F2F Events, Inc.
  • Home
  • About
    • About
    • CPE Credits
    • Session Topics
    • Privacy Policy
      • Scam Warning
    • Code of Conduct
    • Media Kit
  • Get Involved
    • Advisory Council
    • Association Partners
    • Exhibitors
    • Speakers
  • Events
    • Locations
    • Upcoming Events
  • Contact
  • Register

Thank you to everyone who attended

INTERFACE Phoenix 2025

The Valley's Premier Technology Event will return in 2026

INTERFACE Phoenix 2025

IT Infrastructure is constantly changing, bringing more new challenges with it every day. From ransomware and the latest security threats to emerging developments in AI and the need for increased bandwidth and storage, it’s nearly impossible to keep up to date. Our conference is designed to help. We’ve assembled a combination of Best-in-Breed hardware and software solutions, along with local experts and organizations to help educate, advise and connect you to resources that can help you meet your goals.

Covering Information Security, Infrastructure, Cloud, Disaster Recovery, Communications, and more, you’ll find presentations, panel discussions, and exhibitors covering a variety of topics, as well as the latest innovations and best practices.

CPE SURVEY
SUBSCRIBE TO Phoenix EVENTS

AT A GLANCE

June 13th, 2025
8:30am – 4:30pm

Westin Kierland Resort
Grand Ballroom
6902 E. Greenway Parkway
Scottsdale, AZ 85245

Directions & Parking

KEYNOTE: [1 CPE] FBI Cybersecurity Briefing: Safeguarding Against Modern Threats

  Presented by Nick Smith • FBI Special Agent

Seminar Schedule

VIEW FLOORPLAN
DOWNLOAD SCHEDULE
  • Theater One
  • Theater Two
  • Theater Three
  • Sessions
  • Keynote
9:00 - 9:50 AM

[1 CPE] Breaking Down Silos: Unify Assets, Minimize Attack Exposure

  Presented by Lucas Zaichkowsky, Sr Sales Engineer • Axonius

In today’s rapidly evolving security landscape, organizations face the challenge of managing a wide array of tools across endpoints, identities, and networks. While each tool serves a critical purpose, they often operate in isolation, creating silos that obscure visibility and expose vulnerabilities. This session will address how the fragmentation of security systems and data increases attack surfaces and how integrating a unified cyber asset management approach can significantly reduce attack exposure.

Join us as we explore how security professionals can move beyond disconnected tools to leverage a single, comprehensive view of their assets and threat exposures. We’ll highlight practical steps and present a preview of an end-to-end solution designed to break down silos, provide full cyber asset visibility, and enable a more holistic approach to minimizing security risks.

As technology continues to evolve, managing disparate security systems will remain a pressing challenge. This session will offer actionable insights to security professionals looking to streamline their approach and safeguard their organizations from the growing complexities of cyber threats.

Topics: Information Security
10:00 - 10:50 AM

[1 CPE] Securing the Future of Cybersecurity Protection in an AI-Driven Digital Landscape

  Presented by Charles Everette, Field CISO Advisor • ESET

In today’s digital age, advancements in artificial intelligence are reshaping how businesses approach cybersecurity. AI technologies offer powerful tools for detecting, preventing, and responding to cyber threats in real time. However, they also introduce new challenges, including adversarial attacks and ethical concerns. This presentation explores the transformative role of AI in modern cybersecurity strategies. By understanding both the opportunities and risks AI presents, organizations can better protect their digital assets and adapt to the evolving threat landscape.

Topics: Artificial Intelligence
11:00 - 11:50 AM

[1 CPE] Hackers Gonna Hack: When Defenses Break Down

  Presented by Jason Graun, Director of Sales Engineering • Fortinet

Organized threat actors continue to be the most dangerous risk in Cybersecurity. The tactics used to get into endpoints are constantly evolving in sophistication and scale. In this session, we will discuss industry trends/challenges, as well as walk through the tactics, techniques, and procedures used by threat actor groups by using a known active group as an example. We will also discuss practical real-world situations and how to defend against them using a unique approach to stopping ransomware before it becomes an active breach.

Jason Graun is the Sales Engineering Director for the Fortinet Security Operations team. He brings over 20 years of experience in information security and has spent 11 years at Fortinet. He regularly speaks at industry events, CIO/CISO summits, and works closely with IT executives to understand the business challenges they face in securing assets across an ever increasingly mobile workforce. Jason’s focus is to find ways technology can solve the biggest challenges in information security, he also holds a patent on cloud security malware inspection methods.

Topics: Information Security
1:00 - 1:50 PM

[1 CPE] Active Directory: Ransomware, Risk, Review, Recovery

  Presented by Rob Ingenthron, Sr Solution Engineer • Semperis

Cyberattackers are adept at finding ways through your defenses and into identity systems like Active Directory. Many organizations use Active Directory as the primary identity service, and Active Directory is typically tied into almost everything, including Entra ID. From there, they can move laterally, escalate privileges, access sensitive resources, and inject malware or ransomware. Implementing a layered defense that includes identity threat detection and response (ITDR) is key to protecting your operational resilience.

Join Rob Ingenthron, Sr Solution Engineer, to learn:

  • How layered defense has changed over time
  • Why ITDR is now an essential part of a robust layered defense strategy
  • The continuing importance of hygiene and auditing for Active Directory
  • How a layered defense can help you combat attacks that are designed to bypass traditional methods of defense
  • Which best practices lead to a strong layered defense
Topics: Business Continuity / Disaster Recovery
2:00 - 2:50 PM

[1 CPE] Reinventing TPRM: Managing Third-Party Cyber Risk with Intelligence

  Presented by Mark Nafe, Director, Solutions Consulting • RiskRecon by Mastercard

In today’s hyperconnected enterprise, your cybersecurity risk doesn’t end at the firewall—it extends to every vendor, supplier, and partner in your digital ecosystem. Yet many organizations struggle to gain visibility into third-party risk, relying on outdated methods that can’t keep pace with modern threats.

This session explores how leading organizations are leveraging machine learning, threat intelligence, and continuous monitoring to transform their third-party risk management (TPRM) programs from reactive check-the-box exercises into proactive, intelligence-driven strategies. You’ll learn how advanced technologies are enabling security teams to identify high-risk vendors before they become the weak link—and how TPRM is evolving into a critical pillar of enterprise resilience.

Whether you’re already managing vendor risk or just starting to explore the issue, this session will provide the business case, practical frameworks, and technology insights you need to elevate your security posture.

Topics: Information Security
Nick SmithNick SmithFBI Special Agent
3:00 - 3:50 PM

[1 CPE] FBI Cybersecurity Briefing: Safeguarding Against Modern Threats

  Presented by Nick Smith • FBI Special Agent

Join FBI Special Agent Nick Smith for a discussion on the top cyber threats of today. This presentation will cover some of the basic mitigation strategies available that users can enact right now. This discussion will also provide an overview of the FBI’s role in addressing various cyber threats.

Special Agent Nick Smith is a cyber agent with the Federal Bureau of Investigation's Phoenix Division, focusing on criminal cyber matters including computer intrusions, malware, ransomware, and combating criminal infrastructures. Prior to working for the FBI, Nick served several cyber-related roles across government and within the U.S. Intelligence Community. He also served as a Police Officer in Ohio for several years and is a veteran of the U.S. Air Force.

Nick holds a BS in Homeland Security from Embry-Riddle Aeronautical University and an MS in Information Systems Engineering from the Johns Hopkins Whiting School of Engineering. He also maintains certification as a Certified Information Systems Security Professional (CISSP) and Certified Ethical Hacker (CEH).

Topics: Culture, Strategic Management
  • Sessions
9:00 - 9:50 AM

[1 CPE] Role of Network Heartbeat Services in Hybrid Multi-Cloud Transformation

  Presented by Faraz Aladin, Vice President, Technical Marketing • Infoblox

As organizations embrace hybrid multi-cloud strategies, managing core network heartbeat services—DNS, DHCP, and IP Address Management (DDI)—becomes increasingly complex. Traditional approaches to DDI often struggle with the scale, agility, and security demands of modern cloud architectures. In this session, we will explore how a cloud-first, automated, and secure DDI solution can enhance network visibility, simplify operations, and improve performance across on-premises and cloud environments.

Topics: Infrastructure
10:00 - 10:50 AM

[1 CPE] Navigating the Future of Microsoft CSP: Growth, AI, and Strategic Shifts for 2025–2026

  Presented by Alex Easterly, Sr Solutions Architect  • iT1 Source

Join us for an exclusive session exploring the latest changes to Microsoft’s Cloud Solution Provider (CSP) program and what they mean for your business. We'll dive into new expanded subscription options, and key Microsoft priorities including AI-powered productivity, enhanced security, and Azure innovation.

Topics: Artificial Intelligence, Infrastructure
11:00 - 11:50 AM

[1 CPE] Architecture Matters: What You Need to Know When Evaluating SASE & SSE Solutions

  Presented by Jason Bellmont, Platform Solutions Architect • Netskope

SASE and SSE are more than just buzzwords; they represent the future of network and security. But before you entrust all your critical traffic to these cloud solutions, a deeper dive into their underlying architecture is essential. Not all clouds are created equal, and understanding the nuances of these solutions, which are built on the global internet, is paramount for success.

This session will empower attendees with the crucial architectural questions to ask your SASE/SSE providers, ensuring you make an informed decision. We'll explore:

  • Public vs. Private Cloud: What are the implications for your data and performance?
  • Server Locations: Where are security services hosted, and why does proximity matter?
  • Network Architecture: How is the provider's network built and managed for optimal reliability and speed?
  • Capacity Management: How do they scale to meet your evolving demands and ensure consistent performance?
  • Performance Measurement: What metrics should you track, and how do providers guarantee their SLAs?
  • Incident Response: What happens when something breaks, and how quickly can services be restored?

Arm yourself with the right questions to build a secure and high-performing SASE/SSE future.

Topics: Infrastructure
12:00 - 12:50 PM

[1 CPE] Strengthening the Cyber Shield: Private-Public Partnerships at the State and Local Level

  Presented by ACTRA

This session focuses on maturing actionable strategies and collaborative frameworks designed to help IT leaders and cybersecurity professionals navigate today’s dynamic threat landscape. As adversaries increasingly target state and local systems, Arizona’s model for public-private cooperation demonstrates how trusted partnerships, timely threat intelligence sharing, and coordinated incident response can significantly enhance cyber resilience. This session will update participants on practical timely insights into how cross-sector collaboration is being operationalized to protect infrastructure, ensure business continuity, and support a unified cybersecurity posture across the state.

Speakers:

  • Frank J. Grimmelmann, President & CEO, Arizona Cyber Threat Response Alliance, Inc. (ACTRA)
  • Ryan Murray, Deputy Director, AZ Dept of Homeland Security, CISO, State of Arizona
Topics: Culture, Information Security, Strategic Management
1:00 - 1:50 PM

[1 CPE] Outsmart Cybercrime: Protection Optimized with MDR

  Presented by Raymond Neff, Solution Architect • ESET

With the rise of cyber threats and ongoing cyber talent shortage continuing unabated, many organizations are turning toward Managed Detection and Response (MDR). So how can this service enhance an organization's overall security posture and improve incident response? This presentation explores combatting new threats, like multi-extortion ransomware with MDR how to leverage AI-powered threat detection and response, and human expertise, to prevent new ransomware variants the significance of a prevention-first, holistic cybersecurity strategy.

Topics: Information Security
2:00 - 2:50 PM

[1 CPE] The Current State of Virtualization in 2025

  Presented by Dave Fetters, Field CTO • EVOTEK

In 2025, the landscape of alternative hypervisors continues to evolve as organizations seek lightweight, secure, and high-performance virtualization solutions beyond traditional players like VMware and Hyper-V. Emerging hypervisors such as KVM, Xen, and newer options like Nutanix AHV, Firecracker, Proxmox and Opoenshift are gaining traction due to their minimal overhead and suitability for modern workloads, including microservices and serverless computing. The discussion around these alternatives highlights key considerations such as open-source flexibility, integration with container ecosystems, improved security through microVM architectures, and support for edge and cloud-native deployments. As enterprises prioritize efficiency, scalability, and cost-effectiveness. Alternative hypervisors are playing a vital role in reshaping virtualization strategies in both public and private cloud environments.

Topics: Infrastructure
  • Sessions
9:00 - 9:50 AM

[1 CPE] Don’t Build a Fire Department

  Presented by Herb Williams, Sr Sales Engineer, Enterprise US • Arctic Wolf

Building and maintaining an internal SOC operation is hard. We’ll discuss why it’s imperative that organizations lean on 3rd party partners to provide 24x7 monitoring across your collective attack surfaces.

Topics: Information Security
10:00 - 10:50 AM

[1 CPE] Browse Bravely With Prisma Access Browser

  Presented by JR Silverthorne, Partner Solutions Consultant, West • Palo Alto Networks

Join us as we dive into the latest in last-mile data loss prevention and secure browsing for end users. We will showcase Prisma Access Browser's capabilities to keep your data protected on both managed and unmanaged devices while maintaining access to internal applications.

We will showcase how Prisma Access Browser can secure work on any device, boost visibility and control across SaaS/GenAI and web apps, and deliver a delightful user experience.

Whether you're a security architect, IT leader, or network professional, this seminar offers actionable insights and practical guidance to strengthen your organization’s security strategy.

Topics: Information Security
11:00 - 11:50 AM

[1 CPE] Cybersecurity and Compliance For 2025

  Presented by Chris Green, Manager, Penetration Testing • Structured

The cybersecurity regulatory compliance landscape has never been more complicated, and this presentation will provide information and updates to CMMC, GLBA, PCI, TSA, generative AI, and security best practices. Presented by Chris Green, Manager, Penetration Testing at Structured, this discussion will focus on security solutions to these challenges, including penetration testing and zero-trust implementations.

Topics: Information Security
1:00 - 1:50 PM

[1 CPE] Zero Trust in Motion: Securing East/West Traffic to Reduce Risk

  Presented by Rob Miley, AZ Commercial Sales Engineer • HPE Aruba Networking

Ransomware and targeted cyber security threats are on the rise. A proactive prevention strategy should use both tried and proven methodologies as well as new and emerging technologies. East West traffic identification and isolation is key in preventing malicious content from spreading, both in the Data Center and at the Campus Edge of the network. We will focus on innovative approaches to address the security compliance, performance, agility, and scalability demands of today’s highly distributed, hybrid, network environments.

Topics: Information Security
2:00 - 2:50 PM

[1 CPE] Cloud AI Ops: Changing the Network Management Paradigm

  Presented by Brian Matthews, Director, Sales Engineering  • Juniper Networks

Artificial intelligence (AI) is poised to transform every aspect of our lives, from agriculture to healthcare, autonomous vehicles and mobile internet. But, how is AI changing the way we design, operate, and manage networks?

In this session, we will explore the future of AI with a focus on networking applications. We will share the Mist journey to cloud AI, and how we leveraged machine learning and deep learning to create a cloud AIOp solution that simplifies and automates network operations, improves user experience, and reduces costs. We will also discuss the fundamental elements of a networking cloud AIOp solution, such as data collection, processing, analysis, and action. Finally, we will examine the impact of AI on networking IT and the broader economy, and how AI can create new opportunities and challenges for network professionals.

Join us for this exciting and informative keynote and learn how AI can help you take your network to the next level.

Topics: Artificial Intelligence, Infrastructure

Advisory Council

HOW TO BE AN ADVISOR

Advisor-approved content is the foundation upon which INTERFACE was developed. Each conference is guided by an Advisory Council of IT executives and senior managers. Advisor members represent both private and public sector organizations. The council contributes its insight into proposed educational topics and recommends local exhibitors and associations for participation.

EXPAND TO VIEW LIST

Chris Alejandro
Head of Compliance
Apriva

Scott Campbell
Chief Information Security and Privacy Officer
City of Tempe, AZ

Don Clariza
Sr Lead Control Management Officer
Wells Fargo

CC Cornn
Manager, Information Technology
City of Tucson, AZ

Pamela Davis
Cybersecurity Threat Intelligence
Southwest Airlines

Owen Ellington
Manager, IT Communications
City of Scottsdale, AZ

Daniel Estrella
Sr Information System Security Officer
Raytheon

Rachel Evans
Sr IT Project Manager
Salt River Prima-Maricopa Indian Community

John Finnan
Director, Payment Cryptography Services
American Express

Anthony Flot
Chief Technology Officer
AZ Health Care Cost Containment System

Angie Green
Sr Manager, Cybersecurity, Information Assurance
Arete Associates

Frank Grimmelmann
President & CEO
ACTRA

Ryan Gruver
Director, Information Technology
Banner Health

Luke Guillow
Director, Information Technology
Commercial Properites Inc.

Kimberly Hunter
Information Security Engineer
American Airlines

Stephanie Inners
Manager, IT & Systems
R. E. Darling Co., Inc.

Michael Leff
Manager, Information Technology
Cutter Aviation

Mike Lettman
Sr Information Security Analyst
Tri Counties Bank

Mike Manrod
Chief Information Security Officer
Grand Canyon Education

Dina Mathers
Chief Information Security Officer
Carvana

Pete Meehan
Director, Information Technology
Maricopa County Regional School District

Randall Mitchell
Vice President, Information Systems
Arizona Musicfest

Dawn Noble
Chief Information Officer
Noble Logistics Management

Chad Palmer
Director, Area IT
CommonSpirit Health

Nick Petrishin
Manager, IT Service and Performance
Arizona Public Service

Gus Prudencio
Manager, Information Technology
Alpha Geotechnical & Materials

Catherine Rando
Vice President, Information Security
Del Norte Credit Union

Jerry Simpson
Deputy Chief Information Officer
City of Phoenix, AZ

Steve Smith
Sr Information Security Officer
Glendale Community College

Preston Soke
Manager, Information Systems Security
Gila River Indian Community

John Stark
Information Security Officer
AZ Dept of Health Services

Keith Stocks
VP, Third Party Cyber Risk Management
State Street

Joanne Storbeck
Director, Business Continuity Management
EMCOR Group, Inc.

Dana Suddarth
Manager, Information Security Compliance
Carvana

Ian Trollope
Deputy Chief Information Officer
City of Phoenix, AZ

Dan Wilkins
Chief Information Security Officer
AZ Dept of Economic Security

David Williams
Director, Application Development
Terros Health

Joshua Wycoff
Director, IT Security
Judicial Branch of Arizona

Roger Zehner
Manager, Information Security
American Express

Sponsors

HOW TO BE A SPONSOR

Participating exhibitors at INTERFACE achieve a greater return on their investment from this series of IT events than any other face-to-face medium available today. This success is achieved through a time-efficient and cost-effective presence for a pre-qualified audience. This simple formula leads to higher levels of business development opportunity at each event.

GOLD SPONSORS

ESET

ESET

ESET
For more than 30 years, ESET® has been developing industry-leading IT security software and services to protect businesses, critical infrastructure, and consumers worldwide.
Visit Website
Structured

Structured

Structured
Structured is an award-winning solution provider delivering secure, cloud-connected digital infrastructure. For 30 years, we’ve helped clients through all phases of digital transformation by securely bridging people, business and technology.
Visit Website

SILVER SPONSORS

Arctic Wolf

Arctic Wolf

Arctic Wolf
Arctic Wolf® is the market leader in security operations, and provides security operations as a concierge service. Our security experts work as an extension of your team to monitor and detect threats, and continually strengthen your security posture.
Visit Website
Axonius

Axonius

Axonius
Axonius is an asset inventory management platform that focuses on cybersecurity solutions and policies.
Visit Website
EVOTEK

EVOTEK

EVOTEK
EVOTEK™ is North America's premier enabler of digital business with a focus on innovation. With technology offerings in cybersecurity, data center, automation and cloud, EVOTEK is uniquely equipped to enable customers with the industry shift from traditional IT computing to secure multi-cloud.
Visit Website
Fortinet

Fortinet

Fortinet
Fortinet empowers its customers with intelligent, seamless protection across the expanding attack surface & the power to take on the ever-increasing performance requirements of the borderless network – today and into the future.
Visit Website
HPE Aruba Networking

HPE Aruba Networking

HPE Aruba Networking
Deliver the performance and uninterrupted access your business demands with a Zero Trust foundation and AI-automated operations that help you innovate with the least risk.
Visit Website
Infoblox

Infoblox

Infoblox
Infoblox unites networking and security to deliver unmatched performance and protection. Trusted by Fortune 100 companies and emerging innovators, we provide real-time visibility and control over who and what connects to your network, so your organization runs faster and stops threats earlier.
Visit Website
iT1 Source

iT1 Source

iT1 Source
Since 2003, iT1 Source has provided a wide range of IT solutions –– from big data and communications to online support and virtualization.
Visit Website
Mastercard Cybersecurity

Mastercard Cybersecurity

Mastercard Cybersecurity
Through unique threat intelligence and multi-layered, cloud-based defense technologies, Mastercard Cybersecurity helps organizations and consumers address risk in real-time, enhancing resilience against today’s most sophisticated cyberattacks.
Visit Website
Netskope

Netskope

Netskope
Netskope, a global SASE leader, helps organizations apply zero trust principles and AI/ML innovations to protect data and defend against cyber threats. The Netskope platform provides optimized access and real-time security for people, devices, and data anywhere they go. Learn how Netskope helps customers be ready for anything on their SASE journey, visit netskope.com.
Visit Website
Semperis

Semperis

Semperis
Semperis is the industry's most comprehensive Active Directory security and recovery platform, protecting hybrid AD environments from identity-based attacks.
Visit Website

BRONZE SPONSORS

Adlumin

Adlumin

Adlumin
Adlumin's security and compliance automation platform helps organizations manage evolving threats and cybersecurity compliance requirements.
Visit Website
baramundi

baramundi

baramundi
baramundi Software offers efficient, secure, and cross-platform management of workstation environments. With over 20 years of UEM experience across the globe, over 4,000 customers benefit from our intuitive, single-interface platform.
Visit Website
CompuNet

CompuNet

CompuNet
CompuNet is a leading U.S. information technology partner, headquartered in Boise, Idaho. The firm specializes in consultation, design and implementation services specifically tailored to solve business problems. With a best-in-class engineering staff and approach, CompuNet focuses on building lasting relationships that prioritize client satisfaction over sales through every step of the journey.
Visit Website
Gigamon

Gigamon

Gigamon
Gigamon offers a deep observability pipeline that harnesses actionable network-level intelligence to amplify the power of observability tools. This powerful combination enables IT organizations to assure security and compliance governance, speed root-cause analysis of performance bottlenecks, and lower operational overhead associated with managing hybrid and multi-cloud IT infrastructures.
Visit Website
Hitachi Vantara

Hitachi Vantara

Hitachi Vantara
Hitachi Vantara helps enterprises create and derive value from their data. Its solutions include best-in-class data management, IT infrastructure and analytics products, IoT solutions and Smart Spaces technologies for a broad range of industries.
Visit Website
OpenClassrooms

OpenClassrooms

OpenClassrooms
OpenClassrooms' powers a learning platform with more than 600 online courses on a wide range of subjects, from coding and software engineering to management and soft skills. OpenClassrooms offers more than 50 complete training programs, leading to career-focused skills: web development, application development, cybersecurity analysis, instructional design, etc.
Visit Website
Tech Heads

Tech Heads

Tech Heads
Tech Heads provides IT infrastructure design, procurement, managed services and managed security services, with a 25+ year track record.
Visit Website

SPONSOR HIGHLIGHTS

Enjoy enhanced experiences at INTERFACE Phoenix from these highlighted sponsors.

baramundi

baramundi

baramundi
baramundi Software offers efficient, secure, and cross-platform management of workstation environments. With over 20 years of UEM experience across the globe, over 4,000 customers benefit from our intuitive, single-interface platform.
Visit Website
ESET

ESET

ESET
For more than 30 years, ESET® has been developing industry-leading IT security software and services to protect businesses, critical infrastructure, and consumers worldwide.
Visit Website
Hitachi Vantara

Hitachi Vantara

Hitachi Vantara
Hitachi Vantara helps enterprises create and derive value from their data. Its solutions include best-in-class data management, IT infrastructure and analytics products, IoT solutions and Smart Spaces technologies for a broad range of industries.
Visit Website
Structured

Structured

Structured
Structured is an award-winning solution provider delivering secure, cloud-connected digital infrastructure. For 30 years, we’ve helped clients through all phases of digital transformation by securely bridging people, business and technology.
Visit Website

EXHIBITORS & ASSOCIATIONS

ACP Phoenix

ACP Phoenix

ACP Phoenix
ACP is a professional organization that provides a forum for the exchange of experiences and information for business continuity leaders throughout a network of local Chapters.
Visit Website
ACTRA

ACTRA

ACTRA
ACTRA serves as the hub for collaborative information sharing, where partners from industry, government, academia, law enforcement and intelligence come together, to respond to cyber threats, protecting our nation’s security interests.
Visit Website
AFCOM Phoenix

AFCOM Phoenix

AFCOM Phoenix
AFCOM advances data center professionals by delivering comprehensive and vendor-neutral education and peer-to-peer networking to its members around the globe.
Visit Website
AllSTEM

AllSTEM

AllSTEM
AllSTEM Connnections take the time to understand the needs of STEM professionals and companies to make the best connections in STEM related industries.
Visit Website
Apporto

Apporto

Apporto
Managed Cloud Desktops by Apporto. Deliver a fully managed and integrated cloud desktop solution and stop hassling with infrastructure.
Visit Website
ASIS Phoenix

ASIS Phoenix

ASIS Phoenix
ASIS International is dedicated to increasing the effectiveness and productivity of security professionals by developing educational programs and materials that address broad security interests as well as specific security topic areas.
Visit Website
Barracuda

Barracuda

Barracuda
Barracuda Networks is the worldwide leader in Security, Application Delivery and Data Protection Solutions. More than 200,000 global customers trust Barracuda to safeguard their employees, data, and applications from a wide range of threats. Barracuda provides easy, comprehensive and affordable solutions for email protection, application protection, network protection and data protection. We are continually innovating to deliver tomorrow’s security technology, today.
Visit Website
Caliber Security Partners

Caliber Security Partners

Caliber Security Partners
Protect your business and secure your assets with Caliber Security Partners. We offer actionable solutions for your information security needs, including network and systems security, data compliance, and strategy governance. Contact us today for comprehensive cybersecurity services.
Visit Website
Cherry

Cherry

Cherry
Cherry Americas LLC is a global leader in the design, development, and manufacture of computer keyboards, mice, magnetic and chip card readers, and the best mechanical key switches in the industry. Select from hundreds of computer input devices focused on the POS, industrial, healthcare, and IT security markets.
Visit Website
CSA Southwest

CSA Southwest

CSA Southwest
To promote the use of best practices for providing security assurance within Cloud Computing, and provide education on the uses of Cloud Computing to help secure all other forms of computing.
Visit Website
Eaton

Eaton

Eaton
Eaton’s Wright Line business is a leading, global designer and manufacturer of modular office furniture, technical lab furniture, command consoles, data center enclosures and airflow management solutions.
Visit Website
HPE Juniper Networking

HPE Juniper Networking

HPE Juniper Networking
Juniper Networks is now part of HPE. Together, we're building industry-leading, secure, AI-native networks – purpose-built with and for AI. As AI and networking converge, we're driving a bold transformation across enterprises, service providers, and cloud operators.
Visit Website
InfraGard Arizona

InfraGard Arizona

InfraGard Arizona
Arizona InfraGard’s Mission is to help protect Arizona’s infrastructure by supporting the priorities of the FBI to cultivate partnerships with public and private sectors through the sharing of actionable information,training and educational events.
Visit Website
Insight

Insight

Insight
Insight is a leading solutions and systems integrator — providing computer hardware, software, cloud solutions and IT services to business, government, education and healthcare clients.
Visit Website
Invite Networks

Invite Networks

Invite Networks
Explore INVITE Networks managed IT services in Salt Lake City. We are your trusted resource for comprehensive IT solutions, including MSP, collaboration, cybersecurity, and more. Learn how we can support your business.
Visit Website
ISACA Phoenix

ISACA Phoenix

ISACA Phoenix
The purpose of the ISACA Phoenix Chapter is to promote the education of individuals for the improvement and development of their capabilities relating to the auditing of and/or management consulting in the field of Information Systems audit and control.
Visit Website
ISSA Phoenix

ISSA Phoenix

ISSA Phoenix
The mission of the Phoenix ISSA Chapter is to provide a forum for the education of information security to its members through presentations and open discussions on topics important to the members and the information security industry.
Visit Website
Legrand

Legrand

Legrand
The industry-leading brands of Approved Networks Ortronics, Raritan, Server Technology, Starline and ZPE empower Legrand’s Data, Power & Control to produce innovative solutions for data centers, building networks, and facility infrastructures. Our division designs, manufactures, and markets world-class products for a more productive and sustainable future. The exceptional reliability of our technologies results from decades of proven performance and a dedication to research and development. For more information, please visit our website.
Visit Website
Lenovo

Lenovo

Lenovo
Lenovo is one of the world's leading personal technology companies, producing innovative PCs and mobile internet devices. A global Fortune 500 company, Lenovo is the world's largest PC vendor and fourth largest smartphone company.
Visit Website
MSPAA

MSPAA

MSPAA
The MSP Association of America (MSPAA) has been established with three primary missions, each of which follows a unique trajectory aimed at providing our clients, members, and students with a collaborative and informative pathway towards building a future for technology, business, and education.
Visit Website
Netop

Netop

Netop
Netop is transforming the secure remote access and control market by reducing downtime, improving reliability, and simplifying the complexity of modern remote device management without compromising security. With more than 40 years of experience supporting over 5 million devices in over 80 countries, Netop is the trusted choice for secure remote control.
Visit Website
Palo Alto Networks

Palo Alto Networks

Palo Alto Networks
Palo Alto Networks™ is the network security company. Its next-generation firewalls enable unprecedented visibility and granular policy control of applications and content – by user, not just IP address – at up to 10Gbps with no performance degradation.
Visit Website
PMI Phoenix

PMI Phoenix

PMI Phoenix
Project Management Institute (PMI) is the world's leading not-for-profit professional membership association for the project, program and portfolio management profession.
Visit Website
SHI

SHI

SHI
From designing cloud, data center and end user computing strategies that support your hybrid working model to delivering the hardware and software you need to run it, SHI is your complete IT partner.
Visit Website
Tanium

Tanium

Tanium
Tanium gives the world's largest enterprises and government organizations the unique power to secure, control and manage millions of endpoints across the enterprise. 
Visit Website
WiCyS Phoenix

WiCyS Phoenix

WiCyS Phoenix
Women in CyberSecurity is the premier organization with international reach dedicated to bringing together women in cybersecurity from academia, research and industry to share knowledge, experience, networking and mentoring.
Visit Website
World Wide Technology

World Wide Technology

World Wide Technology
World Wide Technology (WWT) WWT, a $20B, privately held technology solutions provider leading the AI and Digital Revolution, has over 30 years of experience helping the world's largest organizations make the right technology decisions faster. Commercial enterprise, public sector and service provider clients work with WWT from strategy to execution bolstered by hands-on access to cutting-edge capabilities across infrastructure, data and AI, security, cloud and more through the Advanced Technology Center.
Visit Website

Interested in becoming part of our next Phoenix event?

CONTACT US FOR INFO

Phoenix

Westin Kierland Resort
Grand Ballroom
6902 E. Greenway Parkway
Scottsdale, AZ 85245

Directions & Parking

About Us

We produce quality, cutting-edge educational seminars, drawn from case studies and best practice examples from leaders in the field.

800-365-6402
Contact Us

Popular Searches

  • Event Registration
  • Become an Exhibitor
  • Become an Advisor
  • Sponsor an Event
  • Contact Event Coordinator
  • Submit Feedback

Seminar Topics

  • Artificial Intelligence
  • BC / DR
  • Culture
  • Data Center Technology
  • Data Management
  • Data Storage
  • Digital Experience
  • Information Security
  • Infrastructure
  • Strategic Management
  • Unified Communications

2026 Events

  • Portland • March 19th
  • Anchorage • April 22nd
  • Honolulu • May 21st
  • Phoenix • June 18th
  • Wyoming • July 9th
  • Montana • July 29th
  • Boise • August 20th
  • Salt Lake City • September 22nd
  • Spokane • October 15th
  • Omaha • November 5th
  • Seattle • December 3rd
  • Home
  • About
  • Get Involved
  • Events
  • Register
  • © 2026 F2F Events, Inc.