F2F Events, Inc.
  • Home
  • About
    • About
    • CPE Credits
    • Session Topics
    • Privacy Policy
      • Scam Warning
    • Code of Conduct
    • Media Kit
  • Get Involved
    • Advisory Council
    • Association Partners
    • Exhibitors
    • Speakers
  • Events
    • Locations
    • Upcoming Events
  • Contact
  • Register

Cutting-edge conferences for over 20 years

Educational Events with Your Local IT Community

View Upcoming Events Register

INTERFACE Honolulu 2024 / See You Next Year

IT Infrastructure is constantly changing, bringing more new challenges with it every day. From ransomware and the latest security threats to emerging developments in AI and the need for increased bandwidth and storage, it’s nearly impossible to keep up to date. Our conference is designed to help. We’ve assembled a combination of Best-in-Breed hardware and software solutions, along with local experts and organizations to help educate, advise and connect you to resources that can help you meet your goals.

Covering Information Security, Infrastructure, Cloud, Disaster Recovery, Communications, and more, you’ll find presentations, panel discussions, and exhibitors covering a variety of topics, as well as the latest innovations and best practices.

CPE SURVEY
SUBSCRIBE TO Honolulu EVENTS

AT A GLANCE

May 22nd, 2024
8:30am – 4:30pm

Sheraton Waikiki
Kauai/Maui Ballroom
2255 Kalākaua Avenue
Honolulu, HI 96815

Directions & Parking

KEYNOTE: [1 CPE] Meaningful Compliance: More than Just Checking Off Boxes

  Presented by Mark Fitzgerald • Chief Compliance Officer, Brigham Young University Hawaii

Seminar Schedule

VIEW FLOORPLAN
DOWNLOAD SCHEDULE
  • Theater One
  • Theater Two
  • Sessions
  • Keynote
9:00 - 9:50 AM

[1 CPE] Intelligent SSE: Secure Everything from Anywhere

  Presented by Matt Senechal, Regional Sales Manager • Netskope

This session will provide a technical overview of Security Service Edge (SSE), focused on the following topics:

  • Unintentional or unapproved data movement
  • Data protection for internal and external threats
  • Conditional and contextual access to safely enable cloud & SaaS applications
  • Protection from cloud-enabled SaaS and web threats
  • Work from anywhere with a secure, fast experience

You will walk away understanding the fundamentals of SSE and how it will benefit your business.

Topics: Data Management, Information Security, Infrastructure
10:00 - 10:50 AM

[1 CPE] Modern Data Storage Strategies for AI and Data Protection

  Presented by Jason Proctor, Field CTO, Cyber Recovery & Compliance, and Andy Scherzinger, Advisory Systems Engineer • Dell

In today's digital landscape, protecting unstructured data is paramount, especially with the increasing threat of ransomware attacks. Implementing robust defenses involves a multi-layered approach, including encryption, access controls, regular backups, and comprehensive monitoring systems. Furthermore, understanding how storage solutions operate is crucial, particularly for modern regenerative AI workloads. By leveraging innovative storage technologies such as distributed file systems and object storage, organizations can efficiently manage vast amounts of data while ensuring its integrity and accessibility for AI-driven applications. This holistic approach not only safeguards against potential threats but also enables seamless data management and utilization in the era of advanced analytics and artificial intelligence.

Topics: Artificial Intelligence, Data Storage
11:00 - 11:50 AM

[1 CPE] How to Build a High Confidence Cyber Recovery Plan

  Presented by Bharath Nagaraj, Sr Technical Field Director  • Cohesity

In an era where data is both a prime asset and a target, the global cybercrime cost is expected to soar to $10.5 trillion USD by 2025, with ransomware attacks becoming more frequent. Despite this, 80% of organizations doubt their cyber resilience strategies. The importance of being prepared for "black swan" cyber events, which exploit new vulnerabilities and can cause overwhelming damage, is highlighted. Cohesity emphasizes the role of Generative AI in bolstering a company's security by automating threat detection, ensuring compliance, and promoting collaboration across departments. This approach not only mitigates risks but also aligns with strategic IT resilience planning. In an upcoming discussion led by Cohesity's Senior Technical Field Director, Bharath Nagaraj, insights into overcoming large organizational challenges, effective response strategies, stakeholder roles, and steps for integrating cyber resilience into IT strategies will be explored, aiming to instill confidence in recovery without succumbing to ransoms.

Topics: Artificial Intelligence, Business Continuity / Disaster Recovery, Information Security
12:00 - 12:50 PM

[1 CPE] Avoiding the Silver Bullet Fallacy Within Insider Threat Detection

  Presented by Damien Weiss, National Security Defense Strategist  • Splunk & Cisco

Damien Weiss is an insider threat specialist at Splunk, where he has been for the past seven years. He works to find ways for analysts to use a constellation of software tools to help find insiders faster. Over the past year, he has focused on using ML and LLMs to help identify those who are looking to harm others or themselves.

Topics: Information Security
1:00 - 1:50 PM

[1 CPE] Panel: Help is Here to Govern AI in Your Workplace!

  Presented by INTERFACE Advisory Council

Is generative AI a true hope, or is it all hype? Are you struggling to keep your end users protected from using AI tools that could cause security concerns? Is your data being protected from entering the AI space? These are just a few of the questions occupying the IT workforce today. While it may seem like a daunting task with no end in sight, there are others facing your challenges and wanting to share their experiences.

Our panel of local IT experts will share their experiences in what it takes to have a smart AI posture. We will discuss data governance, cyber security, and privacy concerns when it comes to AI in your workplace. Please bring your questions as well so you can get some guidance on the challenges you face today. Our esteemed panelists are some of the most experienced IT leaders in Hawaii and they want to share their experiences.

Panelists:

  • Rebecca Cal, Chief Data Officer, State of Hawaii
  • Randy Faatau, Vice President, Cybersecurity Architecture & Operations, First Hawaiian Bank
  • Vince Hoang, Chief Information Security Officer, State of Hawaii
  • Jodi Ito, Chief Information Security Officer, University of Hawaii
Topics: Artificial Intelligence, Information Security
2:00 - 2:50 PM

[1 CPE] Backup ≠ Cyber Recovery

  Presented by Rubrik

Legacy backups are vulnerable to attacks, can’t help you find threats, and force you to do wholesale restores that drag out recovery times. Rubrik Zero Labs found that only 5% of organizations were able to return to business continuity or normal operations within one hour of discovering a CyberAttack. A modern cyber recovery solution is critical for Security and IT teams to be cyber-resilient. Learn how you can make your data indestructible.

Topics: Information Security
Mark FitzgeraldMark FitzgeraldChief Compliance Officer, Brigham Young University Hawaii
3:00 - 3:50 PM

[1 CPE] Meaningful Compliance: More than Just Checking Off Boxes

  Presented by Mark Fitzgerald • Chief Compliance Officer, Brigham Young University Hawaii

A key to creating a culture of compliance is to make it meaningful for all who are involved. Too often compliance is seen as a restriction rather than a series of best practices that can keep all of us safe and enhance user experiences. By adopting practices learned from your help desk –– knowledge management, continual improvement, setting expectations, and practice communications –– you can transform compliance into a tool to help users trust in what IT is delivering to them.

Mark Fitzgerald is BYU Hawaii’s Chief Compliance Officer in the Office of Compliance & Ethics and oversees the Purchasing Department. In this position, Fitzgerald manages programs and activities for establishing standards and implementing procedures to help leaders and managers ensure the university’s compliance with applicable laws and regulations.

Fitzgerald has worked in higher education information technology for over 25 years. Most recently, he worked as the Chief Information Security Officer at Boise State University where he had responsibility for IT compliance. He has also held positions as Executive Director for the Office of Information Technology and Director of Customer Care and Academic Technologies. He taught in the Master of Business Administration program at Boise State University. He also spent some of the early years of his career at BYU in Provo, Utah.

Fitzgerald has a Master of Business Administration in Information Technology from Boise State University and a Bachelor of Arts in Marketing Communications from Brigham Young University in Provo. He has several certifications and associations, including being a Lean Six Sigma Yellow Belt. He also had the privilege of teaching in the Boise State University MBA and Master of Cybersecurity programs.

Topics: Culture, Data Management, Strategic Management
  • Sessions
9:00 - 9:50 AM

[1 CPE] The Intersection of AI and Cybersecurity

  Presented by Robbie Elliott, Head of Engineering, West & Eric Darancette, Security Engineer • Check Point

As artificial intelligence (AI) permeates our lives, it's crucial to address the cybersecurity challenges it presents. In this dynamic landscape, AI will be utilized by both attackers and defenders. We will explore the opportunities of leveraging AI to enhance your business and defenses while acknowledging the potential risks. AI-powered attacks, opaque AI systems, and a lack of standardized security practices demand proactive measures, rigorous protocols, and transparent designs to ensure a secure AI ecosystem.

Topics: Artificial Intelligence, Information Security
10:00 - 10:50 AM

[1 CPE] One Click Away: Lateral Movement Stemming from Office 365 Compromises

  Presented by Wayne Johnson, CEO • Stellar Technologies

In the rapidly evolving digital age, the security of cloud-based platforms like Office 365 is paramount for businesses worldwide. "One Click Away: Lateral Breaches Stemming from Office 365 Compromises" delves into the hacker's mindset, unveiling how the hack occurs (LIVE DEMONSTRATION) and how a seemingly minor compromise can trigger a cascade of security breaches with profound implications for businesses. This presentation will explore the multifaceted threat landscape of Office 365, Active Directory, SAML, and SSLVPN, illuminating the pathways through which a simple breach can spread across an organization's digital ecosystem. Attendees will gain insight into the initial indicators of compromise, empowering them with the knowledge to detect early signs of infiltration. By emphasizing preventative measures and best practices, the session aims to equip participants with robust strategies to safeguard businesses from everyday threats. Furthermore, it will outline effective incident response and mitigation strategies, providing a blueprint for responding to breaches with precision and agility. The presentation will also underscore the far-reaching consequences of breaches, from operational disruptions to severe financial and reputational damage, highlighting the critical need for a proactive and informed approach to cybersecurity in the era of cloud computing.

Topics: Information Security
11:00 - 11:50 AM

[1 CPE] AI-Driven Networking

  Presented by Will Bonilla, Enterprise Strategic Accounts • Juniper Networks

Every connection counts. Nearly every vital experience in modern-day life requires a strong network connection. At Juniper, we believe that connectivity is not the same as experiencing a great connection. When you shift from simply measuring connectivity to focusing on the experience of the end-to-end connection – everything changes. Join us to learn how Juniper is revolutionizing networking with an experience-first approach driven by the industry’s only AI-Native Platform.

Topics: Artificial Intelligence
12:00 - 12:50 PM

[1 CPE] Adventures in CIS: Settings Standards for Windows Workstations and Servers

  Presented by INTERFACE Advisory Council

The Bank of Hawaii has recently completed a project implementing a set of benchmarks defined by the Center for Internet Security (CIS). The intent of this project was to standardize and document security settings on all Windows Workstations and Servers across the organization. The scope of this project was enormous, but the benefits of having completed the implementation are great. Preston and Mike will be discussing the trials and tribulations they encountered along the two-and-a-half-year implementation. In addition, they will offer suggestions for organizations wishing to harden their own security profile through the implementation of CIS benchmarks.

Speakers:

  • Mike Lotter, Systems Automation and Security Engineer, Bank of Hawaii
  • Preston Robler, Manager, Infrastructure Application Services, Bank of Hawaii

Preston Robler was born and raised in Colorado. He obtained a degree in Computer Science from the University of Colorado and has 12 years of experience developing applications in the Java programming language. His adventures in software development have taken him from Colorado to Massachusetts, New Zealand, Alaska, and finally Hawaii. Currently, he manages the Systems Automation and Security team at the Bank of Hawaii.

Mike Lotter has spent over 10 years in systems and network administration across two continents, with a focus on Microsoft products and security. For the last 3 years, he has worked in the Systems Automation and Security team at Bank of Hawaii, two of which were spent on the CIS implementation project.

Topics: Digital Experience, Infrastructure
1:00 - 1:50 PM

[1 CPE] Adversaries for Hire!

  Presented by Steven Massey, Regional Sales Manager • Secureworks & Dell

By exploring modern threat tactics, tooling, and anonymized cases from Healthcare, Critical Infrastructure, and Finance sectors, this talk aims to equip participants with insights into how adversaries operate, enhancing their ability to secure their organizations against breaches and cyber-attacks.

By incorporating various skillsets from active operations, Secureworks has amassed a wealth of offensive knowledge and tradecraft that allows our operators to perform complex offensive security engagements and provide remediation advice and controls to businesses of all types and technologies.

Topics: Information Security
2:00 - 2:50 PM

[1 CPE] Exploring AI for the Modern Organization

  Presented by Shovit Bhari, Brand Technical Specialist • IBM & Converge

As AI reshapes the business landscape, understanding and integrating generative AI is crucial for staying competitive. This presentation will cover the fundamentals of generative AI, including its capabilities in natural language processing and machine learning. We'll explore strategic approaches to incorporate AI into business models, highlighting both opportunities and challenges.

We'll delve into the latest advancements in generative AI, demonstrating their impact through real-world examples. The session will conclude with practical advice on preparing your business for AI adoption, focusing on workforce upskilling, IT infrastructure updates, and ethical considerations.

Join us to learn how to leverage AI effectively to transform and future-proof your enterprise.

Topics: Artificial Intelligence

Advisory Council

HOW TO BE AN ADVISOR

Advisor-approved content is the foundation upon which INTERFACE was developed. Each conference is guided by an Advisory Council of IT executives and senior managers. Advisor members represent both private and public sector organizations. The council contributes its insight into proposed educational topics and recommends local exhibitors and associations for participation.

EXPAND TO VIEW LIST

Michael Agtunong
Manager, Information Technology
Gather Federal Credit Union

Slyvester Apiki
Director, Information Systems,Technology
Molokai Ohana Health Care

Tim Babcock
Chief Information Officer
Cutter Auto

David Chang
Program Manager
TeamPraxis

Nate Chang
Director, Client Services
Punahou School

Eric Daley
Director, Information Technology
HEMIC

Curt Dodds
Manager, Information Technology
UH Institute for Astronomy

Cody Down
Chief Information Officer and Vice President
Hawaii Pacific University

Randy Faatau
VP, Cybersecurity Architecture & Operations
First Hawaiian Bank

Jeff Ferrer
Manager, Information Technology
HI Dept of Human Services

Ryan Field
Executive VP IT, CISO
Bank of Hawaii

Chris Hart
Project Manager, IT Security
Hawaii Pacific Health

Vince Hoang
Chief Information Security Officer
State of Hawaii

Jodi Ito
Chief Information Security Officer
University of Hawaiʻi

Kyle Izumigawa
Director, IT Operations
Hawaiian Telcom

Andrea Jans
Director, Information Technology
American Electric

Vance Jones
Chief Technology Officer
Bank of Hawaii

Nancy Levenson
Chief Information Officer
Kaho’iwai

Sean McCully
Controller & CIO
Office Pavilion Hawaii

Scott Mellon
Manager, IT End User Services & Support
The Queen’s Health Systems

Geoff Milford
Cybersecurity Engineer
Hawaii Pacific Health

Tim Minick
AVP, Director, Cybersecurity Risk Management
Pacific Guardian Life

Grant Nakamichi
Manager, IT Infrastructure
Aloha Pacific Federal Credit Union

Glenn Requierme
Chief Information Officer
REHAB Hospital of the Pacific

Chris Robinson
VP, Cybersecurity Director
Finance Factors Ltd

Crystal Salavea
Director, Information Technology Operations
Outrigger Enterprises

Dave Stevens
Professor, Information Security Program
Kapi’olani Community College

Tony Velasco
IT Division Chief
City & County of Honolulu

Charissa Wong
Manager, Information Technology
Bowers + Kubota Consulting

Alan Yamashiro
Information Security Project Manager
Hawaii Pacific Health

Sponsors

HOW TO BE A SPONSOR

Participating exhibitors at INTERFACE achieve a greater return on their investment from this series of IT events than any other face-to-face medium available today. This success is achieved through a time-efficient and cost-effective presence for a pre-qualified audience. This simple formula leads to higher levels of business development opportunity at each event.

GOLD SPONSORS

Dell

Dell

Dell
Dell Technologies (NYSE:DELL) helps organizations and individuals build their digital future and transform how they work, live and play. The company provides customers with the industry’s broadest and most innovative technology and services portfolio for the data era.
Visit Website

SILVER SPONSORS

Check Point Software

Check Point Software

Check Point Software
Check Point is a leading provider of cyber security solutions to governments and corporate enterprises globally. Its solutions protect customers from 5th generation cyber-attacks with an industry leading catch rate of malware, ransomware and other types of attacks.
Visit Website
Cohesity

Cohesity

Cohesity
Cohesity delivers a web-scale platform that simplifies data protection, consolidates file and object services, provides instant access to test/dev copies, spans from the edge to the cloud, and performs in-place searches and analytics.
Visit Website
Converge Technology Solutions

Converge Technology Solutions

Converge Technology Solutions
Converge Technology Solutions Corp. is a North American software-enabled, Hybrid IT Solution Provider focused on delivering industry leading solutions and services. Converge’s regional sales and services organizations deliver advanced analytics, cloud, cybersecurity, and managed services offerings to clients across various industries.
Visit Website
HPE Juniper Networking

HPE Juniper Networking

HPE Juniper Networking
Juniper Networks is now part of HPE. Together, we're building industry-leading, secure, AI-native networks – purpose-built with and for AI. As AI and networking converge, we're driving a bold transformation across enterprises, service providers, and cloud operators.
Visit Website
Netskope

Netskope

Netskope
Netskope, a global SASE leader, helps organizations apply zero trust principles and AI/ML innovations to protect data and defend against cyber threats. The Netskope platform provides optimized access and real-time security for people, devices, and data anywhere they go. Learn how Netskope helps customers be ready for anything on their SASE journey, visit netskope.com.
Visit Website
Rubrik

Rubrik

Rubrik
Rubrik delivers instant application availability for recovery, search, cloud, and development. Hybrid Cloud enterprises benefit from Rubrik’s market-leading Cloud Data Management platform with simplicity, instant data access, app-mobility, policy-driven automation, Ransomware protection, and analytics at scale.
Visit Website
Splunk

Splunk

Splunk
Splunk is the key to enterprise resilience. Our platform enables organizations around the world to prevent major issues, absorb shocks and accelerate digital transformation.
Visit Website
Stellar

Stellar

Stellar
Our mission is to make migrating to the cloud easier for enterprises than ever before. The cloud isn't just for people with massive development teams that can re-architect enterprise apps to make moving to a big-name public cloud cost-effective. At Stellar, we want to bring the power of cloud computing to everyone and help our customers worry less about IT infrastructure.
Visit Website

BRONZE SPONSORS

baramundi

baramundi

baramundi
baramundi Software offers efficient, secure, and cross-platform management of workstation environments. With over 20 years of UEM experience across the globe, over 4,000 customers benefit from our intuitive, single-interface platform.
Visit Website
Carahsoft

Carahsoft

Carahsoft
Carahsoft is the trusted Government IT solutions provider and a top GSA Schedule holder, supporting a partner ecosystem of manufacturers, resellers, integrators, and consulting partners committed to serving the public sector.
Visit Website
Cyberuptive

Cyberuptive

Cyberuptive
Cyberuptive is a full-service international cybersecurity consulting firm based in Hawaii. With analysts positioned nationwide, they offer around the clock services that include CMMC compliance, managed SOC services, and cybersecurity program development.
Visit Website
HPE

HPE

HPE
At Hewlett Packard Enterprise, we aim to be the industry’s leading provider of hybrid IT, built on the secure, next-generation, software-defined infrastructure that will run customers’ data centers today, bridge them to multi-cloud environments tomorrow, and power the emerging intelligent edge that will run campus, branch and Industrial IoT applications for decades to come. All delivered through a world class services capability.
Visit Website
Optiv

Optiv

Optiv
Optiv is the cyber advisory and solutions leader, delivering strategic and technical expertise to nearly 6,000 companies across every major industry. We partner with organizations to advise, deploy and operate complete cybersecurity programs from strategy and managed security services to risk, integration and technology solutions. With clients at the center of our unmatched ecosystem of people, products, partners and programs, we accelerate business progress like no other company can. At Optiv, we manage cyber risk so you can secure your full potential.
Visit Website
Scale Computing

Scale Computing

Scale Computing
Scale Computing's highly-automated edge infrastructure, virtualization platform, & hyperconverged solutions can handle all of your IT infrastructure needs.
Visit Website
Spectrum Business

Spectrum Business

Spectrum Business
Spectrum Business® delivers a complete portfolio of secure connectivity solutions for small and mid-market businesses and caters to the unique needs of large businesses, communications service providers and government entities. Our industry-leading experts align our products to the needs of each customer, drawing from our full suite of services including internet solutions over hybrid fiber-coax and 100% fiber, video and voice solutions including phone and mobile, as well as unified communications and managed services tailored for our mid-market and large enterprise customers.
Visit Website
Trellix

Trellix

Trellix
Trellix brings you a living XDR architecture that adapts at the speed of threat actors and delivers advanced cyber threat intelligence. We're changing what security means and what it can do, giving everyone in your organization the confidence that comes with being more secure, every day.
Visit Website
Verkada

Verkada

Verkada
Verkada provides cloud-managed security solutions—video surveillance, access control, alarms, and more—designed to simplify physical security and deliver real-time insights for safer, smarter buildings.
Visit Website

EXHIBITORS & ASSOCIATIONS

Arista Networks

Arista Networks

Arista Networks
Arista Networks is an industry leader in data-driven, client-to-cloud networking for large data center, campus, and routing environments. Arista’s award-winning platforms deliver availability, agility, automation, analytics, and security through an advanced network operating stack.
Visit Website
ARMA Hawaii

ARMA Hawaii

ARMA Hawaii
ARMA International provides education and networking opportunities to information professionals to enable them to use skills and experience to leverage the value of records and knowledge as corporate assets and as contributors to organizational success.
Visit Website
ASIS Hawaii

ASIS Hawaii

ASIS Hawaii
ASIS International is the preeminent organization for security professionals. Founded in 1955, ASIS is dedicated to increasing the effectiveness and productivity of security professionals.
Visit Website
Cisco

Cisco

Cisco
Cisco is the worldwide leader in IT that helps companies seize the opportunities of tomorrow by proving that amazing things can happen when you connect the previously unconnected. Cisco delivers intelligent cybersecurity for the real world.
Visit Website
CyberHawaii

CyberHawaii

CyberHawaii
CyberHawaii is an information sharing and analysis non-profit organization committed to developing and enhancing Hawaii’s cybersecurity capabilities. The organization is working to build a community that manages and mitigates cyber risk through various methods.
Visit Website
Cynerio

Cynerio

Cynerio
Cynerio’s Healthcare Cybersecurity Platform is tailored to safeguard medical environments against constantly evolving threats. From real-time detection of malicious network activity to strategic microsegmentation guidance, Cynerio delivers a robust suite of proactive and reactive protections that elevate the security of healthcare facilities and ensure the safety of the patients they serve.
Visit Website
DRFortress

DRFortress

DRFortress
DRFortress is the largest and the only carrier-neutral data center and cloud marketplace operating in Hawaii. Experience the operational reliability, scalability, and security that DRFortress provides for all your mission-critical IT systems.
Visit Website
Good Jobs Hawaii

Good Jobs Hawaii

Good Jobs Hawaii
Good Jobs Hawai'i offers free skills training in Hawai'i’s high-demand sectors including: Healthcare, Technology, Clean energy/Skilled trades, and Creative industries that can lead to a pathway for a better-paying job and accelerate one’s career.
Visit Website
HI Tech Hui

HI Tech Hui

HI Tech Hui
Our team provides Professional IT Support, Managed Services, and Outsourced IT Services, all with an emphasis on keeping your systems secure.
Visit Website
IBM

IBM

IBM
For more than a century, IBM has been a global technology innovator, leading advances in AI, automation and hybrid cloud solutions that help businesses grow.
Visit Website
InfraGard Hawaii

InfraGard Hawaii

InfraGard Hawaii
InfraGard is a partnership between the FBI and the private sector. It is an association dedicated to sharing information and intelligence to prevent hostile acts against the U.S.
Visit Website
ISACA Hawaii

ISACA Hawaii

ISACA Hawaii
Aloha and welcome to the ISACA Hawaii Chapter. The aim of the Chapter is to sponsor educational seminars, workshops, conduct chapter meetings, and help promote and elevate the visibility of the IS audit, control and security profession throughout the area.
Visit Website
ISC2 Hawaii

ISC2 Hawaii

ISC2 Hawaii
The International Information Systems Security Certification Consortium, Inc., (ISC)², is the global, not-for-profit leader in educating and certifying information security professionals throughout their careers.
Visit Website
ISSA Hawaii

ISSA Hawaii

ISSA Hawaii
Welcome to ISSA's Hawaii Chapter, a group of information security professionals devoted to providing educational forums, publications and peer interaction opportunities that enhance the knowledge skills and growth of its members.
Visit Website
MSPAA

MSPAA

MSPAA
The MSP Association of America (MSPAA) has been established with three primary missions, each of which follows a unique trajectory aimed at providing our clients, members, and students with a collaborative and informative pathway towards building a future for technology, business, and education.
Visit Website
PMI Hawaii

PMI Hawaii

PMI Hawaii
PMI is the world's leading not-for-profit membership association for the project management profession. PMI Honolulu's mission is to promote the project management practice and profession through networking, sharing of project experiences, training, education, and certification in the State of Hawaii.
Visit Website
Secureworks

Secureworks

Secureworks
Secureworks is a global cybersecurity leader that protects customer progress with a cloud-native security analytics platform built on 20+ years of threat intelligence, improving the ability to detect advanced threats, streamline investigations, and automate the right actions.
Visit Website
Veeam

Veeam

Veeam
Veeam is the global leader in Intelligent Data Management for the Hyper-Available Enterprise. Veeam Hyper-Availability Platform is the most complete solution to help customers on the journey to automating data management.
Visit Website
World Wide Technology

World Wide Technology

World Wide Technology
World Wide Technology (WWT) WWT, a $20B, privately held technology solutions provider leading the AI and Digital Revolution, has over 30 years of experience helping the world's largest organizations make the right technology decisions faster. Commercial enterprise, public sector and service provider clients work with WWT from strategy to execution bolstered by hands-on access to cutting-edge capabilities across infrastructure, data and AI, security, cloud and more through the Advanced Technology Center.
Visit Website
Zscaler

Zscaler

Zscaler
As a leader in Gartner’s Magic Quadrant, Zscaler enforces business policy, mitigates risk and provides twice the functionality at a fraction of the cost of current solutions, utilizing a multi-tenant, globally-deployed infrastructure.
Visit Website

Interested in becoming part of our next Honolulu event?

CONTACT US FOR INFO

Honolulu

Sheraton Waikiki
Kauai/Maui Ballroom
2255 Kalākaua Avenue
Honolulu, HI 96815

Directions & Parking

About Us

We produce quality, cutting-edge educational seminars, drawn from case studies and best practice examples from leaders in the field.

800-365-6402
Contact Us

Popular Searches

  • Event Registration
  • Become an Exhibitor
  • Become an Advisor
  • Sponsor an Event
  • Contact Event Coordinator
  • Submit Feedback

Seminar Topics

  • Artificial Intelligence
  • BC / DR
  • Culture
  • Data Center Technology
  • Data Management
  • Data Storage
  • Digital Experience
  • Information Security
  • Infrastructure
  • Strategic Management
  • Unified Communications

2026 Events

  • Portland • March 19th
  • Anchorage • April 22nd
  • Honolulu • May 21st
  • Phoenix • June 18th
  • Wyoming • July 9th
  • Montana • July 29th
  • Boise • August 20th
  • Salt Lake City • September 22nd
  • Spokane • October 15th
  • Omaha • November 5th
  • Seattle • December 3rd
  • Home
  • About
  • Get Involved
  • Events
  • Register
  • © 2026 F2F Events, Inc.