threats uniquely targeting those OT environments they’re deployed in. This session will explore this unique threat landscape and the capabilities required to combat the threats and automatically mitigate the risks specially targeting Operational Technology environments.

Topics: Information Security
10:00 - 10:50 AM

[1 CPE] The Future of AI-Enabled Data Platforms

  Presented by Ian Clatworthy, Global Director, Infrastructure Product Marketing • Hitachi Vantara

Removing the infrastructure silos and administration complexity around your application’s data gives you the flexibility to consume solutions and deliver total data freedom. Join us as we showcase the future of data storage as a single hybrid cloud platform for applications. Allowing you to consume the data services you need, where and when you need it! Offering a single data plane and control plane across block, file, object, and mainframe, with one common experience for administration, analytics, and automation.

Ian comes from a customer background in Formula 1 and World Rallying. Having a deep understanding of technology and its benefits he took his skills into technology sales and marketing with Dell and HDS. Today he leads Product Marketing for data infrastructure technologies at Hitachi Vantara.

Topics: Artificial Intelligence, Data Management
11:00 - 11:50 AM

[1 CPE] AI in Cybersecurity: Navigating the Double-Edged Sword

  Presented by Johan Bloomhart, Principal Sales Engineer • WatchGuard & BlackPoint IT

The rise of Artificial Intelligence (AI) has introduced both transformative opportunities and unprecedented risks to the cybersecurity landscape. While AI is a powerful tool for automating threat detection and enhancing security protocols, it also presents new avenues for cybercriminals to launch more sophisticated attacks. In AI in Cybersecurity: Navigating the Double-Edged Sword, we’ll explore AI’s dual impact—empowering both defenders and attackers—and discuss how to harness AI responsibly to protect against emerging threats.

This session will cover:

  • An overview of AI’s evolution and its prominence in the modern business world.
  • How malicious actors exploit AI for nefarious purposes, and the vulnerabilities that arise.
  • How cybersecurity professionals use AI to fortify defenses, identify threats, and mitigate risks.
  • Predictions for AI’s long-term influence on the security industry.
  • The latest technological tools and techniques that can mitigate the risks posed by AI.

We’ll also offer guidance on developing an artificial intelligence policy that allows your organization to leverage AI’s productivity benefits while minimizing risks to data security. Participants will walk away with actionable insights into how to implement AI securely in their business, staying ahead of both competitors and cyber threats.

Topics: Artificial Intelligence, Information Security
1:00 - 1:50 PM

[1 CPE] Incident Response: A Peek Behind the Curtain & the Solution

  Presented by Ron Pelletier, Founder and Chief Customer Officer • Pondurance, with iT1 Source

Join Ron Pelletier, Pondurance’s Co-Founder as he shares insights from the in-house Incident Response Team on current causes & trends, shortfalls on current IR Teams, and the solutions available. Learn about how Ransomware has evolved, how it's analyzed, and what measures should be taken by security programs to keep themselves secure.

Ron has more than twenty-five years of client advisory experience in security and enterprise risk management. His expertise is centered within the enterprise risk assessment, business continuity, and governance areas. He has also provided HIPAA, HITECH, ISO 27002, and PCI DSS advisory services to large and mid-sized organizations. Ron is certified in multiple disciplines relating to information and asset protection, including Certified Information Systems Security Professional (CISSP), Certified Information Systems Security Manager (CISM), Certified Business Continuity Professional (CBCP), Certified Information Systems Auditor (CISA), Certified Computer Forensics Examiner (CCFE), and Certified Ethical Hacker (CEH).

Topics: Information Security
2:00 - 2:50 PM

[1 CPE] People or Machines? An Open Panel Discussion on Building a Balanced IT Team

  Presented by INTERFACE Advisory Council

You may be a small IT shop with limited resources. Using AI applications could help you tremendously but can have drawbacks. What is the correct balance of human workforce and AI supplementation? Every situation is unique and what works for one company, may not work for others. For larger IT shops, the challenges of retaining your top talent and training your staff properly create their own set of challenges. At the end of the day, how you manage your assets to get the job done remains a key responsibility of all IT leaders.

Join the INTERFACE Advisory Council for an open discussion about retaining your workforce, training the next generation of IT leaders, and using AI when appropriate. The difficulty you have in keeping your business operational while secure will never get easier. IT professionals need all the help they can get. Join this panel discussion to hear from your peers about how you can accomplish this tough task.

Moderator: Tony North, Sr Manager, IT Services, King County, Washington

Panelists:

  • Tad Doviak, Master of Cybersecurity and Leadership
  • Sreedhar Pamidiparthi, Director, Technical Architecture, Archway Software
  • Michael Secright, Chief Information Officer, HFS University of Washington
  • Harald Upegui, Director, Information Security, HealthPoint
Topics: Artificial Intelligence
Megan ClarkeMegan ClarkeChief Information Officer, King County WA
3:00 - 3:50 PM

[1 CPE] CIO: Chief Insanity Officer – Thriving in the Role Without Losing Your Mind

  Presented by Megan Clarke • Chief Information Officer, King County WA

Over the past few decades, technological advances have progressed at a level we couldn’t have predicted. Cloud storage, Internet of Things, Bring Your Own Device, remote working, and now Artificial Intelligence have altered the landscape of what it means to be a Chief Information Officer. The resiliency needed to succeed as a CIO can compromise your time rapidly. We are all attempting to balance work and life, this is no different for IT leaders of all types.

Given the demands of cybersecurity and high productivity, today’s CIO must exhibit strong leadership, good decision-making, and a keen financial awareness. Building an IT staff can help you achieve all these objectives, provided you have the right mix of skills, experience, ambition, and diversity. Join Megan Clarke, CIO for King County, Washington, for a discussion about today’s modern-day CIO. Success looks different today, and the definition will only continue to evolve. Megan will share tips about using mental strength and determination as key tools to meet expectations.

Megan K. Clarke, Chief Information Officer (CIO) for King County WA, is a highly experienced, successful, and well-regarded business leader and CIO. She comes to King County from the City of Burbank, where she served as the Assistant Chief Information Officer. Megan brings 19 years of experience in the CIO field and has also previously been in the role of CIO with Stanford University, University of Southern California, The Academy of Motion Picture Arts and Sciences (The Oscars), and The National Academy of Recording Arts & Sciences (The GRAMMYs).

Topics: Culture
  • Sessions
9:00 - 9:50 AM

[1 CPE] Securing Work Where It Happens with Prisma Access Browser

  Presented by Yossi Rosenboim, Manager, Solution Engineering • Palo Alto Networks & Structured

As work increasingly moves to the cloud, traditional network perimeters dissolve, and the browser becomes the new frontline for productivity and risk. This presentation explores how Prisma Access Browser is redefining security by shifting focus from network-based controls to the user’s primary workspace: the Browser. We’ll dive into how this solution uniquely protects users and data at the browser level. Join us to understand how a secure, zero-trust approach to browser activity can streamline compliance, enhance user experience, and fortify your security posture without compromising productivity. This session includes a live demo.

Yossi Rosenboim is a seasoned cybersecurity professional with over 20 years of experience. As a leader of the PNW solution consulting team at Palo Alto Networks, he specializes in guiding organizations through the evolving landscape of cyber security.

Topics: Information Security
10:00 - 10:50 AM

[1 CPE] Fortifying the Digital Landscape: Integrating Regulation with Cybersecurity and GRC

  Presented by Rob Wayt, Director, Governance, Risk & Compliance • Structured

In today’s digital landscape, organizations face an increasing challenge to safeguard their information assets amidst evolving cybersecurity threats, regulatory demands, and operational complexities. This presentation explores the critical interplay between cybersecurity, compliance, risk management, and governance in the protection of sensitive data and information assets. Attendees will gain insights into best practices for creating a resilient cybersecurity program that aligns with regulatory requirements and organizational goals, supporting robust governance structures. Key topics include strategies for assessing and utilizing AI, implementing compliance controls, fostering a culture of security, and leveraging governance to ensure accountability and continuous improvement. This session provides a comprehensive approach for leaders and professionals aiming to secure information assets and enhance resilience in the face of emerging cyber threats.

Topics: Information Security
11:00 - 11:50 AM

[1 CPE] Proactive Threat Mitigation Through East/West Traffic Isolation

  Presented by Rich Horsely, Channel Sales Engineer • HPE Aruba Networking & Structured

Ransomware and targeted cyber security threats are on the rise. A proactive prevention strategy should use both tried and proven methodologies as well as new and emerging technologies. East West traffic identification and isolation is key in preventing malicious content from spreading, both in the Data Center and at the Campus Edge of the network. We will focus on innovative approaches to address the security compliance, performance, agility, and scalability demands of today’s highly distributed, hybrid, network environments.

Topics: Information Security
1:00 - 1:50 PM

[1 CPE] Harnessing AI for Better Network Experiences

  Presented by Spencer Rolfs, Product Marketing Manager, Wireless • Juniper Networks & Structured

What if your network could anticipate and solve problems before they affect your users? We believe that fast connectivity alone isn't enough – it's the quality of the connection that truly matters. Solutions that leverage AI for IT operations (AIOps) will raise the standards of industry norms with an experience-first approach. By seamlessly managing operations across the full stack, you can ensure not just connectivity, but an exceptional network experience. Join us to discover how an AI-native network can significantly reduce networking trouble tickets by up to 90%, lower OpEx by up to 85%, and improve incident resolution times by up to 50%.

Join us as we explore the future of networking by transforming complex challenges into streamlined operations, making networks more responsive, efficient, and user-centric than ever before.

Topics: Artificial Intelligence
2:00 - 2:50 PM

[1 CPE] Hyper-V 2025 and Azure Local: A Powerful Partnership

  Presented by Robert Quimbey, Sr Solutions Architect • Pure Storage & Structured

Microsoft Server 2025 and Hyper-V increases scalability, introduces new features like GPU partitioning, enables VM live migration of VMs running GPU workloads on those partitions, hot patching, SMB over QUIC, and more! Learn about Microsoft Integrations that work on-premises and in the cloud! Azure Stack has been rebranded Azure Local. Learn about Pure's work to integrate and see live demos!

Topics: Data Center Technology, Data Storage
  • Sessions
9:00 - 9:50 AM

[1 CPE] Optimizing for Agility: Network and Security Convergence

  Presented by Steve Riley, Field Chief Technology Officer • Netskope

Integrating a complex ecosystem across all security areas can optimize defenses without simplifying adversaries’ challenges. This approach balances robust security with efficiency, crucial for navigating generative AI and tech advancements. Achieving this requires strategic selection and consolidation of platforms to enhance agility, reduce risk, and maintain cost-effectiveness. In this session, you’ll learn:

  • The composition of an effective security architecture
  • Value you can derive from a converged networking and security platform
  • Common consolidation mistakes people make and how to avoid them
Topics: Infrastructure
10:00 - 10:50 AM

[1 CPE] Unleashing the Power of XDR: Elevating Security for Everyone!

  Presented by Aaron Biancrosso, Regional Account Director, and Jeff Baine, Solutions Architect • Barracuda & BlackPoint

Cyberattacks can reach your organization from any device and attack surface. With limited cybersecurity resources, how do you keep up with the ever-increasing volume of sophisticated, AI-powered attacks? Join this session to learn more about:

  • Transforming Security with XDR Solutions
  • Enhancing Protection within your environment
  • Simplifying the SOC Maturity Model
  • Improved visibility
  • Automated incident response
  • Integration with existing security tools
Topics: Information Security
11:00 - 11:50 AM

[1 CPE] Zero Trust Made Simple: Transforming Security Without Complexity

  Presented by Tony Steffe, Sr Systems Engineer, CISSP • Illumio

Regardless of the sophistication of the ransomware, the end goal is always the same: get in through a vulnerability and move laterally through your network. Join this presentation as we help peel back the layers to provide you with simple steps to get started that include:

  • Gaining visibility to where you are the most vulnerable
  • Closing risky ports
  • Leveraging tools you already have in place without adding layers of complexity

Tony is a knowledgeable technical professional with 20+ years of experience developing, selling, and integrating technology for enterprise customers. He is effective in sales engineering, Internet security, project management, computer networking, and interpersonal relations. Exceptional at managing the personal and technical challenges that arise from building something new, Tony has successfully built out several high-impact IT projects.

Topics: Information Security
12:00 - 12:50 PM

[1 CPE] From Silos to Synergy: The Power of Cybersecurity Platformization

  Presented by Jonathan Becker, Security Engineer • Check Point

Attendees will gain insights into the power of platformized cybersecurity, discovering how it can transform security operations into a more agile, integrated, and proactive defense mechanism.

In today’s rapidly evolving digital landscape, organizations are confronted with a growing and diverse array of cybersecurity threats. This presentation explores the transformative shift toward platform-based cybersecurity solutions, emphasizing how platformization can enhance security posture across the enterprise.

We will begin with a brief history of platformization, tracing its evolution from isolated security tools to integrated, cohesive frameworks. We'll delve into how platformization unites disparate security tools, systems, and processes, creating a unified approach that improves threat detection, response, and mitigation. By breaking down traditional silos and fostering seamless communication across security layers, platformization enables organizations to respond more swiftly and effectively to emerging threats, reduce operational complexity, and bolster overall resilience.

Topics: Information Security, Strategic Management
1:00 - 1:50 PM

[1 CPE] The Current Threat Landscape Requires a Unique Approach

  Presented by Liran Chen, Vice President, Sales Engineering & Technical Services • Forescout

Specialized threats targeting OT environments have been around since at least 2010, with the reports of Stuxnet. Recognizing the criticality of these devices, Threat Actors have continued evolving, continuing to target OT devices, many of which are inherently insecure-by-design. Research, such as Vedere Labs’ OT:ICEFALL research project and Project Basecamp by Digital Bond from 10 years ago showed how significant the scope of vulnerable devices are that are pervasive in critical infrastructure systems. Today’s SOC needs to not only see those devices and the risks they pose while also ensuring accurate detection of the threats uniquely targeting those OT environments they’re deployed in. This session will explore this unique threat landscape and the capabilities required to combat the threats and automatically mitigate the risks specially targeting Operational Technology environments.

Topics: Information Security
2:00 - 2:50 PM

[1 CPE] Architecting a Data-Centric Approach to Zero Trust

  Presented by Aaron Kremer, Technical Solution Specialist • NetApp

Security has become a key pillar to protect data, data management and mobility is critical for ensuring the data is where it is needed, and with all the complexity everyone is managing, simplicity is key to helping customers accelerate their outcomes.

Topics: Information Security
  • Sessions
9:00 - 9:50 AM

[1 CPE] AI Unleashed: Navigating the AI Landscape for Responsible Adoption

  Presented by Hunter Helfgott, AI Adoption Specialist • Cerium Networks

In today’s digital era, AI is not just a buzzword but a robust toolset that, when wielded with precision, can unlock unprecedented value and competitive advantage. As we embark on this journey, we must anchor our strategies in the bedrock of security, ensuring that our AI systems not only enhance our capabilities but also safeguard our assets. This presentation explores practical steps to weave AI into our business fabric, turning challenges into a springboard for growth and innovation. Our goal is to present you with concepts and avenues to consider as you learn to navigate your adoption. Let’s embark on this journey to harness AI’s potential responsibly and effectively.

Topics: Artificial Intelligence
10:00 - 10:50 AM

[1 CPE] Don’t Build a Fire Department

  Presented by Brian Knopp, Principal Sales Engineer • Arctic Wolf

Building and maintaining an internal SOC operation is hard. We’ll discuss why it’s imperative that organizations lean on 3rd party partners to provide 24x7 monitoring across your collective attack surfaces.

Topics: Information Security
11:00 - 11:50 AM

[1 CPE] Navigating the Return: The Strategic Shift from Hyperscalers to Private Cloud

  Presented by Shirin Elkoshairi, Consultant • Wowrack

Cloud repatriation. As companies reassess their cloud strategies, moving away from hyperscalers like AWS, Azure, and GCP Cloud, private or hybrid cloud environment has become a significant trend. We'll explore why this is happening, what benefits it brings, the challenges involved, and strategies for a successful transition.

Topics: Infrastructure
12:00 - 12:50 PM

[1 CPE] The Decarbonization of the Data Center

  Presented by Ian Clatworthy, Global Director, Infrastructure Product Marketing • Hitachi Vantara

Balancing the need for substantial data infrastructure with more eco-friendly policies should be top of all organizational to-do lists. Rather than a competition between corporations, these initiatives should be focused on the larger benefit of a healthier world. That’s why creating a specific data center decarbonization strategy will be key. This will range from improving the visibility and measurement of power usage, to actually reducing the carbon footprint of each operational layer. But where should organizations begin?

Ian comes from a customer background in Formula 1 and World Rallying. Having a deep understanding of technology and its benefits he took his skills into technology sales and marketing with Dell and HDS. Today he leads Product Marketing for data infrastructure technologies at Hitachi Vantara.

Topics: Data Center Technology, Strategic Management
1:00 - 1:50 PM

[1 CPE] Enhancing Security with Observability: Real-Time Threat Detection and Insights

  Presented by Kyle Kowalski, Lead Solutions Engineer • Dynatrace

In a world of complex dependencies, leveraging observability data can improve the security posture of any organization. From identifying false alarms to removing noise, to including critical context to vulnerability and anomaly detection, it helps to identify threats in real time.

Kyle Kowalski, Lead Solutions Engineer, will discuss how organizations can merge logs, metrics, events, and traces to create a comprehensive view of their environments. He will demonstrate the impact of AI in unifying these data points for faster, more accurate security insights.

Topics: Information Security
2:00 - 2:50 PM

[1 CPE] Streamline IT Operations in a World of Hypervisor Uncertainty

  Presented by Dave Weber, Sr Systems Engineer • Nutanix

The IT landscape is undergoing a major transformation with new hypervisor technologies and evolving pricing models. This shift presents a wealth of opportunities, yet only a select few solutions are truly enterprise-ready. These standout options deliver a complete suite of tools designed to optimize your IT operations and drive your business goals forward. Join this session to learn more about the potential for innovation and efficiency to streamline your workloads while maintaining your bottom line.

Topics: Infrastructure

Advisory Council

HOW TO BE AN ADVISOR

Advisor-approved content is the foundation upon which INTERFACE was developed. Each conference is guided by an Advisory Council of IT executives and senior managers. Advisor members represent both private and public sector organizations. The council contributes its insight into proposed educational topics and recommends local exhibitors and associations for participation.

EXPAND TO VIEW LIST

Scott Benson
Director, Cybersecurity and Infrastructure
Mud Bay

Shannon Boldt
Manager, Information Systems
Point No Point Treaty Council

Jeff Brausieck
Sr Manager, Chief Information Security Officer
Seattle City Light

Shawn Cook
Director, Technology
Prosser School District

Tim Crawford
Executive Director, Information Technology Services
Federal Way Public Schools

Alex Di Giacomo
Chief Information Security Officer
Sound Transit

Alpha Diallo
Manager, Security
Spothero

Stephen Doherty
Director, Information Services
City of Marysville, WA

Tad Doviak
Master of Cybersecurity and Leadership

John Forrister
Director, Networking & Information Security
Tgen

Sean Godfrey
Vice President, Information Technology
Chateau Retirement Communities LLC

Ren Guardiano
Sr Director, IT Services
Seattle Children’s Hospital

Brandon Hampshire
Manager, Desktop and Applications
Hillis Clark Martin & Peterson

Dean Haverstraw
Director, Information Technology
Samson Inc.

Bob Johnson
Director, Information Services
Turner Construction Group

Lawrence Kane
Sr Director, IT Procurement
Transamerica

Daniel Lungu
Director, Information Technology
Regal Logistics

Lupe Mejia
Technology Administrator
Yakima County, WA

Robb Montejano
Director, Information Technology
Era Living

Brian Moore
Director, Technology
Tacoma-Pierce County Health Dept

Ward Naf
Director, Information Technology
Whatcom Community College

Tony North
Sr Manager, IT Services
King County, WA

William Otworth
Sr Manager, Vulnerability and Risk Assessment
BECU

Ashley Riggs
Assistant Director, Information Technology
City of Auburn, WA

Lionel Roberts
Manager, Information Technology
Cedar Grove

Vinay Sayala
Chief Information Officer
Sea Mar Community Health Centers

Michael Secright
Chief Information Officer
HFS University of Washington

Skylar Shaw
Director, Information Technology
Zetec

Tony Sheehan
Director, Information Services
Seattle Convention Center

Sean Timm
Manager, Computing Infrastructure
Seattle Public Library

Harald Upegui
Director, Information Security
HealthPoint

Sponsors

HOW TO BE A SPONSOR

Participating exhibitors at INTERFACE achieve a greater return on their investment from this series of IT events than any other face-to-face medium available today. This success is achieved through a time-efficient and cost-effective presence for a pre-qualified audience. This simple formula leads to higher levels of business development opportunity at each event.

GOLD SPONSORS

BlackPoint IT

BlackPoint IT

BlackPoint IT
Established in 1977, BlackPoint IT Services is a leading provider of comprehensive IT and Telecom Managed Services, catering to small and medium-sized businesses across the United States. Our commitment to excellence extends globally, with remote services offered internationally for our clients. Our diverse service offerings encompass Carrier, IT Networking, Telecom professional services, and project management, ensuring that our clients receive end-to-end support for their technology needs. At BlackPoint, we are dedicated to delivering tailored solutions that harness the power of current technologies, empowering our clients to achieve their business objectives both today and in the future. With a strong focus on innovation and customer satisfaction, we take pride in our ability to offer a wide range of services while maintaining a high level of expertise. Our team's collaborative approach and unwavering dedication to excellence make BlackPoint the ideal partner for businesses seeking cutting-edge IT and Telecom solutions.
Visit Website
Forescout

Forescout

Forescout
The only automated cybersecurity company that continuously identifies, protects and ensures the compliance of all managed and unmanaged connected assets – IT, IoT, IoMT and OT – so you can more effectively manage cyber risk and mitigate threats.
Visit Website
Hitachi Vantara

Hitachi Vantara

Hitachi Vantara
Hitachi Vantara helps enterprises create and derive value from their data. Its solutions include best-in-class data management, IT infrastructure and analytics products, IoT solutions and Smart Spaces technologies for a broad range of industries.
Visit Website
Structured

Structured

Structured
Structured is an award-winning solution provider delivering secure, cloud-connected digital infrastructure. For 30 years, we’ve helped clients through all phases of digital transformation by securely bridging people, business and technology.
Visit Website

SILVER SPONSORS

Arctic Wolf

Arctic Wolf

Arctic Wolf
Arctic Wolf® is the market leader in security operations, and provides security operations as a concierge service. Our security experts work as an extension of your team to monitor and detect threats, and continually strengthen your security posture.
Visit Website
Cerium Networks

Cerium Networks

Cerium Networks
Cerium is a recognized innovator and leading provider of a full suite of collaboration, contact center, networking, data center, and security solutions. We help medium to large businesses in the Northwest plan for and then realize the positive impact of technology on their business operations, strategies, and user experiences.
Visit Website
Check Point Software

Check Point Software

Check Point Software
Check Point is a leading provider of cyber security solutions to governments and corporate enterprises globally. Its solutions protect customers from 5th generation cyber-attacks with an industry leading catch rate of malware, ransomware and other types of attacks.
Visit Website
Dynatrace

Dynatrace

Dynatrace
Innovate faster, operate more efficiently, and drive better business outcomes with observability, AI, automation, and application security in one platform.
Visit Website
Illumio

Illumio

Illumio
Illumio, the Zero Trust Segmentation company, stops breaches and ransomware from spreading across the hybrid attack surface. The Illumio ZTS Platform visualizes how workloads and devices are communicating, creates granular segmentation policies which only allow necessary communication, and automatically isolates ransomware and breaches. Assume breach. Minimize impact. Increase resilience.
Visit Website
iT1 Source

iT1 Source

iT1 Source
Since 2003, iT1 Source has provided a wide range of IT solutions –– from big data and communications to online support and virtualization.
Visit Website
NetApp

NetApp

NetApp
NetApp – Our team is data driven. You have a vision for digital transformation. We help you make it all possible.
Visit Website
Netskope

Netskope

Netskope
Netskope, a global SASE leader, helps organizations apply zero trust principles and AI/ML innovations to protect data and defend against cyber threats. The Netskope platform provides optimized access and real-time security for people, devices, and data anywhere they go. Learn how Netskope helps customers be ready for anything on their SASE journey, visit netskope.com.
Visit Website
Nutanix

Nutanix

Nutanix
Nutanix makes IT infrastructure invisible with an enterprise cloud platform that delivers the agility and economics of the public cloud, without sacrificing the security and control of on-premises infrastructure.
Visit Website
Wowrack

Wowrack

Wowrack
Wowrack is a global cloud service provider; offering various Hosting services including Managed Hosting Solutions, Dedicated Server Solutions, Colocation, Virtualization, Disaster Recovery, Backup services and much more!
Visit Website

BRONZE SPONSORS

APC by Schneider Electric

APC by Schneider Electric

APC by Schneider Electric
APC, a flagship brand of Schneider Electric, provides clean battery backup power, surge protection and IT physical infrastructure inside and outside the traditional IT environment. Through APC brand products and solutions, they offer certainty in a connected world. Certainty that their reliable, integrated physical infrastructure solutions are based on the fundamental premise that your data and information should —and always will be —accessible.
Visit Website
baramundi

baramundi

baramundi
baramundi Software offers efficient, secure, and cross-platform management of workstation environments. With over 20 years of UEM experience across the globe, over 4,000 customers benefit from our intuitive, single-interface platform.
Visit Website
CompuNet

CompuNet

CompuNet
CompuNet is a leading U.S. information technology partner, headquartered in Boise, Idaho. The firm specializes in consultation, design and implementation services specifically tailored to solve business problems. With a best-in-class engineering staff and approach, CompuNet focuses on building lasting relationships that prioritize client satisfaction over sales through every step of the journey.
Visit Website
Critical Start

Critical Start

Critical Start
Critical Start Managed Cyber Risk Reduction solutions ensure continuous security monitoring and mitigation, delivering robust protection against threats. With our platform’s maturity assessments, event analytics, response capabilities, and a team of expert risk mitigators, achieve the highest level of cyber risk reduction and increase confidence in attaining desired security maturity.
Visit Website
eSentire

eSentire

eSentire
eSentire’s complete, multi-signal Managed Detection and Response services provide 24/7 cutting-edge protection to prevent cybercriminals from ever disrupting your business.
Visit Website
Extreme Networks

Extreme Networks

Extreme Networks
Extreme Networks, Inc. (EXTR) delivers software-driven networking solutions that help IT departments everywhere deliver the ultimate business outcome: stronger connections with customers, partners and employees.
Visit Website
GCSIT & Dell

GCSIT & Dell

GCSIT & Dell
GCSIT is a different kind of engineering firm. We act as your personal technology optimization team to create and maintain custom-built, agile infrastructure. We help you transition to the right technology solutions to better handle complex and dynamic challenges.
Visit Website
Pondurance

Pondurance

Pondurance
Pondurance Managed Detection and Response is backed by authentic human intelligence. See how Pondurance MDR can help you manage threats.
Visit Website
Scale Computing

Scale Computing

Scale Computing
Scale Computing's highly-automated edge infrastructure, virtualization platform, & hyperconverged solutions can handle all of your IT infrastructure needs.
Visit Website

EXHIBITORS & ASSOCIATIONS

8x8, Inc.

8x8, Inc.

8x8, Inc.
8×8 is transforming the future of business communications as a leading Experience Communications as a Service (XCaaS) provider. 8×8 XCaaS brings together customer and employee experience to deliver business agility. It’s the only integrated platform for contact center, voice, video, chat, and APIs that addresses today’s dynamic, critical workplace requirements. Unlike competitors, the 8×8 Experience Communications Platform enables company-wide collaboration, unified administration, shared integrations, and cross-platform AI and analytics through the industry’s only 99.999% financially back, platform-wide service level agreement (SLA). Unlike multi-vendor environments, 8×8 XCaaS provides platform-wide reliability, lowers cost, boosts employee productivity and customer engagement, and delivers intelligence through AI-powered experiences and insights.
Visit Website
Adlumin

Adlumin

Adlumin
Adlumin's security and compliance automation platform helps organizations manage evolving threats and cybersecurity compliance requirements.
Visit Website
AFCEA Seattle

AFCEA Seattle

AFCEA Seattle
AFCEA is an international organization that provides a forum for the ethical exchange of information. AFCEA is dedicated to increasing knowledge of issues relevantto its members in information technology, communication, homeland security and more.
Visit Website
ASIS Puget Sound

ASIS Puget Sound

ASIS Puget Sound
ASIS International is the preeminent organization for security professionals. ASIS is dedicated to increasing the effectiveness and productivity of security professionals by developing educational programs that address broad security interests.
Visit Website
Barracuda

Barracuda

Barracuda
Barracuda Networks is the worldwide leader in Security, Application Delivery and Data Protection Solutions. More than 200,000 global customers trust Barracuda to safeguard their employees, data, and applications from a wide range of threats. Barracuda provides easy, comprehensive and affordable solutions for email protection, application protection, network protection and data protection. We are continually innovating to deliver tomorrow’s security technology, today.
Visit Website
City University of Seattle

City University of Seattle

City University of Seattle
City University of Seattle offers flexible online and onsite doctoral, graduate and bachelor’s degrees, designed to promote working adults. Apply today!
Visit Website
CNR Inc

CNR Inc

CNR Inc
CNR Inc in Tacoma, WA, is your full service partner for delivering the latest in communications, solutions and support services to maximize your communications investment.
Visit Website
Cohesity

Cohesity

Cohesity
Cohesity delivers a web-scale platform that simplifies data protection, consolidates file and object services, provides instant access to test/dev copies, spans from the edge to the cloud, and performs in-place searches and analytics.
Visit Website
CommScope

CommScope

CommScope
Advancing broadband enterprise and wireless networks to power progress and create lasting connections.
Visit Website
CSA Seattle

CSA Seattle

CSA Seattle
The Cloud Security Alliance (CSA) is a non-profit with a mission to promote best practices for providing security assurance within Cloud Computing, and to provide education on the uses of Cloud Computing to help secure all other forms of computing.
Visit Website
DAMA Puget Sound

DAMA Puget Sound

DAMA Puget Sound
Data Management Association - Puget Sound is a non-profit professional organization whose objective is to promote and advance the concepts of information resource management in the Pacific Northwest.
Visit Website
Delinea

Delinea

Delinea
Seamless, intelligent, centralized authorization to better secure the modern enterprise. The Delinea Platform enables you to discover all identities, assign appropriate access levels, detect irregularities, and immediately respond to identity threats in real-time.
Visit Website
Dell

Dell

Dell
Dell Technologies (NYSE:DELL) helps organizations and individuals build their digital future and transform how they work, live and play. The company provides customers with the industry’s broadest and most innovative technology and services portfolio for the data era.
Visit Website
DPE Systems

DPE Systems

DPE Systems
DPE Systems, a Microsoft Silver Partner in Seattle WA, providing complete IT solutions including: hardware, software, IT services, IT support, and consulting services.
Visit Website
Everpure

Everpure

Everpure
Create an Enterprise Data Cloud that unifies access, simplifies management, and unlocks the value of your data—only with the Everpure platform.
Visit Website
Fortinet

Fortinet

Fortinet
Fortinet helps organizations across the public and private sectors protect the systems, data, and services that keep businesses and communities running. From government agencies and schools to enterprises and service providers, leaders rely on Fortinet to secure critical infrastructure, ensure operational continuity, and defend against evolving cyber threats. Our Security Fabric platform unifies networking and security to deliver the visibility, control, and efficiency organizations need to operate confidently, whether virtual, in the cloud, or on-premises.
Visit Website
FusionTek

FusionTek

FusionTek
FusionTek is a managed service provider specializing in providing reliable IT services design for our clients demanding IT needs. In addition to managed services, we specialize insecurity and unified communication projects.
Visit Website
GuidePoint Security

GuidePoint Security

GuidePoint Security
GuidePoint Security provides trusted cybersecurity consulting expertise, solutions, and services that help organizations make better decisions and minimize risk.
Visit Website
HDI Seattle

HDI Seattle

HDI Seattle
HDI is the world’s largest IT service & technical support membership association and the industry’s premier certification and training body. Guided by an international panel of industry experts and practitioners.
Visit Website
HPE Aruba Networking

HPE Aruba Networking

HPE Aruba Networking
Deliver the performance and uninterrupted access your business demands with a Zero Trust foundation and AI-automated operations that help you innovate with the least risk.
Visit Website
HPE Juniper Networking

HPE Juniper Networking

HPE Juniper Networking
Juniper Networks is now part of HPE. Together, we're building industry-leading, secure, AI-native networks – purpose-built with and for AI. As AI and networking converge, we're driving a bold transformation across enterprises, service providers, and cloud operators.
Visit Website
InfraGard Washington

InfraGard Washington

InfraGard Washington
InfraGard is a partnership between the FBI and the private sector representing businesses, academia, state , local law enforcement agencies, and other participants dedicated to sharing information and intelligence to prevent hostile acts against the U.S.
Visit Website
inTech Consulting

inTech Consulting

inTech Consulting
At inTech we are more than an MSP. We strive to be an extension of your business, blending seamlessly with your staff. Our team of engineers/developers are always looking for ways to add value and bring the latest tech to bear on your everyday struggles.
Visit Website
ISC2 Seattle

ISC2 Seattle

ISC2 Seattle
Bringing like-minded professionals together in the Greater Puget Sound region to discuss current tactics, techniques, and procedures within cybersecurity.
Visit Website
ISSA Puget Sound

ISSA Puget Sound

ISSA Puget Sound
The Information Systems Security Association (ISSA) is a not-for profit international organization of information security professionals and practitioners.
Visit Website
McKinstry

McKinstry

McKinstry
McKinstry provides integrated technology infrastructure solutions. Using a collaborative, sustainable approach we plan, build and maintain facility systems that are optimized for the life of your building.
Visit Website
MSPAA

MSPAA

MSPAA
The MSP Association of America (MSPAA) has been established with three primary missions, each of which follows a unique trajectory aimed at providing our clients, members, and students with a collaborative and informative pathway towards building a future for technology, business, and education.
Visit Website
NETSCOUT

NETSCOUT

NETSCOUT
The complexity of our connected world is soaring at rates never before seen, creating problems nearly impossible to find. As Guardians of the Connected World, it is our collective mission to secure and assure the performance of our digital ecosystems - across any application, any cloud, any data center. Our patented Smart Data technology and continuous monitoring was engineered to penetrate the countless layers of services, applications, and hybrid cloud servers that comprise your digital architectures. Identify problems with precision and solve them with confidence.
Visit Website
Palo Alto Networks

Palo Alto Networks

Palo Alto Networks
Palo Alto Networks™ is the network security company. Its next-generation firewalls enable unprecedented visibility and granular policy control of applications and content – by user, not just IP address – at up to 10Gbps with no performance degradation.
Visit Website
Puget Sound PMI

Puget Sound PMI

Puget Sound PMI
The Puget Sound Chapter of the Project Management Institute is part of an international nonprofit professional organization dedicated to advancing project management excellence through professionalism.
Visit Website
Ruckus Networks

Ruckus Networks

Ruckus Networks
Ruckus Networks is redefining connectivity around the globe. We build secure wired and wireless access networks for organizations that place a premium on connectivity experiences for end-users as well as simplicity and lower-cost-per-connection for IT.
Visit Website
STEP CG

STEP CG

STEP CG
When you choose STEP CG, you get a trusted partner that understands your business strategy. We’re a leading managed IT, security and cloud services provider with award-winning, nationwide solutions. We support a full portfolio of networking, voice, security and professional service solutions. Our network technology solutions are powered by strategic engineers and best of breed technologies across a wide range of industries.
Visit Website
Valcom

Valcom

Valcom
Valcom, Inc. is a leader in design and manufacture of electronics, telecommunication systems, loud speaker paging, IP centric Mass Notification Systems and Visual messaging. We provide leading edge technology, hardware and software solutions to meet the specific needs of industry, higher education, healthcare facilities, military, and government applications.
Visit Website
Verkada

Verkada

Verkada
Verkada provides cloud-managed security solutions—video surveillance, access control, alarms, and more—designed to simplify physical security and deliver real-time insights for safer, smarter buildings.
Visit Website
WatchGuard

WatchGuard

WatchGuard
For 25 years, WatchGuard Technologies has pioneered easy-to-deploy and easy to manage solutions. With industry-leading network security, secure Wi-Fi, MFA, Endpoint and network intelligence products and services for more than 250,000 companies. In a world where the cybersecurity landscape is constantly evolving, and new threats emerge each day, WatchGuard makes enterprise-grade cybersecurity technology accessible for every company.
Visit Website
Women CyberGuardians

Women CyberGuardians

Women CyberGuardians
Women CyberGuardians is an organization that promotes diversity, inclusion, and accessibility in the cybersecurity field. We are a community of women and allies who share a passion for cybersecurity and a desire to learn, grow, and support each other. We welcome people of all backgrounds, skill levels, and career stages, from students and beginners to professionals and experts. We believe that women are underrepresented and face many challenges in the cybersecurity field, such as discrimination, harassment, and lack of support. We believe that by empowering women and creating an inclusive community, we can foster a more diverse and innovative cybersecurity workforce and culture.
Visit Website
WorkSafe Technologies

WorkSafe Technologies

WorkSafe Technologies
WorkSafe Technologies is a leading authority in seismic protection. WorkSafe Technologies' ISO-Base seismic isolation technology is the most effective way to protect mission-critical and expensive electronic equipment in the event of an earthquake.
Visit Website
Xiologix

Xiologix

Xiologix
Xiologix is a technology solution provider of business driven multi-vendor IT solutions to customers throughout the US and Canada. They offer a wide variety of hardware and software products from the world's leading IT companies.
Visit Website
Zorse Cyber

Zorse Cyber

Zorse Cyber
Elevate Your Email & Web Security with Bouncer. Bouncer stands as a dedicated guardian for your email and web content, offering a level of protection that goes beyond the ordinary. Every Bouncer product runs on our proprietary platform, providing you with these unmatched security features: Seamless Integration, Accessible Insights, Proprietary Analysis and Sanitization, and “Frisk” with Bouncer Serial CDR.
Visit Website
Zscaler

Zscaler

Zscaler
As a leader in Gartner’s Magic Quadrant, Zscaler enforces business policy, mitigates risk and provides twice the functionality at a fraction of the cost of current solutions, utilizing a multi-tenant, globally-deployed infrastructure.
Visit Website

Interested in becoming part of our next Seattle event?

CONTACT US FOR INFO

Seattle

Seattle Convention Center
Ballroom 6BC
705 Pike Street
Seattle, WA 98101

Directions & Parking

About Us

We produce quality, cutting-edge educational seminars, drawn from case studies and best practice examples from leaders in the field.

800-365-6402
Contact Us

Popular Searches

  • Event Registration
  • Become an Exhibitor
  • Become an Advisor
  • Sponsor an Event
  • Contact Event Coordinator
  • Submit Feedback

Seminar Topics

  • Artificial Intelligence
  • BC / DR
  • Culture
  • Data Center Technology
  • Data Management
  • Data Storage
  • Digital Experience
  • Information Security
  • Infrastructure
  • Strategic Management
  • Unified Communications

2026 Events

  • Portland • March 19th
  • Anchorage • April 22nd
  • Honolulu • May 21st
  • Phoenix • June 18th
  • Wyoming • July 9th
  • Montana • July 29th
  • Boise • August 20th
  • Salt Lake City • September 22nd
  • Spokane • October 15th
  • Omaha • November 5th
  • Seattle • December 3rd
  • Home
  • About
  • Get Involved
  • Events
  • Register
  • © 2026 F2F Events, Inc.